{"id":"https://openalex.org/W3097387069","doi":"https://doi.org/10.1109/ict49546.2020.9239463","title":"DOOM: a Training-Free, Real-Time Video Flow Identification Method for Encrypted Traffic","display_name":"DOOM: a Training-Free, Real-Time Video Flow Identification Method for Encrypted Traffic","publication_year":2020,"publication_date":"2020-10-05","ids":{"openalex":"https://openalex.org/W3097387069","doi":"https://doi.org/10.1109/ict49546.2020.9239463","mag":"3097387069"},"language":"en","primary_location":{"id":"doi:10.1109/ict49546.2020.9239463","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ict49546.2020.9239463","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 27th International Conference on Telecommunications (ICT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032815082","display_name":"Youting Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Youting Liu","raw_affiliation_strings":["Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","National Engineering Laboratory of Information Security Technologies, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"National Engineering Laboratory of Information Security Technologies, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103113029","display_name":"Shu Li","orcid":"https://orcid.org/0009-0005-3043-8243"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shu Li","raw_affiliation_strings":["Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","National Engineering Laboratory of Information Security Technologies, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"National Engineering Laboratory of Information Security Technologies, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100767827","display_name":"Chengwei Zhang","orcid":"https://orcid.org/0000-0002-1921-9032"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chengwei Zhang","raw_affiliation_strings":["Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","National Engineering Laboratory of Information Security Technologies, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"National Engineering Laboratory of Information Security Technologies, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011296789","display_name":"Chao Zheng","orcid":"https://orcid.org/0000-0003-2943-3953"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Zheng","raw_affiliation_strings":["Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","National Engineering Laboratory of Information Security Technologies, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"National Engineering Laboratory of Information Security Technologies, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101922475","display_name":"Yong Sun","orcid":"https://orcid.org/0000-0002-8847-8337"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Sun","raw_affiliation_strings":["Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","National Engineering Laboratory of Information Security Technologies, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"National Engineering Laboratory of Information Security Technologies, Beijing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100713362","display_name":"Qingyun Liu","orcid":"https://orcid.org/0000-0003-4815-3463"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingyun Liu","raw_affiliation_strings":["Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","National Engineering Laboratory of Information Security Technologies, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"National Engineering Laboratory of Information Security Technologies, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5032815082"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.7954,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.78862909,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7587149143218994},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6486908793449402},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.627665102481842},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.625720202922821},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5269278287887573},{"id":"https://openalex.org/keywords/residential-gateway","display_name":"Residential gateway","score":0.5258249044418335},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5184659361839294},{"id":"https://openalex.org/keywords/limiting","display_name":"Limiting","score":0.4340866506099701},{"id":"https://openalex.org/keywords/internet-traffic","display_name":"Internet traffic","score":0.4295312762260437},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.429193377494812},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.14058977365493774},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.11146542429924011},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10681450366973877}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7587149143218994},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6486908793449402},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.627665102481842},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.625720202922821},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5269278287887573},{"id":"https://openalex.org/C179703994","wikidata":"https://www.wikidata.org/wiki/Q1755130","display_name":"Residential gateway","level":2,"score":0.5258249044418335},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5184659361839294},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.4340866506099701},{"id":"https://openalex.org/C63969886","wikidata":"https://www.wikidata.org/wiki/Q3536440","display_name":"Internet traffic","level":3,"score":0.4295312762260437},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.429193377494812},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.14058977365493774},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.11146542429924011},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10681450366973877},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ict49546.2020.9239463","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ict49546.2020.9239463","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 27th International Conference on Telecommunications (ICT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W1481277647","https://openalex.org/W1970131865","https://openalex.org/W1995026396","https://openalex.org/W2000756828","https://openalex.org/W2062401262","https://openalex.org/W2096118443","https://openalex.org/W2141708177","https://openalex.org/W2148913232","https://openalex.org/W2149600645","https://openalex.org/W2150779517","https://openalex.org/W2162452656","https://openalex.org/W2174056151","https://openalex.org/W2179036394","https://openalex.org/W2256681573","https://openalex.org/W2263205932","https://openalex.org/W2343828539","https://openalex.org/W2500368581","https://openalex.org/W2591712613","https://openalex.org/W2743678626","https://openalex.org/W2750601856","https://openalex.org/W2768519224","https://openalex.org/W2793336017","https://openalex.org/W2809211034","https://openalex.org/W2883258693","https://openalex.org/W2897202622","https://openalex.org/W3035952106","https://openalex.org/W3106188540","https://openalex.org/W4248409180","https://openalex.org/W6693281421","https://openalex.org/W6743795535"],"related_works":["https://openalex.org/W1535080110","https://openalex.org/W306312984","https://openalex.org/W857189463","https://openalex.org/W2979675132","https://openalex.org/W2790520092","https://openalex.org/W4306309337","https://openalex.org/W20648474","https://openalex.org/W2109516765","https://openalex.org/W4288094128","https://openalex.org/W4313563004"],"abstract_inverted_index":{"The":[0],"internet":[1],"traffic":[2,17,34,46],"is":[3,11,36,76],"mainly":[4],"dominated":[5],"by":[6],"videos,":[7],"limiting":[8],"video":[9,28,63,82],"transmission":[10,29],"thus":[12],"required":[13],"to":[14,26],"manage":[15],"the":[16],"when":[18],"network":[19],"congestion":[20],"occurs.":[21],"Besides,":[22],"service":[23],"providers":[24],"want":[25],"guarantee":[27],"for":[30,62,87],"customers'":[31],"satisfaction.":[32],"However,":[33],"encryption":[35],"becoming":[37],"increasingly":[38],"common,":[39],"making":[40],"conventional":[41],"payload-based":[42],"methods":[43],"unsuitable,":[44],"while":[45],"analysis":[47],"(TA)":[48],"still":[49],"works.":[50],"In":[51],"this":[52],"paper,":[53],"we":[54],"implement":[55],"and":[56,66,80],"evaluate":[57],"machine":[58],"learning":[59],"(ML)-based":[60],"TA":[61],"flow":[64,83],"identification":[65,84],"propose":[67],"a":[68,77],"method":[69,85],"named":[70],"detecting":[71],"ON-OFF":[72],"mode":[73],"(DOOM),":[74],"which":[75],"training-free,":[78],"real-time":[79],"lightweight":[81],"suitable":[86],"Gateway":[88],"or":[89],"Internet":[90],"Backbone":[91],"Provider":[92],"(IBP)":[93],"middle-boxes.":[94]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
