{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T04:08:06Z","timestamp":1744344486521,"version":"3.40.4"},"publisher-location":"Singapore","reference-count":28,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819709410"},{"type":"electronic","value":"9789819709427"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-0942-7_23","type":"book-chapter","created":{"date-parts":[[2024,2,25]],"date-time":"2024-02-25T20:02:00Z","timestamp":1708891320000},"page":"452-471","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["MFL-RAT: Multi-class Few-Shot Learning Method for\u00a0Encrypted RAT Traffic Detection"],"prefix":"10.1007","author":[{"given":"Yijing","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jianhuan","family":"Zhuo","sequence":"additional","affiliation":[]},{"given":"Jianjun","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Xiaoyu","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Weilin","family":"Gai","sequence":"additional","affiliation":[]},{"given":"Xiaodu","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yinliang","family":"Yue","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,26]]},"reference":[{"issue":"2","key":"23_CR1","doi-asserted-by":"publisher","first-page":"1135","DOI":"10.1109\/SURV.2013.100613.00161","volume":"16","author":"M Finsterbusch","year":"2013","unstructured":"Finsterbusch, M., Richter, C., Rocha, E., Muller, J.-A., Hanssgen, K.: A survey of payload-based traffic classification approaches. IEEE Commun. Surv. Tutorials 16(2), 1135\u20131156 (2013)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Meghdouri, F., V\u00e1zquez, F.I., Zseby, T.: Cross-layer profiling of encrypted network data for anomaly detection. In: 2020 IEEE 7th International Conference on Data Science and Advanced Analytics (DSAA), pp. 469\u2013478. IEEE (2020)","DOI":"10.1109\/DSAA49011.2020.00061"},{"issue":"2","key":"23_CR3","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1049\/iet-ifs.2018.5186","volume":"13","author":"W Han","year":"2019","unstructured":"Han, W., Xue, J., Yan, H.: Detecting anomalous traffic in the controlled network based on cross entropy and support vector machine. IET Inf. Secur. 13(2), 109\u2013116 (2019)","journal-title":"IET Inf. Secur."},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Shekhawat, A.S., Di Troia, F., Stamp, M.: Feature analysis of encrypted malicious traffic. Exp. Syst. Appl. 125, 130\u2013141 (2019)","DOI":"10.1016\/j.eswa.2019.01.064"},{"key":"23_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/978-3-319-99073-6_17","volume-title":"Computer Security","author":"G Stergiopoulos","year":"2018","unstructured":"Stergiopoulos, G., Talavari, A., Bitsikas, E., Gritzalis, D.: Automatic detection of various malicious traffic using side channel features on TCP packets. In: Lopez, J., Zhou, J., Soriano, M. (eds.) ESORICS 2018. LNCS, vol. 11098, pp. 346\u2013362. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99073-6_17"},{"key":"23_CR6","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1016\/j.ins.2020.05.035","volume":"541","author":"X Liu","year":"2020","unstructured":"Liu, X., et al.: Attention-based bidirectional GRU networks for efficient https traffic classification. Inf. Sci. 541, 297\u2013315 (2020)","journal-title":"Inf. Sci."},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Lotfollahi, M., Siavoshani, M.J., Zade, R.S.H., Saberian, M.: Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft Comput. 24(3), 1999\u20132012 (2020)","DOI":"10.1007\/s00500-019-04030-2"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Shapira, T., Shavitt, Y.: FlowPic: encrypted internet traffic classification is as easy as image recognition. In: IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 680\u2013687. IEEE (2019)","DOI":"10.1109\/INFCOMW.2019.8845315"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Liu, C., He, L., Xiong, G., Cao, Z., Li, Z.: FS-Net: a flow sequence network for encrypted traffic classification. In: IEEE INFOCOM 2019-IEEE Conference on Computer Communications, pp. 1171\u20131179. IEEE (2019)","DOI":"10.1109\/INFOCOM.2019.8737507"},{"key":"23_CR10","unstructured":"Finn, C., Abbeel, P., Levine, S.: Model-agnostic meta-learning for fast adaptation of deep networks. In: International Conference on Machine Learning, pp. 1126\u20131135. PMLR (2017)"},{"key":"23_CR11","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/j.cose.2018.12.012","volume":"82","author":"M Ring","year":"2019","unstructured":"Ring, M., Schl\u00f6r, D., Landes, D., Hotho, A.: Flow-based network traffic generation using generative adversarial networks. Comput. Secur. 82, 156\u2013172 (2019)","journal-title":"Comput. Secur."},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Guo, Y., Xiong, G., Li, Z., Shi, J., Cui, M., Gou, G.: TA-GAN: GAN based traffic augmentation for imbalanced network traffic classification. In: 2021 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20138. IEEE (2021)","DOI":"10.1109\/IJCNN52387.2021.9533942"},{"issue":"1","key":"23_CR13","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1080\/09540091.2021.2024509","volume":"34","author":"S Cai","year":"2022","unstructured":"Cai, S., Han, D., Yin, X., Li, D., Chang, C.