{"id":"https://openalex.org/W4294672466","doi":"https://doi.org/10.1109/icccn54977.2022.9868928","title":"Real-time Application Identification of RTC Media Streams via Encrypted Traffic Analysis","display_name":"Real-time Application Identification of RTC Media Streams via Encrypted Traffic Analysis","publication_year":2022,"publication_date":"2022-07-01","ids":{"openalex":"https://openalex.org/W4294672466","doi":"https://doi.org/10.1109/icccn54977.2022.9868928"},"language":"en","primary_location":{"id":"doi:10.1109/icccn54977.2022.9868928","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn54977.2022.9868928","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Conference on Computer Communications and Networks (ICCCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032328549","display_name":"Hua Wu","orcid":"https://orcid.org/0000-0002-8829-0182"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]},{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hua Wu","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University,Nanjing,China","Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China","Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing, China","Purple Mountain Laboratories for Network and Communication Security, Nanjing, China","School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University,Nanjing,China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing, China","institution_ids":[]},{"raw_affiliation_string":"Purple Mountain Laboratories for Network and Communication Security, Nanjing, China","institution_ids":["https://openalex.org/I4210155350"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101184606","display_name":"Chengfei Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chengfei Zhu","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University,Nanjing,China","School of Cyber Science and Engineering, Southeast University, Nanjing, China","Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University,Nanjing,China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043707940","display_name":"Guang Cheng","orcid":"https://orcid.org/0000-0001-8642-4362"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guang Cheng","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University,Nanjing,China","Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing, China","Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China","School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University,Nanjing,China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing, China","institution_ids":[]},{"raw_affiliation_string":"Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073150709","display_name":"Xiaoyan Hu","orcid":"https://orcid.org/0000-0002-4172-1977"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyan Hu","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University,Nanjing,China","Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China","School of Cyber Science and Engineering, Southeast University, Nanjing, China","Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University,Nanjing,China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5032328549"],"corresponding_institution_ids":["https://openalex.org/I4210155350","https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":0.2653,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.61158843,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7934448719024658},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6151957511901855},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5803936123847961},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5755178928375244},{"id":"https://openalex.org/keywords/traffic-shaping","display_name":"Traffic shaping","score":0.5747395157814026},{"id":"https://openalex.org/keywords/data-stream-mining","display_name":"Data stream mining","score":0.5740441083908081},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.557848334312439},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.5312293171882629},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.46857237815856934},{"id":"https://openalex.org/keywords/traffic-generation-model","display_name":"Traffic generation model","score":0.44737210869789124},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.4441637694835663},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.43870627880096436},{"id":"https://openalex.org/keywords/network-traffic-control","display_name":"Network traffic control","score":0.35062873363494873},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.33257222175598145},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.15092206001281738}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7934448719024658},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6151957511901855},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5803936123847961},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5755178928375244},{"id":"https://openalex.org/C46451311","wikidata":"https://www.wikidata.org/wiki/Q262550","display_name":"Traffic shaping","level":4,"score":0.5747395157814026},{"id":"https://openalex.org/C89198739","wikidata":"https://www.wikidata.org/wiki/Q3079880","display_name":"Data stream mining","level":2,"score":0.5740441083908081},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.557848334312439},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.5312293171882629},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.46857237815856934},{"id":"https://openalex.org/C176715033","wikidata":"https://www.wikidata.org/wiki/Q2080768","display_name":"Traffic