{"id":"https://openalex.org/W3200273708","doi":"https://doi.org/10.1155/2021/5363750","title":"Anomaly Detection in Encrypted Internet Traffic Using Hybrid Deep Learning","display_name":"Anomaly Detection in Encrypted Internet Traffic Using Hybrid Deep Learning","publication_year":2021,"publication_date":"2021-09-21","ids":{"openalex":"https://openalex.org/W3200273708","doi":"https://doi.org/10.1155/2021/5363750","mag":"3200273708"},"language":"en","primary_location":{"id":"doi:10.1155/2021/5363750","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/5363750","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/5363750.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2021/5363750.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079692899","display_name":"Taimur Bakhshi","orcid":"https://orcid.org/0000-0003-4750-7864"},"institutions":[{"id":"https://openalex.org/I201384688","display_name":"National University of Computer and Emerging Sciences","ror":"https://ror.org/003eyb898","country_code":"PK","type":"education","lineage":["https://openalex.org/I201384688"]},{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]}],"countries":["GB","PK"],"is_corresponding":true,"raw_author_name":"Taimur Bakhshi","raw_affiliation_strings":["Center for Information Management & Cyber Security, National University of Computer & Emerging Sciences, Lahore, Pakistan","Center for Security, Communications & Networking Research, University of Plymouth, Plymouth, UK"],"affiliations":[{"raw_affiliation_string":"Center for Information Management & Cyber Security, National University of Computer & Emerging Sciences, Lahore, Pakistan","institution_ids":["https://openalex.org/I201384688"]},{"raw_affiliation_string":"Center for Security, Communications & Networking Research, University of Plymouth, Plymouth, UK","institution_ids":["https://openalex.org/I897542642"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044709278","display_name":"Bogdan Ghita","orcid":"https://orcid.org/0000-0002-1788-547X"},"institutions":[{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Bogdan Ghita","raw_affiliation_strings":["Center for Security, Communications & Networking Research, University of Plymouth, Plymouth, UK"],"affiliations":[{"raw_affiliation_string":"Center for Security, Communications & Networking Research, University of Plymouth, Plymouth, UK","institution_ids":["https://openalex.org/I897542642"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5079692899"],"corresponding_institution_ids":["https://openalex.org/I201384688","https://openalex.org/I897542642"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":3.6795,"has_fulltext":true,"cited_by_count":47,"citation_normalized_percentile":{"value":0.93205737,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"2021","issue":null,"first_page":"1","last_page":"16"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8983355164527893},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.7628120183944702},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7345976829528809},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6902533173561096},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6192927360534668},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.541517972946167},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4889329969882965},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.48466068506240845},{"id":"https://openalex.org/keywords/feature-engineering","display_name":"Feature engineering","score":0.4574818015098572},{"id":"https://openalex.org/keywords/recurrent-neural-network","display_name":"Recurrent neural network","score":0.4453568756580353},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.41729027032852173},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4163411855697632},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4104350209236145},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.39661282300949097},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3430973291397095},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.23207569122314453},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2020280659198761}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8983355164527893},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.7628120183944702},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7345976829528809},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6902533173561096},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6192927360534668},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.541517972946167},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4889329969882965},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.48466068506240845},{"id":"https://openalex.org/C2778827112","wikidata":"https://www.wikidata.org/wiki/Q22245680","display_name":"Feature engineering","level":3,"score":0.4574818015098572},{"id":"https://openalex.org/C147168706","wikidata":"https://www.wikidata.org/wiki/Q1457734","display_name":"Recurrent neural network","level":3,"score":0.4453568756580353},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.41729027032852173},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4163411855697632},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4104350209236145},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.39661282300949097},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3430973291397095},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.23207569122314453},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2020280659198761},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1155/2021/5363750","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/5363750","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/5363750.