{"id":"https://openalex.org/W4411949098","doi":"https://doi.org/10.1109/tnse.2025.3582871","title":"A Unified Framework for Robust Encrypted Malicious Traffic Detection in Adverse Environments via Graph Structure Learning","display_name":"A Unified Framework for Robust Encrypted Malicious Traffic Detection in Adverse Environments via Graph Structure Learning","publication_year":2025,"publication_date":"2025-07-02","ids":{"openalex":"https://openalex.org/W4411949098","doi":"https://doi.org/10.1109/tnse.2025.3582871"},"language":"en","primary_location":{"id":"doi:10.1109/tnse.2025.3582871","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2025.3582871","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057657371","display_name":"Jianjin Zhao","orcid":"https://orcid.org/0000-0001-5362-3445"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jianjin Zhao","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079443685","display_name":"Zhiwei Cui","orcid":"https://orcid.org/0000-0003-1300-8426"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiwei Cui","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011916209","display_name":"Junsong Fu","orcid":"https://orcid.org/0000-0002-2445-1987"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junsong Fu","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047030842","display_name":"Meng Shen","orcid":"https://orcid.org/0000-0002-1867-0972"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Meng Shen","raw_affiliation_strings":["Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5092069033","display_name":"Qi Li","orcid":"https://orcid.org/0000-0001-9855-6119"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Li","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5057657371"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08517225,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":null,"first_page":"245","last_page":"261"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9846000075340271,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9587000012397766,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6991007328033447},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6642023921012878},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4894353449344635},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.4157288372516632},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3884970545768738},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.36391881108283997},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3621698021888733},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.32596859335899353}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6991007328033447},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6642023921012878},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4894353449344635},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.4157288372516632},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3884970545768738},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36391881108283997},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3621698021888733},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32596859335899353}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnse.2025.3582871","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2025.3582871","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":56,"referenced_works":["https://openalex.org/W2295321789","https://openalex.org/W2537766808","https://openalex.org/W2606697812","https://openalex.org/W2612544399","https://openalex.org/W2743104969","https://openalex.org/W2743556905","https://openalex.org/W2907492528","https://openalex.org/W2911286998","https://openalex.org/W2912711574","https://openalex.org/W2963065250","https://openalex.org/W2996039144","https://openalex.org/W3004507689","https://openalex.org/W3028917156","https://openalex.org/W3082830450","https://openalex.org/W3097300053","https://openalex.org/W3111088413","https://openalex.org/W3120227884","https://openalex.org/W3152893301","https://openalex.org/W3153206160","https://openalex.org/W3173170122","https://openalex.org/W3175971420","https://openalex.org/W3191490876","https://openalex.org/W3200583622","https://openalex.org/W3206444595","https://openalex.org/W3208773001","https://openalex.org/W4214599792","https://openalex.org/W4223587185","https://openalex.org/W4283818432","https://openalex.org/W4285292284","https://openalex.org/W4290714064","https://openalex.org/W4296893596","https://openalex.org/W4306406279","https://openalex.org/W4312401453","https://openalex.org/W4324007233","https://openalex.org/W4384822835","https://openalex.org/W4385009227","https://openalex.org/W4388867311","https://openalex.org/W4392796768","https://openalex.org/W4392939489","https://openalex.org/W4394862809","https://openalex.org/W4396663473","