generation model","level":2,"score":0.44737210869789124},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.4441637694835663},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.43870627880096436},{"id":"https://openalex.org/C201100257","wikidata":"https://www.wikidata.org/wiki/Q393287","display_name":"Network traffic control","level":3,"score":0.35062873363494873},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33257222175598145},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.15092206001281738},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccn54977.2022.9868928","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn54977.2022.9868928","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Conference on Computer Communications and Networks (ICCCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4699999988079071,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[{"id":"https://openalex.org/G7713054969","display_name":null,"funder_award_id":"2021YFB3101403","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320330188","display_name":"Jiangsu Provincial Key Laboratory of Networked Collective Intelligence, Southeast University","ror":null},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1977336324","https://openalex.org/W2010716466","https://openalex.org/W2040333627","https://openalex.org/W2055581124","https://openalex.org/W2062401262","https://openalex.org/W2077450203","https://openalex.org/W2150779517","https://openalex.org/W2190207511","https://openalex.org/W2405419323","https://openalex.org/W2409587536","https://openalex.org/W2743678626","https://openalex.org/W2897202622","https://openalex.org/W2904675738","https://openalex.org/W2911301616","https://openalex.org/W2912386632","https://openalex.org/W2919493784","https://openalex.org/W2942890744","https://openalex.org/W3011262701","https://openalex.org/W3039623901","https://openalex.org/W3048455029","https://openalex.org/W3048832564","https://openalex.org/W3091056778","https://openalex.org/W3121912046","https://openalex.org/W3136654195","https://openalex.org/W3145680685","https://openalex.org/W3163231864","https://openalex.org/W3176230514","https://openalex.org/W3183371660","https://openalex.org/W4200096524","https://openalex.org/W4301866626","https://openalex.org/W6744538726","https://openalex.org/W6757126947","https://openalex.org/W6758022392"],"related_works":["https://openalex.org/W2490010379","https://openalex.org/W2114472740","https://openalex.org/W2374980776","https://openalex.org/W2138225277","https://openalex.org/W2060036720","https://openalex.org/W2362416893","https://openalex.org/W2147668000","https://openalex.org/W2612238703","https://openalex.org/W4242927786","https://openalex.org/W147072543"],"abstract_inverted_index":{"The":[0,166],"globalization":[1],"of":[2,19,50,59,105,114,235,240],"the":[3,6,15,48,71,75,89,98,102,115,147,150,155,236,241],"economy":[4],"and":[5,17,32,38,137,162,188,238],"increase":[7],"in":[8,108,142,220],"network":[9,36,206],"bandwidth":[10],"have":[11],"contributed":[12],"significantly":[13],"to":[14,46,54,61,69,73,96,172,197],"development":[16],"popularity":[18],"real-time":[20,39,131],"communication":[21],"(RTC)":[22],"social":[23,143],"applications.":[24],"RTC":[25,51,76,139,217],"media":[26,77,106,140,218],"streams,":[27],"such":[28],"as":[29],"video":[30],"meetings":[31],"calls,":[33],"require":[34],"more":[35],"resources":[37],"performance":[40],"than":[41],"other":[42],"services.":[43],"In":[44,111],"order":[45],"meet":[47],"requirements":[49],"application":[52,72,132],"providers":[53],"offer":[55],"a":[56,130],"higher":[57],"level":[58],"service":[60],"their":[62],"subscribers,":[63],"Internet":[64],"Service":[65],"Providers":[66],"(ISPs)":[67],"need":[68],"identify":[70,213],"which":[74],"stream":[78],"belongs.":[79],"There":[80],"are":[81,170],"already":[82],"some":[83],"studies":[84],"on":[85,182],"traffic":[86,157,193,207],"identification.":[87],"However,":[88],"extant":[90],"work":[91,116,227],"is":[92,117,195],"not":[93,118,180],"yet":[94],"able":[95],"distinguish":[97],"corresponding":[99,214],"applications":[100,215],"from":[101,154,216],"same":[103],"type":[104],"streams":[107,141,219],"real":[109,221],"time.":[110,222,243],"addition,":[112],"most":[113],"validated":[119],"with":[120,225],"actual":[121],"data":[122],"containing":[123],"massive":[124],"background":[125],"traffic.":[126],"Hence,":[127],"we":[128],"propose":[129],"identification":[133],"method":[134,151,178,231],"for":[135],"meeting":[136],"calling":[138],"networks.":[144],"By":[145],"analyzing":[146],"encrypted":[148],"traffic,":[149],"extracts":[152],"features":[153],"unit-time":[156],"aggregation":[158],"without":[159],"using":[160,204],"payload":[161],"related":[163],"information":[164],"fields.":[165],"generated":[167],"feature":[168],"sequences":[169],"fed":[171],"our":[173,210],"lightweight":[174],"model.":[175],"Our":[176],"proposed":[177],"does":[179],"depend":[181],"initial":[183],"packets":[184],"or":[185],"whole":[186],"flows,":[187],"only":[189,233],"an":[190],"arbitrary":[191],"3-second":[192],"block":[194],"needed":[196],"achieve":[198],"over":[199],"99%":[200],"accuracy.":[201],"Moreover,":[202],"experiments":[203],"high-speed":[205],"reflect":[208],"that":[209,229],"approach":[211],"can":[212],"Besides,":[223],"comparisons":[224],"similar":[226],"show":[228],"this":[230],"requires":[232],"1/160th":[234],"memory":[237],"1/10th":[239],"processing":[242]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
