{"id":"https://openalex.org/W3037463437","doi":"https://doi.org/10.4018/ijwnbt.2020070104","title":"Detection of Virtual Private Network Traffic Using Machine Learning","display_name":"Detection of Virtual Private Network Traffic Using Machine Learning","publication_year":2020,"publication_date":"2020-06-26","ids":{"openalex":"https://openalex.org/W3037463437","doi":"https://doi.org/10.4018/ijwnbt.2020070104","mag":"3037463437"},"language":"en","primary_location":{"id":"doi:10.4018/ijwnbt.2020070104","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijwnbt.2020070104","pdf_url":null,"source":{"id":"https://openalex.org/S4210205280","display_name":"International Journal of Wireless Networks and Broadband Technologies","issn_l":"2155-6261","issn":["2155-6261","2155-627X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Wireless Networks and Broadband Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://pure.ulster.ac.uk/en/publications/23b70547-650c-4779-bb93-d1c62509697b","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076709709","display_name":"Shane Miller","orcid":null},"institutions":[{"id":"https://openalex.org/I138801177","display_name":"University of Ulster","ror":"https://ror.org/01yp9g959","country_code":"GB","type":"education","lineage":["https://openalex.org/I138801177"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Shane Miller","raw_affiliation_strings":["Ulster University, Derry, UK"],"affiliations":[{"raw_affiliation_string":"Ulster University, Derry, UK","institution_ids":["https://openalex.org/I138801177"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002868461","display_name":"Kevin Curran","orcid":"https://orcid.org/0000-0001-5237-5355"},"institutions":[{"id":"https://openalex.org/I138801177","display_name":"University of Ulster","ror":"https://ror.org/01yp9g959","country_code":"GB","type":"education","lineage":["https://openalex.org/I138801177"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Kevin Curran","raw_affiliation_strings":["Ulster University, Derry, UK"],"affiliations":[{"raw_affiliation_string":"Ulster University, Derry, UK","institution_ids":["https://openalex.org/I138801177"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111507525","display_name":"Tom Lunney","orcid":null},"institutions":[{"id":"https://openalex.org/I138801177","display_name":"University of Ulster","ror":"https://ror.org/01yp9g959","country_code":"GB","type":"education","lineage":["https://openalex.org/I138801177"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Tom Lunney","raw_affiliation_strings":["Ulster University, Derry, UK"],"affiliations":[{"raw_affiliation_string":"Ulster University, Derry, UK","institution_ids":["https://openalex.org/I138801177"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5076709709"],"corresponding_institution_ids":["https://openalex.org/I138801177"],"apc_list":null,"apc_paid":null,"fwci":1.5418,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.84044446,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"9","issue":"2","first_page":"60","last_page":"80"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6703512072563171},{"id":"https://openalex.org/keywords/private-network","display_name":"Private network","score":0.661407470703125},{"id":"https://openalex.org/keywords/header","display_name":"Header","score":0.6332645416259766},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5462250113487244},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5457437038421631},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5404641628265381},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.4760960340499878},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.45049160718917847},{"id":"https://openalex.org/keywords/cross-validation","display_name":"Cross-validation","score":0.4398425221443176},{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.43664199113845825},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4280143976211548},{"id":"https://openalex.org/keywords/traffic-generation-model","display_name":"Traffic generation model","score":0.4205847382545471},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.41921231150627136},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4033205807209015},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.38696321845054626}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6703512072563171},{"id":"https://openalex.org/C117387248","wikidata":"https://www.wikidata.org/wiki/Q11186","display_name":"Private