{"id":"https://openalex.org/W2915004662","doi":"https://doi.org/10.1109/iwqos.2018.8624124","title":"MaMPF: Encrypted Traffic Classification Based on Multi-Attribute Markov Probability Fingerprints","display_name":"MaMPF: Encrypted Traffic Classification Based on Multi-Attribute Markov Probability Fingerprints","publication_year":2018,"publication_date":"2018-06-01","ids":{"openalex":"https://openalex.org/W2915004662","doi":"https://doi.org/10.1109/iwqos.2018.8624124","mag":"2915004662"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwqos.2018.8624124","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100353359","display_name":"Chang Liu","orcid":"https://orcid.org/0000-0003-3094-8153"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chang Liu","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101031616","display_name":"Zigang Cao","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zigang Cao","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115601598","display_name":"Gang Xiong","orcid":"https://orcid.org/0000-0002-3190-6521"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gang Xiong","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052269317","display_name":"Gaopeng Gou","orcid":"https://orcid.org/0000-0002-3533-4874"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gaopeng Gou","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110500992","display_name":"Siu\u2010Ming Yiu","orcid":null},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Siu-Ming Yiu","raw_affiliation_strings":["Department of Computer Science, The University of Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The University of Hong Kong","institution_ids":["https://openalex.org/I889458895"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083944036","display_name":"Longtao He","orcid":"https://orcid.org/0000-0001-7072-7457"},"institutions":[{"id":"https://openalex.org/I4210087772","display_name":"National Computer Network Emergency Response Technical Team/Coordination Center of Chinar","ror":"https://ror.org/00247dh76","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210087772"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Longtao He","raw_affiliation_strings":["National Computer Network Emergency Response Technical Team, Coordination Center, China"],"affiliations":[{"raw_affiliation_string":"National Computer Network Emergency Response Technical Team, Coordination Center, China","institution_ids":["https://openalex.org/I4210087772"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.089,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":72,"citation_normalized_percentile":{"value":0.857952,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9952,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.50459325},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.50011444},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep Packet Inspection","score":0.41098252}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8075622},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7979765},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.66221344},{"id":"https://openalex.org/C23224414","wikidata":"https://www.wikidata.org/wiki/Q176769","display_name":"Hidden Markov model","level":2,"score":0.6140446},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.6120314},{"id":"https://openalex.org/C98763669","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov chain","level":2,"score":0.5872151},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.50459325},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.50011444},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.44397002},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.43037295},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.42962825},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.42261285},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.41098252},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.38479048},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38219324},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.31468058},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.23889163},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16125536},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10268873},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwqos.2018.8624124","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.81,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":30,"referenced_works":["https://openalex.org/W1521553548","https://openalex.org/W1572584960","https://openalex.org/W1994687138","https://openalex.org/W2000756828","https://openalex.org/W2029043047","https://openalex.org/W2034373897","https://openalex.org/W2040403168","https://openalex.org/W2041855183","https://openalex.org/W2050160298","https://openalex.org/W2111214891","https://openalex.org/W2115416723","https://openalex.org/W2171634548","https://openalex.org/W2172421484","https://openalex.org/W2238866705","https://openalex.org/W2284594984","https://openalex.org/W2295321789","https://openalex.org/W2343004508","https://openalex.org/W2534437878","https://openalex.org/W2537766808","https://openalex.org/W2555621429","https://openalex.org/W2556588907","https://openalex.org/W2605422749","https://openalex.org/W2613715541","https://openalex.org/W2743556905","https://openalex.org/W2743678626","https://openalex.org/W2744198018","https://openalex.org/W2754353227","https://openalex.org/W2963065250","https://openalex.org/W2963403784","https://openalex.org/W4210531213"],"related_works":["https://openalex.org/W4206905835","https://openalex.org/W3171249834","https://openalex.org/W3011161512","https://openalex.org/W2928278548","https://openalex.org/W2917586021","https://openalex.org/W2537489883","https://openalex.org/W2179036394","https://openalex.org/W2041550843","https://openalex.org/W2017644937","https://openalex.org/W1976515580"],"abstract_inverted_index":{"With":[0],"the":[1,18,29,38,47,75,105,123,135,139,144,174],"explosion":[2],"of":[3,16,31,49,61,66,117,137],"network":[4,6,162],"applications,":[5],"anomaly":[7],"detection":[8],"and":[9,20,113,126,134,152,168,172],"security":[10],"management":[11],"face":[12],"a":[13,21,58,96,157],"big":[14],"challenge,":[15],"which":[17,44,94],"first":[19],"fundamental":[22],"step":[23],"is":[24,90],"traffic":[25,63,83,166],"classification.":[26,84,147],"However,":[27],"for":[28,81,146],"sake":[30],"user":[32],"privacy,":[33],"encrypted":[34,62,82,165],"communication":[35],"protocols,":[36],"e.g.":[37],"SSL/TLS":[39],"protocol,":[40],"are":[41,132,141],"extensively":[42],"used,":[43],"results":[45],"in":[46],"ineffectiveness":[48],"traditional":[50],"rule-based":[51],"classification":[52,64],"methods.":[53,176],"Existing":[54],"methods":[55],"cannot":[56],"have":[57],"satisfactory":[59],"accuracy":[60],"because":[65],"insufficient":[67],"distinguishable":[68],"characteristics.":[69],"In":[70],"this":[71],"paper,":[72],"we":[73],"propose":[74],"Multi-attribute":[76],"Markov":[77,130],"Probability":[78],"Fingerprints":[79],"(MaMPF),":[80],"The":[85],"key":[86],"idea":[87],"behind":[88],"MaMPF":[89,148],"to":[91],"consider":[92],"multi-attributes,":[93],"includes":[95],"critical":[97],"feature,":[98],"namely":[99],"\u201clength":[100],"block":[101,128],"sequence\u201d":[102],"that":[103],"captures":[104],"time-series":[106],"packet":[107],"lengths":[108],"effectively":[109],"using":[110],"power-law":[111],"distributions":[112],"relative":[114],"occurrence":[115],"probabilities":[116,136],"all":[118,138],"considered":[119],"applications.":[120],"Based":[121],"on":[122,156],"message":[124],"type":[125],"length":[127],"sequences,":[129],"models":[131],"trained":[133],"applications":[140],"concatenated":[142],"as":[143],"fingerprints":[145],"achieves":[149],"96.4%":[150],"TPR":[151],"0.2%":[153],"FPR":[154],"performance":[155],"real-world":[158],"dataset":[159],"from":[160],"campus":[161],"(including":[163],"950,000+":[164],"flows":[167],"covering":[169],"18":[170],"applications),":[171],"outperforms":[173],"state-of-the-art":[175]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2915004662","counts_by_year":[{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":18},{"year":2021,"cited_by_count":20},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":6}],"updated_date":"2025-01-03T12:07:53.571390","created_date":"2019-02-21"}