{"id":"https://openalex.org/W4320029471","doi":"https://doi.org/10.1109/globecom48099.2022.10001131","title":"An Adversarial Learning-based Tor Malware Traffic Detection Model","display_name":"An Adversarial Learning-based Tor Malware Traffic Detection Model","publication_year":2022,"publication_date":"2022-12-04","ids":{"openalex":"https://openalex.org/W4320029471","doi":"https://doi.org/10.1109/globecom48099.2022.10001131"},"language":"en","primary_location":{"id":"doi:10.1109/globecom48099.2022.10001131","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom48099.2022.10001131","pdf_url":null,"source":{"id":"https://openalex.org/S4363607705","display_name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073150709","display_name":"Xiaoyan Hu","orcid":"https://orcid.org/0000-0002-4172-1977"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]},{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaoyan Hu","raw_affiliation_strings":["School of Cyber Science &#x0026; Engineering, Southeast University,Nanjing,China,211189","Purple Mountain Laboratories for Network and Communication Security, Nanjing, China","Jiangsu Provincial Engineering Research Center of Security for Ubiquitous Network, Nanjing, China","Research Base of International Cyberspace Governance (Southeast University), Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science &#x0026; Engineering, Southeast University,Nanjing,China,211189","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Purple Mountain Laboratories for Network and Communication Security, Nanjing, China","institution_ids":["https://openalex.org/I4210155350"]},{"raw_affiliation_string":"Jiangsu Provincial Engineering Research Center of Security for Ubiquitous Network, Nanjing, China","institution_ids":[]},{"raw_affiliation_string":"Research Base of International Cyberspace Governance (Southeast University), Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101005780","display_name":"Yishu Gao","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yishu Gao","raw_affiliation_strings":["School of Cyber Science &#x0026; Engineering, Southeast University,Nanjing,China,211189"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science &#x0026; Engineering, Southeast University,Nanjing,China,211189","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043707940","display_name":"Guang Cheng","orcid":"https://orcid.org/0000-0001-8642-4362"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guang Cheng","raw_affiliation_strings":["School of Cyber Science &#x0026; Engineering, Southeast University,Nanjing,China,211189"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science &#x0026; Engineering, Southeast University,Nanjing,China,211189","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032328549","display_name":"Hua Wu","orcid":"https://orcid.org/0000-0002-8829-0182"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hua Wu","raw_affiliation_strings":["School of Cyber Science &#x0026; Engineering, Southeast University,Nanjing,China,211189"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science &#x0026; Engineering, Southeast University,Nanjing,China,211189","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100665328","display_name":"Ruidong Li","orcid":"https://orcid.org/0000-0002-9905-8952"},"institutions":[{"id":"https://openalex.org/I10091056","display_name":"Kanazawa University","ror":"https://ror.org/02hwp6a56","country_code":"JP","type":"education","lineage":["https://openalex.org/I10091056"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Ruidong Li","raw_affiliation_strings":["Institute of Science and Engineering, Kanazawa University,Kakuma, Kanazawa,Japan,920-1192"],"affiliations":[{"raw_affiliation_string":"Institute of Science and Engineering, Kanazawa University,Kakuma, Kanazawa,Japan,920-1192","institution_ids":["https://openalex.org/I10091056"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5073150709"],"corresponding_institution_ids":["https://openalex.org/I4210155350","https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":0.4155,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.60498815,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"1050","issue":null,"first_page":"74","last_page":"79"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8715904355049133},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7931876182556152},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7723963856697083},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6032646298408508},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.601718544960022},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.545806348323822},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5201519131660461},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.497882604598999},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.47262927889823914},{"id":"https://openalex.org/keywords