{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:36:34Z","timestamp":1771612594929,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":32,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819608201","type":"print"},{"value":"9789819608218","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0821-8_25","type":"book-chapter","created":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T05:03:11Z","timestamp":1734152591000},"page":"370-385","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Transformer Based Malicious Traffic Detection Method in\u00a0Android Mobile Networks"],"prefix":"10.1007","author":[{"given":"Yuhao","family":"Sun","sequence":"first","affiliation":[]},{"given":"Hao","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Yingjun","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Botao","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Shuhai","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yongxin","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Hongkun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiong","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,15]]},"reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Ajagbe, S.A., Adigun, M.O.: Deep learning techniques for detection and prediction of pandemic diseases: a systematic literature review. Multimedia Tools Appl. 1\u201335 (2023)","DOI":"10.1007\/s11042-023-15805-z"},{"issue":"27","key":"25_CR2","doi-asserted-by":"publisher","first-page":"20319","DOI":"10.1007\/s00521-023-08818-0","volume":"35","author":"T Anitha","year":"2023","unstructured":"Anitha, T., Aanjankumar, S., Poonkuntran, S., Nayyar, A.: A novel methodology for malicious traffic detection in smart devices using BI-LSTM-CNN-dependent deep learning methodology. Neural Comput. Appl. 35(27), 20319\u201320338 (2023)","journal-title":"Neural Comput. Appl."},{"issue":"4","key":"25_CR3","doi-asserted-by":"publisher","first-page":"5152","DOI":"10.1109\/TNSM.2022.3157344","volume":"19","author":"G Apruzzese","year":"2022","unstructured":"Apruzzese, G., Pajola, L., Conti, M.: The cross-evaluation of machine learning-based network intrusion detection systems. IEEE Trans. Netw. Serv. Manage. 19(4), 5152\u20135169 (2022)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"25_CR4","unstructured":"Ba, J.L., Kiros, J.R., Hinton, G.E.: Layer normalization. arXiv preprint arXiv:1607.06450 (2016)"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Bayazit, E.C., Sahingoz, O.K., Dogan, B.: A deep learning based android malware detection system with static analysis. In: 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), pp.\u00a01\u20136 (2022)","DOI":"10.1109\/HORA55278.2022.9800057"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Bortolameotti, R., Ede, T.V., Caselli, M., Everts, M.H., Peter, A.: DECANTeR: DEteCtion of anomalous outbouNd HTTP traffic by passive application fingerprinting. In: the 33rd Annual Computer Security Applications Conference (2017)","DOI":"10.1145\/3134600.3134605"},{"key":"25_CR7","doi-asserted-by":"publisher","first-page":"117936","DOI":"10.1016\/j.eswa.2022.117936","volume":"207","author":"M Chal\u00e9","year":"2022","unstructured":"Chal\u00e9, M., Bastian, N.D.: Generating realistic cyber data for training and evaluating machine learning classifiers for network intrusion detection systems. Expert Syst. Appl. 207, 117936 (2022)","journal-title":"Expert Syst. Appl."},{"key":"25_CR8","doi-asserted-by":"publisher","first-page":"7489","DOI":"10.1007\/s11227-020-03372-1","volume":"76","author":"L Chen","year":"2020","unstructured":"Chen, L., Gao, S., Liu, B., Lu, Z., Jiang, Z.: THS-IDPC: a three-stage hierarchical sampling method based on improved density peaks clustering algorithm for encrypted malicious traffic detection. J. Supercomput. 76, 7489\u20137518 (2020)","journal-title":"J. Supercomput."},{"key":"25_CR9","unstructured":"Chen, M., et al.: Generative pretraining from pixels. In: Daume, H., Singh, A. (eds.) International Conference On Machine Learning, vol. 119, pp. 1691\u20131703 (2020). Proceedings of Machine Learning Research, vol.\u00a0119 (2020)"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Choudhury, N., et al.: Malicious traffic classification using convolutional neural network. In: 2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT), pp.\u00a01\u20137. IEEE (2023)","DOI":"10.1109\/ICCCNT56998.2023.10307207"},{"key":"25_CR11","unstructured":"Dosovitskiy, A., et al.: An image is worth 16x16 words: transformers for image recognition at scale. In: International Conference on Learning Representations (2021)"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Draper-Gil., G., Lashkari., A.H., Mamun., M.S.I., A. Ghorbani., A.: Characterization of encrypted and VPN traffic using time-related features. In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy - ICISSP, pp. 407\u2013414. INSTICC, SciTePress (2016)","DOI":"10.5220\/0005740704070414"},{"key":"25_CR13","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.patcog.2016.03.028","volume":"58","author":"SM Erfani","year":"2016","unstructured":"Erfani, S.M., Rajasegarar, S., Karunasekera, S., Leckie, C.: High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recogn. 58, 121\u2013134 (2016)","journal-title":"Pattern Recogn."