{"id":"https://openalex.org/W2902427896","doi":"https://doi.org/10.1109/cybersa.2018.8551395","title":"Multilayer Perceptron Neural Network for Detection of Encrypted VPN Network Traffic","display_name":"Multilayer Perceptron Neural Network for Detection of Encrypted VPN Network Traffic","publication_year":2018,"publication_date":"2018-06-01","ids":{"openalex":"https://openalex.org/W2902427896","doi":"https://doi.org/10.1109/cybersa.2018.8551395","mag":"2902427896"},"language":"en","primary_location":{"id":"doi:10.1109/cybersa.2018.8551395","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cybersa.2018.8551395","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://pure.ulster.ac.uk/ws/files/76375033/Multilayer_Perceptron_Neural_Network_fo...ction_of_Encrypted_VPN_Network_Traffic.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076709709","display_name":"Shane Miller","orcid":null},"institutions":[{"id":"https://openalex.org/I138801177","display_name":"University of Ulster","ror":"https://ror.org/01yp9g959","country_code":"GB","type":"education","lineage":["https://openalex.org/I138801177"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Shane Miller","raw_affiliation_strings":["Faculty of Computing and Engineering, Ulster University, Northern Ireland"],"affiliations":[{"raw_affiliation_string":"Faculty of Computing and Engineering, Ulster University, Northern Ireland","institution_ids":["https://openalex.org/I138801177"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002868461","display_name":"Kevin Curran","orcid":"https://orcid.org/0000-0001-5237-5355"},"institutions":[{"id":"https://openalex.org/I138801177","display_name":"University of Ulster","ror":"https://ror.org/01yp9g959","country_code":"GB","type":"education","lineage":["https://openalex.org/I138801177"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Kevin Curran","raw_affiliation_strings":["Faculty of Computing and Engineering, Ulster University, Northern Ireland"],"affiliations":[{"raw_affiliation_string":"Faculty of Computing and Engineering, Ulster University, Northern Ireland","institution_ids":["https://openalex.org/I138801177"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111507525","display_name":"Tom Lunney","orcid":null},"institutions":[{"id":"https://openalex.org/I138801177","display_name":"University of Ulster","ror":"https://ror.org/01yp9g959","country_code":"GB","type":"education","lineage":["https://openalex.org/I138801177"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Tom Lunney","raw_affiliation_strings":["Faculty of Computing and Engineering, Ulster University, Northern Ireland"],"affiliations":[{"raw_affiliation_string":"Faculty of Computing and Engineering, Ulster University, Northern Ireland","institution_ids":["https://openalex.org/I138801177"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5076709709"],"corresponding_institution_ids":["https://openalex.org/I138801177"],"apc_list":null,"apc_paid":null,"fwci":2.0275,"has_fulltext":false,"cited_by_count":42,"citation_normalized_percentile":{"value":0.90124582,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/private-network","display_name":"Private network","score":0.778058648109436},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.7657750844955444},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7578537464141846},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6027061939239502},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.571703314781189},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5406519770622253},{"id":"https://openalex.org/keywords/perceptron","display_name":"Perceptron","score":0.5108618140220642},{"id":"https://openalex.org/keywords/multilayer-perceptron","display_name":"Multilayer perceptron","score":0.49775078892707825},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.48435792326927185},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.46512341499328613},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.44045987725257874},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.39607274532318115},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36956435441970825},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3456488251686096},{"id":"https://openalex.org/keywords/quality-of-service","display_name":"Quality of service","score":0.09370526671409607}],"concepts":[{"id":"https://openalex.org/C117387248","wikidata":"https://www.wikidata.org/wiki/Q11186","display_name":"Private network","level":2,"score":0.778058648109436},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.7657750844955444},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7578537464141846},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6027061939239502},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.571703314781189},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5406519770622253},{"id":"https://openalex.org/C60908668","wikidata":"https://www.wikidata.org/wiki/Q690207","display_name":"Perceptron","level":3,"score":0.5108618140220642},{"id":"https://openalex.org/C179717631","wikidata":"https://www.wikidata.org/wiki/Q2991667","display_name":"Multilayer