{"id":"https://openalex.org/W4312896828","doi":"https://doi.org/10.1109/tnsm.2022.3223902","title":"Encrypted DNS Traffic Analysis for Service Intention Inferring","display_name":"Encrypted DNS Traffic Analysis for Service Intention Inferring","publication_year":2022,"publication_date":"2022-11-24","ids":{"openalex":"https://openalex.org/W4312896828","doi":"https://doi.org/10.1109/tnsm.2022.3223902"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2022.3223902","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090713660","display_name":"Xiaodong Zang","orcid":"https://orcid.org/0000-0002-8377-5877"},"institutions":[{"id":"https://openalex.org/I202126657","display_name":"Qufu Normal University","ror":"https://ror.org/03ceheh96","country_code":"CN","type":"funder","lineage":["https://openalex.org/I202126657"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"funder","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaodong Zang","raw_affiliation_strings":["Key Laboratory of Computer Network and Information Integration, Ministry of Education, Southeast University, Nanjing, China","School of Cyber Science and Engineering, Qufu Normal University, Qufu, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Qufu Normal University, Qufu, China","institution_ids":["https://openalex.org/I202126657"]},{"raw_affiliation_string":"Key Laboratory of Computer Network and Information Integration, Ministry of Education, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034787225","display_name":"Jian Gong","orcid":"https://orcid.org/0000-0001-7264-3636"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"funder","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Gong","raw_affiliation_strings":["Key Laboratory of Computer Network and Information Integration, Ministry of Education, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Computer Network and Information Integration, Ministry of Education, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031904848","display_name":"Maoli Wang","orcid":"https://orcid.org/0000-0001-5420-1463"},"institutions":[{"id":"https://openalex.org/I202126657","display_name":"Qufu Normal University","ror":"https://ror.org/03ceheh96","country_code":"CN","type":"funder","lineage":["https://openalex.org/I202126657"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Maoli Wang","raw_affiliation_strings":["School of Cyber Science and Engineering, Qufu Normal University, Qufu, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Qufu Normal University, Qufu, China","institution_ids":["https://openalex.org/I202126657"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028272399","display_name":"Peng Gao","orcid":"https://orcid.org/0000-0003-2230-3937"},"institutions":[{"id":"https://openalex.org/I202126657","display_name":"Qufu Normal University","ror":"https://ror.org/03ceheh96","country_code":"CN","type":"funder","lineage":["https://openalex.org/I202126657"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peng Gao","raw_affiliation_strings":["School of Cyber Science and Engineering, Qufu Normal University, Qufu, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Qufu Normal University, Qufu, China","institution_ids":["https://openalex.org/I202126657"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.141,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.363347,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":59,"max":69},"biblio":{"volume":"20","issue":"2","first_page":"1405","last_page":"1417"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9973,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/netflow","display_name":"NetFlow","score":0.73204595},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.6153818},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.5082583},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.42231756}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.87348634},{"id":"https://openalex.org/C188067584","wikidata":"https://www.wikidata.org/wiki/Q219363","display_name":"NetFlow","level":2,"score":0.73204595},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.6392158},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.6153818},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.61074054},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.5082583},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.46425775},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.45300758},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.42231756},