{"id":"https://openalex.org/W7117113725","doi":"https://doi.org/10.1186/s42400-025-00446-6","title":"GSPB: a global-statistic and packet-byte fusion framework for encrypted traffic classification","display_name":"GSPB: a global-statistic and packet-byte fusion framework for encrypted traffic classification","publication_year":2025,"publication_date":"2025-12-24","ids":{"openalex":"https://openalex.org/W7117113725","doi":"https://doi.org/10.1186/s42400-025-00446-6"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00446-6","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00446-6","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00446-6.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00446-6.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5121140701","display_name":"Haiyue Li","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haiyue Li","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, 210096, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, 210096, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121215771","display_name":"Jun Tao","orcid":null},"institutions":[{"id":"https://openalex.org/I4210102840","display_name":"Ubiquitous Energy (United States)","ror":"https://ror.org/01b06j989","country_code":"US","type":"company","lineage":["https://openalex.org/I4210102840"]},{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN","US"],"is_corresponding":false,"raw_author_name":"Jun Tao","raw_affiliation_strings":["Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing, 210096, China","Purple Mountain Laboratories for Network and Communication Security, Nanjing, 211111, China","School of Cyber Science and Engineering, Southeast University, Nanjing, 210096, China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing, 210096, China","institution_ids":["https://openalex.org/I4210102840"]},{"raw_affiliation_string":"Purple Mountain Laboratories for Network and Communication Security, Nanjing, 211111, China","institution_ids":["https://openalex.org/I4210155350"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, 210096, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121146218","display_name":"Linxiao Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Linxiao Yu","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, 210096, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, 210096, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102797850","display_name":"Yuantu Luo","orcid":"https://orcid.org/0009-0003-0448-2502"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuantu Luo","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, 210096, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, 210096, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109778702","display_name":"Zuyan Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zuyan Wang","raw_affiliation_strings":["Purple Mountain Laboratories for Network and Communication Security, Nanjing, 211111, China","School of Cyber Science and Engineering, Southeast University, Nanjing, 210096, China"],"affiliations":[{"raw_affiliation_string":"Purple Mountain Laboratories for Network and Communication Security, Nanjing, 211111, China","institution_ids":["https://openalex.org/I4210155350"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, 210096, China","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5121140701"],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.80237385,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.984000027179718,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.984000027179718,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.003599999938160181,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14258","display_name":"Legal and Policy Issues","score":0.0010000000474974513,"subfield":{"id":"https://openalex.org/subfields/3308","display_name":"Law"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.7204999923706055},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7135999798774719},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5612999796867371},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.5117999911308289},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.486299991607666},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4684999883174896},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.46299999952316284},{"id":"https://openalex.org/keywords/traffic-analysis","display_name":"Traffic analysis","score":0.4602999985218048},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.3813999891281128}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7462000250816345},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.7204999923706055},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7135999798774719},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6086000204086304},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5612999796867371},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.5117999911308289},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.486299991607666},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4684999883174896},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.46299999952316284},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.4602999985218048},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.3813999891281128},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.37560001015663147},{"id":"https://openalex.org/C203519979","wikidata":"https://www.wikidata.org/wiki/Q865360","display_name":"Jaccard index","level":3,"score":0.3499999940395355},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.3465000092983246},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3434999883174896},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.3353999853134155},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3255000114440918},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.325300008058548},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.3138999938964844},{"id":"https://openalex.org/C75564084","wikidata":"https://www.wikidata.org/wiki/Q5597085","display_name":"Graph