{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T22:59:16Z","timestamp":1773269956287,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":30,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819562022","type":"print"},{"value":"9789819562039","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6203-9_17","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:25:40Z","timestamp":1767320740000},"page":"313-331","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Early Detection of\u00a0Malicious Traffic Based on\u00a0Graph Modeling and\u00a0Spatio-Temporal Attention Approach"],"prefix":"10.1007","author":[{"given":"Jinchuan","family":"Liu","sequence":"first","affiliation":[]},{"given":"Shuaishuai","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Jiaxiong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zehua","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Qiannan","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Zhaoyan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Junhang","family":"Fu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Sharma, A., Lashkari, A.H.: A survey on encrypted network traffic: a comprehensive survey of identification\/classification techniques, challenges, and future directions. Comput. Netw., 110984 (2024)","DOI":"10.1016\/j.comnet.2024.110984"},{"key":"17_CR2","first-page":"103644","volume":"80","author":"ZR Zeng","year":"2024","unstructured":"Zeng, Z.R., Xun, P., Peng, W., Zhao, B.K.: Toward identifying malicious encrypted traffic with a causality detection system. J. Inf. Secur. Appl. 80, 103644 (2024)","journal-title":"J. Inf. Secur. Appl."},{"key":"17_CR3","doi-asserted-by":"publisher","first-page":"2076","DOI":"10.1109\/TIFS.2023.3262121","volume":"18","author":"P Zhang","year":"2023","unstructured":"Zhang, P., et al.: Real-time malicious traffic detection with online isolation forest over SD-WAN. IEEE Trans. Inf. Forensics Secur. 18, 2076\u20132090 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"17_CR4","doi-asserted-by":"publisher","first-page":"2046","DOI":"10.1109\/TIFS.2020.3046876","volume":"16","author":"M Shen","year":"2020","unstructured":"Shen, M., Liu, Y., Zhu, L., Xiaojiang, D., Jiankun, H.: Fine-grained webpage fingerprinting using only packet length information of encrypted traffic. IEEE Trans. Inf. Forensics Secur. 16, 2046\u20132059 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"17_CR5","doi-asserted-by":"publisher","first-page":"103143","DOI":"10.1016\/j.cose.2023.103143","volume":"128","author":"Z Wang","year":"2023","unstructured":"Wang, Z., Thing, V.L.L.: Feature mining for encrypted malicious traffic detection with deep learning and other machine learning algorithms. Comput. Secur. 128, 103143 (2023)","journal-title":"Comput. Secur."},{"key":"17_CR6","doi-asserted-by":"publisher","first-page":"102985","DOI":"10.1016\/j.jnca.2021.102985","volume":"183\u2013184","author":"G Aceto","year":"2021","unstructured":"Aceto, G., Ciuonzo, D., Montieri, A., Pescap\u00e9, A.: DISTILLER: encrypted traffic classification via multimodal multitask deep learning. J. Netw. Comput. Appl. 183\u2013184, 102985 (2021)","journal-title":"J. Netw. Comput. Appl."},{"key":"17_CR7","doi-asserted-by":"publisher","first-page":"102663","DOI":"10.1016\/j.cose.2022.102663","volume":"116","author":"J Lan","year":"2022","unstructured":"Lan, J., Liu, X., Li, B., Li, Y., Geng, T.: DarknetSec: a novel self-attentive deep learning method for darknet traffic classification and application identification. Comput. Secur. 116, 102663 (2022)","journal-title":"Comput. Secur."},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Zhong, M., Lin, M., Zhang, C., Zeshui, X.: A survey on graph neural networks for intrusion detection systems: methods, trends and challenges. Comput. Secur., 103821 (2024)","DOI":"10.1016\/j.cose.2024.103821"},{"key":"17_CR9","doi-asserted-by":"publisher","first-page":"103466","DOI":"10.1016\/j.cose.2023.103466","volume":"135","author":"L Wang","year":"2023","unstructured":"Wang, L., et al.: TGPrint: attack fingerprint classification on encrypted network traffic based graph convolution attention networks. Comput. Secur. 135, 103466 (2023)","journal-title":"Comput. Secur."},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Yang, J., Jiang, X., Lei, Y., Liang, W., Ma, Z., Li, S.: MTSecurity: privacy-preserving malicious traffic classification using graph neural network and transformer. IEEE Trans. Netw. Serv. Manage. (2024)","DOI":"10.1109\/TNSM.2024.3383851"},{"key":"17_CR11","doi-asserted-by":"publisher","first-page":"2367","DOI":"10.1109\/TIFS.2021.3050608","volume":"16","author":"M Shen","year":"2021","unstructured":"Shen, M., Zhang, J., Zhu, L., Ke, X., Xiaojiang, D.: Accurate decentralized application identification via encrypted traffic analysis using graph neural networks. IEEE Trans. Inf. Forensics Secur. 16, 2367\u20132380 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"17_CR12","doi-asserted-by":"publisher","first-page":"102542","DOI":"10.1016\/j.cose.2021.102542","volume":"113","author":"Z Wang","year":"2022","unstructured":"Wang, Z., Fok, K.W., Thing, V.L.L.: Machine learning for encrypted malicious traffic detection: approaches, datasets and comparative study. Comput. Secur. 113, 102542 (2022)","journal-title":"Comput. Secur."