{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T11:07:44Z","timestamp":1743851264782,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030797270"},{"type":"electronic","value":"9783030797287"}],"license":[{"start":{"date-parts":[[2021,6,24]],"date-time":"2021-06-24T00:00:00Z","timestamp":1624492800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,24]],"date-time":"2021-06-24T00:00:00Z","timestamp":1624492800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-79728-7_20","type":"book-chapter","created":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T18:04:06Z","timestamp":1624471446000},"page":"199-208","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Malicious Encrypted Traffic Identification Based on Four-Tuple Feature and Deep Learning"],"prefix":"10.1007","author":[{"given":"Kunlin","family":"Li","sequence":"first","affiliation":[]},{"given":"Baojiang","family":"Cui","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,24]]},"reference":[{"key":"20_CR1","unstructured":"ThreatLabZ. 2020 State of Encrypted Attacks https:\/\/www.zscaler.com\/resources\/industry-reports\/state-of-encrypted-attacks-summary-report.pdf"},{"issue":"5","key":"20_CR2","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MCOM.2019.1800819","volume":"57","author":"S Rezaei","year":"2019","unstructured":"Rezaei, S., Liu, X.: Deep learning for encrypted traffic classification: an overview. IEEE Commun. Mag. 57(5), 76\u201381 (2019). https:\/\/doi.org\/10.1109\/MCOM.2019.1800819","journal-title":"IEEE Commun. Mag."},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Anderson, B., Mcgrew, D.: Identifying encrypted malware traffic with contextual flow data. In: Proceedings of the 2016 ACM Workshop, ACM (2016)","DOI":"10.1145\/2996758.2996768"},{"key":"20_CR4","unstructured":"Gancheva, Z., Sattler, P., W\u00fcstrich, L.: TLS Fingerprinting Techniques. Network 15, (2020)"},{"issue":"1","key":"20_CR5","first-page":"1","volume":"14","author":"B Anderson","year":"2016","unstructured":"Anderson, B., Paul, S., Mcgrew, D.: Deciphering Malware\u2019s use of TLS (without Decryption). J. Comput. Virol. Hacking Tech. 14(1), 1\u201317 (2016)","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Wang, W., Zhu, M., Wang, J., et al.: End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), IEEE (2017)","DOI":"10.1109\/ISI.2017.8004872"},{"key":"20_CR7","unstructured":"Wang W , Zhu M , Zeng X , et al. Malware traffic classification using convolutional neural network for representation learning. In: 2017 International Conference on Information Networking (ICOIN), IEEE (2017)"},{"key":"20_CR8","doi-asserted-by":"publisher","first-page":"1792","DOI":"10.1109\/ACCESS.2017.2780250","volume":"6","author":"W Wang","year":"2017","unstructured":"Wang, W., Sheng, Y., Wang, J., et al.: HAST-IDS: Learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection. IEEE Access 6, 1792\u20131806 (2017)","journal-title":"IEEE Access"},{"key":"20_CR9","unstructured":"Lotfollahi, M., Zade, R.S.H., Siavoshani, M.J., et al.: Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft Comput. (2017)"},{"key":"20_CR10","unstructured":"Stras\u00e1k, F.: Detection of HTTPS malware traffic. Czech Technical University in Prague, Bachelor project assignment (2017)"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Dai, R., Gao, C., Lang, B., et al.: SSL malicious traffic detection based on multi-view features. In: ICCNS 2019: 2019 the 9th International Conference on Communication and Network Security (2019)","DOI":"10.1145\/3371676.3371697"},{"key":"20_CR12","unstructured":"Alexa. http:\/\/www.alexa.com\/ (2020)"},{"key":"20_CR13","unstructured":"Althouse, J.: TLS Fingerprinting with JA3 and JA3S - Salesforce Engineering (2019). https:\/\/engineering.salesforce.com\/tlsfingerprinting-with-ja3-and-ja3s247362855967"},{"key":"20_CR14","unstructured":"Bouvrie J. Notes on convolutional neural networks (2006)"},{"issue":"8","key":"20_CR15","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Liu, W., Jia, Y., et al.: Going Deeper with Convolutions (2014)","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Graves, A., Mohamed, A.R., Hinton, G.: Speech recognition with deep recurrent neural networks. In: International Conference on Acoustics Speech & Signal Processing, icassp (2013)","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"20_CR18","unstructured":"CTU Malware Dataset. https:\/\/www.stratosphereips.org\/datasets-malware"},{"key":"20_CR19","unstructured":"Garcia, S.: Malware Capture Facility Project (2013). https:\/\/mcfp.felk.cvut.cz\/"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"D\u2019Angelo, G., Palmieri, F., Robustelli, A., et al.: Effective classification of android malware families through dynamic features and neural networks. Connection Sci. 1\u201316 (2021)","DOI":"10.1080\/09540091.2021.1889977"}],"container-title":["Lecture Notes in Networks and Systems","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-79728-7_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T18:53:25Z","timestamp":1624474405000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-79728-7_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,24]]},"ISBN":["9783030797270","9783030797287"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-79728-7_20","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021,6,24]]},"assertion":[{"value":"24 June 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IMIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"imis2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/imis\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}