{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T04:12:24Z","timestamp":1740111144101,"version":"3.37.3"},"reference-count":53,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2022,11,17]],"date-time":"2022-11-17T00:00:00Z","timestamp":1668643200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2023,1]]},"DOI":"10.1016\/j.comnet.2022.109471","type":"journal-article","created":{"date-parts":[[2022,11,21]],"date-time":"2022-11-21T21:22:44Z","timestamp":1669065764000},"page":"109471","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":3,"special_numbering":"C","title":["Web browsing privacy in the deep learning era: Beyond VPNs and encryption"],"prefix":"10.1016","volume":"220","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3421-7633","authenticated-orcid":false,"given":"Daniel","family":"Perdices","sequence":"first","affiliation":[]},{"given":"Jorge E.","family":"L\u00f3pez de Vergara","sequence":"additional","affiliation":[]},{"given":"Iv\u00e1n","family":"Gonz\u00e1lez","sequence":"additional","affiliation":[]},{"given":"Luis","family":"de Pedro","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comnet.2022.109471_b1","series-title":"2021 17th International Conference on Network and Service Management","first-page":"173","article-title":"Assessing the limits of privacy and data usage for web browsing analytics","author":"Perdices","year":"2021"},{"year":"2020","series-title":"The European data strategy","author":"European Commission","key":"10.1016\/j.comnet.2022.109471_b2"},{"year":"2021","series-title":"Federal Data Strategy: Leveraging Data as Strategic Asset","author":"US Government","key":"10.1016\/j.comnet.2022.109471_b3"},{"issue":"1","key":"10.1016\/j.comnet.2022.109471_b4","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/s12116-021-09319-8","article-title":"The rise of data politics: Digital China and the world","volume":"56","author":"Liu","year":"2021","journal-title":"Stud. Comparat. Int. Dev."},{"year":"2020","series-title":"How do EU citizens manage their personal data online?","author":"European Commission","key":"10.1016\/j.comnet.2022.109471_b5"},{"year":"2020","series-title":"Using TLS 1.3 with HTTP\/2","author":"Benjamin","key":"10.1016\/j.comnet.2022.109471_b6"},{"year":"2018","series-title":"DNS Queries over HTTPS (DoH)","author":"Hoffman","key":"10.1016\/j.comnet.2022.109471_b7"},{"year":"2016","series-title":"Specification for DNS over Transport Layer Security (TLS)","author":"Hu","key":"10.1016\/j.comnet.2022.109471_b8"},{"key":"10.1016\/j.comnet.2022.109471_b9","series-title":"13th USENIX Security Symposium","first-page":"1","article-title":"TOR: The Second-Generation onion router","author":"Dingledine","year":"2004"},{"year":"2022","series-title":"Brave browser: Secure, fast and private web browser","author":"Brave Software Inc.","key":"10.1016\/j.comnet.2022.109471_b10"},{"year":"2021","series-title":"Over 25% of tor exit relays spied on users\u2019 dark web activities","author":"The Hacker News","key":"10.1016\/j.comnet.2022.109471_b11"},{"year":"2021","series-title":"Tor security advisory: exit relays running SSLstrip in May and June 2020","author":"The Tor Project","key":"10.1016\/j.comnet.2022.109471_b12"},{"year":"2004","series-title":"Cisco Systems NetFlow Services Export Version 9","author":"Claise","key":"10.1016\/j.comnet.2022.109471_b13"},{"year":"2013","series-title":"Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information","author":"Aitken","key":"10.1016\/j.comnet.2022.109471_b14"},{"key":"10.1016\/j.comnet.2022.109471_b15","series-title":"WebSci 2020 - Proceedings of the 12th ACM Conference on Web Science","first-page":"76","article-title":"What a tangled web we weave: Understanding the interconnectedness of the third party cookie ecosystem","author":"Hu","year":"2020"},{"key":"10.1016\/j.comnet.2022.109471_b16","series-title":"Proceedings of the 2012 Internet Measurement Conference","first-page":"413","article-title":"DNS to the rescue: Discerning content and services in a Tangled Web","author":"Berm\u00fadez","year":"2012"},{"key":"10.1016\/j.comnet.2022.109471_b17","series-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems","first-page":"6000","article-title":"Attention is all you need","author":"Vaswani","year":"2017"},{"year":"2020","series-title":"Alexa - Top sites","author":"Amazon Web Services","key":"10.1016\/j.comnet.2022.109471_b18"},{"issue":"3","key":"10.1016\/j.comnet.2022.109471_b19","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/SURV.2009.090304","article-title":"A survey on internet traffic identification","volume":"11","author":"Callado","year":"2009","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.comnet.2022.109471_b20","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.jnca.2018.03.008","article-title":"DNS weighted footprints for web browsing