{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T21:56:41Z","timestamp":1757541401889,"version":"3.40.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030891367"},{"type":"electronic","value":"9783030891374"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-89137-4_11","type":"book-chapter","created":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T22:42:46Z","timestamp":1633905766000},"page":"154-170","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Multi-granularity Mobile Encrypted Traffic Classification Based on Fusion Features"],"prefix":"10.1007","author":[{"given":"Hui","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Gaopeng","family":"Gou","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Chang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yuewen","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Ye","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,10]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Aceto, G., Ciuonzo, D., Montieri, A., Pescap\u00e9, A.: Mobile encrypted traffic classification using deep learning. In: 2018 Network Traffic Measurement and Analysis Conference (TMA), pp. 1\u20138. IEEE (2018)","DOI":"10.23919\/TMA.2018.8506558"},{"key":"11_CR2","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.jnca.2017.11.007","volume":"103","author":"G Aceto","year":"2018","unstructured":"Aceto, G., Ciuonzo, D., Montieri, A., Pescap\u00e9, A.: Multi-classification approaches for classifying mobile app traffic. J. Netw. Comput. Appl. 103, 131\u2013145 (2018)","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"11_CR3","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1109\/TNSM.2019.2899085","volume":"16","author":"G Aceto","year":"2019","unstructured":"Aceto, G., Ciuonzo, D., Montieri, A., Pescap\u00e9, A.: Mobile encrypted traffic classification using deep learning: Experimental evaluation, lessons learned, and challenges. IEEE Trans. Netw. Serv. Manage. 16(2), 445\u2013458 (2019)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Alcock, S., Nelson, R.: Measuring the accuracy of open-source payload-based traffic classifiers using popular internet applications. In: 38th Annual IEEE Conference on Local Computer Networks-Workshops, pp. 956\u2013963. IEEE (2013)","DOI":"10.1109\/LCNW.2013.6758538"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Anderson, B., McGrew, D.: Machine learning for encrypted malware traffic classification: accounting for noisy labels and non-stationarity. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1723\u20131732 (2017)","DOI":"10.1145\/3097983.3098163"},{"issue":"3","key":"11_CR6","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/SURV.2009.090304","volume":"11","author":"A Callado","year":"2009","unstructured":"Callado, A., et al.: A survey on internet traffic identification. IEEE Commun. Surv. Tutorials 11(3), 37\u201352 (2009)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"11","key":"11_CR7","doi-asserted-by":"publisher","first-page":"2916","DOI":"10.1109\/TIFS.2019.2911156","volume":"14","author":"F Casino","year":"2019","unstructured":"Casino, F., Choo, K.K.R., Patsakis, C.: Hedge: efficient traffic classification of encrypted and compressed packets. IEEE Trans. Inf. Forensics Secur. 14(11), 2916\u20132926 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"11_CR8","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/TIFS.2015.2478741","volume":"11","author":"M Conti","year":"2015","unstructured":"Conti, M., Mancini, L.V., Spolaor, R., Verde, N.V.: Analyzing android encrypted network traffic to identify user actions. IEEE Trans. Inf. Forensics Secur. 11(1), 114\u2013125 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: The transport layer security (tls) protocol version 1.2 (2008)","DOI":"10.17487\/rfc5246"},{"issue":"12","key":"11_CR10","doi-asserted-by":"publisher","first-page":"3039","DOI":"10.1109\/TIFS.2017.2730819","volume":"12","author":"R Dubin","year":"2017","unstructured":"Dubin, R., Dvir, A., Pele, O., Hadar, O.: I know what you saw last minute\u2013encrypted http adaptive video streaming title classification. IEEE Trans. Inf. Forensics Secur. 12(12), 3039\u20133049 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"11_CR11","doi-asserted-by":"publisher","first-page":"1135","DOI":"10.1109\/SURV.2013.100613.00161","volume":"16","author":"M Finsterbusch","year":"2013","unstructured":"Finsterbusch, M., Richter, C., Rocha, E., Muller, J.A., Hanssgen, K.: A survey of payload-based traffic classification approaches. IEEE Commun. Surv. Tutorials 16(2), 1135\u20131156 (2013)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Freier, A., Karlton, P., Kocher, P.: The secure sockets layer (SSL) protocol version 3.0. Tech. rep., RFC 6101 (2011)","DOI":"10.17487\/rfc6101"},{"issue":"11","key":"11_CR13","doi-asserted-by":"publisher","first-page":"2851","DOI":"10.1109\/TMC.2016.2516020","volume":"15","author":"Y Fu","year":"2016","unstructured":"Fu, Y., Xiong, H., Lu, X., Yang, J., Chen, C.: Service usage classification with encrypted internet traffic in mobile messaging apps. IEEE Trans. Mob. Comput. 