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:71207d6b1ded4e9186eade1d04017533","is_oa":true,"landing_page_url":"https://doaj.org/article/71207d6b1ded4e9186eade1d04017533","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2021 (2021)","raw_type":"article"},{"id":"pmh:oai:pearl.plymouth.ac.uk:10026.1/18327","is_oa":false,"landing_page_url":"http://hdl.handle.net/10026.1/18327","pdf_url":null,"source":{"id":"https://openalex.org/S4306402507","display_name":"PEARL (University of Plymouth)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I897542642","host_organization_name":"University of Plymouth","host_organization_lineage":["https://openalex.org/I897542642"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1155/2021/5363750","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/5363750","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/5363750.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3200273708.pdf","grobid_xml":"https://content.openalex.org/works/W3200273708.grobid-xml"},"referenced_works_count":47,"referenced_works":["https://openalex.org/W2031163547","https://openalex.org/W2040870580","https://openalex.org/W2077488147","https://openalex.org/W2099940443","https://openalex.org/W2100495367","https://openalex.org/W2236990834","https://openalex.org/W2296509296","https://openalex.org/W2364408376","https://openalex.org/W2624871570","https://openalex.org/W2740755977","https://openalex.org/W2743678626","https://openalex.org/W2750674396","https://openalex.org/W2753434589","https://openalex.org/W2789828921","https://openalex.org/W2794826941","https://openalex.org/W2897202622","https://openalex.org/W2903382683","https://openalex.org/W2911301616","https://openalex.org/W2912386632","https://openalex.org/W2913609127","https://openalex.org/W2919115771","https://openalex.org/W2919493784","https://openalex.org/W2928842143","https://openalex.org/W2952436057","https://openalex.org/W2972117870","https://openalex.org/W2981318525","https://openalex.org/W2993565013","https://openalex.org/W3005748482","https://openalex.org/W3021182036","https://openalex.org/W3023430131","https://openalex.org/W3038955483","https://openalex.org/W3047132966","https://openalex.org/W3086424741","https://openalex.org/W3097529015","https://openalex.org/W3102286750","https://openalex.org/W3108827348","https://openalex.org/W3112230928","https://openalex.org/W3118903043","https://openalex.org/W3120016685","https://openalex.org/W3121886859","https://openalex.org/W3135622244","https://openalex.org/W3181108657","https://openalex.org/W4301866626","https://openalex.org/W4320930577","https://openalex.org/W6746023985","https://openalex.org/W6757107679","https://openalex.org/W6764398373"],"related_works":["https://openalex.org/W4225394202","https://openalex.org/W4298287631","https://openalex.org/W2953061907","https://openalex.org/W3032952384","https://openalex.org/W3034302643","https://openalex.org/W1847088711","https://openalex.org/W2179036394","https://openalex.org/W4206905835","https://openalex.org/W2613715541","https://openalex.org/W4387022695"],"abstract_inverted_index":{"An":[0],"increasing":[1],"number":[2],"of":[3,41,59,76,104,134,155],"Internet":[4],"application":[5],"services":[6],"are":[7,93,126],"relying":[8,105],"on":[9,106],"encrypted":[10,20,79,98],"traffic":[11,21,43],"to":[12,22,38,62,95],"offer":[13],"adequate":[14],"consumer":[15],"privacy.":[16],"Anomaly":[17],"detection":[18,75],"in":[19,56,78,174,180],"circumvent":[23],"and":[24,33,91,121,137,158,183],"mitigate":[25],"cyber":[26],"security":[27],"threats":[28],"is,":[29],"however,":[30],"an":[31,159],"open":[32],"ongoing":[34],"research":[35],"challenge":[36],"due":[37],"the":[39,88,151,156,166,181,188],"limitation":[40],"existing":[42],"classification":[44,64],"techniques.":[45],"Deep":[46],"learning":[47,110],"is":[48],"emerging":[49],"as":[50,143],"a":[51,70,107,131],"promising":[52],"paradigm,":[53],"allowing":[54],"reduction":[55],"manual":[57],"determination":[58],"feature":[60,153,177],"set":[61],"increase":[63],"accuracy.":[65],"The":[66,146],"present":[67],"work":[68],"develops":[69],"deep":[71,109],"learning-based":[72],"model":[73],"for":[74],"anomalies":[77],"network":[80],"traffic.":[81],"Three":[82],"different":[83],"publicly":[84],"available":[85],"datasets":[86],"including":[87],"NSL-KDD,":[89],"UNSW-NB15,":[90],"CIC-IDS-2017":[92],"used":[94],"comprehensively":[96],"analyze":[97],"attacks":[99],"targeting":[100],"popular":[101],"protocols.":[102],"Instead":[103],"single":[108],"model,":[111],"multiple":[112],"schemes":[113],"using":[114],"convolutional":[115,135],"(CNN),":[116],"long":[117],"short-term":[118],"memory":[119],"(LSTM),":[120],"recurrent":[122,139],"neural":[123],"networks":[124],"(RNNs)":[125],"investigated.":[127],"Our":[128],"results":[129,173],"report":[130],"hybrid":[132,147,185],"combination":[133],"(CNN)":[136],"gated":[138],"unit":[140],"(GRU)":[141],"models":[142],"outperforming":[144],"others.":[145],"approach":[148],"benefits":[149],"from":[150],"low-latency":[152],"derivation":[154],"CNN,":[157],"overall":[160],"improved":[161],"training":[162],"dataset":[163],"fitting.":[164],"Additionally,":[165],"highly":[167],"effective":[168],"generalization":[169],"offered":[170],"by":[171],"GRU":[172,184],"optimal":[175],"time-domain-related":[176],"extraction,":[178],"resulting":[179],"CNN":[182],"scheme":[186],"presenting":[187],"best":[189],"model.":[190]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":20},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":4}],"updated_date":"2026-04-06T07:47:59.780226","created_date":"2025-10-10T00:00:00"}