},{"issue":"1","key":"17_CR13","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1109\/TNET.2022.3195871","volume":"31","author":"F Chuanpu","year":"2023","unstructured":"Chuanpu, F., Li, Q., Shen, M., Ke, X.: Frequency domain feature based robust malicious traffic detection. IEEE\/ACM Trans. Netw. 31(1), 452\u2013467 (2023)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Wang, W., Zhu, M., Wang, J., Zeng, X., Yang, Z.: End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 43\u201348. IEEE (2017)","DOI":"10.1109\/ISI.2017.8004872"},{"key":"17_CR15","doi-asserted-by":"publisher","first-page":"110598","DOI":"10.1016\/j.comnet.2024.110598","volume":"250","author":"X Zang","year":"2024","unstructured":"Zang, X., Wang, T., Zhang, X., Gong, J., Gao, P., Zhang, G.: Encrypted malicious traffic detection based on natural language processing and deep learning. Comput. Netw. 250, 110598 (2024)","journal-title":"Comput. Netw."},{"key":"17_CR16","doi-asserted-by":"publisher","first-page":"9374","DOI":"10.1109\/TIFS.2024.3433446","volume":"19","author":"Y Liu","year":"2024","unstructured":"Liu, Y., Wang, X., Bo, Q., Zhao, F.: ATVITSC: a novel encrypted traffic classification method based on deep learning. IEEE Trans. Inf. Forensics Secur. 19, 9374\u20139389 (2024)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"17_CR17","doi-asserted-by":"publisher","first-page":"1999","DOI":"10.1007\/s00500-019-04030-2","volume":"24","author":"M Lotfollahi","year":"2020","unstructured":"Lotfollahi, M., Siavoshani, M.J., Zade, R.S.H., Saberian, M.: Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft. Comput. 24(3), 1999\u20132012 (2020)","journal-title":"Soft. Comput."},{"key":"17_CR18","doi-asserted-by":"publisher","first-page":"107974","DOI":"10.1016\/j.comnet.2021.107974","volume":"190","author":"K Lin","year":"2021","unstructured":"Lin, K., Xiaolong, X., Gao, H.: TSCRNN: a novel classification scheme of encrypted traffic based on flow spatiotemporal features for efficient management of IIoT. Comput. Netw. 190, 107974 (2021)","journal-title":"Comput. Netw."},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Lin, X., Xiong, G., Gou, G., Li, Z., Shi, J., Jing, Yu.: ET-BERT: a contextualized datagram representation with pre-training transformers for encrypted traffic classification. In: Proceedings of the ACM Web Conference, vol. 2022, pp. 633\u2013642 (2022)","DOI":"10.1145\/3485447.3512217"},{"key":"17_CR20","unstructured":"Devlin, J., Chang, M.-W., Lee, K., Toutanova, K.: BERT: pre-training of deep bidirectional transformers for language understanding (2019)"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Li, Y., et al.: GraphDDoS: effective DDoS attack detection using graph neural networks. In: 2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD), pp. 1275\u20131280. IEEE (2022)","DOI":"10.1109\/CSCWD54268.2022.9776097"},{"key":"17_CR22","doi-asserted-by":"publisher","first-page":"104083","DOI":"10.1016\/j.cose.2024.104083","volume":"147","author":"J Chen","year":"2024","unstructured":"Chen, J., Xie, H., Cai, S., Song, L., Geng, B., Guo, W.: GCN-MHSA: a novel malicious traffic detection method based on graph convolutional neural network and multi-head self-attention mechanism. Comput. Secur. 147, 104083 (2024)","journal-title":"Comput. Secur."},{"issue":"4","key":"17_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3613960","volume":"26","author":"J Chen","year":"2023","unstructured":"Chen, J., Song, L., Cai, S., Xie, H., Yin, S., Ahmad, B.: TLS-MHSA: an efficient detection model for encrypted malicious traffic based on multi-head self-attention mechanism. ACM Trans. Priv. Secur. 26(4), 1\u201321 (2023)","journal-title":"ACM Trans. Priv. Secur."},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Huang, W., Han, X., Zhang, M., Li, M., Liu, W., Yang, Z., Yang, H.: MFFAN: multiple features fusion with attention networks for malicious traffic detection. In: 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 391\u2013398. IEEE (2022)","DOI":"10.1109\/TrustCom56396.2022.00061"},{"key":"17_CR25","unstructured":"Biondi, P., et al.: Scapy: packet crafting for Python. https:\/\/github.com\/secdev\/scapy. Accessed 24 Jun 2025"},{"key":"17_CR26","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems, vol. 30 (2017)"},{"key":"17_CR27","unstructured":"Veli\u010dkovi\u0107, P., Cucurull, G., Casanova, A., Romero, A., Li\u00f2, P., Bengio, Y.: Graph attention networks (2018)"},{"key":"17_CR28","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A., et\u00a0al.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSp 2018, pp. 108\u2013116 (2018)","DOI":"10.5220\/0006639801080116"},{"key":"17_CR29","unstructured":"CSE-CIC-IDS2018 dataset (2021). https:\/\/www.unb.ca\/cic\/datasets\/ids-2018.html"},{"key":"17_CR30","doi-asserted-by":"publisher","first-page":"110372","DOI":"10.1016\/j.comnet.2024.110372","volume":"245","author":"X Han","year":"2024","unstructured":"Han, X., et al.: DE-GNN: dual embedding with graph neural network for fine-grained encrypted traffic classification. Comput. Netw. 245, 110372 (2024)","journal-title":"Comput. Netw."}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6203-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T07:37:23Z","timestamp":1773214643000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6203-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819562022","9789819562039"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6203-9_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc22025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/inscrypt2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}