{"id":"https://openalex.org/W7116780157","doi":"https://doi.org/10.1109/tifs.2025.3646874","title":"EO-EPTC: End-to-End Original Traffic-Based Encrypted Proxy Traffic Classification Framework","display_name":"EO-EPTC: End-to-End Original Traffic-Based Encrypted Proxy Traffic Classification Framework","publication_year":2025,"publication_date":"2025-12-22","ids":{"openalex":"https://openalex.org/W7116780157","doi":"https://doi.org/10.1109/tifs.2025.3646874"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2025.3646874","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3646874","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5120956211","display_name":"Yige Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I146620803","display_name":"Wenzhou University","ror":"https://ror.org/020hxh324","country_code":"CN","type":"education","lineage":["https://openalex.org/I146620803"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yige Chen","raw_affiliation_strings":["College of Computer Science and Artificial Intelligence and Wenzhou Key Laboratory for Intelligent Networking, Wenzhou University, Wenzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Artificial Intelligence and Wenzhou Key Laboratory for Intelligent Networking, Wenzhou University, Wenzhou, China","institution_ids":["https://openalex.org/I146620803"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111815081","display_name":"Huajie Jia","orcid":null},"institutions":[{"id":"https://openalex.org/I146620803","display_name":"Wenzhou University","ror":"https://ror.org/020hxh324","country_code":"CN","type":"education","lineage":["https://openalex.org/I146620803"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huajie Jia","raw_affiliation_strings":["College of Computer Science and Artificial Intelligence and Wenzhou Key Laboratory for Intelligent Networking, Wenzhou University, Wenzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Artificial Intelligence and Wenzhou Key Laboratory for Intelligent Networking, Wenzhou University, Wenzhou, China","institution_ids":["https://openalex.org/I146620803"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102387836","display_name":"Zhenzhou Tang","orcid":null},"institutions":[{"id":"https://openalex.org/I146620803","display_name":"Wenzhou University","ror":"https://ror.org/020hxh324","country_code":"CN","type":"education","lineage":["https://openalex.org/I146620803"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenzhou Tang","raw_affiliation_strings":["College of Computer Science and Artificial Intelligence and Wenzhou Key Laboratory for Intelligent Networking, Wenzhou University, Wenzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Artificial Intelligence and Wenzhou Key Laboratory for Intelligent Networking, Wenzhou University, Wenzhou, China","institution_ids":["https://openalex.org/I146620803"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005315918","display_name":"Yipeng Wang","orcid":"https://orcid.org/0000-0002-8188-4666"},"institutions":[{"id":"https://openalex.org/I78675632","display_name":"Beijing Information Science & Technology University","ror":"https://ror.org/04xnqep60","country_code":"CN","type":"education","lineage":["https://openalex.org/I78675632"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yipeng Wang","raw_affiliation_strings":["College of Computer Science and the Engineering Research Center of Intelligent Perception and Autonomous Control, Ministry of Education, Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and the Engineering Research Center of Intelligent Perception and Autonomous Control, Ministry of Education, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I78675632"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100387661","display_name":"Hui Liu","orcid":"https://orcid.org/0000-0003-2992-5018"},"institutions":[{"id":"https://openalex.org/I2250653659","display_name":"Tencent (China)","ror":"https://ror.org/00hhjss72","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250653659"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Liu","raw_affiliation_strings":["Platform and Content Group, Tencent, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Platform and Content Group, Tencent, Beijing, China","institution_ids":["https://openalex.org/I2250653659"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5120956211"],"corresponding_institution_ids":["https://openalex.org/I146620803"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.83443543,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":null,"first_page":"490","last_page":"505"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9768000245094299,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9768000245094299,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.0013000000035390258,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.0013000000035390258,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8003000020980835},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.7506999969482422},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.7330999970436096},{"id":"https://openalex.org/keywords/proxy-re-encryption","display_name":"Proxy re-encryption","score":0.6661999821662903},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4302999973297119},{"id":"https://openalex.org/keywords/traffic-analysis","display_name":"Traffic