{"id":"https://openalex.org/W2605422749","doi":"https://doi.org/10.1109/tifs.2017.2692682","title":"Classification of Encrypted Traffic With Second-Order Markov Chains and Application Attribute Bigrams","display_name":"Classification of Encrypted Traffic With Second-Order Markov Chains and Application Attribute Bigrams","publication_year":2017,"publication_date":"2017-04-12","ids":{"openalex":"https://openalex.org/W2605422749","doi":"https://doi.org/10.1109/tifs.2017.2692682","mag":"2605422749"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2017.2692682","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2692682","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047030842","display_name":"Meng Shen","orcid":"https://orcid.org/0000-0002-1867-0972"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Meng Shen","raw_affiliation_strings":["Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications, School of Computer Science, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications, School of Computer Science, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066803032","display_name":"Mingwei Wei","orcid":null},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingwei Wei","raw_affiliation_strings":["Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications, School of Computer Science, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications, School of Computer Science, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100634361","display_name":"Liehuang Zhu","orcid":"https://orcid.org/0000-0003-3277-3887"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liehuang Zhu","raw_affiliation_strings":["Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications, School of Computer Science, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications, School of Computer Science, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055998640","display_name":"Mingzhong Wang","orcid":"https://orcid.org/0000-0002-6533-8104"},"institutions":[{"id":"https://openalex.org/I174025329","display_name":"University of the Sunshine Coast","ror":"https://ror.org/016gb9e15","country_code":"AU","type":"education","lineage":["https://openalex.org/I174025329"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Mingzhong Wang","raw_affiliation_strings":["Faculty of Arts, Business and Law, University of the Sunshine Coast, Sippy Downs, QLD, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of Arts, Business and Law, University of the Sunshine Coast, Sippy Downs, QLD, Australia","institution_ids":["https://openalex.org/I174025329"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5047030842"],"corresponding_institution_ids":["https://openalex.org/I125839683"],"apc_list":null,"apc_paid":null,"fwci":12.0559,"has_fulltext":false,"cited_by_count":194,"citation_normalized_percentile":{"value":0.98768609,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"12","issue":"8","first_page":"1830","last_page":"1843"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8846791982650757},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7389907240867615},{"id":"https://openalex.org/keywords/bigram","display_name":"Bigram","score":0.7050761580467224},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5813931226730347},{"id":"https://openalex.org/keywords/markov-chain","display_name":"Markov chain","score":0.5535920262336731},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.5433401465415955},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.5403082966804504},{"id":"https://openalex.org/keywords/header","display_name":"Header","score":0.46928489208221436},{"id":"https://openalex.org/keywords/hidden-markov-model","display_name":"Hidden Markov model","score":0.43880751729011536},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.38187623023986816},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.35312163829803467},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.35184916853904724},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.345022976398468}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8846791982650757},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7389907240867615},{"id":"https://openalex.org/C108757681","wikidata":"https://www.wikidata.org/wiki/Q2773912","display_name":"Bigram","level":3,"score":0.7050761580467224},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5813931226730347},{"id":"https://openalex.org/C98763669","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov chain","level":2,"score":0.5535920262336731},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.5433401465415955},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.5403082966804504},{"id":"https://openalex.org/C48105269","wikidata":"https://www.wikidata.org/wiki/Q1141160","display_name":"Header","level":2,"score":0.46928489208221436},{"id":"https://openalex.org/C23224414","wikidata":"https://www.wikidata.org/wiki/Q176769","display_name":"Hidden Markov