{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:27:52Z","timestamp":1763202472488,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030653897"},{"type":"electronic","value":"9783030653903"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-65390-3_17","type":"book-chapter","created":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T08:08:49Z","timestamp":1609834129000},"page":"207-219","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Encrypted Traffic Classification Using Graph Convolutional Networks"],"prefix":"10.1007","author":[{"given":"Shuang","family":"Mo","sequence":"first","affiliation":[]},{"given":"Yifei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ding","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Wenrui","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Shaohua","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Chuan","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,6]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Draper-Gil, G., Lashkari, A.H., Mamun, M.S.I., et al.: Characterization of encrypted and VPN traffic using time-related. In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP), pp. 407\u2013414 (2016)","DOI":"10.5220\/0005740704070414"},{"issue":"5","key":"17_CR2","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MCOM.2019.1800819","volume":"57","author":"S Rezaei","year":"2019","unstructured":"Rezaei, S., Liu, X.: Deep learning for encrypted traffic classification: an overview. IEEE communications Mag. 57(5), 76\u201381 (2019)","journal-title":"IEEE communications Mag."},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Bremler-Barr, A., David, S.T., Hay, D., et al.: Decompression-free inspection: DPI for shared dictionary compression over HTTP. In: 2012 Proceedings IEEE INFOCOM, pp. 1987\u20131995. IEEE (2012)","DOI":"10.1109\/INFCOM.2012.6195576"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Deri, L., Martinelli, M., Bujlow, T., et al.: nDPI: open-source high-speed deep packet inspection. In: 2014 International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 617\u2013622. IEEE (2014)","DOI":"10.1109\/IWCMC.2014.6906427"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Alshammari, R., Zincir-Heywood, A.N.: Investigating two different approaches for encrypted traffic classification. In: 2008 Sixth Annual Conference on Privacy, Security and Trust, pp. 156\u2013166. IEEE (2008)","DOI":"10.1109\/PST.2008.15"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Alshammari, R., Zincir-Heywood, A.N.: Machine learning based encrypted traffic classification: identifying SSH and Skype. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1\u20138. IEEE (2009)","DOI":"10.1109\/CISDA.2009.5356534"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Dusi, M., Este, A., Gringoli, F., et al.: Using GMM and SVM-based techniques for the classification of SSH-encrypted traffic. In: 2009 IEEE International Conference on Communications, pp. 1\u20136. IEEE (2009)","DOI":"10.1109\/ICC.2009.5199557"},{"issue":"3","key":"17_CR8","doi-asserted-by":"publisher","first-page":"e1929","DOI":"10.1002\/nem.1929","volume":"27","author":"A Vl\u0103du\u0163u","year":"2017","unstructured":"Vl\u0103du\u0163u, A., Com\u0103neci, D., Dobre, C.: Internet traffic classification based on flows\u2019 statistical properties with machine learning. Int. J. Netw. Manage. 27(3), e1929 (2017)","journal-title":"Int. J. Netw. Manage."},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Wang, W., Zhu, M., Wang, J., et al.: End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 43\u201348. IEEE (2017)","DOI":"10.1109\/ISI.2017.8004872"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Chen, Z., He, K., Li, J., et al.: Seq2Img: a sequence-to-image based approach towards IP traffic classification using convolutional neural networks. In: 2017 IEEE International Conference on Big Data (Big Data), pp. 1271\u20131276. IEEE (2017)","DOI":"10.1109\/BigData.2017.8258054"},{"key":"17_CR11","doi-asserted-by":"publisher","first-page":"50850","DOI":"10.1109\/ACCESS.2018.2868993","volume":"6","author":"K Wu","year":"2018","unstructured":"Wu, K., Chen, Z., Li, W.: A novel intrusion detection model for a massive network using convolutional neural networks. IEEE Access 6, 50850\u201350859 (2018)","journal-title":"IEEE Access"},{"issue":"3","key":"17_CR12","doi-asserted-by":"publisher","first-page":"1999","DOI":"10.1007\/s00500-019-04030-2","volume":"24","author":"M Lotfollahi","year":"2019","unstructured":"Lotfollahi, M., Jafari Siavoshani, M., Shirali Hossein Zade, R., Saberian, M.: Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft. Comput. 24(3), 1999\u20132012 (2019). https:\/\/doi.org\/10.1007\/s00500-019-04030-2","journal-title":"Soft. Comput."},{"key":"17_CR13","doi-asserted-by":"publisher","first-page":"1792","DOI":"10.1109\/ACCESS.2017.2780250","volume":"6","author":"W Wang","year":"2017","unstructured":"Wang, W., Sheng, Y., Wang, J., et al.: HAST-IDS: learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection. IEEE Access 6, 1792\u20131806 (2017)","journal-title":"IEEE Access"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Yao, H., Liu, C., Zhang, P., et al.: Identification of encrypted traffic through attention mechanism based long short term memory. IEEE Trans. Big Data (2019)","DOI":"10.1109\/TBDATA.2019.2940675"},{"issue":"8","key":"17_CR15","doi-asserted-by":"publisher","first-page":"1909","DOI":"10.1016\/j.comnet.2011.01.020","volume":"55","author":"M Iliofotou","year":"2011","unstructured":"Iliofotou, M., Kim, H., Faloutsos, M., et al.: Graption: A graph-based P2P traffic classification framework for the internet backbone. Comput. Netw. 55(8), 1909\u20131920 (2011)","journal-title":"Comput. Netw."},{"key":"17_CR16","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-662-45670-5_8","volume-title":"Applications and Techniques in Information Security","author":"Z Cao","year":"2014","unstructured":"Cao, Z., Xiong, G., Zhao, Y., Li, Z., Guo, L.: A survey on encrypted traffic classification. In: Batten, L., Li, G., Niu, W., Warren, M. (eds.) ATIS 2014. CCIS, vol. 490, pp. 73\u201381. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45670-5_8"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Aghaei-Foroushani, V., Zincir-Heywood, A.N.: A proxy identifier based on patterns in traffic flows. In: 2015 IEEE 16th International Symposium on High Assurance Systems Engineering, pp. 118\u2013125. IEEE (2015)","DOI":"10.1109\/HASE.2015.26"},{"key":"17_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-540-31966-5_4","volume-title":"Passive and Active Network Measurement","author":"AW Moore","year":"2005","unstructured":"Moore, A.W., Papagiannaki, K.: Toward the accurate identification of network applications. In: Dovrolis, C. (ed.) PAM 2005. LNCS, vol. 3431, pp. 41\u201354. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/978-3-540-31966-5_4"},{"key":"17_CR19","unstructured":"Vaswani, A., Shazeer, N., Parmar, N., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems, pp. 5998\u20136008 (2017)"},{"key":"17_CR20","unstructured":"Hamilton, W., Ying, Z., Leskovec, J.: Inductive representation learning on large graphs. In: Advances in Neural Information Processing Systems, pp. 1024\u20131034 (2017)"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Chen, T., Guestrin, C.: Xgboost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785\u2013794 (2016)","DOI":"10.1145\/2939672.2939785"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Li, A., Qin, Z., Liu, R., et al.: Spam review detection with graph convolutional networks. In: Proceedings of the 28th ACM International Conference on Information and Knowledge Management, pp. 2703\u20132711 (2019)","DOI":"10.1145\/3357384.3357820"}],"container-title":["Lecture Notes in Computer Science","Advanced Data Mining and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-65390-3_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T08:39:22Z","timestamp":1609835962000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-65390-3_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030653897","9783030653903"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-65390-3_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"6 January 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ADMA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Data Mining and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Foshan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adma2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/adma2020.nuit.edu.cn\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"96","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}