embedding","level":3,"score":0.29989999532699585},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.2922999858856201},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.2906000018119812},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.28619998693466187},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.2797999978065491},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.2759999930858612},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.27549999952316284},{"id":"https://openalex.org/C114809511","wikidata":"https://www.wikidata.org/wiki/Q1412924","display_name":"Flow network","level":2,"score":0.2623000144958496},{"id":"https://openalex.org/C33954974","wikidata":"https://www.wikidata.org/wiki/Q486494","display_name":"Sensor fusion","level":2,"score":0.26170000433921814},{"id":"https://openalex.org/C2777672014","wikidata":"https://www.wikidata.org/wiki/Q1172573","display_name":"Web traffic","level":3,"score":0.2538999915122986}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00446-6","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00446-6","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00446-6.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:6f19eb5950e14f2989faf86163c50871","is_oa":true,"landing_page_url":"https://doaj.org/article/6f19eb5950e14f2989faf86163c50871","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 8, Iss 1, Pp 1-16 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00446-6","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00446-6","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00446-6.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.8266164064407349}],"awards":[{"id":"https://openalex.org/G1092968927","display_name":null,"funder_award_id":"62472087","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3318296319","display_name":null,"funder_award_id":"Grant 62472087","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G37568934","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7117113725.pdf","grobid_xml":"https://content.openalex.org/works/W7117113725.grobid-xml"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W1521553548","https://openalex.org/W1677182931","https://openalex.org/W2052565897","https://openalex.org/W2064675550","https://openalex.org/W2190207511","https://openalex.org/W2900853407","https://openalex.org/W2919493784","https://openalex.org/W2983433342","https://openalex.org/W3011667710","https://openalex.org/W3012902672","https://openalex.org/W3017387519","https://openalex.org/W3048832564","https://openalex.org/W3116203245","https://openalex.org/W3120227884","https://openalex.org/W3181596493","https://openalex.org/W4224315052","https://openalex.org/W4281623355","https://openalex.org/W4285292284","https://openalex.org/W4290874972","https://openalex.org/W4296473472","https://openalex.org/W4312573762","https://openalex.org/W4319994093","https://openalex.org/W4322706638","https://openalex.org/W4367047070","https://openalex.org/W4379054627","https://openalex.org/W4382281941","https://openalex.org/W4385444612","https://openalex.org/W4387007222","https://openalex.org/W4387011098","https://openalex.org/W4389943455","https://openalex.org/W4396663473","https://openalex.org/W4400975454","https://openalex.org/W4402351625","https://openalex.org/W4405183144","https://openalex.org/W4411337269"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"While":[1],"encrypted":[2,34,44,102,182],"traffic":[3,35,45,58,103,147,183],"protects":[4],"user":[5,31],"privacy":[6],"and":[7,23,28,72,89,109,114,122,131,150,162],"data":[8],"security,":[9],"it":[10],"is":[11,36,54,156],"also":[12],"frequently":[13],"exploited":[14],"by":[15],"malicious":[16],"actors":[17],"for":[18,56,111],"illegal":[19],"activities,":[20],"e.g.,":[21],"phishing":[22],"malware":[24],"distribution.":[25],"Therefore,":[26],"accurately":[27],"efficiently":[29],"identifying":[30],"behavior":[32],"behind":[33],"crucial":[37],"to":[38,76,145],"maintaining":[39],"network":[40],"security.":[41],"However,":[42],"existing":[43],"classification":[46,104,184],"methods":[47,62,179],"rely":[48],"on":[49,128,169],"flow-level":[50],"feature":[51,112,165],"extraction,":[52],"which":[53],"ineffective":[55],"short":[57],"flow.":[59],"Additionally,":[60],"these":[61,94],"only":[63],"analyze":[64],"the":[65,79],"graph":[66,125],"interaction":[67],"structure":[68,126],"between":[69,134],"local":[70],"clients":[71],"remote":[73],"servers,":[74],"failing":[75],"effectively":[77,118],"utilize":[78],"byte-level":[80,120],"information":[81,121],"in":[82,86,96,180],"packets.":[83],"This":[84,116],"results":[85],"limited":[87],"adaptability":[88],"low":[90],"accuracy.":[91],"To":[92],"address":[93],"limitations,":[95],"this":[97],"paper,":[98],"we":[99,139],"propose":[100],"an":[101,159],"method,":[105],"named":[106],"Global-Statistical":[107],"features":[108,149],"Packet-Bytes,":[110],"extraction":[113],"fusion.":[115],"method":[117,175],"utilizes":[119],"constructs":[123],"a":[124,141,163],"based":[127],"sliding":[129],"windows":[130],"Jaccard":[132],"similarity":[133],"packet":[135,151],"bytes.":[136],"In":[137],"particular,":[138],"design":[140],"triple":[142],"embedding":[143],"layer":[144],"embed":[146],"flow":[148],"byte":[152],"features.":[153],"Feature":[154],"fusion":[155,166],"achieved":[157],"through":[158],"encoder-decoder":[160],"module":[161],"cross-gated":[164],"mechanism.":[167],"Experiments":[168],"public":[170],"datasets":[171],"show":[172],"that":[173],"our":[174],"outperforms":[176],"several":[177],"state-of-the-art":[178],"fine-grained":[181],"tasks.":[185]},"counts_by_year":[],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-12-24T00:00:00"}