},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Gao, Z., Zhang, S.: Research on encrypted malicious 5G access network traffic identification based on deep learning. In: International Conference on Science of Cyber Security, pp. 496\u2013512. Springer (2023)","DOI":"10.1007\/978-3-031-45933-7_29"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Habibi Lashkari., A., Draper Gil., G., Mamun., M.S.I., Ghorbani., A.A.: Characterization of tor traffic using time based features. In: Proceedings of the 3rd International Conference on Information Systems Security and Privacy - ICISSP, pp. 253\u2013262. INSTICC, SciTePress (2017)","DOI":"10.5220\/0006105602530262"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Haripriya, L., Jabbar, M.A.: Role of machine learning in intrusion detection system. In: 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), pp. 925\u2013929. IEEE (2018)","DOI":"10.1109\/ICECA.2018.8474576"},{"key":"25_CR17","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference On Computer Vision And Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"25_CR18","unstructured":"Hei, Y., et al.: Hawk: rapid android malware detection through heterogeneous graph attention networks. IEEE Transactions on Neural Networks and Learning Systems (2021)"},{"key":"25_CR19","unstructured":"Kaspersky: It threat evolution in q3 2023. mobile statistics (2023). https:\/\/securelist.com\/it-threat-evolution-q3-2023-mobile-statistics"},{"key":"25_CR20","doi-asserted-by":"crossref","unstructured":"Lashkari, A.H., Kadir, A.F.A., Taheri, L., Ghorbani, A.A.: Toward developing a systematic approach to generate benchmark android malware datasets and classification. In: 2018 International Carnahan conference on security technology (ICCST), pp.\u00a01\u20137. IEEE (2018)","DOI":"10.1109\/CCST.2018.8585560"},{"issue":"2","key":"25_CR21","doi-asserted-by":"publisher","first-page":"721","DOI":"10.32604\/cmc.2019.05610","volume":"60","author":"J Liu","year":"2019","unstructured":"Liu, J., Zeng, Y., Shi, J., Yang, Y., Wang, R., He, L.: MalDetect: a structure of encrypted malware traffic detection. Comput. Mater. Continua 60(2), 721\u2013739 (2019)","journal-title":"Comput. Mater. Continua"},{"key":"25_CR22","unstructured":"Masko, D., Hensman, P.: The impact of imbalanced training data for convolutional neural networks (2015)"},{"key":"25_CR23","unstructured":"Peng, H., et al.: Unsupervised social bot detection via structural information theory. ACM Trans. Inf. Syst. Just Accepted"},{"issue":"2","key":"25_CR24","doi-asserted-by":"publisher","first-page":"e87357","DOI":"10.1371\/journal.pone.0087357","volume":"9","author":"BC Ross","year":"2014","unstructured":"Ross, B.C.: Mutual information between discrete and continuous data sets. PLoS ONE 9(2), e87357 (2014)","journal-title":"PLoS ONE"},{"key":"25_CR25","doi-asserted-by":"crossref","unstructured":"Singh, M., Singh, A., Kim, S.: Blockchain: a game changer for securing IoT data. In: 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), pp. 51\u201355 (2018)","DOI":"10.1109\/WF-IoT.2018.8355182"},{"key":"25_CR26","unstructured":"Vaswani, A., et al.: Attention is all you need. Adv. Neural Inf. Process. Syst. 30 (2017)"},{"issue":"2","key":"25_CR27","doi-asserted-by":"publisher","first-page":"1139","DOI":"10.1109\/TDSC.2022.3148990","volume":"20","author":"N Wang","year":"2022","unstructured":"Wang, N., Chen, Y., Xiao, Y., Hu, Y., Lou, W., Hou, Y.T.: Manda: On adversarial example detection for network intrusion detection system. IEEE Trans. Dependable Secure Comput. 20(2), 1139\u20131153 (2022)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"11","key":"25_CR28","first-page":"1","volume":"24","author":"Z Wang","year":"2015","unstructured":"Wang, Z.: The applications of deep learning on traffic identification. BlackHat USA 24(11), 1\u201310 (2015)","journal-title":"BlackHat USA"},{"key":"25_CR29","doi-asserted-by":"crossref","unstructured":"Yu, Y., Yan, H., Ma, Y., Zhou, H., Guan, H.: DeepHTTP: anomalous HTTP traffic detection and malicious pattern mining based on deep learning. In: Cyber Security: 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers 17, pp. 141\u2013161. Springer (2020)","DOI":"10.1007\/978-981-33-4922-3_11"},{"key":"25_CR30","doi-asserted-by":"crossref","unstructured":"Zhang, R., et al.: Automating DBSCAN via deep reinforcement learning. In: Proceedings of the 31st ACM International Conference on Information and Knowledge Management, pp. 2620\u20132630 (2022)","DOI":"10.1145\/3511808.3557245"},{"key":"25_CR31","unstructured":"Zhou, D., et al.: Deepvit: Towards deeper vision transformer. arXiv preprint arXiv:2103.11886 (2021)"},{"key":"25_CR32","doi-asserted-by":"crossref","unstructured":"Zou, D., et al.: Multispans: a multi-range spatial-temporal transformer network for traffic forecast via structural entropy optimization. In: Proceedings of the 17th ACM International Conference on Web Search and Data Mining, pp. 1032\u20131041 (2024)","DOI":"10.1145\/3616855.3635820"}],"container-title":["Lecture Notes in Computer Science","Advanced Data Mining and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0821-8_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T05:11:11Z","timestamp":1734153071000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0821-8_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"ISBN":["9789819608201","9789819608218"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0821-8_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,15]]},"assertion":[{"value":"15 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests."}},{"value":"ADMA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Data Mining and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adma2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/adma2024.github.io\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}