{"id":"https://openalex.org/W4393956382","doi":"https://doi.org/10.1145/3603166.3632243","title":"PPS: A Packets Pattern-based Video Identification in Encrypted Network Traffic","display_name":"PPS: A Packets Pattern-based Video Identification in Encrypted Network Traffic","publication_year":2023,"publication_date":"2023-12-04","ids":{"openalex":"https://openalex.org/W4393956382","doi":"https://doi.org/10.1145/3603166.3632243"},"language":"en","primary_location":{"id":"doi:10.1145/3603166.3632243","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3603166.3632243","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3603166.3632243","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the IEEE/ACM 16th International Conference on Utility and Cloud Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3603166.3632243","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078487772","display_name":"Syed M. A. H. Bukhari","orcid":"https://orcid.org/0000-0002-6359-5879"},"institutions":[{"id":"https://openalex.org/I83202590","display_name":"Jeju National University","ror":"https://ror.org/05hnb4n85","country_code":"KR","type":"education","lineage":["https://openalex.org/I83202590"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Syed Muhammad Ammar Hassan Bukhari","raw_affiliation_strings":["Department of Computer Engineering, Jeju National University, Jeju-si, Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0002-6359-5879","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Jeju National University, Jeju-si, Republic of Korea","institution_ids":["https://openalex.org/I83202590"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087380351","display_name":"Muhammad Afaq","orcid":"https://orcid.org/0000-0001-8678-0754"},"institutions":[{"id":"https://openalex.org/I83202590","display_name":"Jeju National University","ror":"https://ror.org/05hnb4n85","country_code":"KR","type":"education","lineage":["https://openalex.org/I83202590"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Muhammad Afaq","raw_affiliation_strings":["Department of Computer Engineering, Jeju National University, Jeju-si, Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0001-8678-0754","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Jeju National University, Jeju-si, Republic of Korea","institution_ids":["https://openalex.org/I83202590"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5066464184","display_name":"Wang\u2010Cheol Song","orcid":"https://orcid.org/0000-0002-7411-5316"},"institutions":[{"id":"https://openalex.org/I83202590","display_name":"Jeju National University","ror":"https://ror.org/05hnb4n85","country_code":"KR","type":"education","lineage":["https://openalex.org/I83202590"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Wang-Cheol Song","raw_affiliation_strings":["Department of Computer Engineering, Jeju National University, Jeju-si, Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0002-7411-5316","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Jeju National University, Jeju-si, Republic of Korea","institution_ids":["https://openalex.org/I83202590"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5078487772"],"corresponding_institution_ids":["https://openalex.org/I83202590"],"apc_list":null,"apc_paid":null,"fwci":0.3408,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.68695782,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7520759105682373},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6695055961608887},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6648843884468079},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6062432527542114},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5925625562667847}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7520759105682373},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6695055961608887},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6648843884468079},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6062432527542114},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5925625562667847},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3603166.3632243","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3603166.3632243","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3603166.3632243","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the IEEE/ACM 16th International Conference on Utility and Cloud Computing","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3603166.3632243","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3603166.3632243","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3603166.3632243","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the IEEE/ACM 16th International Conference on Utility and Cloud Computing","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6610135176","display_name":null,"funder_award_id":"2018-0-01863","funder_id":"https://openalex.org/F4320328359","funder_display_name":"Ministry of Science and ICT, South Korea"}],"funders":[{"id":"https://openalex.org/F4320320671","display_name":"National Research Foundation","ror":"https://ror.org/05s0g1g46"},{"id":"https://openalex.org/F4320322120","display_name":"National Research Foundation of Korea","ror":"https://ror.org/013aysd81"},{"id":"https://openalex.org/F4320328359","display_name":"Ministry of Science and ICT, South Korea","ror":"https://ror.org/01wpjm123"},{"id":"https://openalex.org/F4320335489","display_name":"Institute for Information and Communications Technology Promotion","ror":"https://ror.org/01g0hqq23"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4393956382.pdf","grobid_xml":"https://content.openalex.org/works/W4393956382.grobid-xml"},"referenced_works_count":12,"referenced_works":["https://openalex.org/W1549152507","https://openalex.org/W2162452656","https://openalex.org/W2343828539","https://openalex.org/W2793336017","https://openalex.org/W2949600091","https://openalex.org/W2955506470","https://openalex.org/W3023568338","https://openalex.org/W3035952106","https://openalex.org/W3144062820","https://openalex.org/W4210423341","https://openalex.org/W4230770384","https://openalex.org/W4376651722"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W4391913857","https://openalex.org/W2350741829","https://openalex.org/W2386317283"],"abstract_inverted_index":{"Video":[0],"identification":[1,30,48,137,156],"in":[2,11,50,64,82],"encrypted":[3,51],"network":[4,52,111],"traffic":[5,53,112],"has":[6],"become":[7,32],"a":[8,46,65,86,100,140,158],"trending":[9],"field":[10],"the":[12,25,35,55,61,79,83,107,110,117,121,125,134,146],"research":[13],"area":[14],"for":[15],"user":[16],"behavior":[17],"and":[18,74,114],"Quality":[19],"of":[20,28,37,57,85,88,143],"Experience":[21],"(QoE)":[22],"analysis.":[23],"However,":[24],"traditional":[26],"methods":[27],"video":[29,47,70,80,118,136,155],"have":[31],"ineffective":[33],"with":[34,139,157],"usage":[36],"Hypertext":[38],"Transfer":[39],"Protocol":[40],"Secure":[41],"(HTTPS).":[42],"This":[43,93],"paper":[44],"presents":[45],"method":[49],"using":[54],"number":[56],"packets":[58],"received":[59],"at":[60],"user's":[62],"end":[63],"second.":[66],"For":[67],"this":[68],"purpose,":[69],"streams":[71,81],"are":[72],"captured,":[73],"feature":[75,94,113],"is":[76,95],"extracted":[77],"from":[78,109,124],"form":[84],"series":[87],"Packets":[89],"per":[90],"Seconds":[91],"(PPS).":[92],"provided":[96],"as":[97],"input":[98],"to":[99],"Convolutional":[101],"Neural":[102],"Network":[103],"(CNN),":[104],"which":[105],"learns":[106],"pattern":[108,122],"successfully":[115],"identifies":[116],"even":[119],"if":[120],"differs":[123],"training":[126],"sample.":[127],"The":[128],"results":[129,147],"show":[130,148],"that":[131,149],"PPS":[132],"outperforms":[133,151],"other":[135],"techniques":[138],"high":[141],"accuracy":[142],"90%.":[144],"Moreover,":[145],"CNN":[150],"its":[152],"counterpart":[153],"regarding":[154],"25%":[159],"performance":[160],"increase.":[161]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