-C.: A hybrid parallel deep learning model for efficient intrusion detection based on metric learning. Connect. Sci. 34(1), 551\u2013577 (2022)","journal-title":"Connect. Sci."},{"key":"23_CR14","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1016\/j.ins.2021.05.016","volume":"569","author":"G Andresini","year":"2021","unstructured":"Andresini, G., Appice, A., Malerba, D.: Autoencoder-based deep metric learning for network intrusion detection. Inf. Sci. 569, 706\u2013727 (2021)","journal-title":"Inf. Sci."},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Feng, T., Qi, Q., Wang, J., Liao, J.: Few-shot class-adaptive anomaly detection with model-agnostic meta-learning. In: 2021 IFIP Networking Conference (IFIP Networking), pp. 1\u20139. IEEE (2021)","DOI":"10.23919\/IFIPNetworking52078.2021.9472814"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, Y.: ER-ERT: a method of ensemble representation learning of encrypted RAT traffic. In: 2023 IFIP Networking Conference (IFIP Networking), pp. 1\u201310 (2023)","DOI":"10.23919\/IFIPNetworking57963.2023.10186391"},{"issue":"1","key":"23_CR17","first-page":"3753","volume":"14","author":"K Fukumizu","year":"2013","unstructured":"Fukumizu, K., Song, L., Gretton, A.: Kernel Bayes\u2019 rule: Bayesian inference with positive definite kernels. J. Mach. Learn. Res. 14(1), 3753\u20133783 (2013)","journal-title":"J. Mach. Learn. Res."},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Wang, W., Zhu, M., Wang, J., Zeng, X., Yang, Z.: End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 43\u201348 (2017)","DOI":"10.1109\/ISI.2017.8004872"},{"key":"23_CR19","unstructured":"Stratosphere: Stratosphere laboratory datasets (2022). https:\/\/www.stratosphereips.org\/datasets-overview. Accessed 14 Mar 2022"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Garcia, S., Grill, M., Stiborek, J., Zunino, A.: An empirical comparison of botnet detection methods. Comput. Secur. 45, 100\u2013123 (2014)","DOI":"10.1016\/j.cose.2014.05.011"},{"key":"23_CR21","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.cose.2019.06.005","volume":"86","author":"M Ring","year":"2019","unstructured":"Ring, M., Wunderlich, S., Scheuring, D., Landes, D., Hotho, A.: A survey of network-based intrusion detection data sets. Comput. Secur. 86, 147\u2013167 (2019)","journal-title":"Comput. Secur."},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Mirsky, Y., Doitshman, T., Elovici, Y., Shabtai, A.: Kitsune: an ensemble of autoencoders for online network intrusion detection. arXiv preprint arXiv:1802.09089 (2018)","DOI":"10.14722\/ndss.2018.23204"},{"key":"23_CR23","unstructured":"Schwartz, E.: Delta-encoder: an effective sample synthesis method for few-shot object recognition. In: Advances in Neural Information Processing Systems, vol. 31 (2018)"},{"key":"23_CR24","doi-asserted-by":"crossref","unstructured":"Sung, F., Yang, Y., Zhang, L., Xiang, T., Torr, P.H.S., Hospedales, T.M.: Learning to compare: relation network for few-shot learning. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1199\u20131208 (2018)","DOI":"10.1109\/CVPR.2018.00131"},{"key":"23_CR25","unstructured":"Vinyals, O., Blundell, C., Lillicrap, T., Wierstra, D., et al.: Matching networks for one shot learning. In: Advances in Neural Information Processing Systems, vol. 29 (2016)"},{"key":"23_CR26","doi-asserted-by":"crossref","unstructured":"Gidaris, S., Komodakis, N.: Dynamic few-shot visual learning without forgetting. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4367\u20134375 (2018)","DOI":"10.1109\/CVPR.2018.00459"},{"key":"23_CR27","unstructured":"Li, Z., Zhou, F., Chen, F., Li, H.: Meta-SGD: learning to learn quickly for few-shot learning. arXiv preprint arXiv:1707.09835 (2017)"},{"key":"23_CR28","doi-asserted-by":"publisher","first-page":"108346","DOI":"10.1109\/ACCESS.2020.3001350","volume":"8","author":"S Zavrak","year":"2020","unstructured":"Zavrak, S., \u0130skefiyeli, M.: Anomaly-based intrusion detection from network flow features using variational autoencoder. IEEE Access 8, 108346\u2013108358 (2020)","journal-title":"IEEE Access"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-0942-7_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T11:11:25Z","timestamp":1744283485000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-0942-7_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819709410","9789819709427"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-0942-7_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"26 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/link.springer.com\/conference\/cisc","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"152","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}