network","level":2,"score":0.661407470703125},{"id":"https://openalex.org/C48105269","wikidata":"https://www.wikidata.org/wiki/Q1141160","display_name":"Header","level":2,"score":0.6332645416259766},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5462250113487244},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5457437038421631},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5404641628265381},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.4760960340499878},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.45049160718917847},{"id":"https://openalex.org/C27181475","wikidata":"https://www.wikidata.org/wiki/Q541014","display_name":"Cross-validation","level":2,"score":0.4398425221443176},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.43664199113845825},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4280143976211548},{"id":"https://openalex.org/C176715033","wikidata":"https://www.wikidata.org/wiki/Q2080768","display_name":"Traffic generation model","level":2,"score":0.4205847382545471},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.41921231150627136},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4033205807209015},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.38696321845054626},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.4018/ijwnbt.2020070104","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijwnbt.2020070104","pdf_url":null,"source":{"id":"https://openalex.org/S4210205280","display_name":"International Journal of Wireless Networks and Broadband Technologies","issn_l":"2155-6261","issn":["2155-6261","2155-627X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Wireless Networks and Broadband Technologies","raw_type":"journal-article"},{"id":"pmh:oai:pure.atira.dk:openaire/23b70547-650c-4779-bb93-d1c62509697b","is_oa":true,"landing_page_url":"https://pure.ulster.ac.uk/en/publications/23b70547-650c-4779-bb93-d1c62509697b","pdf_url":null,"source":{"id":"https://openalex.org/S4306402454","display_name":"Ulster University Research Portal (Ulster University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I138801177","host_organization_name":"University of Ulster","host_organization_lineage":["https://openalex.org/I138801177"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"Miller, S, Curran, K & Lunney, T 2020, 'Detection of Virtual Private Network Traffic Using Machine Learning', International Journal of Wireless Networks and Broadband Technologies, vol. 9, no. 2, 4, pp. 60-80. https://doi.org/10.4018/ijwnbt.2020070104","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:RePEc:igg:jwnbt0:v:9:y:2020:i:2:p:60-80","is_oa":false,"landing_page_url":"http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJWNBT.2020070104","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:pure.atira.dk:openaire/23b70547-650c-4779-bb93-d1c62509697b","is_oa":true,"landing_page_url":"https://pure.ulster.ac.uk/en/publications/23b70547-650c-4779-bb93-d1c62509697b","pdf_url":null,"source":{"id":"https://openalex.org/S4306402454","display_name":"Ulster University Research Portal (Ulster University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I138801177","host_organization_name":"University of Ulster","host_organization_lineage":["https://openalex.org/I138801177"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"Miller, S, Curran, K & Lunney, T 2020, 'Detection of Virtual Private Network Traffic Using Machine Learning', International Journal of Wireless Networks and Broadband Technologies, vol. 9, no. 2, 4, pp. 