/retraining","display_name":"Retraining","score":0.4537520706653595},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3250425159931183},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.09457889199256897}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8715904355049133},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7931876182556152},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7723963856697083},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6032646298408508},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.601718544960022},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.545806348323822},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5201519131660461},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.497882604598999},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.47262927889823914},{"id":"https://openalex.org/C2778712577","wikidata":"https://www.wikidata.org/wiki/Q3505966","display_name":"Retraining","level":2,"score":0.4537520706653595},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3250425159931183},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.09457889199256897},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom48099.2022.10001131","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom48099.2022.10001131","pdf_url":null,"source":{"id":"https://openalex.org/S4363607705","display_name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.800000011920929,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1973980104","https://openalex.org/W2062173166","https://openalex.org/W2103312864","https://openalex.org/W2172011174","https://openalex.org/W2314121694","https://openalex.org/W2341111334","https://openalex.org/W2461943168","https://openalex.org/W2535690855","https://openalex.org/W2591712613","https://openalex.org/W2769585469","https://openalex.org/W2902408484","https://openalex.org/W2908403421","https://openalex.org/W2923778952","https://openalex.org/W2963115223","https://openalex.org/W2964318098","https://openalex.org/W3047194494","https://openalex.org/W3111563271","https://openalex.org/W3113651845","https://openalex.org/W3198511875","https://openalex.org/W4293846201","https://openalex.org/W6739868092"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2081982437","https://openalex.org/W4394857231","https://openalex.org/W2027050655","https://openalex.org/W4320018150","https://openalex.org/W4239582170","https://openalex.org/W2918664383","https://openalex.org/W106056076","https://openalex.org/W4320855730","https://openalex.org/W2135200719"],"abstract_inverted_index":{"Attackers":[0],"often":[1,46],"use":[2,94],"Tor":[3,25,40,68,78,116],"to":[4,59,97,147,161],"launch":[5],"cyberattacks":[6],"and":[7,14,31,93,140,157],"conduct":[8],"illegal":[9],"transactions,":[10],"threatening":[11],"cyberspace's":[12],"security":[13],"people's":[15],"daily":[16],"lives.":[17],"Existing":[18],"methods":[19],"for":[20,103],"malware":[21,41,117],"traffic":[22,42,118],"detection":[23,43,92,119],"on":[24],"can":[26,90],"be":[27,60],"classified":[28],"as":[29,186,188],"rule-based":[30],"network-based,":[32],"both":[33],"of":[34,166,179],"which":[35,194],"apply":[36],"machine":[37,53,137],"learning":[38,54,138],"extensively.":[39],"systems":[44,55],"are":[45,56],"deployed":[47],"in":[48,190],"open":[49],"network":[50],"environments.":[51],"Their":[52],"the":[57,145,163,176,182,198],"first":[58],"attacked":[61],"by":[62],"adversarial":[63,123,159,164,183,192,199],"samples.":[64],"To":[65],"ensure":[66],"that":[67,89,121,134,175],"is":[69,185,195],"not":[70],"abused,":[71],"this":[72],"paper":[73],"proposes":[74],"an":[75,99,130],"Adversarial":[76],"Learning-based":[77],"Malware":[79],"Traffic":[80],"Detection":[81],"model,":[82],"AL-TMTD.":[83],"We":[84,125,143],"generate":[85,158],"realistic":[86],"attack":[87],"samples":[88,96,160],"evade":[91],"these":[95],"produce":[98],"augmented":[100],"training":[101],"set":[102],"producing":[104],"hardened":[105],"detectors.":[106],"In":[107],"such":[108],"a":[109,113,201],"way,":[110],"we":[111],"obtain":[112],"more":[114],"resilient":[115],"model":[120,155],"achieves":[122],"robustness.":[124],"validate":[126,162],"our":[127,167],"proposal":[128],"through":[129,153],"extensive":[131],"experimental":[132,172],"campaign":[133],"considers":[135],"multiple":[136],"algorithms":[139],"shadow":[141,151],"models.":[142],"simulate":[144],"adversary":[146],"construct":[148],"functionally":[149],"approximate":[150],"models":[152],"black-box":[154],"extraction":[156],"robustness":[165],"proposed":[168],"AL-TMTD":[169,180],"model.":[170],"Our":[171],"results":[173],"demonstrate":[174],"average":[177],"accuracy":[178],"after":[181],"retraining":[184],"high":[187],"0.995":[189],"detecting":[191],"samples,":[193],"0.314":[196],"without":[197],"retraining,":[200],"significant":[202],"improvement.":[203]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
