{"id":"https://openalex.org/W4290996573","doi":"https://doi.org/10.1109/icc45855.2022.9839256","title":"Real-time Identification of VPN Traffic based on Counting Bloom Filter and Chained Hash Table from Sampled Data in High-speed Networks","display_name":"Real-time Identification of VPN Traffic based on Counting Bloom Filter and Chained Hash Table from Sampled Data in High-speed Networks","publication_year":2022,"publication_date":"2022-05-16","ids":{"openalex":"https://openalex.org/W4290996573","doi":"https://doi.org/10.1109/icc45855.2022.9839256"},"language":"en","primary_location":{"id":"doi:10.1109/icc45855.2022.9839256","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc45855.2022.9839256","pdf_url":null,"source":{"id":"https://openalex.org/S4363607711","display_name":"ICC 2022 - IEEE International Conference on Communications","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2022 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032328549","display_name":"Hua Wu","orcid":"https://orcid.org/0000-0002-8829-0182"},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hua Wu","raw_affiliation_strings":["Southeast University,School of Cyber Science and Engineering,Nanjing,China","School of Cyber Science and Engineering, Southeast University, Nanjing, China","Purple Mountain Laboratories for Network and Communication Security, Nanjing, China","Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Southeast University,School of Cyber Science and Engineering,Nanjing,China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Purple Mountain Laboratories for Network and Communication Security, Nanjing, China","institution_ids":["https://openalex.org/I4210155350"]},{"raw_affiliation_string":"Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100454966","display_name":"Yujie Liu","orcid":"https://orcid.org/0009-0001-0433-3000"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yujie Liu","raw_affiliation_strings":["Southeast University,School of Cyber Science and Engineering,Nanjing,China","School of Cyber Science and Engineering, Southeast University, Nanjing, China","Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Southeast University,School of Cyber Science and Engineering,Nanjing,China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043707940","display_name":"Guang Cheng","orcid":"https://orcid.org/0000-0001-8642-4362"},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guang Cheng","raw_affiliation_strings":["Southeast University,School of Cyber Science and Engineering,Nanjing,China","Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China","Purple Mountain Laboratories for Network and Communication Security, Nanjing, China","School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Southeast University,School of Cyber Science and Engineering,Nanjing,China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Purple Mountain Laboratories for Network and Communication Security, Nanjing, China","institution_ids":["https://openalex.org/I4210155350"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073150709","display_name":"Xiaoyan Hu","orcid":"https://orcid.org/0000-0002-4172-1977"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyan Hu","raw_affiliation_strings":["Southeast University,School of Cyber Science and Engineering,Nanjing,China","School of Cyber Science and Engineering, Southeast University, Nanjing, China","Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing, China","Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Southeast University,School of Cyber Science and Engineering,Nanjing,China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing, China","institution_ids":[]},{"raw_affiliation_string":"Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5032328549"],"corresponding_institution_ids":["https://openalex.org/I4210155350","https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":0.5197,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.62863607,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"5070","last_page":"5075"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bloom-filter","display_name":"Bloom filter","score":0.8689588308334351},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.707309365272522},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6197373867034912},{"id":"https://openalex.org/keywords/hash-table","display_name":"Hash table","score":0.5879419445991516},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5541568994522095},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5470640063285828},{"id":"https://openalex.org/keywords/traffic-generation-model","display_name":"Traffic generation model","score":0.533869743347168},{"id":"https://openalex.org/keywords/traffic-shaping","display_name":"Traffic shaping","score":0.5026233196258545},{"id":"https://openalex.org/keywords/floating-car-data","display_name":"Floating car data","score":0.4692297875881195},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.4359109103679657},{"id":"https://openalex.org/keywords/traffic-engineering","display_name":"Traffic engineering","score":0.4169667959213257},{"id":"https://openalex.org/keywords/network-traffic-control","display_name":"Network traffic control","score":0.38782596588134766},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.373320996761322},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.2442387342453003},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.17955711483955383},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1509447693824768},{"id":"https://openalex.org/keywords/traffic-congestion","display_name":"Traffic congestion","score":0.14925435185432434}],"concepts":[{"id":"https://openalex.org/C147224247","wikidata":"https://www.wikidata.org/wiki/Q885373","display_name":"Bloom