{"id":"https://openalex.org/W3136394420","doi":"https://doi.org/10.1145/3442520.3442529","title":"TLS Encrypted Application Classification Using Machine Learning with Flow Feature Engineering","display_name":"TLS Encrypted Application Classification Using Machine Learning with Flow Feature Engineering","publication_year":2020,"publication_date":"2020-11-27","ids":{"openalex":"https://openalex.org/W3136394420","doi":"https://doi.org/10.1145/3442520.3442529","mag":"3136394420"},"language":"en","primary_location":{"id":"doi:10.1145/3442520.3442529","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3442520.3442529","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 the 10th International Conference on Communication and Network Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048859921","display_name":"Onur Barut","orcid":"https://orcid.org/0000-0002-0599-1515"},"institutions":[{"id":"https://openalex.org/I133738476","display_name":"University of Massachusetts Lowell","ror":"https://ror.org/03hamhx47","country_code":"US","type":"education","lineage":["https://openalex.org/I133738476"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Onur Barut","raw_affiliation_strings":["University of Massachusetts Lowell, USA"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts Lowell, USA","institution_ids":["https://openalex.org/I133738476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001500653","display_name":"Rebecca Zhu","orcid":"https://orcid.org/0000-0003-0957-5962"},"institutions":[{"id":"https://openalex.org/I4210093848","display_name":"Nashua School District","ror":"https://ror.org/00j83d509","country_code":"US","type":"education","lineage":["https://openalex.org/I4210093848"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rebecca Zhu","raw_affiliation_strings":["Nashua High School South, Unites States"],"affiliations":[{"raw_affiliation_string":"Nashua High School South, Unites States","institution_ids":["https://openalex.org/I4210093848"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003621523","display_name":"Yan Luo","orcid":"https://orcid.org/0000-0002-5301-5092"},"institutions":[{"id":"https://openalex.org/I133738476","display_name":"University of Massachusetts Lowell","ror":"https://ror.org/03hamhx47","country_code":"US","type":"education","lineage":["https://openalex.org/I133738476"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yan Luo","raw_affiliation_strings":["University of Massachusetts Lowell, United States"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts Lowell, United States","institution_ids":["https://openalex.org/I133738476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100378750","display_name":"Tong Zhang","orcid":"https://orcid.org/0000-0001-5818-4285"},"institutions":[{"id":"https://openalex.org/I1343180700","display_name":"Intel (United States)","ror":"https://ror.org/01ek73717","country_code":"US","type":"company","lineage":["https://openalex.org/I1343180700"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tong Zhang","raw_affiliation_strings":["Intel Corporation, United States"],"affiliations":[{"raw_affiliation_string":"Intel Corporation, United States","institution_ids":["https://openalex.org/I1343180700"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5048859921"],"corresponding_institution_ids":["https://openalex.org/I133738476"],"apc_list":null,"apc_paid":null,"fwci":1.3256,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.85320233,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"32","last_page":"41"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.9057878851890564},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.8496497869491577},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7860850095748901},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.6647917628288269},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.6185817718505859},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5748586654663086},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.559867262840271},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5155420303344727},{"id":"https://openalex.org/keywords/macro","display_name":"Macro","score":0.5063844919204712},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.482907772064209},{"id":"https://openalex.org/keywords/internet-traffic","display_name":"Internet traffic","score":0.4685096740722656},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.46360480785369873},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.4364228844642639},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.42329925298690796},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.19226789474487305},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.08505317568778992},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.08059385418891907}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.9057878851890564},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.8496497869491577},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7860850095748901},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.6647917628288269},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.6185817718505859},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5748586654663086},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.559867262840271},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5155420303344727},{"id":"https://openalex.org/C166955791","wikidata":"https://www.wikidata.org/wiki/Q629579","display_name":"Macro","level":2,"score":0.5063844919204712},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.482907772064209},{"id":"https://openalex.org/C63969886","wikidata":"https://www.wikidata.org/wiki/Q3536440","display_name":"Internet traffic","level":3,"score":0.4685096740722656},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.46360480785369873},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.4364228844642639},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.42329925298690796},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.19226789474487305},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.08505317568778992},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.08059385418891907},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3442520.3442529","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3442520.3442529","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 the 10th International Conference on Communication and Network Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1976279855","https://openalex.org/W1984097153","https://openalex.org/W2040403168","https://openalex.org/W2591712613","https://openalex.org/W2599600800","https://openalex.org/W2612151390","https://openalex.org/W2772317693","https://openalex.org/W2892460540","https://openalex.org/W2908025692","https://openalex.org/W2913856735","https://openalex.org/W2963516518","https://openalex.org/W2972394923","https://openalex.org/W2974442408","https://openalex.org/W3009005808","https://openalex.org/W3027738413","https://openalex.org/W4212911130","https://openalex.org/W4239058462","https://openalex.org/W4240455494","https://openalex.org/W4285784418","https://openalex.org/W4301900453"],"related_works":["https://openalex.org/W2547456248","https://openalex.org/W4312241727","https://openalex.org/W4384946034","https://openalex.org/W3036573907","https://openalex.org/W2554395890","https://openalex.org/W2567120387","https://openalex.org/W4285551868","https://openalex.org/W2152125195","https://openalex.org/W2182343390","https://openalex.org/W2027016628"],"abstract_inverted_index":{"Network":[0],"traffic":[1,24,58,88],"classification":[2,31,59,89],"has":[3],"become":[4,39],"increasingly":[5],"important":[6],"as":[7],"the":[8,14,20,86,99,105,125],"number":[9],"of":[10,22,90],"devices":[11],"connected":[12],"to":[13],"Internet":[15],"is":[16,25,44],"rapidly":[17],"growing.":[18],"Proportionally,":[19],"amount":[21],"encrypted":[23,57,87,109],"also":[26],"increasing,":[27],"making":[28],"payload":[29],"based":[30],"methods":[32],"obsolete.":[33],"Consequently,":[34],"machine":[35],"learning":[36],"approaches":[37],"have":[38],"crucial":[40],"when":[41],"user":[42],"privacy":[43,55],"concerned.":[45],"For":[46],"this":[47],"purpose,":[48],"we":[49],"propose":[50],"an":[51],"accurate,":[52],"fast,":[53],"and":[54,66,79,94,108,124,131],"preserved":[56],"approach":[60],"with":[61,112],"engineered":[62],"flow":[63,110],"feature":[64,68],"extraction":[65],"appropriate":[67],"selection.":[69],"The":[70],"proposed":[71],"scheme":[72],"achieves":[73],"a":[74,80,113],"0.92899":[75],"macro-average":[76],"F1":[77],"score":[78,84],"0.88313":[81],"macro-averaged":[82],"mAP":[83],"for":[85,129],"Audio,":[91],"Email,":[92],"Chat,":[93],"Video":[95],"classes":[96],"derived":[97],"from":[98],"non-vpn2016":[100],"dataset.":[101],"Further":[102],"experiments":[103],"on":[104],"mixed":[106,132],"non-encrypted":[107],"dataset":[111],"data":[114],"augmentation":[115],"method":[116],"called":[117],"Synthetic":[118],"Minority":[119],"Over-Sampling":[120],"Technique":[121],"are":[122,127],"conducted":[123],"results":[126],"discussed":[128],"TLS-encrypted":[130],"flows.":[133]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
