{"id":"https://openalex.org/W4403331669","doi":"https://doi.org/10.1109/tnsm.2024.3479150","title":"IIT: Accurate Decentralized Application Identification Through Mining Intra- and Inter-Flow Relationships","display_name":"IIT: Accurate Decentralized Application Identification Through Mining Intra- and Inter-Flow Relationships","publication_year":2024,"publication_date":"2024-10-11","ids":{"openalex":"https://openalex.org/W4403331669","doi":"https://doi.org/10.1109/tnsm.2024.3479150"},"language":"en","primary_location":{"id":"doi:10.1109/tnsm.2024.3479150","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2024.3479150","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109025357","display_name":"Qianwei Meng","orcid":"https://orcid.org/0000-0003-0244-699X"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qianwei Meng","raw_affiliation_strings":["Henan Key Laboratory of Network Cryptography Technology and the Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, China","Henan Key Laboratory of Network Cryptography Technology and Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology and the Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology and Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028566827","display_name":"Qingjun Yuan","orcid":"https://orcid.org/0000-0002-6598-8190"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingjun Yuan","raw_affiliation_strings":["Henan Key Laboratory of Network Cryptography Technology and the Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, China","MoE Key Lab for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, China"],"affiliations":[{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology and the Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"MoE Key Lab for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029715489","display_name":"Weina Niu","orcid":"https://orcid.org/0000-0002-3235-3463"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weina Niu","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","School of Computer Science and Engineering, University of Electronic Science and Technology of China, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079565555","display_name":"Yongjuan Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongjuan Wang","raw_affiliation_strings":["Henan Key Laboratory of Network Cryptography Technology and the Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, China","Henan Key Laboratory of Network Cryptography Technology and Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology and the Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology and Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043313305","display_name":"Siqi Lu","orcid":"https://orcid.org/0000-0002-8593-9636"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Siqi Lu","raw_affiliation_strings":["Henan Key Laboratory of Network Cryptography Technology and the Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, China","Henan Key Laboratory of Network Cryptography Technology and Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology and the Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology and Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018754060","display_name":"Guangsong Li","orcid":"https://orcid.org/0000-0001-8251-0634"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guangsong Li","raw_affiliation_strings":["Henan Key Laboratory of Network Cryptography Technology and the Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, China","Henan Key Laboratory of Network Cryptography Technology and Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology and the Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology and Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101528492","display_name":"Xiangbin Wang","orcid":"https://orcid.org/0009-0005-1372-3069"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangbin Wang","raw_affiliation_strings":["Henan Key Laboratory of Network Cryptography Technology and the Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, China","Henan Key Laboratory of Network Cryptography Technology and Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology and the Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology and Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110520854","display_name":"Wenqi He","orcid":null},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenqi He","raw_affiliation_strings":["Henan Key Laboratory of Network Cryptography Technology and the Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, China","Henan Key Laboratory of Network Cryptography Technology and Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology and the Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology and Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou, China","institution_ids":["https://openalex.org/I4210132990"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5109025357"],"corresponding_institution_ids":["https://openalex.org/I4210132990"],"apc_list":null,"apc_paid":null,"fwci":4.5177,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.95294972,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"22","issue":"1","first_page":"394","last_page":"408"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.9742000102996826,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.9742000102996826,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10538","display_name":"Data