filter","level":2,"score":0.8689588308334351},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.707309365272522},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6197373867034912},{"id":"https://openalex.org/C67388219","wikidata":"https://www.wikidata.org/wiki/Q207440","display_name":"Hash table","level":3,"score":0.5879419445991516},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5541568994522095},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5470640063285828},{"id":"https://openalex.org/C176715033","wikidata":"https://www.wikidata.org/wiki/Q2080768","display_name":"Traffic generation model","level":2,"score":0.533869743347168},{"id":"https://openalex.org/C46451311","wikidata":"https://www.wikidata.org/wiki/Q262550","display_name":"Traffic shaping","level":4,"score":0.5026233196258545},{"id":"https://openalex.org/C64093975","wikidata":"https://www.wikidata.org/wiki/Q356677","display_name":"Floating car data","level":3,"score":0.4692297875881195},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.4359109103679657},{"id":"https://openalex.org/C16160715","wikidata":"https://www.wikidata.org/wiki/Q1640676","display_name":"Traffic engineering","level":2,"score":0.4169667959213257},{"id":"https://openalex.org/C201100257","wikidata":"https://www.wikidata.org/wiki/Q393287","display_name":"Network traffic control","level":3,"score":0.38782596588134766},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.373320996761322},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.2442387342453003},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.17955711483955383},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1509447693824768},{"id":"https://openalex.org/C2779888511","wikidata":"https://www.wikidata.org/wiki/Q244156","display_name":"Traffic congestion","level":2,"score":0.14925435185432434},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C22212356","wikidata":"https://www.wikidata.org/wiki/Q775325","display_name":"Transport engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc45855.2022.9839256","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc45855.2022.9839256","pdf_url":null,"source":{"id":"https://openalex.org/S4363607711","display_name":"ICC 2022 - IEEE International Conference on Communications","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2022 - IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.47999998927116394,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W149523093","https://openalex.org/W1982728146","https://openalex.org/W2065889189","https://openalex.org/W2387756251","https://openalex.org/W2613715541","https://openalex.org/W2993565013","https://openalex.org/W2999537246","https://openalex.org/W3003925524","https://openalex.org/W3010612350","https://openalex.org/W3031847392","https://openalex.org/W3035910245","https://openalex.org/W3103656239","https://openalex.org/W3155086037","https://openalex.org/W4246219036","https://openalex.org/W6606098666"],"related_works":["https://openalex.org/W2490010379","https://openalex.org/W1531550827","https://openalex.org/W2141958076","https://openalex.org/W2056187239","https://openalex.org/W2497786025","https://openalex.org/W2742483930","https://openalex.org/W2463357960","https://openalex.org/W3007419580","https://openalex.org/W2138363124","https://openalex.org/W2528017522"],"abstract_inverted_index":{"Virtual":[0],"Private":[1],"Network":[2],"(VPN)":[3],"can":[4,226],"bypass":[5],"censorship":[6],"and":[7,113,125,218],"access":[8],"services":[9],"that":[10,107],"are":[11,108,207],"geographically":[12],"locked.":[13],"Therefore,":[14],"VPN":[15,28,66,80,93,161,165,229],"traffic":[16,24,29,34,52,67,81,94,117,142,166,192,230],"identification":[17,30,90,205,231],"has":[18],"become":[19],"an":[20],"urgent":[21],"problem":[22],"in":[23,41,98,160],"classification.":[25],"The":[26,54],"existing":[27],"methods":[31],"use":[32,138],"complete":[33,176],"for":[35,69,92],"analysis.":[36],"However,":[37],"massive":[38],"data":[39,97],"analysis":[40],"high-speed":[42,57,99],"networks":[43,58],"consumes":[44],"many":[45],"resources,":[46],"limiting":[47],"the":[48,132,164,177,180,191,196,204],"real-time":[49,89],"processing":[50,118,178],"of":[51,56,134,141,168,183,232],"identification.":[53],"management":[55],"is":[59,75,157,187],"mainly":[60],"based":[61,120],"on":[62,121,144],"sampled":[63,83,96,201],"traffic.":[64,162],"As":[65],"accounts":[68],"a":[70,88,115,145,210],"relatively":[71],"low":[72],"proportion,":[73],"it":[74,170],"particularly":[76],"challenging":[77],"to":[78,175],"identify":[79],"from":[82,95,200],"data.":[84],"This":[85,185],"paper":[86],"proposes":[87],"method":[91,225],"networks.":[100],"In":[101,222],"our":[102,135,224],"method,":[103,136],"we":[104,137],"construct":[105],"features":[106],"still":[109],"available":[110],"after":[111],"sampling":[112,181],"design":[114],"fast":[116],"structure":[119],"Counting":[122],"Bloom":[123],"Filter":[124],"Chained":[126],"Hash":[127],"Table":[128],"(CBCH).":[129],"To":[130],"validate":[131],"usability":[133],"900":[139],"seconds":[140,174],"generated":[143],"10":[146],"Gbps":[147],"link":[148],"as":[149],"background":[150],"traffic,":[151,155,203],"mixed":[152],"with":[153,213],"V2Ray":[154,234],"which":[156],"increasingly":[158],"common":[159],"With":[163],"proportion":[167],"0.03%,":[169],"takes":[171],"only":[172],"50.79":[173],"at":[179,209],"ratio":[182],"1/256.":[184],"time":[186],"significantly":[188],"less":[189],"than":[190],"generation":[193],"time.":[194],"For":[195],"effective":[197],"flows":[198],"extracted":[199],"backbone":[202],"results":[206],"maintained":[208],"high":[211],"level":[212],"97%":[214],"precision,":[215],"93%":[216],"recall,":[217],"95%":[219],"F1":[220],"score.":[221],"addition,":[223],"achieve":[227],"fine-grained":[228],"different":[233],"tools.":[235]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