model","level":2,"score":0.43880751729011536},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38187623023986816},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.35312163829803467},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.35184916853904724},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.345022976398468},{"id":"https://openalex.org/C137546455","wikidata":"https://www.wikidata.org/wiki/Q3213474","display_name":"Trigram","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2017.2692682","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2692682","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:usc:22437","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/TIFS.2017.2692682","pdf_url":null,"source":{"id":"https://openalex.org/S4306401632","display_name":"USC Research Bank (University of the Sunshine Coast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I174025329","host_organization_name":"University of the Sunshine Coast","host_organization_lineage":["https://openalex.org/I174025329"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5099999904632568,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[{"id":"https://openalex.org/G3167722615","display_name":null,"funder_award_id":"61602039","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8794919391","display_name":null,"funder_award_id":"4164098","funder_id":"https://openalex.org/F4320322919","funder_display_name":"Natural Science Foundation of Beijing Municipality"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322919","display_name":"Natural Science Foundation of Beijing Municipality","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1481628066","https://openalex.org/W1521422460","https://openalex.org/W2000089542","https://openalex.org/W2000756828","https://openalex.org/W2002658930","https://openalex.org/W2010716466","https://openalex.org/W2034373897","https://openalex.org/W2047363665","https://openalex.org/W2051000513","https://openalex.org/W2062401262","https://openalex.org/W2077673877","https://openalex.org/W2079309933","https://openalex.org/W2083254762","https://openalex.org/W2094245741","https://openalex.org/W2108217512","https://openalex.org/W2108343180","https://openalex.org/W2129141174","https://openalex.org/W2135088779","https://openalex.org/W2135579486","https://openalex.org/W2138449377","https://openalex.org/W2148346742","https://openalex.org/W2149600645","https://openalex.org/W2175128823","https://openalex.org/W2190207511","https://openalex.org/W2217066517","https://openalex.org/W2238866705","https://openalex.org/W2295321789","https://openalex.org/W2475585782","https://openalex.org/W2534437878","https://openalex.org/W3160447194","https://openalex.org/W6631131035","https://openalex.org/W6688248365"],"related_works":["https://openalex.org/W3020951519","https://openalex.org/W3173084154","https://openalex.org/W2334448532","https://openalex.org/W2982021180","https://openalex.org/W2131563376","https://openalex.org/W2065474030","https://openalex.org/W3044308011","https://openalex.org/W4212842074","https://openalex.org/W1602622186","https://openalex.org/W4300427221"],"abstract_inverted_index":{"With":[0],"a":[1,9,134],"profusion":[2],"of":[3,39,88,93,107,129],"network":[4,13],"applications,":[5],"traffic":[6,48,68],"classification":[7,42,49,69,159],"plays":[8],"crucial":[10],"role":[11],"in":[12,91,118],"management":[14],"and":[15,96,112],"policy-based":[16],"security":[17,32],"control.":[18],"The":[19],"widely":[20],"used":[21],"encryption":[22],"transmission":[23],"protocols,":[24,34],"such":[25],"as":[26],"the":[27,37,73,86,101,108,113,127,139,143,153,158,164,168],"secure":[28],"socket":[29],"layer/transport":[30],"layer":[31],"(SSL/TLS)":[33],"lead":[35],"to":[36,122],"failure":[38],"traditional":[40],"payload-based":[41],"methods.":[43],"Existing":[44],"methods":[45,90],"for":[46,55],"encrypted":[47,67],"cannot":[50],"achieve":[51],"high":[52],"discrimination":[53,94],"accuracy":[54,160],"applications":[56],"with":[57,167],"similar":[58],"fingerprints.":[59],"In":[60],"this":[61],"paper,":[62],"we":[63,132],"propose":[64],"an":[65],"attribute-aware":[66],"method":[70,136,155],"based":[71],"on":[72,163],"second-order":[74,144],"Markov":[75,146],"Chains.":[76],"We":[77],"start":[78],"by":[79,137,161],"exploring":[80],"approaches":[81],"that":[82,100,152],"can":[83,156],"further":[84],"improve":[85,157],"performance":[87],"existing":[89],"terms":[92],"accuracy,":[95],"make":[97],"promising":[98],"observations":[99],"application":[102,115,123,130],"attribute":[103,140],"bigram,":[104],"which":[105],"consists":[106],"certificate":[109],"packet":[110],"length":[111],"first":[114],"data":[116],"size":[117],"SSL/TLS":[119],"sessions,":[120],"contributes":[121],"discrimination.":[124],"To":[125],"increase":[126],"diversity":[128],"fingerprints,":[131],"develop":[133],"new":[135],"incorporating":[138],"bigrams":[141],"into":[142],"homogeneous":[145],"chains.":[147],"Extensive":[148],"evaluation":[149],"results":[150],"show":[151],"proposed":[154],"29%":[162],"average":[165],"compared":[166],"state-of-the-art":[169],"Markov-based":[170],"method.":[171]},"counts_by_year":[{"year":2026,"cited_by_count":5},{"year":2025,"cited_by_count":22},{"year":2024,"cited_by_count":28},{"year":2023,"cited_by_count":17},{"year":2022,"cited_by_count":33},{"year":2021,"cited_by_count":31},{"year":2020,"cited_by_count":22},{"year":2019,"cited_by_count":20},{"year":2018,"cited_by_count":13},{"year":2017,"cited_by_count":3}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
