{"id":"https://openalex.org/W4307459841","doi":"https://doi.org/10.1145/3558819.3558835","title":"Research on Novel TLS Protocol Network Traffic Management and Monitoring Method","display_name":"Research on Novel TLS Protocol Network Traffic Management and Monitoring Method","publication_year":2022,"publication_date":"2022-09-23","ids":{"openalex":"https://openalex.org/W4307459841","doi":"https://doi.org/10.1145/3558819.3558835"},"language":"en","primary_location":{"id":"doi:10.1145/3558819.3558835","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3558819.3558835","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3558819.3558835","source":{"id":"https://openalex.org/S4363608855","display_name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3558819.3558835","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102999591","display_name":"Yangyang Guan","orcid":"https://orcid.org/0000-0002-8215-135X"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yangyang Guan","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, China and \rSchool of Cyber Security, University of Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, China and \rSchool of Cyber Security, University of Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100332655","display_name":"Zhen Li","orcid":"https://orcid.org/0000-0003-1166-9482"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Li","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, China and \rSchool of Cyber Security, University of Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, China and \rSchool of Cyber Security, University of Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5115601598","display_name":"Gang Xiong","orcid":"https://orcid.org/0000-0002-3190-6521"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gang Xiong","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, China and \rSchool of Cyber Security, University of Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, China and \rSchool of Cyber Security, University of Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102999591"],"corresponding_institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.1044,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.3073132,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"89","last_page":"94"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9695000052452087,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9695000052452087,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.923799991607666,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9118000268936157,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7884182929992676},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7446992993354797},{"id":"https://openalex.org/keywords/network-management","display_name":"Network management","score":0.5692206621170044},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5597594380378723},{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.5542412400245667},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5531778931617737},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.48267701268196106},{"id":"https://openalex.org/keywords/network-management-application","display_name":"Network management application","score":0.4620627164840698},{"id":"https://openalex.org/keywords/network-management-station","display_name":"Network management station","score":0.44597673416137695},{"id":"https://openalex.org/keywords/network-architecture","display_name":"Network architecture","score":0.22071194648742676}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7884182929992676},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7446992993354797},{"id":"https://openalex.org/C129763632","wikidata":"https://www.wikidata.org/wiki/Q1454667","display_name":"Network management","level":2,"score":0.5692206621170044},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5597594380378723},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.5542412400245667},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5531778931617737},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.48267701268196106},{"id":"https://openalex.org/C89094514","wikidata":"https://www.wikidata.org/wiki/Q7001060","display_name":"Network management application","level":4,"score":0.4620627164840698},{"id":"https://openalex.org/C16986412","wikidata":"https://www.wikidata.org/wiki/Q918419","display_name":"Network management station","level":3,"score":0.44597673416137695},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.22071194648742676},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3558819.3558835","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3558819.3558835","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3558819.3558835","source":{"id":"https://openalex.org/S4363608855","display_name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3558819.3558835","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3558819.3558835","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3558819.3558835","source":{"id":"https://openalex.org/S4363608855","display_name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5517038434","display_name":null,"funder_award_id":"2020YFB","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G7222629967","display_name":null,"funder_award_id":"2020YFB1006100","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4307459841.pdf","grobid_xml":"https://content.openalex.org/works/W4307459841.grobid-xml"},"referenced_works_count":9,"referenced_works":["https://openalex.org/W26952455","https://openalex.org/W1981790149","https://openalex.org/W2139674816","https://openalex.org/W2911812040","https://openalex.org/W2915352631","https://openalex.org/W2980189702","https://openalex.org/W4253779865","https://openalex.org/W6682199348","https://openalex.org/W6816635083"],"related_works":["https://openalex.org/W1979528400","https://openalex.org/W2286884870","https://openalex.org/W582999994","https://openalex.org/W1485511208","https://openalex.org/W2351459560","https://openalex.org/W224643466","https://openalex.org/W1984267261","https://openalex.org/W2384062591","https://openalex.org/W2015940040","https://openalex.org/W2150744554"],"abstract_inverted_index":{"With":[0,73],"the":[1,11,41,47,74,78,100,121,130,137,146,152,187,190,194,197,203,210,214,217,220,224,230,241,252,257,275],"development":[2],"of":[3,26,43,77,95,157,189,196,216,229,278],"Internet":[4],"technology,":[5],"more":[6,8],"and":[7,34,59,63,71,87,107,112,127,129,140,165,173,177,206,219,227,250,260],"websites":[9],"use":[10],"novel":[12,79,131,271,279],"TLS":[13,178,198,231],"encryption":[14,24,76],"technologies":[15],"(such":[16],"as":[17,57],"TLS1.3,":[18],"DOH,":[19],"ESNI,":[20],"etc.).":[21],"The":[22,66,115,183],"full":[23,75],"technology":[25],"network":[27,49,96,113,208,238,242,253],"traffic":[28,122,168,205],"brings":[29],"great":[30],"challenges":[31],"to":[32,85,119,150,248],"identify":[33],"prevent":[35],"threats":[36],"in":[37],"encrypted":[38],"traffic.":[39],"In":[40],"face":[42],"new":[44,93],"threat":[45],"behavior,":[46],"traditional":[48,101],"management":[50,103,123,169,243,254],"needs":[51],"a":[52,92,270],"long-term":[53],"experimental":[54],"process":[55,68,226],"such":[56],"observation":[58],"analysis,":[60],"feature":[61],"extraction":[62],"online":[64],"recognition.":[65],"whole":[67],"is":[69,118,246],"time-consuming":[70],"labor-consuming.":[72],"protocol,":[80,199],"this":[81,160,162],"confrontation":[82,102],"will":[83],"continue":[84],"escalate":[86],"unsustainable.":[88],"This":[89],"paper":[90,163],"proposes":[91,164],"idea":[94,117,273],"management,":[97,106],"which":[98],"changes":[99],"into":[104],"cooperation":[105,188,215],"can":[108,201,236],"compromise":[109],"privacy":[110],"protection":[111],"management.":[114,239],"main":[116],"study":[120],"method":[124,144,149,176,185,212],"combining":[125],"\"endpoint\"":[126],"\"pipe\"":[128],"protocol":[132,179,232],"extension":[133,195],"method.":[134,182],"Securely":[135],"transmit":[136],"secret":[138],"key":[139,171],"data":[141,228,262],"senseless":[142],"decryption":[143],"through":[145],"hidden":[147],"channel":[148],"obtain":[151],"real":[153],"URL":[154],"access":[155],"path":[156],"users.":[158],"On":[159,240],"basis,":[161],"designs":[166],"two":[167,267],"methods:":[170],"acquisition":[172],"covert":[174],"transmission":[175,233],"upgrade":[180],"implementation":[181],"first":[184],"requires":[186,213],"client.":[191],"By":[192,222],"studying":[193],"we":[200,235],"decrypt":[202,249],"original":[204],"realize":[207],"management;":[209],"second":[211],"client":[218],"server.":[221],"upgrading":[223],"handshake":[225],"implementation,":[234],"implement":[237],"side,":[244],"it":[245],"necessary":[247],"restore":[251],"packets,":[255],"while":[256],"user":[258],"request":[259],"response":[261],"cannot":[263],"be":[264],"decrypted.":[265],"These":[266],"approaches":[268],"are":[269],"solution":[272],"under":[274],"popular":[276],"application":[277],"protocols.":[280]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