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.27954954},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.12036905},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2022.3223902","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":40,"referenced_works":["https://openalex.org/W1591333027","https://openalex.org/W1995429675","https://openalex.org/W2102351657","https://openalex.org/W2149600645","https://openalex.org/W2275070211","https://openalex.org/W2393727648","https://openalex.org/W2745051817","https://openalex.org/W2786766445","https://openalex.org/W2789828921","https://openalex.org/W2799725809","https://openalex.org/W2804874973","https://openalex.org/W2810669459","https://openalex.org/W2899948414","https://openalex.org/W2912711574","https://openalex.org/W2914899172","https://openalex.org/W2951357720","https://openalex.org/W2963516518","https://openalex.org/W2967062414","https://openalex.org/W2972689670","https://openalex.org/W2988067895","https://openalex.org/W3007562398","https://openalex.org/W3011866104","https://openalex.org/W3015696644","https://openalex.org/W3040172617","https://openalex.org/W3045710056","https://openalex.org/W3055166465","https://openalex.org/W3093369301","https://openalex.org/W3124610607","https://openalex.org/W3127161477","https://openalex.org/W3129726290","https://openalex.org/W3133725389","https://openalex.org/W3159937868","https://openalex.org/W3173427323","https://openalex.org/W3174247628","https://openalex.org/W3193870278","https://openalex.org/W3195462390","https://openalex.org/W4200449488","https://openalex.org/W4206741375","https://openalex.org/W4213168906","https://openalex.org/W4292672153"],"related_works":["https://openalex.org/W4320027669","https://openalex.org/W4289655086","https://openalex.org/W3199479007","https://openalex.org/W2611702147","https://openalex.org/W2380475535","https://openalex.org/W2377112249","https://openalex.org/W2370801098","https://openalex.org/W2359209543","https://openalex.org/W2134539183","https://openalex.org/W2068608815"],"abstract_inverted_index":{"Service":[0],"intention":[1],"refers":[2],"to":[3,108,143],"what":[4],"service":[5,8,15,17,20,26,47,93,98],"or":[6,19,33,63,117],"which":[7,52],"the":[9,83,87,130,136,151,157],"server":[10],"provides.":[11],"The":[12,23],"former":[13],"includes":[14],"classification,":[16,28],"type,":[18],"behavior":[21,85,94,174],"classification.":[22],"latter":[24],"contains":[25],"content":[27],"such":[29,56],"as":[30,57],"shopping":[31],"online":[32],"uploading":[34],"and":[35,40,129,153,187],"downloading,":[36],"etc..":[37],"Port-based":[38],"classification":[39,42,48],"payload-based":[41],"are":[43],"two":[44],"widely":[45],"used":[46],"schemes,":[49],"both":[50],"of":[51,86,156],"have":[53],"many":[54],"limitations,":[55],"only":[58],"focusing":[59],"on":[60],"server-side":[61],"scenarios":[62],"just":[64],"designing":[65],"for":[66,184],"non-encrypted":[67],"requests.":[68],"In":[69],"this":[70],"paper,":[71],"we":[72,90,102,122],"propose":[73],"an":[74],"encryption-independent":[75],"approach":[76,159],"from":[77,135],"a":[78,104,113],"network-side":[79],"perspective":[80],"by":[81,96],"analyzing":[82],"communication":[84],"IPs.":[88],"Firstly,":[89],"identify":[91],"similar":[92,164],"clusters":[95],"employing":[97],"influence":[99],"metrics.":[100],"Then,":[101],"devise":[103],"semantic":[105],"mining":[106],"mechanism":[107],"infer":[109],"whether":[110],"they":[111],"serve":[112],"fixed":[114],"user":[115],"group":[116],"provide":[118],"interactive":[119],"service.":[120],"Finally,":[121],"use":[123],"open-source":[124],"benchmark":[125],"datasets,":[126,128],"synthetic":[127],"real":[131],"Netflow":[132],"data":[133],"collected":[134],"China":[137],"Education":[138],"Research":[139],"Network":[140],"backbone":[141],"(CERNET)":[142],"verify":[144],"our":[145,168,180],"proposal.":[146],"Experimental":[147],"results":[148],"demonstrate":[149,178],"that":[150,179],"accuracy":[152],"recall":[154],"rate":[155],"proposed":[158],"is":[160,182],"better":[161],"than":[162],"other":[163],"state-of-the-art":[165],"methods.":[166],"Besides,":[167],"work":[169,181],"can":[170],"also":[171],"distinguish":[172],"malicious":[173],"clusters.":[175],"Extensive":[176],"experiments":[177],"efficient":[183],"network":[185],"management":[186],"security":[188],"monitoring.":[189]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4312896828","counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-04-20T22:09:52.214574","created_date":"2023-01-05"}