{"id":"https://openalex.org/W4312530727","doi":"https://doi.org/10.1109/iscc55528.2022.9913053","title":"PSCM: Towards Practical Encrypted Unknown Protocol Classification","display_name":"PSCM: Towards Practical Encrypted Unknown Protocol Classification","publication_year":2022,"publication_date":"2022-06-30","ids":{"openalex":"https://openalex.org/W4312530727","doi":"https://doi.org/10.1109/iscc55528.2022.9913053"},"language":"en","primary_location":{"id":"doi:10.1109/iscc55528.2022.9913053","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc55528.2022.9913053","pdf_url":null,"source":{"id":"https://openalex.org/S4363605780","display_name":"2022 IEEE Symposium on Computers and Communications (ISCC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032328549","display_name":"Hua Wu","orcid":"https://orcid.org/0000-0002-8829-0182"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hua Wu","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University,Nanjing,China","Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing, China","Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China","School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University,Nanjing,China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing, China","institution_ids":[]},{"raw_affiliation_string":"Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011051553","display_name":"Chaoqun Cui","orcid":"https://orcid.org/0009-0002-7487-7916"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chaoqun Cui","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University,Nanjing,China","Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China","School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University,Nanjing,China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043707940","display_name":"Guang Cheng","orcid":"https://orcid.org/0000-0001-8642-4362"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guang Cheng","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University,Nanjing,China","Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China","Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing, China","School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University,Nanjing,China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing, China","institution_ids":[]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073150709","display_name":"Xiaoyan Hu","orcid":"https://orcid.org/0000-0002-4172-1977"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyan Hu","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University,Nanjing,China","Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China","Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing, China","School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University,Nanjing,China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Key Laboratory of Computer Network and Information Integration, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing, China","institution_ids":[]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5032328549"],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":0.2079,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.43719026,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9836999773979187,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8110651969909668},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.7073987722396851},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.7031710147857666},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.6980471014976501},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6709246039390564},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.643356204032898},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5696972012519836},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5285099148750305},{"id":"https://openalex.org/keywords/quality-of-service","display_name":"Quality of service","score":0.4838310778141022},{"id":"https://openalex.org/keywords/internet-traffic","display_name":"Internet traffic","score":0.47495603561401367},{"id":"https://openalex.org/keywords/statistical-classification","display_name":"Statistical classification","score":0.46168723702430725},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.429858922958374},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.36050400137901306},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3243862986564636}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8110651969909668},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.7073987722396851},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.7031710147857666},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6980471014976501},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6709246039390564},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.643356204032898},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5696972012519836},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5285099148750305},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.4838310778141022},{"id":"https://openalex.org/C63969886","wikidata":"https://www.wikidata.org/wiki/Q3536440","display_name":"Internet traffic","level":3,"score":0.47495603561401367},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.46168723702430725},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.429858922958374},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.36050400137901306},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3243862986564636},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscc55528.2022.9913053","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc55528.2022.9913053","pdf_url":null,"source":{"id":"https://openalex.org/S4363605780","display_name":"2022 IEEE Symposium on Computers and Communications (ISCC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.5}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4287966854","https://openalex.org/W32109103","https://openalex.org/W2171634548","https://openalex.org/W2076952529","https://openalex.org/W2547456248","https://openalex.org/W4312241727","https://openalex.org/W4384946034","https://openalex.org/W3036573907","https://openalex.org/W2021820946","https://openalex.org/W2005802709"],"abstract_inverted_index":{"Network":[0],"traffic":[1,34,38,116],"classification":[2,39],"is":[3,68],"the":[4,16,22,45,104,108,119,130],"basis":[5],"for":[6,73],"network":[7,33,115],"management,":[8],"Quality":[9],"of":[10,18,24,47,61,124],"Service":[11],"and":[12,50,90,102,126],"intrusion":[13],"detection.":[14],"As":[15],"number":[17],"Internet":[19],"applications":[20],"increases,":[21],"variety":[23],"unknown":[25,74,99],"protocols":[26,62],"grows,":[27],"posing":[28],"a":[29,86],"significant":[30],"challenge":[31],"to":[32,79,95,107],"classification.":[35],"Traditional":[36],"rule-based":[37],"methods":[40,54],"are":[41],"currently":[42],"limited":[43],"by":[44],"rise":[46],"dynamic":[48],"ports":[49],"encryption":[51],"protocols.":[52,110],"Statistical":[53],"using":[55],"statistical":[56],"features":[57,101],"have":[58],"good":[59],"recognition":[60],"with":[63],"public":[64,70],"formats.":[65],"However,":[66],"there":[67],"no":[69],"protocol":[71,100],"format":[72],"protocols,":[75],"making":[76],"it":[77],"challenging":[78],"extract":[80,97],"useful":[81],"features.":[82],"This":[83],"paper":[84],"proposes":[85],"practical":[87],"Probability":[88],"Statistics":[89],"Cluster":[91],"Merging":[92],"(PSCM)":[93],"method":[94,120],"automatically":[96],"encrypted":[98],"map":[103],"clustering":[105],"results":[106,112],"actual":[109],"Experimental":[111],"on":[113],"real-world":[114],"show":[117],"that":[118],"achieves":[121],"an":[122],"accuracy":[123],"99.28%":[125],"performs":[127],"well":[128],"in":[129],"sampling":[131],"scenarios.":[132]},"counts_by_year":[{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