60-80. https://doi.org/10.4018/ijwnbt.2020070104","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W1491471319","https://openalex.org/W1527701244","https://openalex.org/W1592090113","https://openalex.org/W1924043382","https://openalex.org/W1924486975","https://openalex.org/W1958208689","https://openalex.org/W1963746220","https://openalex.org/W1977366836","https://openalex.org/W1991830413","https://openalex.org/W1995064042","https://openalex.org/W2019821286","https://openalex.org/W2021314679","https://openalex.org/W2030102079","https://openalex.org/W2103647628","https://openalex.org/W2116967744","https://openalex.org/W2118365066","https://openalex.org/W2120660108","https://openalex.org/W2122410182","https://openalex.org/W2134560943","https://openalex.org/W2142889610","https://openalex.org/W2149600645","https://openalex.org/W2163764145","https://openalex.org/W2245990522","https://openalex.org/W2258553250","https://openalex.org/W2366315503","https://openalex.org/W2493666673","https://openalex.org/W2496064548","https://openalex.org/W2513055681","https://openalex.org/W2557308648","https://openalex.org/W2678934292","https://openalex.org/W2735745260","https://openalex.org/W2745034467","https://openalex.org/W2751413838","https://openalex.org/W2761443578","https://openalex.org/W2789240981","https://openalex.org/W2801802177","https://openalex.org/W2885199066","https://openalex.org/W2886583834","https://openalex.org/W2902427896","https://openalex.org/W2914128779","https://openalex.org/W2950309870","https://openalex.org/W2964351274","https://openalex.org/W2978449229","https://openalex.org/W2987269735","https://openalex.org/W2996451395","https://openalex.org/W3124598234","https://openalex.org/W3198350258","https://openalex.org/W4233865259"],"related_works":["https://openalex.org/W4212842074","https://openalex.org/W1602622186","https://openalex.org/W4300427221","https://openalex.org/W2904326537","https://openalex.org/W4301398392","https://openalex.org/W4205292708","https://openalex.org/W2997818875","https://openalex.org/W4379534844","https://openalex.org/W266939152","https://openalex.org/W3103293871"],"abstract_inverted_index":{"The":[0,125,151],"detection":[1,210,238],"of":[2,53,78,91,112,118,123,149,176,191,211,233,239],"unauthorized":[3],"users":[4],"can":[5],"be":[6,221],"problematic":[7],"for":[8,224],"techniques":[9,195],"that":[10,63,85,133,161,218],"are":[11,19,89],"available":[12],"at":[13],"present":[14],"if":[15],"the":[16,40,72,86,134,142,162,197,209,231,237],"nefarious":[17],"actors":[18],"using":[20,57,66,180],"identity":[21,113],"hiding":[22,116],"tools":[23],"such":[24],"as":[25,99],"anonymising":[26],"proxies":[27],"or":[28,108],"virtual":[29],"private":[30],"networks":[31],"(VPNs).":[32],"This":[33,184],"work":[34,153],"presents":[35],"computational":[36],"models":[37,88],"to":[38,50,128,139,155,167,244],"address":[39],"limitations":[41],"currently":[42],"experienced":[43],"in":[44,71,95,208,226,230],"detecting":[45],"VPN":[46,143,170,240],"traffic.":[47],"A":[48],"model":[49],"detect":[51],"usage":[52,131,159,241],"VPNs":[54],"was":[55,64,137,165],"developed":[56],"a":[58,96,104,205],"multi-layered":[59],"perceptron":[60],"neural":[61,135],"network":[62,80,93,136],"trained":[65],"flow":[67],"statistics":[68],"data":[69],"found":[70,132,160],"transmission":[73],"control":[74],"protocol":[75],"(TCP)":[76],"header":[77],"captured":[79],"packets.":[81],"Validation":[82],"testing":[83],"showed":[84],"presented":[87],"capable":[90],"classifying":[92],"traffic":[94,144,171],"binary":[97],"manner":[98],"direct":[100],"(originating":[101],"directly":[102],"from":[103],"user's":[105],"own":[106],"device)":[107],"indirect":[109],"(makes":[110],"use":[111],"and":[114,196],"location":[115],"features":[117],"VPNs)":[119],"with":[120,145,172,215],"high":[121],"degrees":[122],"accuracy.":[124],"experiments":[126],"conducted":[127],"classify":[129,156],"OpenVPN":[130,158],"able":[138,166],"correctly":[140,168],"identify":[141,169],"an":[146,173,189,245],"overall":[147,174],"accuracy":[148,175,178,199],"93.71%.":[150],"further":[152,222],"done":[154],"Stunnel":[157],"Neural":[163],"Network":[164],"97.82%":[177],"when":[179],"10-fold":[181],"cross":[182],"validation.":[183],"final":[185],"experiment":[186],"also":[187],"provided":[188],"observation":[190],"3":[192],"different":[193,198],"validation":[194],"results":[200,203],"obtained.":[201],"These":[202],"demonstrate":[204],"significant":[206],"advancement":[207],"unauthorised":[212],"user":[213],"access":[214],"evidence":[216],"showing":[217],"there":[219],"could":[220],"advances":[223],"research":[225],"this":[227],"field":[228],"particularly":[229],"application":[232],"business":[234],"security":[235],"where":[236],"is":[242],"important":[243],"organization.":[246]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