15(11), 2851\u20132864 (2016)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"7","key":"11_CR14","doi-asserted-by":"publisher","first-page":"745","DOI":"10.4304\/jsw.5.7.745-752","volume":"5","author":"S Gong","year":"2010","unstructured":"Gong, S.: A collaborative filtering recommendation algorithm based on user clustering and item clustering. J. Softw. 5(7), 745\u2013752 (2010)","journal-title":"J. Softw."},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Hou, C., Shi, J., Kang, C., Cao, Z., Gang, X.: Classifying user activities in the encrypted wechat traffic. In: 2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC), pp. 1\u20138. IEEE (2018)","DOI":"10.1109\/PCCC.2018.8711267"},{"issue":"3","key":"11_CR16","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1016\/j.comnet.2012.10.002","volume":"57","author":"A Jamdagni","year":"2013","unstructured":"Jamdagni, A., Tan, Z., He, X., Nanda, P., Liu, R.P.: Repids: a multi tier real-time payload-based intrusion detection system. Comput. Netw. 57(3), 811\u2013824 (2013)","journal-title":"Comput. Netw."},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Kim, S.M., Goo, Y.H., Kim, M.S., Choi, S.G., Choi, M.J.: A method for service identification of SSL\/TLS encrypted traffic with the relation of session ID and server IP. In: 2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS), pp. 487\u2013490. IEEE (2015)","DOI":"10.1109\/APNOMS.2015.7275373"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Korczy\u0144ski, M., Duda, A.: Markov chain fingerprinting to classify encrypted traffic. In: IEEE INFOCOM 2014-IEEE Conference on Computer Communications, pp. 781\u2013789. IEEE (2014)","DOI":"10.1109\/INFOCOM.2014.6848005"},{"key":"11_CR19","doi-asserted-by":"publisher","first-page":"107372","DOI":"10.1016\/j.comnet.2020.107372","volume":"179","author":"D Li","year":"2020","unstructured":"Li, D., Li, W., Wang, X., Nguyen, C.T., Lu, S.: App trajectory recognition over encrypted internet traffic based on deep neural network. Comput. Netw. 179, 107372 (2020)","journal-title":"Comput. Netw."},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Liu, C., He, L., Xiong, G., Cao, Z., Li, Z.: Fs-net: a flow sequence network for encrypted traffic classification. In: IEEE INFOCOM 2019-IEEE Conference on Computer Communications, pp. 1171\u20131179. IEEE (2019)","DOI":"10.1109\/INFOCOM.2019.8737507"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Liu, J., Fu, Y., Ming, J., Ren, Y., Sun, L., Xiong, H.: Effective and real-time in-app activity analysis in encrypted internet traffic streams. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 335\u2013344 (2017)","DOI":"10.1145\/3097983.3098049"},{"issue":"3","key":"11_CR22","doi-asserted-by":"publisher","first-page":"1999","DOI":"10.1007\/s00500-019-04030-2","volume":"24","author":"M Lotfollahi","year":"2020","unstructured":"Lotfollahi, M., Siavoshani, M.J., Zade, R.S.H., Saberian, M.: Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft Comput. 24(3), 1999\u20132012 (2020)","journal-title":"Soft Comput."},{"key":"11_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/978-3-319-29814-6_23","volume-title":"Information and Communications Security","author":"MSI Mamun","year":"2016","unstructured":"Mamun, M.S.I., Ghorbani, A.A., Stakhanova, N.: An entropy based encrypted traffic classifier. In: Qing, S., Okamoto, E., Kim, K., Liu, D. (eds.) ICICS 2015. LNCS, vol. 9543, pp. 282\u2013294. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-29814-6_23"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"McPherson, J., Ma, K.L., Krystosk, P., Bartoletti, T., Christensen, M.: Portvis: a tool for port-based detection of security events. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pp. 73\u201381 (2004)","DOI":"10.1145\/1029208.1029220"},{"issue":"4","key":"11_CR25","doi-asserted-by":"publisher","first-page":"3843","DOI":"10.1109\/TVT.2019.2894290","volume":"68","author":"W Niu","year":"2019","unstructured":"Niu, W., Zhuo, Z., Zhang, X., Du, X., Yang, G., Guizani, M.: A heuristic statistical testing based approach for encrypted network traffic identification. IEEE Trans. Veh. Technol. 