Mining Algorithms and Applications","score":0.9380000233650208,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9369000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7740397453308105},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.6066702604293823},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.42094290256500244},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.41277262568473816}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7740397453308105},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.6066702604293823},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.42094290256500244},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.41277262568473816},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnsm.2024.3479150","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2024.3479150","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3269047364","display_name":null,"funder_award_id":"No.2023YFB2705000","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G7440884919","display_name":null,"funder_award_id":"62276091","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W1987971958","https://openalex.org/W2000756828","https://openalex.org/W2190207511","https://openalex.org/W2272516773","https://openalex.org/W2560100125","https://openalex.org/W2754529701","https://openalex.org/W2919493784","https://openalex.org/W2949330846","https://openalex.org/W2963704216","https://openalex.org/W2964602598","https://openalex.org/W2974442408","https://openalex.org/W2978116268","https://openalex.org/W3003508977","https://openalex.org/W3013914784","https://openalex.org/W3112068637","https://openalex.org/W3120227884","https://openalex.org/W3154284926","https://openalex.org/W3189612867","https://openalex.org/W3199786743","https://openalex.org/W4213135868","https://openalex.org/W4213425351","https://openalex.org/W4226055875","https://openalex.org/W4285819445","https://openalex.org/W4290874972","https://openalex.org/W4293004633","https://openalex.org/W4312401453","https://openalex.org/W4312935532","https://openalex.org/W4321380758","https://openalex.org/W4367047070","https://openalex.org/W4377101054","https://openalex.org/W4385245566","https://openalex.org/W4385488763","https://openalex.org/W4385613110","https://openalex.org/W4387011098","https://openalex.org/W4389633720","https://openalex.org/W4400120053","https://openalex.org/W6755207826","https://openalex.org/W6786948829","https://openalex.org/W6793954727","https://openalex.org/W6796927292"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W4402327032","https://openalex.org/W2382290278"],"abstract_inverted_index":{"Identifying":[0],"Decentralized":[1],"Applications":[2],"(DApps)":[3],"from":[4],"encrypted":[5,37,91],"network":[6,16,62,146],"traffic":[7,38,92,197,237],"plays":[8],"an":[9,52],"important":[10],"role":[11],"in":[12,34,181,234],"areas":[13],"such":[14],"as":[15,51],"management":[17],"and":[18,55,73,104,123,137,162,185,195],"threat":[19],"detection.":[20],"However,":[21],"DApps":[22,35,180,194],"deployed":[23],"on":[24,113,145,153,169,190,215],"the":[25,29,60,75,99,114,120,126,149,163,182,187,204,216,228,235],"same":[26,30],"platform":[27],"use":[28],"encryption":[31],"settings,":[32],"resulting":[33],"generating":[36],"with":[39,148],"great":[40],"similarity.":[41],"In":[42,84,226],"addition,":[43,227],"existing":[44],"flow-based":[45],"methods":[46],"only":[47],"consider":[48],"each":[49],"flow":[50,131],"isolated":[53],"individual":[54],"feed":[56],"it":[57],"sequentially":[58],"into":[59],"neural":[61],"for":[63],"feature":[64],"extraction,":[65],"ignoring":[66],"other":[67,223],"rich":[68],"information":[69,130,154,170],"introduced":[70],"between":[71,77,156,172],"flows,":[72,147],"therefore":[74],"relationship":[76],"different":[78,157,173],"flows":[79],"is":[80],"not":[81],"effectively":[82],"utilized.":[83],"this":[85],"study,":[86],"we":[87],"propose":[88],"a":[89,141,160,208],"novel":[90],"classification":[93,198,209,238],"model":[94,189,206,230],"IIT":[95,139,188,205,229],"to":[96],"heterogeneously":[97],"mine":[98],"potential":[100],"features":[101],"of":[102,110,129,179,211,219],"intra-":[103,122],"inter-flows,":[105],"which":[106],"contain":[107],"two":[108,191],"types":[109],"encoders":[111],"based":[112],"multi-head":[115],"self-attention":[116],"mechanism.":[117],"By":[118],"combining":[119],"complementary":[121],"inter-flow":[124,164],"perspectives,":[125],"entire":[127],"process":[128],"can":[132],"be":[133],"more":[134,142,167],"completely":[135],"understood":[136],"described.":[138],"provides":[140],"complete":[143],"perspective":[144,151,165],"intra-flow":[150],"focusing":[152],"transfer":[155],"packets":[158],"within":[159],"flow,":[161],"placing":[166],"emphasis":[168],"interaction":[171],"flows.":[174],"We":[175],"captured":[176],"44":[177,220],"classes":[178],"real":[183],"world":[184],"evaluated":[186],"datasets,":[192],"including":[193],"malicious":[196,236],"tasks.":[199],"The":[200],"results":[201],"demonstrate":[202],"that":[203],"achieves":[207],"accuracy":[210],"greater":[212],"than":[213],"97%":[214],"real-world":[217],"dataset":[218],"DApps,":[221],"outperforming":[222],"state-of-the-art":[224],"methods.":[225],"exhibits":[231],"good":[232],"generalization":[233],"task.":[239]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":10}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
