{"id":"https://openalex.org/W3166964991","doi":"https://doi.org/10.1109/iscc53001.2021.9631407","title":"Evaluating Resilience of Encrypted Traffic Classification against Adversarial Evasion Attacks","display_name":"Evaluating Resilience of Encrypted Traffic Classification against Adversarial Evasion Attacks","publication_year":2021,"publication_date":"2021-09-05","ids":{"openalex":"https://openalex.org/W3166964991","doi":"https://doi.org/10.1109/iscc53001.2021.9631407","mag":"3166964991"},"language":"en","primary_location":{"id":"doi:10.1109/iscc53001.2021.9631407","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc53001.2021.9631407","pdf_url":null,"source":{"id":"https://openalex.org/S4363605778","display_name":"2021 IEEE Symposium on Computers and Communications (ISCC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050326160","display_name":"Ramy Maarouf","orcid":null},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Ramy Maarouf","raw_affiliation_strings":["School of Information Technology, Carleton University, Ottawa, Canada"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Carleton University, Ottawa, Canada","institution_ids":["https://openalex.org/I67031392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041026154","display_name":"Danish Sattar","orcid":"https://orcid.org/0000-0002-9179-0006"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Danish Sattar","raw_affiliation_strings":["School of Information Technology, Carleton University, Ottawa, Canada"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Carleton University, Ottawa, Canada","institution_ids":["https://openalex.org/I67031392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103160400","display_name":"Ashraf Matrawy","orcid":"https://orcid.org/0000-0001-9220-4630"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Ashraf Matrawy","raw_affiliation_strings":["School of Information Technology, Carleton University, Ottawa, Canada"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Carleton University, Ottawa, Canada","institution_ids":["https://openalex.org/I67031392"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5050326160"],"corresponding_institution_ids":["https://openalex.org/I67031392"],"apc_list":null,"apc_paid":null,"fwci":1.0053,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.7916433,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7867937088012695},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7418897151947021},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.7207845449447632},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.7077440619468689},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.6617416739463806},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.655145525932312},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6171364188194275},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6130062341690063},{"id":"https://openalex.org/keywords/evasion","display_name":"Evasion (ethics)","score":0.6018707752227783},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.5980135202407837},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.5389242172241211},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.4403538703918457},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.41558799147605896},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3925294280052185},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29103970527648926}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7867937088012695},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7418897151947021},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.7207845449447632},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.7077440619468689},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.6617416739463806},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.655145525932312},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6171364188194275},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6130062341690063},{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.6018707752227783},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.5980135202407837},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.5389242172241211},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.4403538703918457},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.41558799147605896},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3925294280052185},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29103970527648926},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C8891405","wikidata":"https://www.wikidata.org/wiki/Q1059","display_name":"Immune system","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C203014093","wikidata":"https://www.wikidata.org/wiki/Q101929","display_name":"Immunology","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscc53001.2021.9631407","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc53001.2021.9631407","pdf_url":null,"source":{"id":"https://openalex.org/S4363605778","display_name":"2021 IEEE Symposium on Computers and Communications (ISCC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":52,"referenced_works":["https://openalex.org/W179875071","https://openalex.org/W1913192097","https://openalex.org/W1945616565","https://openalex.org/W1964234701","https://openalex.org/W1974799041","https://openalex.org/W2025531056","https://openalex.org/W2090640027","https://openalex.org/W2092939357","https://openalex.org/W2118561568","https://openalex.org/W2120152316","https://openalex.org/W2143305710","https://openalex.org/W2149600645","https://openalex.org/W2167101736","https://openalex.org/W2243397390","https://openalex.org/W2343828539","https://openalex.org/W2460937040","https://openalex.org/W2547480331","https://openalex.org/W2739349903","https://openalex.org/W2743678626","https://openalex.org/W2746600820","https://openalex.org/W2760535917","https://openalex.org/W2771644755","https://openalex.org/W2853623529","https://openalex.org/W2898726669","https://openalex.org/W2901312569","https://openalex.org/W2910121883","https://openalex.org/W2919868916","https://openalex.org/W2954996726","https://openalex.org/W2963178695","https://openalex.org/W2963207607","https://openalex.org/W2963516518","https://openalex.org/W2963542245","https://openalex.org/W2963857521","https://openalex.org/W2964082701","https://openalex.org/W2964253222","https://openalex.org/W2972326188","https://openalex.org/W2983044655","https://openalex.org/W2986078788","https://openalex.org/W2996517047","https://openalex.org/W3013520104","https://openalex.org/W3096520920","https://openalex.org/W3100321043","https://openalex.org/W3105524694","https://openalex.org/W3106412272","https://openalex.org/W4247922705","https://openalex.org/W4293846201","https://openalex.org/W6640425456","https://openalex.org/W6719080892","https://openalex.org/W6729429595","https://openalex.org/W6739868092","https://openalex.org/W6769694023","https://openalex.org/W6784961079"],"related_works":["https://openalex.org/W3048732067","https://openalex.org/W4383468834","https://openalex.org/W4283221438","https://openalex.org/W2900159906","https://openalex.org/W4384648009","https://openalex.org/W4287828318","https://openalex.org/W2406556600","https://openalex.org/W4380352238","https://openalex.org/W3126470649","https://openalex.org/W2930249865"],"abstract_inverted_index":{"Machine":[0],"learning":[1,4,31,53,85],"and":[2,46,51,73],"deep":[3,52,84],"algorithms":[5,54],"can":[6,18],"be":[7],"used":[8],"to":[9,95],"classify":[10],"encrypted":[11,16],"Internet":[12],"traffic.":[13],"Classification":[14],"of":[15,25,42,80,101,109],"traffic":[17],"become":[19],"more":[20],"challenging":[21],"in":[22,93],"the":[23,30,40,90,99,102,107],"presence":[24],"adversarial":[26,91],"attacks":[27,45],"that":[28],"target":[29],"algorithms.":[32],"In":[33,78],"this":[34],"paper,":[35],"we":[36,57],"focus":[37],"on":[38,106],"investigating":[39],"effectiveness":[41],"different":[43],"evasion":[44],"see":[47],"how":[48],"resilient":[49],"machine":[50,96],"are.":[55],"Namely,":[56],"test":[58],"C4.5":[59],"Decision":[60],"Tree,":[61],"K-Nearest":[62],"Neighbor":[63],"(KNN),":[64],"Artificial":[65],"Neural":[66,70,75],"Network":[67],"(ANN),":[68],"Convolutional":[69],"Networks":[71,76],"(CNN)":[72],"Recurrent":[74],"(RNN).":[77],"most":[79],"our":[81],"experimental":[82],"results,":[83],"shows":[86],"better":[87],"resilience":[88],"against":[89],"samples":[92],"comparison":[94],"learning.":[97],"Whereas,":[98],"impact":[100],"attack":[103],"varies":[104],"depending":[105],"type":[108],"attack.":[110]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
