{"id":"https://openalex.org/W7138865585","doi":"https://doi.org/10.1109/globecom59602.2025.11432783","title":"NetGuard: Awareness of Network Access Behaviour via Real-Time Passive Traffic Analysis","display_name":"NetGuard: Awareness of Network Access Behaviour via Real-Time Passive Traffic Analysis","publication_year":2025,"publication_date":"2025-12-08","ids":{"openalex":"https://openalex.org/W7138865585","doi":"https://doi.org/10.1109/globecom59602.2025.11432783"},"language":null,"primary_location":{"id":"doi:10.1109/globecom59602.2025.11432783","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom59602.2025.11432783","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2025 - 2025 IEEE Global Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100362635","display_name":"Wenhao Li","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136246","display_name":"China Telecom (China)","ror":"https://ror.org/03jgnzt20","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136246"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wenhao Li","raw_affiliation_strings":["Research Institute of China Telecom Corporation Ltd.,Guangzhou"],"affiliations":[{"raw_affiliation_string":"Research Institute of China Telecom Corporation Ltd.,Guangzhou","institution_ids":["https://openalex.org/I4210136246"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130171569","display_name":"Jie Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136246","display_name":"China Telecom (China)","ror":"https://ror.org/03jgnzt20","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136246"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Chen","raw_affiliation_strings":["Research Institute of China Telecom Corporation Ltd.,Guangzhou"],"affiliations":[{"raw_affiliation_string":"Research Institute of China Telecom Corporation Ltd.,Guangzhou","institution_ids":["https://openalex.org/I4210136246"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036444230","display_name":"Wanting Gou","orcid":"https://orcid.org/0000-0002-5233-1958"},"institutions":[{"id":"https://openalex.org/I4210136246","display_name":"China Telecom (China)","ror":"https://ror.org/03jgnzt20","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136246"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wanting Gou","raw_affiliation_strings":["Research Institute of China Telecom Corporation Ltd.,Guangzhou"],"affiliations":[{"raw_affiliation_string":"Research Institute of China Telecom Corporation Ltd.,Guangzhou","institution_ids":["https://openalex.org/I4210136246"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130103064","display_name":"Huamin Jin","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136246","display_name":"China Telecom (China)","ror":"https://ror.org/03jgnzt20","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136246"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huamin Jin","raw_affiliation_strings":["Research Institute of China Telecom Corporation Ltd.,Guangzhou"],"affiliations":[{"raw_affiliation_string":"Research Institute of China Telecom Corporation Ltd.,Guangzhou","institution_ids":["https://openalex.org/I4210136246"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130018754","display_name":"Shuai Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136246","display_name":"China Telecom (China)","ror":"https://ror.org/03jgnzt20","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136246"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuai Wang","raw_affiliation_strings":["Research Institute of China Telecom Corporation Ltd.,Guangzhou"],"affiliations":[{"raw_affiliation_string":"Research Institute of China Telecom Corporation Ltd.,Guangzhou","institution_ids":["https://openalex.org/I4210136246"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5130004706","display_name":"Xiao-Yu Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiao-Yu Zhang","raw_affiliation_strings":["Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100362635"],"corresponding_institution_ids":["https://openalex.org/I4210136246"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.88100744,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"3037","last_page":"3042"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9581999778747559,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9581999778747559,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.007699999958276749,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.0071000000461936,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.6226000189781189},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5812000036239624},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.559499979019165},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5056999921798706},{"id":"https://openalex.org/keywords/optimal-distinctiveness-theory","display_name":"Optimal distinctiveness theory","score":0.48840001225471497},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.47450000047683716},{"id":"https://openalex.org/keywords/access-network","display_name":"Access network","score":0.4625999927520752},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.39980000257492065},{"id":"https://openalex.org/keywords/network-access-device","display_name":"Network Access Device","score":0.39660000801086426}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7049999833106995},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.6226000189781189},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5812000036239624},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.559499979019165},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5056999921798706},{"id":"https://openalex.org/C47385372","wikidata":"https://www.wikidata.org/wiki/Q7098943","display_name":"Optimal