analysis","score":0.4115000069141388},{"id":"https://openalex.org/keywords/macro","display_name":"Macro","score":0.3995000123977661}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8003000020980835},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7792999744415283},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.7506999969482422},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.7330999970436096},{"id":"https://openalex.org/C2776861820","wikidata":"https://www.wikidata.org/wiki/Q7252899","display_name":"Proxy re-encryption","level":4,"score":0.6661999821662903},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5910000205039978},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5134000182151794},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4302999973297119},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.4115000069141388},{"id":"https://openalex.org/C166955791","wikidata":"https://www.wikidata.org/wiki/Q629579","display_name":"Macro","level":2,"score":0.3995000123977661},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.37599998712539673},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3573000133037567},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.33489999175071716},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.33390000462532043},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3244999945163727},{"id":"https://openalex.org/C46451311","wikidata":"https://www.wikidata.org/wiki/Q262550","display_name":"Traffic shaping","level":4,"score":0.3237000107765198},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.310699999332428},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.2996000051498413},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2581999897956848},{"id":"https://openalex.org/C3017944768","wikidata":"https://www.wikidata.org/wiki/Q1450463","display_name":"Poison control","level":2,"score":0.25189998745918274}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3646874","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3646874","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W1902237438","https://openalex.org/W2064675550","https://openalex.org/W2105482032","https://openalex.org/W2295598076","https://openalex.org/W2343828539","https://openalex.org/W2591712613","https://openalex.org/W2919493784","https://openalex.org/W2922103104","https://openalex.org/W2976836186","https://openalex.org/W3145680685","https://openalex.org/W3153467024","https://openalex.org/W3174009192","https://openalex.org/W3189612867","https://openalex.org/W3192392107","https://openalex.org/W4206685914","https://openalex.org/W4224315052","https://openalex.org/W4226268322","https://openalex.org/W4280529340","https://openalex.org/W4285292284","https://openalex.org/W4285819445","https://openalex.org/W4293004633","https://openalex.org/W4307020324","https://openalex.org/W4308261380","https://openalex.org/W4312767053","https://openalex.org/W4312893735","https://openalex.org/W4319866187","https://openalex.org/W4322706638","https://openalex.org/W4328028814","https://openalex.org/W4385245566","https://openalex.org/W4386385252","https://openalex.org/W4387011225","https://openalex.org/W4389331539","https://openalex.org/W4393256213","https://openalex.org/W4396629515","https://openalex.org/W4397000408","https://openalex.org/W4400762160","https://openalex.org/W4400975454","https://openalex.org/W4402105908"],"related_works":[],"abstract_inverted_index":{"Machine":[0],"learning-based":[1],"methods":[2],"for":[3],"encrypted":[4,13,35,92,122,164,184],"traffic":[5,15,28,40,73,114,124,128,165,172],"classification":[6,120,166],"can":[7],"be":[8],"effectively":[9],"applied":[10],"to":[11,25,59,63,84,107,135,144,162,173,180,188],"analyze":[12],"proxy":[14,18,36,65,69,93,123,151,185],"generated":[16],"by":[17,74],"protocols,":[19],"which":[20],"are":[21],"intermediary":[22],"protocols":[23,37,70],"used":[24],"route":[26],"network":[27,48],"through":[29],"a":[30,55,85,126,141,154],"remote":[31],"server.":[32],"Nonetheless,":[33],"different":[34],"generate":[38],"distinct":[39],"patterns,":[41],"even":[42],"when":[43],"they":[44],"handle":[45],"the":[46,109,119,146,150],"same":[47],"behavior.":[49],"To":[50],"address":[51],"these":[52],"distribution":[53,110,137],"differences,":[54],"straight-forward":[56],"approach":[57],"is":[58],"collect":[60],"datasets":[61],"specific":[62],"each":[64],"protocol.":[66],"However,":[67],"typical":[68],"repackage":[71],"original":[72,90,113,127,171],"encrypting":[75],"it":[76],"without":[77],"payload":[78],"padding":[79],"or":[80],"compression.":[81],"This":[82,177],"leads":[83],"definite":[86],"characteristic":[87],"correlation":[88],"between":[89,112],"and":[91,115,139],"traffic.":[94,176,194],"We":[95,159],"propose":[96],"an":[97],"End-to-end":[98],"Original":[99],"traffic-based":[100],"Encrypted":[101],"Proxy":[102],"Traffic":[103],"Classification":[104],"framework":[105],"(EO-EPTC)":[106],"bridge":[108],"gap":[111],"proxied":[116,175,193],"traffic,":[117,186],"enabling":[118],"of":[121,149],"using":[125],"dataset.":[129],"EO-EPTC":[130,161],"conducts":[131],"sequence":[132,155],"feature":[133,156],"alignment":[134],"reduce":[136],"bias":[138],"employs":[140],"Seq2Seq":[142],"model":[143],"capture":[145],"underlying":[147],"semantics":[148],"protocol,":[152],"creating":[153],"transformation":[157],"model.":[158],"apply":[160],"existing":[163],"models,":[167],"training":[168],"them":[169],"on":[170,183,192],"classify":[174],"achieves":[178],"up":[179],"99.70%":[181],"accuracy":[182],"comparable":[187],"models":[189],"trained":[190],"directly":[191]},"counts_by_year":[],"updated_date":"2026-01-08T20:05:33.558190","created_date":"2025-12-22T00:00:00"}
