{"id":"https://openalex.org/W3009999820","doi":"https://doi.org/10.1109/globecom38437.2019.9013272","title":"Machine Learning Classification on Traffic of Secondary Encryption","display_name":"Machine Learning Classification on Traffic of Secondary Encryption","publication_year":2019,"publication_date":"2019-12-01","ids":{"openalex":"https://openalex.org/W3009999820","doi":"https://doi.org/10.1109/globecom38437.2019.9013272","mag":"3009999820"},"language":"en","primary_location":{"id":"doi:10.1109/globecom38437.2019.9013272","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom38437.2019.9013272","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047030842","display_name":"Meng Shen","orcid":"https://orcid.org/0000-0002-1867-0972"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Meng Shen","raw_affiliation_strings":["School of Computer Science, Beijing Institute of Technology, Beijing, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Beijing Institute of Technology, Beijing, P. R. China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100685019","display_name":"Jinpeng Zhang","orcid":"https://orcid.org/0000-0003-0524-9190"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinpeng Zhang","raw_affiliation_strings":["School of Computer Science, Beijing Institute of Technology, Beijing, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Beijing Institute of Technology, Beijing, P. R. China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100460985","display_name":"Siqi Chen","orcid":"https://orcid.org/0000-0003-0970-3733"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Siqi Chen","raw_affiliation_strings":["School of Computer Science, Beijing Institute of Technology, Beijing, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Beijing Institute of Technology, Beijing, P. R. China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100664853","display_name":"Yiting Liu","orcid":"https://orcid.org/0000-0003-1837-0301"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yiting Liu","raw_affiliation_strings":["School of Computer Science, Beijing Institute of Technology, Beijing, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Beijing Institute of Technology, Beijing, P. R. China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100634361","display_name":"Liehuang Zhu","orcid":"https://orcid.org/0000-0003-3277-3887"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liehuang Zhu","raw_affiliation_strings":["School of Computer Science, Beijing Institute of Technology, Beijing, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Beijing Institute of Technology, Beijing, P. R. China","institution_ids":["https://openalex.org/I125839683"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5047030842"],"corresponding_institution_ids":["https://openalex.org/I125839683"],"apc_list":null,"apc_paid":null,"fwci":0.28,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.6795864,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.8646319508552551},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8384628295898438},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7997453212738037},{"id":"https://openalex.org/keywords/discriminative-model","display_name":"Discriminative model","score":0.7005069851875305},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.6365481615066528},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.5989035964012146},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5822400450706482},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep packet inspection","score":0.5816892385482788},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.5645760893821716},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5220967531204224},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4939644932746887},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.48930856585502625},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.48075008392333984},{"id":"https://openalex.org/keywords/traffic-analysis","display_name":"Traffic analysis","score":0.45816662907600403},{"id":"https://openalex.org/keywords/web-traffic","display_name":"Web traffic","score":0.43404752016067505},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.22741422057151794},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.19828999042510986},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1642238199710846}],"concepts":[{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.8646319508552551},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8384628295898438},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7997453212738037},{"id":"https://openalex.org/C97931131","wikidata":"https://www.wikidata.org/wiki/Q5282087","display_name":"Discriminative model","level":2,"score":0.7005069851875305},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.6365481615066528},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.5989035964012146},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5822400450706482},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.5816892385482788},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.5645760893821716},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5220967531204224},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4939644932746887},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.48930856585502625},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.48075008392333984},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.45816662907600403},{"id":"https://openalex.org/C2777672014","wikidata":"https://www.wikidata.org/wiki/Q1172573","display_name":"Web traffic","level":3,"score":0.43404752016067505},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.22741422057151794},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.19828999042510986},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1642238199710846},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom38437.2019.9013272","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom38437.2019.9013272","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6899999976158142,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1481628066","https://openalex.org/W1521422460","https://openalex.org/W2002658930","https://openalex.org/W2010716466","https://openalex.org/W2108217512","https://openalex.org/W2125216345","https://openalex.org/W2135579486","https://openalex.org/W2190207511","https://openalex.org/W2238866705","https://openalex.org/W2272516773","https://openalex.org/W2505363557","https://openalex.org/W2605422749","https://openalex.org/W2949330846","https://openalex.org/W2960741711","https://openalex.org/W2969849834"],"related_works":["https://openalex.org/W2964663688","https://openalex.org/W3171671300","https://openalex.org/W4399181772","https://openalex.org/W2062731068","https://openalex.org/W4293901154","https://openalex.org/W4293088549","https://openalex.org/W4296473472","https://openalex.org/W3174245262","https://openalex.org/W1917343041","https://openalex.org/W3007491104"],"abstract_inverted_index":{"Encrypted":[0],"traffic":[1,36,60,108],"classification":[2,28],"plays":[3],"an":[4,16,71],"important":[5],"role":[6],"in":[7],"network":[8],"management.":[9],"In":[10,51],"this":[11],"paper,":[12],"we":[13,64],"take":[14],"as":[15,45],"example":[17],"of":[18,48],"the":[19,34,56,74,84,117,121],"web":[20],"browsing":[21],"application,":[22],"and":[23,77],"propose":[24],"a":[25,66],"machine":[26,99],"learning":[27,100],"scheme,":[29],"Bali,":[30],"that":[31,73,116],"can":[32,94],"identify":[33],"encrypted":[35,49,59],"from":[37,61,83],"various":[38,62],"websites.":[39],"We":[40],"employ":[41],"packet":[42],"length":[43],"statistics":[44],"discriminative":[46],"features":[47],"traffic.":[50],"order":[52],"to":[53],"further":[54],"investigate":[55],"differences":[57],"among":[58],"websites,":[63],"develop":[65],"clustering":[67],"method":[68,119],"based":[69],"on":[70],"observation":[72],"first":[75],"outgoing":[76],"incoming":[78],"packets":[79],"with":[80],"specific":[81],"flags":[82],"same":[85],"website":[86],"have":[87],"similar":[88],"features.":[89],"The":[90],"above":[91],"two":[92],"techniques":[93],"be":[95],"incorporated":[96],"into":[97],"typical":[98],"models":[101],"(e.g.,":[102],"random":[103],"forests,":[104],"SVM,":[105],"kNN)":[106],"for":[107],"classification.":[109],"Experiment":[110],"results":[111],"using":[112],"real-world":[113],"datasets":[114],"demonstrate":[115],"proposed":[118],"outperforms":[120],"state-of-the-art":[122],"methods.":[123]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
