{"id":"https://openalex.org/W2982387504","doi":"https://doi.org/10.1109/icnp.2019.8888043","title":"Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach","display_name":"Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W2982387504","doi":"https://doi.org/10.1109/icnp.2019.8888043","mag":"2982387504"},"language":"en","primary_location":{"id":"doi:10.1109/icnp.2019.8888043","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnp.2019.8888043","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 27th International Conference on Network Protocols (ICNP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040565656","display_name":"Yige Chen","orcid":"https://orcid.org/0000-0002-0430-0057"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yige Chen","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066426299","display_name":"Tianning Zang","orcid":"https://orcid.org/0000-0003-3583-6249"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tianning Zang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100715816","display_name":"Yongzheng Zhang","orcid":"https://orcid.org/0009-0000-1077-3849"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongzheng Zhang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049853160","display_name":"Yuan Zhou","orcid":"https://orcid.org/0000-0002-9198-6586"},"institutions":[{"id":"https://openalex.org/I4210087772","display_name":"National Computer Network Emergency Response Technical Team/Coordination Center of Chinar","ror":"https://ror.org/00247dh76","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210087772"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan Zhou","raw_affiliation_strings":["National Computer Network Emergency Response Technical Team/Coordination Center of China"],"affiliations":[{"raw_affiliation_string":"National Computer Network Emergency Response Technical Team/Coordination Center of China","institution_ids":["https://openalex.org/I4210087772"]}]},{"author_position":"last","author":{"id":null,"display_name":"Yipeng Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yipeng Wang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5040565656"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404"],"apc_list":null,"apc_paid":null,"fwci":3.4729,"has_fulltext":false,"cited_by_count":33,"citation_normalized_percentile":{"value":0.94250681,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8453037738800049},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8243887424468994},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.7599241733551025},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6441153287887573},{"id":"https://openalex.org/keywords/transport-layer-security","display_name":"Transport Layer Security","score":0.6156424283981323},{"id":"https://openalex.org/keywords/handshake","display_name":"Handshake","score":0.5436761379241943},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4876321852207184},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4759778082370758},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4471380114555359},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.44639620184898376},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.43263334035873413},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3455227017402649},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.07958391308784485}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8453037738800049},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8243887424468994},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.7599241733551025},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6441153287887573},{"id":"https://openalex.org/C148176105","wikidata":"https://www.wikidata.org/wiki/Q206494","display_name":"Transport Layer Security","level":3,"score":0.6156424283981323},{"id":"https://openalex.org/C2778000800","wikidata":"https://www.wikidata.org/wiki/Q830043","display_name":"Handshake","level":3,"score":0.5436761379241943},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4876321852207184},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4759778082370758},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4471380114555359},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.44639620184898376},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.43263334035873413},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3455227017402649},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.07958391308784485},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icnp.2019.8888043","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnp.2019.8888043","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 27th International Conference on Network Protocols (ICNP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1828150029","https://openalex.org/W2000756828","https://openalex.org/W2008183828","https://openalex.org/W2111427271","https://openalex.org/W2116876232","https://openalex.org/W2120152316","https://openalex.org/W2125055259","https://openalex.org/W2144759496","https://openalex.org/W2190207511","https://openalex.org/W2238866705","https://openalex.org/W2266218113","https://openalex.org/W2285910409","https://openalex.org/W2295598076","https://openalex.org/W2534437878","https://openalex.org/W2605422749","https://openalex.org/W2750601856","https://openalex.org/W2753952929","https://openalex.org/W2911964244","https://openalex.org/W2915004662","https://openalex.org/W2915352631","https://openalex.org/W2919493784","https://openalex.org/W2963403784","https://openalex.org/W3102476541","https://openalex.org/W4210531213","https://openalex.org/W4231879123","https://openalex.org/W4298051233","https://openalex.org/W6728101636","https://openalex.org/W6743795535"],"related_works":["https://openalex.org/W4296873577","https://openalex.org/W4295681914","https://openalex.org/W2503991861","https://openalex.org/W2516734788","https://openalex.org/W2612638001","https://openalex.org/W2347296673","https://openalex.org/W1971902782","https://openalex.org/W4319159013","https://openalex.org/W2337566776","https://openalex.org/W1557407300"],"abstract_inverted_index":{"With":[0],"the":[1,12,44,97,102,107,116,120,129,136,139,144,148,160,169,176,179,187],"unprecedented":[2],"prevalence":[3],"of":[4,131,138,165,178,192],"mobile":[5,23],"network":[6,24],"applications,":[7,167],"cryptographic":[8],"protocols,":[9],"such":[10],"as":[11],"Secure":[13],"Socket":[14],"Layer/Transport":[15],"Layer":[16],"Security":[17],"(SSL/TLS),":[18],"are":[19,41,56],"widely":[20],"used":[21],"in":[22,60,119,190],"applications":[25,71],"for":[26,32,43,70],"communication":[27],"security.":[28],"The":[29],"proven":[30],"methods":[31,66,189],"encrypted":[33,38,63,83,121,140],"video":[34],"stream":[35],"classification":[36,50,65,85,111,125],"or":[37],"protocol":[39],"detection":[40],"unsuitable":[42],"SSL/TLS":[45],"traffic.":[46],"Consequently,":[47],"application-level":[48],"traffic":[49,64,84,141],"based":[51,95],"networking":[52],"and":[53,114,172,195],"security":[54],"services":[55],"facing":[57],"severe":[58],"challenges":[59],"effectiveness.":[61],"Existing":[62],"exhibit":[67],"unsatisfying":[68],"accuracy":[69,158,194],"with":[72],"similar":[73],"state":[74],"characteristics.":[75],"In":[76],"this":[77],"paper,":[78],"we":[79],"propose":[80],"a":[81],"multiple-attribute-based":[82],"system":[86],"named":[87],"Multi-Attribute":[88],"Associated":[89],"Fingerprints":[90],"(MAAF).":[91],"We":[92],"develop":[93],"MAAF":[94,134,155,183],"on":[96,159],"two":[98],"key":[99,132],"insights":[100],"that":[101,115,154,163],"DNS":[103],"traces":[104],"generated":[105],"during":[106,147],"application":[108],"runtime":[109],"contain":[110],"guidance":[112],"information":[113],"handshake":[117],"certificates":[118],"flows":[122],"can":[123],"provide":[124],"clues.":[126],"Apart":[127],"from":[128],"exploitation":[130],"insights,":[133],"employs":[135],"context":[137],"to":[142,175,186],"overcome":[143],"attribute-lacking":[145],"problem":[146],"classification.":[149],"Our":[150],"experimental":[151],"results":[152],"demonstrate":[153],"achieves":[156],"98.69%":[157],"real-world":[161],"traceset":[162],"consists":[164],"16":[166],"supports":[168],"early":[170],"prediction,":[171],"is":[173,184],"robust":[174],"scale":[177],"training":[180],"traceset.":[181],"Besides,":[182],"superior":[185],"state-of-the-art":[188],"terms":[191],"both":[193],"robustness.":[196]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":5}],"updated_date":"2026-03-25T23:56:10.502304","created_date":"2025-10-10T00:00:00"}
