{"id":"https://openalex.org/W4400224462","doi":"https://doi.org/10.1145/3649153.3649207","title":"MFC-DoH: DoH Tunnel Detection Based on the Fusion of MAML and F-CNN","display_name":"MFC-DoH: DoH Tunnel Detection Based on the Fusion of MAML and F-CNN","publication_year":2024,"publication_date":"2024-05-07","ids":{"openalex":"https://openalex.org/W4400224462","doi":"https://doi.org/10.1145/3649153.3649207"},"language":"en","primary_location":{"id":"doi:10.1145/3649153.3649207","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3649153.3649207","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 21st ACM International Conference on Computing Frontiers","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3649153.3649207","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102720386","display_name":"Xiaoyu Liu","orcid":"https://orcid.org/0009-0006-6031-8493"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaoyu Liu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011964636","display_name":"Yijing Zhang","orcid":"https://orcid.org/0009-0007-2926-6725"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yijing Zhang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045164115","display_name":"Xiaodu Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaodu Yang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045494547","display_name":"Weilin Gai","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weilin Gai","raw_affiliation_strings":["Institute of Software, Chinese Academy of Sciences, School of computer science and technology, University of Chinese Academy of Sciences, National Computer Network, Emergency Response Technical, Team/Coordination Center of China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Software, Chinese Academy of Sciences, School of computer science and technology, University of Chinese Academy of Sciences, National Computer Network, Emergency Response Technical, Team/Coordination Center of China, Beijing, China","institution_ids":["https://openalex.org/I4210165038","https://openalex.org/I4210128818"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101923084","display_name":"Bo Sun","orcid":"https://orcid.org/0009-0007-9648-7720"},"institutions":[{"id":"https://openalex.org/I4210087772","display_name":"National Computer Network Emergency Response Technical Team/Coordination Center of Chinar","ror":"https://ror.org/00247dh76","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210087772"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Sun","raw_affiliation_strings":["National Computer Network, Emergency Response Technical, Team/Coordination Center of China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Computer Network, Emergency Response Technical, Team/Coordination Center of China, Beijing, China","institution_ids":["https://openalex.org/I4210087772"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5102720386"],"corresponding_institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":2.1757,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.88955812,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"267","last_page":"275"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12740","display_name":"Gait Recognition and Analysis","score":0.9646999835968018,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6016824841499329},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.483195424079895},{"id":"https://openalex.org/keywords/fusion","display_name":"Fusion","score":0.4722694158554077},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.43208563327789307},{"id":"https://openalex.org/keywords/sensor-fusion","display_name":"Sensor fusion","score":0.4246140122413635},{"id":"https://openalex.org/keywords/remote-sensing","display_name":"Remote sensing","score":0.3649517297744751},{"id":"https://openalex.org/keywords/geology","display_name":"Geology","score":0.272375226020813}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6016824841499329},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.483195424079895},{"id":"https://openalex.org/C158525013","wikidata":"https://www.wikidata.org/wiki/Q2593739","display_name":"Fusion","level":2,"score":0.4722694158554077},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.43208563327789307},{"id":"https://openalex.org/C33954974","wikidata":"https://www.wikidata.org/wiki/Q486494","display_name":"Sensor fusion","level":2,"score":0.4246140122413635},{"id":"https://openalex.org/C62649853","wikidata":"https://www.wikidata.org/wiki/Q199687","display_name":"Remote sensing","level":1,"score":0.3649517297744751},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.272375226020813},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3649153.3649207","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3649153.3649207","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 21st ACM International Conference on Computing Frontiers","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3649153.3649207","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3649153.3649207","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 21st ACM International Conference on Computing Frontiers","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2101234009","https://openalex.org/W2604763608","https://openalex.org/W2994419048","https://openalex.org/W3021740526","https://openalex.org/W3080354144","https://openalex.org/W3080730509","https://openalex.org/W3120774524","https://openalex.org/W3182711238","https://openalex.org/W3194997082","https://openalex.org/W4214533612","https://openalex.org/W4221077261","https://openalex.org/W4285184946"],"related_works":["https://openalex.org/W2058170566","https://openalex.org/W2755342338","https://openalex.org/W2772917594","https://openalex.org/W2775347418","https://openalex.org/W2166024367","https://openalex.org/W3116076068","https://openalex.org/W2229312674","https://openalex.org/W2951359407","https://openalex.org/W2079911747","https://openalex.org/W1969923398"],"abstract_inverted_index":{"Domain":[0],"Name":[1],"System":[2],"(DNS)":[3],"tunnels,":[4],"used":[5],"by":[6,75],"attackers":[7,52],"to":[8,41],"transmit":[9],"sensitive":[10],"information":[11],"through":[12],"plaintext":[13],"DNS":[14,43,55],"protocols,":[15],"have":[16],"garnered":[17],"significant":[18],"attention.":[19],"In":[20],"addressing":[21],"the":[22,27,34,60,106,113,118,121,134,145],"security":[23],"concerns":[24],"of":[25,108,120],"DNS,":[26],"Internet":[28],"Engineering":[29],"Task":[30],"Force":[31],"(IETF)":[32],"introduced":[33],"DNS-over-HTTPS":[35],"(DoH)":[36],"protocol":[37],"in":[38,70,93,148,152],"2018,":[39],"aiming":[40],"encrypt":[42],"data":[44],"transmission":[45],"and":[46,68,112,125],"effectively":[47],"safeguard":[48],"user":[49],"privacy.":[50],"However,":[51],"cleverly":[53],"conceal":[54],"tunnels":[56,151],"within":[57],"HTTPS":[58],"using":[59],"DoH":[61,83,90,150],"protocol,":[62],"rendering":[63],"traditional":[64],"detection":[65,92],"methods":[66],"ineffective":[67],"resulting":[69],"numerous":[71],"areas":[72],"being":[73],"impacted":[74],"malicious":[76],"events.":[77],"Although":[78],"there":[79],"are":[80,87],"studies":[81],"on":[82,105,133],"tunnel":[84,91],"detection,":[85],"few":[86],"concerned":[88],"with":[89,117],"few-shot":[94,153],"scenarios.":[95,154],"This":[96],"paper":[97],"proposes":[98],"a":[99],"novel":[100],"method":[101,132,142],"called":[102],"MFC-DoH,":[103],"based":[104],"combination":[107],"Model-Agnostic":[109],"Meta-Learning":[110],"(MAML)":[111],"unique":[114],"CNN":[115],"network(F-CNN)":[116],"introduction":[119],"frequency":[122],"domain":[123],"layer":[124],"multi-head":[126],"attention":[127],"layer(MHSA).":[128],"We":[129],"evaluate":[130],"our":[131,141],"public":[135],"dataset.":[136],"Experimental":[137],"results":[138],"exhibit":[139],"that":[140],"significantly":[143],"outperforms":[144],"existing":[146],"approach":[147],"detecting":[149]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