distinctiveness theory","level":2,"score":0.48840001225471497},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.47450000047683716},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46619999408721924},{"id":"https://openalex.org/C62793504","wikidata":"https://www.wikidata.org/wiki/Q228327","display_name":"Access network","level":2,"score":0.4625999927520752},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4537999927997589},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.39980000257492065},{"id":"https://openalex.org/C184533269","wikidata":"https://www.wikidata.org/wiki/Q16977811","display_name":"Network Access Device","level":4,"score":0.39660000801086426},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.3831000030040741},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.3788999915122986},{"id":"https://openalex.org/C1304207","wikidata":"https://www.wikidata.org/wiki/Q7189582","display_name":"Physical access","level":3,"score":0.33079999685287476},{"id":"https://openalex.org/C78834623","wikidata":"https://www.wikidata.org/wiki/Q640394","display_name":"Mobile broadband","level":3,"score":0.3222000002861023},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.3176000118255615},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.31450000405311584},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3046000003814697},{"id":"https://openalex.org/C204222849","wikidata":"https://www.wikidata.org/wiki/Q104954","display_name":"Radio-frequency identification","level":2,"score":0.298799991607666},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.29179999232292175},{"id":"https://openalex.org/C95491727","wikidata":"https://www.wikidata.org/wiki/Q992968","display_name":"Mobile telephony","level":3,"score":0.28529998660087585},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2784999907016754},{"id":"https://openalex.org/C2983646967","wikidata":"https://www.wikidata.org/wiki/Q688498","display_name":"Access technology","level":3,"score":0.263700008392334},{"id":"https://openalex.org/C106365562","wikidata":"https://www.wikidata.org/wiki/Q3078360","display_name":"Radio access network","level":4,"score":0.25459998846054077},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.25220000743865967}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom59602.2025.11432783","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom59602.2025.11432783","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2025 - 2025 IEEE Global Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1529710634","https://openalex.org/W2096587965","https://openalex.org/W2179036394","https://openalex.org/W2295598076","https://openalex.org/W2599600800","https://openalex.org/W2613715541","https://openalex.org/W2915004662","https://openalex.org/W2919493784","https://openalex.org/W2952586546","https://openalex.org/W2994866269","https://openalex.org/W2997618270","https://openalex.org/W3007237867","https://openalex.org/W3007562398","https://openalex.org/W3015650867","https://openalex.org/W3035950449","https://openalex.org/W4296893596","https://openalex.org/W4312401453","https://openalex.org/W4321487091","https://openalex.org/W4322577210","https://openalex.org/W4366147360","https://openalex.org/W4367046757","https://openalex.org/W4367046987","https://openalex.org/W4386260511","https://openalex.org/W4387011100","https://openalex.org/W4387011225"],"related_works":[],"abstract_inverted_index":{"In":[0],"the":[1,7,13,33,78,96,130],"academic":[2],"discourse":[3],"of":[4,9,15,23,35,98,111,137],"network":[5,19,70,112],"management,":[6],"identification":[8],"unauthorized":[10],"access":[11,20,71,88],"and":[12,46,108,140],"profiling":[14],"mobile":[16,138],"devices":[17],"through":[18,90],"detection":[21,29,110],"are":[22,38],"paramount":[24],"importance.":[25],"The":[26],"prevalent":[27],"endpoint-based":[28],"methods,":[30],"which":[31],"necessitate":[32],"deployment":[34],"monitoring":[36],"software,":[37],"fraught":[39],"with":[40],"challenges":[41],"that":[42,67],"impede":[43],"their":[44],"scalability":[45],"applicability":[47],"across":[48],"diverse":[49],"operating":[50],"systems,":[51],"often":[52],"due":[53],"to":[54],"prohibitive":[55],"costs.":[56],"To":[57,122],"surmount":[58],"these":[59],"obstacles,":[60],"we":[61,126],"propose":[62],"NetGuard,":[63],"a":[64,91,134],"pioneering":[65],"system":[66],"passively":[68],"discerns":[69],"patterns":[72,89],"from":[73],"gateway-level":[74],"traffic.":[75],"Grounded":[76],"in":[77,119],"innovative":[79],"Domain":[80],"Name":[81],"Forest":[82],"(dnForest)":[83],"fingerprinting,":[84],"NetGuard":[85,146],"refines":[86],"device-specific":[87],"two-stage":[92],"distillation":[93],"algorithm,":[94],"enhancing":[95],"distinctiveness":[97],"each":[99],"device\u2019s":[100],"digital":[101],"signature.":[102],"This":[103],"refined":[104],"methodology":[105],"enables":[106],"efficient":[107],"real-time":[109],"access,":[113],"as":[114],"evidenced":[115],"by":[116],"our":[117],"experiments":[118],"real-world":[120],"settings.":[121],"advance":[123],"scholarly":[124],"investigation,":[125],"have":[127],"meticulously":[128],"compiled":[129],"NetCess2023":[131],"dataset,":[132],"encompassing":[133],"broad":[135],"spectrum":[136],"devices,":[139],"made":[141],"it":[142],"publicly":[143],"available":[144],"alongside":[145],"prototype":[147],"at":[148],"https://github.com/SecTeamPolaris/NetGuard.":[149]},"counts_by_year":[],"updated_date":"2026-03-20T20:54:20.808490","created_date":"2026-03-20T00:00:00"}