https://openalex.org/W4396757496","https://openalex.org/W4396758721","https://openalex.org/W4401508167","https://openalex.org/W4401508391","https://openalex.org/W4402187046","https://openalex.org/W4402957950","https://openalex.org/W4403577465","https://openalex.org/W4405183428","https://openalex.org/W4405270567","https://openalex.org/W4406611343","https://openalex.org/W4407468113","https://openalex.org/W4409369257","https://openalex.org/W4409474994","https://openalex.org/W4409671228","https://openalex.org/W4410492229"],"related_works":["https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W2385965183","https://openalex.org/W4289281780","https://openalex.org/W2013342653","https://openalex.org/W2901818815","https://openalex.org/W4237598585","https://openalex.org/W2359552542","https://openalex.org/W2105642232","https://openalex.org/W2374897487"],"abstract_inverted_index":{"The":[0],"widespread":[1],"adoption":[2],"of":[3,46,54,88,251],"encryption":[4],"protocols":[5],"enables":[6],"attackers":[7],"to":[8,40,64,103,191],"conceal":[9],"malicious":[10,142],"activities":[11],"within":[12,37],"encrypted":[13,141,166],"traffic,":[14],"rendering":[15],"traditional":[16],"detection":[17,144,219,257],"methods":[18,95],"ineffective.":[19],"Graph":[20,173],"Neural":[21],"Networks":[22],"(GNNs)":[23],"have":[24],"emerged":[25],"as":[26,93],"a":[27,136,170,185],"promising":[28],"solution":[29],"by":[30,196,230],"modeling":[31,162,217],"network":[32,81,240],"objects":[33,82],"and":[34,107,159,168,203,218,242,272,285],"their":[35],"interactions":[36],"graph":[38,146,187],"representations":[39],"capture":[41],"the":[42,51,248,290],"collaborative":[43],"behavioral":[44,163],"patterns":[45],"complex":[47],"threat":[48],"activities.":[49],"However,":[50],"well-performed":[52],"premise":[53],"GNNs":[55],"does":[56],"not":[57],"always":[58],"hold":[59],"in":[60,122,259],"adverse":[61,228,260,265],"environments,":[62],"leading":[63],"unsatisfactory":[65],"performance,":[66],"suffering":[67],"from":[68],"three":[69],"critical":[70],"issues":[71],"including":[72],"(1)":[73],"incomplete":[74],"information":[75,180],"analysis,":[76],"where":[77],"heterogeneous":[78,154],"relations":[79,194],"among":[80,165],"are":[83],"often":[84],"overlooked":[85],"(2)":[86],"lack":[87],"solutions":[89],"for":[90,139,178],"evasion":[91,197],"techniques,":[92],"existing":[94],"focus":[96],"on":[97,113,293],"robust":[98,140],"representation":[99],"learning":[100,189],"but":[101],"fail":[102],"correct":[104,192],"adversarial":[105,243],"distortions,":[106],"(3)":[108],"limited":[109],"robustness":[110,237,250],"evaluation,":[111],"relying":[112],"synthetic":[114],"feature":[115],"perturbations":[116],"rather":[117],"than":[118],"raw":[119,232],"traffic":[120,143,233],"manipulations":[121],"line":[123],"with":[124],"real-world":[125],"attacks.":[126,244],"To":[127],"address":[128],"these":[129],"issues,":[130],"we":[131],"propose":[132],"<sc":[133,150,211,222,252,276],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[134,151,212,223,253,277],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">RETA</small>,":[135,254],"unified":[137,186],"framework":[138,190],"via":[145],"structure":[147,188],"learning.":[148],"First,":[149],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">RETA</small>":[152,213,224,278],"unifies":[153],"subgraphs":[155,161],"capturing":[156],"semantic":[157],"metapaths":[158],"homogeneous":[160],"similarities":[164],"sessions":[167],"takes":[169],"tailored":[171],"Heterogeneous":[172],"Attention":[174],"Network":[175],"(HAN)":[176],"encoder":[177],"neighborhood":[179],"aggregation.":[181],"Then,":[182],"it":[183],"employs":[184],"noisy":[193],"induced":[195],"techniques":[198],"through":[199],"channel":[200],"attention-based":[201],"aggregation":[202],"Bayesian":[204],"inference-based":[205],"estimation.":[206],"Following":[207],"an":[208],"iterative":[209],"manner,":[210],"mutually":[214],"improves":[215],"relation":[216],"robustness.":[220],"Finally,":[221],"simulates":[225],"various":[226],"realistic":[227],"conditions":[229,266],"modifying":[231],"captures,":[234],"ensuring":[235],"comprehensive":[236],"evaluations":[238],"against":[239],"fluctuations":[241],"Extensive":[245],"experiments":[246],"demonstrate":[247],"superior":[249],"significantly":[255],"improving":[256],"performance":[258],"environments.":[261],"Even":[262],"under":[263],"extreme":[264],"(i.e.,":[267],"30%":[268],"packet":[269],"loss":[270],"rate":[271],"5":[273],"perturbation":[274],"edges),":[275],"still":[279],"shows":[280],"significant":[281],"advantages,":[282],"delivering":[283],"8.94%":[284],"4.85%":[286],"accuracy":[287],"improvements":[288],"over":[289],"baseline":[291],"models":[292],"average.":[294]},"counts_by_year":[],"updated_date":"2025-11-23T05:10:03.516525","created_date":"2025-10-10T00:00:00"}