analytics","volume":"111","author":"Garc\u00eda-Dorado","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.comnet.2022.109471_b21","series-title":"2016 International Wireless Communications and Mobile Computing Conference","first-page":"38","article-title":"Towards web service classification using addresses and DNS","author":"Trevisan","year":"2016"},{"issue":"4","key":"10.1016\/j.comnet.2022.109471_b22","doi-asserted-by":"crossref","first-page":"420","DOI":"10.2478\/popets-2021-0078","article-title":"Domain name encryption is not enough: Privacy leakage via IP-based website fingerprinting","volume":"2021","author":"Hoang","year":"2021","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"10.1016\/j.comnet.2022.109471_b23","series-title":"2021 XLVII Latin American Computing Conference","first-page":"1","article-title":"Short-time prediction of DNS queries using deep learning and pre-trained word embedding","author":"Merlino","year":"2021"},{"key":"10.1016\/j.comnet.2022.109471_b24","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2021.108357","article-title":"Natural language processing for web browsing analytics: Challenges, lessons learned, and opportunities","volume":"198","author":"Perdices","year":"2021","journal-title":"Comput. Netw."},{"key":"10.1016\/j.comnet.2022.109471_b25","series-title":"Proceedings of the 2016 IEEE International Conference on Big Data","first-page":"2740","article-title":"WHAT: A big data approach for accounting of modern web services","author":"Trevisan","year":"2016"},{"key":"10.1016\/j.comnet.2022.109471_b26","series-title":"16th USENIX Security Symposium","first-page":"339","article-title":"On web browsing privacy in anonymized NetFlows","author":"Coull","year":"2007"},{"issue":"3","key":"10.1016\/j.comnet.2022.109471_b27","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1145\/3411740.3411743","article-title":"Does domain name encryption increase users\u2019 privacy?","volume":"50","author":"Trevisan","year":"2020","journal-title":"SIGCOMM Comput. Commun. Rev."},{"issue":"4","key":"10.1016\/j.comnet.2022.109471_b28","first-page":"292","article-title":"Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning","volume":"2019","author":"Bhat","year":"2019","journal-title":"Proc. Priv. Enhanc. Technol."},{"issue":"3","key":"10.1016\/j.comnet.2022.109471_b29","doi-asserted-by":"crossref","first-page":"814","DOI":"10.1109\/TNSM.2019.2927409","article-title":"LENTA: Longitudinal exploration for network traffic analysis from passive data","volume":"16","author":"Morichetta","year":"2019","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"10.1016\/j.comnet.2022.109471_b30","series-title":"Proceedings of the 2016 2nd IEEE International Conference on Computer and Communications, ICCC 2016 - Proceedings","first-page":"2451","article-title":"Network traffic classification techniques and comparative analysis using machine learning algorithms","author":"Shafiq","year":"2017"},{"issue":"3","key":"10.1016\/j.comnet.2022.109471_b31","doi-asserted-by":"crossref","first-page":"1730","DOI":"10.1109\/TNSM.2020.2999856","article-title":"BitProb: Probabilistic Bit Signatures for Accurate Application Identification","volume":"17","author":"Hubballi","year":"2020","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"10.1016\/j.comnet.2022.109471_b32","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1109\/ACCESS.2019.2962018","article-title":"Large-scale mobile app identification using deep learning","volume":"8","author":"Rezaei","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2022.109471_b33","doi-asserted-by":"crossref","first-page":"182065","DOI":"10.1109\/ACCESS.2020.3029190","article-title":"Automatic mobile app identification from encrypted traffic with hybrid neural networks","volume":"8","author":"Wang","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2022.109471_b34","series-title":"Proceedings of the 2019 IEEE Conference on Computer Communications Workshops","first-page":"680","article-title":"FlowPic: Encrypted internet traffic classification is as easy as image recognition","author":"Shapira","year":"2019"},{"key":"10.1016\/j.comnet.2022.109471_b35","series-title":"Proceedings of the 2020 IEEE 6th International Conference on Computer and Communications","first-page":"634","article-title":"An encrypted traffic classification framework based on convolutional neural networks and stacked autoencoders","author":"Wang","year":"2020"},{"key":"10.1016\/j.comnet.2022.109471_b36","series-title":"Proceedings of the 2020 IEEE 39th International Performance Computing and Communications Conference","first-page":"1","article-title":"An encrypted traffic classification method combining graph convolutional network and autoencoder","author":"Sun","year":"2020"},{"key":"10.1016\/j.comnet.2022.109471_b37","series-title":"Proceedings of the 2020 33rd SIBGRAPI Conference on Graphics, Patterns and Images","first-page":"256","article-title":"Packet Vision: A convolutional neural network approach for network traffic classification","author":"Moreira","year":"2020"},{"issue":"2","key":"10.1016\/j.comnet.2022.109471_b38","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1109\/TNSM.2019.2899085","article-title":"Mobile encrypted traffic classification using deep learning: Experimental evaluation, lessons learned, and challenges","volume":"16","author":"Aceto","year":"2019","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"10.1016\/j.comnet.2022.109471_b39","series-title":"Proceedings of the 32nd International Conference on Neural Information Processing Systems","first-page":"5394","article-title":"Fully understanding the hashing trick","author":"Freksen","year":"2018"},{"key":"10.1016\/j.comnet.2022.109471_b40","series-title":"16th International Workshop on Spoken Language Translation 2019","article-title":"Transformers without tears: Improving the normalization of self-attention","author":"Nguyen","year":"2019"},{"key":"10.1016\/j.comnet.2022.109471_b41","doi-asserted-by":"crossref","unstructured":"F. Wang, M. Jiang, C. Qian, S. Yang, C. Li, H. Zhang, X. Wang, X. Tang, Residual Attention Network for Image Classification, in: 2017 IEEE Conference on Computer Vision and Pattern Recognition, CVPR, 2017, pp. 6450\u20136458, http:\/\/dx.doi.org\/10.1109\/CVPR.2017.683.","DOI":"10.1109\/CVPR.2017.683"},{"key":"10.1016\/j.comnet.2022.109471_b42","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"3141","article-title":"Dual attention network for scene segmentation","author":"Fu","year":"2019"},{"key":"10.1016\/j.comnet.2022.109471_b43","unstructured":"S. Zeng, F. Graf, C. Hofer, R. Kwitt, Topological Attention for Time Series Forecasting, in: A. Beygelzimer, Y. Dauphin, P. Liang, J.W. Vaughan (Eds.), Advances in Neural Information Processing Systems, 2021, pp. 1\u201312."},{"year":"2015","series-title":"TensorFlow: Large-scale machine learning on heterogeneous systems","author":"Abadi","key":"10.1016\/j.comnet.2022.109471_b44"},{"year":"2015","series-title":"Keras","author":"Chollet","key":"10.1016\/j.comnet.2022.109471_b45"},{"key":"10.1016\/j.comnet.2022.109471_b46","unstructured":"V. Nair, G.E. Hinton, Rectified Linear Units Improve Restricted Boltzmann Machines, in: Proceedings of the 27th International Conference on Machine Learning, ICML-10, 2010, pp. 807\u2013814."},{"key":"10.1016\/j.comnet.2022.109471_b47","unstructured":"D.P. Kingma, J. Ba, Adam: A Method for Stochastic Optimization, in: Proceedings of the 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7-9, 2015, Conference Track, 2015, pp. 1\u201313."},{"key":"10.1016\/j.comnet.2022.109471_b48","series-title":"Proceedings of the 22nd ACM Internet Measurement Conference","first-page":"317","article-title":"A world wide view of browsing the World Wide Web","author":"Ruth","year":"2022"},{"issue":"1","key":"10.1016\/j.comnet.2022.109471_b49","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1207\/s15506878jobem4601_1","article-title":"The internet audience: Web use as mass behavior","volume":"46","author":"Webster","year":"2002","journal-title":"J. Broadcast. Electron. Media"},{"issue":"11","key":"10.1016\/j.comnet.2022.109471_b50","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1109\/MCOM.2008.4689258","article-title":"On the duration and spatial characteristics of internet traffic measurement experiments","volume":"46","author":"Garc\u00eda-Dorado","year":"2008","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.comnet.2022.109471_b51","series-title":"Advances in Neural Information Processing Systems, Vol. 27","first-page":"1","article-title":"Generative adversarial networks","author":"Goodfellow","year":"2014"},{"year":"2021","series-title":"High-resolution image synthesis with latent diffusion models","author":"Rombach","key":"10.1016\/j.comnet.2022.109471_b52"},{"year":"2022","series-title":"Noiszy: A browser plugin which generates meaningless web-traffic to disguise your real browsing data","author":"Grammatas","key":"10.1016\/j.comnet.2022.109471_b53"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128622005059?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128622005059?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T18:59:43Z","timestamp":1716231583000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128622005059"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1]]},"references-count":53,"alternative-id":["S1389128622005059"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2022.109471","relation":{},"ISSN":["1389-1286"],"issn-type":[{"type":"print","value":"1389-1286"}],"subject":[],"published":{"date-parts":[[2023,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Web browsing privacy in the deep learning era: Beyond VPNs and encryption","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2022.109471","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"109471"}}