perceptron","level":3,"score":0.49775078892707825},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.48435792326927185},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.46512341499328613},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.44045987725257874},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.39607274532318115},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36956435441970825},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3456488251686096},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.09370526671409607},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/cybersa.2018.8551395","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cybersa.2018.8551395","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.atira.dk:publications/7225b446-b726-4854-b27e-b5a1b7f7971f","is_oa":true,"landing_page_url":"https://pure.ulster.ac.uk/en/publications/7225b446-b726-4854-b27e-b5a1b7f7971f","pdf_url":"https://pure.ulster.ac.uk/ws/files/76375033/Multilayer_Perceptron_Neural_Network_fo...ction_of_Encrypted_VPN_Network_Traffic.pdf","source":{"id":"https://openalex.org/S4306402454","display_name":"Ulster University Research Portal (Ulster University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I138801177","host_organization_name":"University of Ulster","host_organization_lineage":["https://openalex.org/I138801177"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Miller, S, Curran, K & Lunney, T 2018, Multilayer Perceptron Neural Network for Detection of Encrypted VPN Network Traffic. in IEEE International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2018). pp. 12, IEEE International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2018), Glasgow, United Kingdom, 11/06/18. https://doi.org/10.1109/CyberSA.2018.8551395","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:pure.atira.dk:publications/7225b446-b726-4854-b27e-b5a1b7f7971f","is_oa":true,"landing_page_url":"https://pure.ulster.ac.uk/en/publications/7225b446-b726-4854-b27e-b5a1b7f7971f","pdf_url":"https://pure.ulster.ac.uk/ws/files/76375033/Multilayer_Perceptron_Neural_Network_fo...ction_of_Encrypted_VPN_Network_Traffic.pdf","source":{"id":"https://openalex.org/S4306402454","display_name":"Ulster University Research Portal (Ulster University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I138801177","host_organization_name":"University of Ulster","host_organization_lineage":["https://openalex.org/I138801177"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Miller, S, Curran, K & Lunney, T 2018, Multilayer Perceptron Neural Network for Detection of Encrypted VPN Network Traffic. in IEEE International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2018). pp. 12, IEEE International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2018), Glasgow, United Kingdom, 11/06/18. https://doi.org/10.1109/CyberSA.2018.8551395","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[{"score":0.6000000238418579,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2902427896.pdf","grobid_xml":"https://content.openalex.org/works/W2902427896.grobid-xml"},"referenced_works_count":18,"referenced_works":["https://openalex.org/W1491471319","https://openalex.org/W1958208689","https://openalex.org/W1972355341","https://openalex.org/W1980991316","https://openalex.org/W2010716466","https://openalex.org/W2027664152","https://openalex.org/W2030516862","https://openalex.org/W2063804286","https://openalex.org/W2073119119","https://openalex.org/W2103312864","https://openalex.org/W2120660108","https://openalex.org/W2331488455","https://openalex.org/W2343828539","https://openalex.org/W2465142808","https://openalex.org/W2496064548","https://openalex.org/W3023265243","https://openalex.org/W4233865259","https://openalex.org/W4249698975"],"related_works":["https://openalex.org/W2988306524","https://openalex.org/W2076543106","https://openalex.org/W2019891950","https://openalex.org/W4205292708","https://openalex.org/W2085842814","https://openalex.org/W2523437662","https://openalex.org/W4387048144","https://openalex.org/W2492135063","https://openalex.org/W2362514456","https://openalex.org/W2766585573"],"abstract_inverted_index":{"There":[0,21,55],"has":[1,16,41],"been":[2],"a":[3,43,81,108,138,152,156],"growth":[4],"in":[5,9,134,146],"popularity":[6,49],"of":[7,46,50,74,121,129,141,163],"privacy":[8,32],"the":[10,18,48,126,144],"personal":[11],"computing":[12],"space":[13],"and":[14,31,38,64,131],"this":[15,72,165],"influenced":[17],"IT":[19],"industry.":[20],"is":[22,95,104,117],"more":[23,29,58],"demand":[24],"for":[25],"websites":[26],"to":[27,69,83,86,92,112,118,124,136],"use":[28,75,120],"secure":[30],"focused":[33],"technologies":[34],"such":[35],"as":[36],"HTTPS":[37],"TLS.":[39],"This":[40,149],"had":[42],"knock-on":[44],"effect":[45],"increasing":[47],"Virtual":[51],"Private":[52],"Networks":[53],"(VPNs).":[54],"are":[56,66],"now":[57],"VPN":[59,130],"offerings":[60],"than":[61],"ever":[62],"before":[63],"some":[65],"exceptionally":[67],"simple":[68],"setup.":[70],"Unfortunately,":[71],"ease":[73],"means":[76],"that":[77],"businesses":[78],"will":[79],"have":[80],"need":[82],"be":[84],"able":[85],"classify":[87,113],"whether":[88],"an":[89,97,114],"incoming":[90,115],"connection":[91,116],"their":[93],"network":[94,160],"from":[96],"original":[98],"IP":[99],"address":[100],"or":[101],"if":[102],"it":[103],"being":[105],"proxied":[106],"through":[107],"VPN.":[109],"A":[110],"method":[111],"make":[119],"machine":[122],"learning":[123],"learn":[125],"general":[127],"patterns":[128],"non-VPN":[132],"traffic":[133],"order":[135],"build":[137],"model":[139,161],"capable":[140,162],"distinguishing":[142],"between":[143],"two":[145],"real":[147],"time.":[148],"paper":[150],"outlines":[151],"framework":[153],"built":[154],"on":[155],"multilayer":[157],"perceptron":[158],"neural":[159],"achieving":[164],"goal.":[166]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":11},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":5},{"year":2018,"cited_by_count":1}],"updated_date":"2026-03-17T17:19:04.345684","created_date":"2025-10-10T00:00:00"}
