{"id":"https://openalex.org/W4409371989","doi":"https://doi.org/10.32604/cmc.2025.063308","title":"Real-Time Identification Technology for Encrypted DNS Traffic with Privacy Protection","display_name":"Real-Time Identification Technology for Encrypted DNS Traffic with Privacy Protection","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4409371989","doi":"https://doi.org/10.32604/cmc.2025.063308"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.063308","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.063308","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.063308","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001877125","display_name":"Zhipeng Qin","orcid":"https://orcid.org/0000-0003-4372-4327"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Zhipeng Qin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084911370","display_name":"Hanbing Yan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hanbing Yan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004618001","display_name":"Biyang Zhang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Biyang Zhang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060907389","display_name":"Peng Wang","orcid":"https://orcid.org/0000-0003-3513-2479"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Peng Wang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5101838781","display_name":"Yi-Tao Li","orcid":"https://orcid.org/0000-0002-7234-019X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yitao Li","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5001877125"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.5567,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.82184696,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"83","issue":"3","first_page":"5811","last_page":"5829"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9402999877929688,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9402999877929688,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6818225383758545},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.6215238571166992},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.6193786263465881},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6133564114570618},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5260643362998962},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5103299021720886}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6818225383758545},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.6215238571166992},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.6193786263465881},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6133564114570618},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5260643362998962},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5103299021720886},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.063308","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.063308","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.063308","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.063308","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5600000023841858}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W3008176860","https://openalex.org/W3010852232","https://openalex.org/W3127229177","https://openalex.org/W3155912831","https://openalex.org/W3178914588","https://openalex.org/W3189227796","https://openalex.org/W3194075353","https://openalex.org/W3196650078","https://openalex.org/W4225607886","https://openalex.org/W4280625975","https://openalex.org/W4285265295","https://openalex.org/W4309080560","https://openalex.org/W4321496630","https://openalex.org/W4366956748","https://openalex.org/W4384038596","https://openalex.org/W4388765979","https://openalex.org/W4391896150","https://openalex.org/W4392543840","https://openalex.org/W4400887755","https://openalex.org/W4403123735"],"related_works":["https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W2385965183","https://openalex.org/W2953707841","https://openalex.org/W4403547452","https://openalex.org/W1496791764","https://openalex.org/W4318485713","https://openalex.org/W2740319091","https://openalex.org/W4225340788","https://openalex.org/W33899462"],"abstract_inverted_index":{"With":[0],"the":[1,160,165],"widespread":[2],"adoption":[3],"of":[4,89,170],"encrypted":[5,32,79,171],"Domain":[6],"Name":[7],"System":[8],"(DNS)":[9],"technologies":[10,49],"such":[11],"as":[12],"DNS":[13,33,80,172],"over":[14],"Hyper":[15],"Text":[16],"Transfer":[17],"Protocol":[18],"Secure":[19],"(HTTPS),":[20],"traditional":[21],"port":[22],"and":[23,55,68,102,122,130,153,167],"protocol-based":[24],"traffic":[25,81,173],"analysis":[26],"methods":[27,61],"have":[28],"become":[29],"ineffective.":[30],"Although":[31],"enhances":[34],"user":[35],"privacy":[36,69,83,100,124,129],"protection,":[37],"it":[38,179],"also":[39],"provides":[40],"concealed":[41],"communication":[42],"channels":[43],"for":[44,78,181],"malicious":[45],"software,":[46],"compelling":[47],"detection":[48],"to":[50,98,126,149],"shift":[51],"towards":[52],"statistical":[53],"feature-based":[54],"machine":[56],"learning":[57,109],"approaches.":[58],"However,":[59],"these":[60],"still":[62],"face":[63],"challenges":[64],"in":[65],"real-time":[66,75,168],"performance":[67,169],"protection.":[70,84],"This":[71],"paper":[72],"proposes":[73],"a":[74,86,106,141],"identification":[76,103,132,174],"technology":[77,162],"with":[82],"Firstly,":[85],"hierarchical":[87],"architecture":[88],"cloud-edge-end":[90],"collaboration":[91],"is":[92,117,147],"designed,":[93],"incorporating":[94],"task":[95],"offloading":[96,137],"strategies":[97],"balance":[99],"protection":[101],"efficiency.":[104],"Secondly,":[105],"privacy-preserving":[107],"federated":[108],"mechanism":[110],"based":[111,139],"on":[112,140],"Federated":[113],"Robust":[114],"Aggregation":[115],"(FedRA)":[116],"proposed,":[118],"utilizing":[119],"Medoid":[120],"aggregation":[121],"differential":[123],"techniques":[125],"ensure":[127],"data":[128],"enhance":[131],"accuracy.":[133],"Finally,":[134],"an":[135],"edge":[136],"strategy":[138],"dynamic":[142],"priority":[143],"scheduling":[144],"algorithm":[145],"(DPSA)":[146],"designed":[148],"alleviate":[150],"terminal":[151],"burden":[152],"reduce":[154],"latency.":[155],"Simulation":[156],"results":[157],"demonstrate":[158],"that":[159],"proposed":[161],"significantly":[163],"improves":[164],"accuracy":[166],"while":[175],"protecting":[176],"privacy,":[177],"making":[178],"suitable":[180],"various":[182],"network":[183],"environments.":[184]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
