{"id":"https://openalex.org/W2164588585","doi":"https://doi.org/10.1109/icc.2009.5199062","title":"Identifying the Use of Data/Voice/Video-Based P2P Traffic by DNS-Query Behavior","display_name":"Identifying the Use of Data/Voice/Video-Based P2P Traffic by DNS-Query Behavior","publication_year":2009,"publication_date":"2009-06-01","ids":{"openalex":"https://openalex.org/W2164588585","doi":"https://doi.org/10.1109/icc.2009.5199062","mag":"2164588585"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2009.5199062","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2009.5199062","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032499371","display_name":"Hung-Shen Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I25846049","display_name":"National Tsing Hua University","ror":"https://ror.org/00zdnkx70","country_code":"TW","type":"education","lineage":["https://openalex.org/I25846049"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"H.-S. Wu","raw_affiliation_strings":["Institute of Communications Engineering, National Tsing Hua University, Taiwan"],"affiliations":[{"raw_affiliation_string":"Institute of Communications Engineering, National Tsing Hua University, Taiwan","institution_ids":["https://openalex.org/I25846049"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111917638","display_name":"Nen-Fu Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I25846049","display_name":"National Tsing Hua University","ror":"https://ror.org/00zdnkx70","country_code":"TW","type":"education","lineage":["https://openalex.org/I25846049"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"N.-F. Huang","raw_affiliation_strings":["Institute of Communications Engineering, National Tsing Hua University, Taiwan"],"affiliations":[{"raw_affiliation_string":"Institute of Communications Engineering, National Tsing Hua University, Taiwan","institution_ids":["https://openalex.org/I25846049"]}]},{"author_position":"last","author":{"id":null,"display_name":"G.-H. Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I25846049","display_name":"National Tsing Hua University","ror":"https://ror.org/00zdnkx70","country_code":"TW","type":"education","lineage":["https://openalex.org/I25846049"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"G.-H. Lin","raw_affiliation_strings":["Department of Computer Science, National Tsing Hua University, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National Tsing Hua University, Taiwan","institution_ids":["https://openalex.org/I25846049"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5032499371"],"corresponding_institution_ids":["https://openalex.org/I25846049"],"apc_list":null,"apc_paid":null,"fwci":0.9035,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.82231433,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8691667318344116},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7619448900222778},{"id":"https://openalex.org/keywords/voice-over-ip","display_name":"Voice over IP","score":0.661259651184082},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6067075729370117},{"id":"https://openalex.org/keywords/file-sharing","display_name":"File sharing","score":0.6040634512901306},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5815402865409851},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5565261840820312},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.45795711874961853},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.42548635601997375},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.23339122533798218}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8691667318344116},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7619448900222778},{"id":"https://openalex.org/C171246234","wikidata":"https://www.wikidata.org/wiki/Q81945","display_name":"Voice over IP","level":3,"score":0.661259651184082},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6067075729370117},{"id":"https://openalex.org/C551386961","wikidata":"https://www.wikidata.org/wiki/Q22666","display_name":"File sharing","level":3,"score":0.6040634512901306},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5815402865409851},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5565261840820312},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.45795711874961853},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.42548635601997375},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.23339122533798218},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2009.5199062","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2009.5199062","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1521553548","https://openalex.org/W1674877186","https://openalex.org/W1809447567","https://openalex.org/W1849161695","https://openalex.org/W1972699782","https://openalex.org/W2012095206","https://openalex.org/W2035654716","https://openalex.org/W2041855183","https://openalex.org/W2056625091","https://openalex.org/W2102351657","https://openalex.org/W2122226347","https://openalex.org/W2130598205","https://openalex.org/W2133473417","https://openalex.org/W2144256483","https://openalex.org/W2153527920","https://openalex.org/W3138273970","https://openalex.org/W4236506014","https://openalex.org/W4245265554","https://openalex.org/W4255938980","https://openalex.org/W6637096788","https://openalex.org/W6639048092","https://openalex.org/W6664794199"],"related_works":["https://openalex.org/W2084179496","https://openalex.org/W2167843315","https://openalex.org/W2179036394","https://openalex.org/W2012465643","https://openalex.org/W4206905835","https://openalex.org/W1568303756","https://openalex.org/W2773751105","https://openalex.org/W2613715541","https://openalex.org/W2050261031","https://openalex.org/W4293863212"],"abstract_inverted_index":{"There":[0],"are":[1],"more":[2,4],"and":[3,31],"P2P":[5,16,56,81,99,108],"applications":[6,17,100],"in":[7],"the":[8,38,43,55,59,67,84,106],"Internet,":[9],"with":[10],"or":[11],"without":[12],"encrypted":[13],"content.":[14],"The":[15,89],"can":[18],"be":[19],"classified":[20],"into":[21],"three":[22],"categories:":[23],"file":[24],"sharing":[25],"(BT,":[26],"eMule),":[27],"VoIP":[28],"(Skype,":[29],"MSN),":[30],"video":[32],"streaming":[33],"(PPStream,":[34],"PPLive).":[35],"By":[36],"observing":[37],"common":[39,107],"communication":[40],"nature":[41],"among":[42],"peers,":[44],"this":[45],"paper":[46],"proposes":[47],"a":[48,76],"simple":[49],"but":[50],"efficient":[51],"way":[52],"to":[53,72],"identify":[54,74],"traffic":[57],"by":[58],"DNS":[60],"query":[61],"behavior.":[62],"Experimental":[63],"results":[64],"illustrate":[65],"that":[66],"proposed":[68,90],"mechanism":[69,91],"is":[70,78,87,92],"able":[71],"accurately":[73],"if":[75],"host":[77],"using":[79],"data/voice/video-based":[80],"traffic,":[82],"even":[83],"packet":[85],"content":[86],"encrypted.":[88],"also":[93],"capable":[94],"of":[95],"detecting":[96],"future":[97],"unknown":[98],"as":[101,103],"long":[102],"they":[104],"perform":[105],"behaviors.":[109]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":3}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