68(4), 3843\u20133853 (2019)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"11_CR26","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1109\/ACCESS.2019.2962018","volume":"8","author":"S Rezaei","year":"2019","unstructured":"Rezaei, S., Kroencke, B., Liu, X.: Large-scale mobile app identification using deep learning. IEEE Access 8, 348\u2013362 (2019)","journal-title":"IEEE Access"},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Roughan, M., Sen, S., Spatscheck, O., Duffield, N.: Class-of-service mapping for QoS: a statistical signature-based approach to IP traffic classification. In: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement, pp. 135\u2013148 (2004)","DOI":"10.1145\/1028788.1028805"},{"key":"11_CR28","unstructured":"Shen, M., Wei, M., Zhu, L., Wang, M., Li, F.: Certificate-aware encrypted traffic classification using second-order Markov chain. In: 2016 IEEE\/ACM 24th International Symposium on Quality of Service (IWQoS), pp. 1\u201310. IEEE (2016)"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Sirinam, P., Imani, M., Juarez, M., Wright, M.: Deep fingerprinting: undermining website fingerprinting defenses with deep learning. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1928\u20131943 (2018)","DOI":"10.1145\/3243734.3243768"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Taylor, V.F., Spolaor, R., Conti, M., Martinovic, I.: Appscanner: automatic fingerprinting of smartphone apps from encrypted network traffic. In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 439\u2013454. IEEE (2016)","DOI":"10.1109\/EuroSP.2016.40"},{"issue":"1","key":"11_CR31","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/TIFS.2017.2737970","volume":"13","author":"VF Taylor","year":"2017","unstructured":"Taylor, V.F., Spolaor, R., Conti, M., Martinovic, I.: Robust smartphone app identification via encrypted network traffic analysis. IEEE Trans. Inf. Forensics Secur. 13(1), 63\u201378 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"11_CR32","doi-asserted-by":"crossref","unstructured":"Wang, C., et al.: Fingerprinting encrypted voice traffic on smart speakers with deep learning. In: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 254\u2013265 (2020)","DOI":"10.1145\/3395351.3399357"},{"key":"11_CR33","doi-asserted-by":"crossref","unstructured":"Wang, J., Cao, Z., Kang, C., Xiong, G.: User behavior classification in encrypted cloud camera traffic. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp. 1\u20136. IEEE (2019)","DOI":"10.1109\/GLOBECOM38437.2019.9013558"},{"key":"11_CR34","doi-asserted-by":"crossref","unstructured":"Wang, W., Zhu, M., Wang, J., Zeng, X., Yang, Z.: End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 43\u201348. IEEE (2017)","DOI":"10.1109\/ISI.2017.8004872"},{"key":"11_CR35","doi-asserted-by":"crossref","unstructured":"Yao, H., Liu, C., Zhang, P., Wu, S., Jiang, C., Yu, S.: Identification of encrypted traffic through attention mechanism based long short term memory. IEEE Trans. Big Data (2019)","DOI":"10.1109\/TBDATA.2019.2940675"},{"key":"11_CR36","unstructured":"Yoon, K.: Convolutional neural networks for sentence classification. arXiv (2014)"},{"key":"11_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-642-04492-2_3","volume-title":"Management Enabling the Future Internet for Changing Business and New Computing Services","author":"SH Yoon","year":"2009","unstructured":"Yoon, S.H., Park, J.W., Park, J.S., Oh, Y.S., Kim, M.S.: Internet application traffic classification using fixed IP-port. In: Hong, C.S., Tonouchi, T., Ma, Y., Chao, C.S. (eds.) APNOMS 2009. LNCS, vol. 5787, pp. 21\u201330. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04492-2_3"},{"issue":"13","key":"11_CR38","first-page":"54","volume":"62","author":"C Yu","year":"2018","unstructured":"Yu, C., Tian, X., Guo, Y.: Research on user portrait based on behavior-content fusion model. Libr. Inf. Work 62(13), 54\u201363 (2018)","journal-title":"Libr. Inf. Work"},{"key":"11_CR39","doi-asserted-by":"crossref","unstructured":"Zhang, H., Papadopoulos, C., Massey, D.: Detecting encrypted botnet traffic. In: 2013 Proceedings IEEE INFOCOM, pp. 3453\u20131358. IEEE (2013)","DOI":"10.1109\/INFCOM.2013.6567180"}],"container-title":["Lecture Notes in Computer Science","Science of Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-89137-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T21:31:26Z","timestamp":1638394286000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-89137-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030891367","9783030891374"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-89137-4_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"10 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SciSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Science of Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 August 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"scisec2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/scisec.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}