{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T02:55:14Z","timestamp":1761015314794,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819788002"},{"type":"electronic","value":"9789819788019"}],"license":[{"start":{"date-parts":[[2024,12,25]],"date-time":"2024-12-25T00:00:00Z","timestamp":1735084800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,25]],"date-time":"2024-12-25T00:00:00Z","timestamp":1735084800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-97-8801-9_1","type":"book-chapter","created":{"date-parts":[[2024,12,24]],"date-time":"2024-12-24T07:05:45Z","timestamp":1735023945000},"page":"3-23","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["TorHunter: A Lightweight Method for\u00a0Efficient Identification of\u00a0Obfuscated Tor Traffic Through Unsupervised Pre-training"],"prefix":"10.1007","author":[{"given":"Yuwei","family":"Xu","sequence":"first","affiliation":[]},{"given":"Zhengxin","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Rongrong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yali","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Guang","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,25]]},"reference":[{"key":"1_CR1","unstructured":"Tor metrics. https:\/\/metrics.torproject.org\/userstats-bridge-transport.html. Accessed 13 Mar 2023"},{"key":"1_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/1302999","volume":"2021","author":"R Basheer","year":"2021","unstructured":"Basheer, R., Alkhatib, B.: Threats from the dark: a review over dark web investigation research for cyber threat intelligence. J. Comput. Netw. Commun. 2021, 1\u201321 (2021)","journal-title":"J. Comput. Netw. Commun."},{"key":"1_CR3","unstructured":"Yawning: The obfourscator (courtesy mirror) (2024). https:\/\/github.com\/Yawning\/obfs4. Accessed 07 Feb 2024"},{"key":"1_CR4","unstructured":"Fifield, D.: Threat modeling and circumvention of Internet censorship. University of California, Berkeley (2017)"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"He, H.Y., Yang, Z.G., Chen, X.N.: PERT: payload encoding representation from transformer for encrypted traffic classification. In: Proceedings of the ITU Kaleidoscope: Industry-Driven Digital Transformation (ITU K), pp.\u00a01\u20138. IEEE (2020)","DOI":"10.23919\/ITUK50268.2020.9303204"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Lin, X., Xiong, G., Gou, G., etc.: ET-BERT: a contextualized datagram representation with pre-training transformers for encrypted traffic classification. In: Proceedings of the ACM Web Conference (WWW), pp. 633\u2013642 (2022)","DOI":"10.1145\/3485447.3512217"},{"issue":"3","key":"1_CR7","doi-asserted-by":"publisher","first-page":"1369","DOI":"10.1109\/TNET.2022.3215507","volume":"31","author":"P Lin","year":"2022","unstructured":"Lin, P., Ye, K., Hu, Y., Lin, Y., Xu, C.Z.: A novel multimodal deep learning framework for encrypted traffic classification. IEEE\/ACM Trans. Netw. 31(3), 1369\u20131384 (2022)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"1_CR8","first-page":"1","volume":"2021","author":"W Xu","year":"2021","unstructured":"Xu, W., Zou, F.: Obfuscated tor traffic identification based on sliding window. Secur. Commun. Netw. 2021, 1\u201311 (2021)","journal-title":"Secur. Commun. Netw."},{"key":"1_CR9","doi-asserted-by":"publisher","first-page":"109965","DOI":"10.1016\/j.comnet.2023.109965","volume":"235","author":"Y Xu","year":"2023","unstructured":"Xu, Y., Cao, J., Song, K., Xiang, Q., Cheng, G.: FastTraffic: a lightweight method for encrypted traffic fast classification. Comput. Netw. 235, 109965\u2013109978 (2023)","journal-title":"Comput. Netw."},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Panchenko, A., et al.: Website fingerprinting at internet scale. In: Proceedings of 23rd Annual Network and Distributed System Security Symposium (NDSS) (2016)","DOI":"10.14722\/ndss.2016.23477"},{"key":"1_CR11","doi-asserted-by":"publisher","first-page":"2166","DOI":"10.1109\/TIFS.2022.3179955","volume":"17","author":"SJ Xu","year":"2022","unstructured":"Xu, S.J., Geng, G.G., Jin, X.B., Liu, D.J., Weng, J.: Seeing traffic paths: encrypted traffic classification with path signature features. IEEE Trans. Inf. Forensics Secur. 17, 2166\u20132181 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8","key":"1_CR12","doi-asserted-by":"publisher","first-page":"1747","DOI":"10.1109\/TIFS.2016.2551203","volume":"11","author":"S Feghhi","year":"2016","unstructured":"Feghhi, S., Leith, D.J.: A web traffic analysis attack using only timing information. IEEE Trans. Inf. Forensics Secur. 11(8), 1747\u20131759 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Wang, W., Zhu, M., Wang, J., et al.: End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 43\u201348 (2017)","DOI":"10.1109\/ISI.2017.8004872"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Lotfollahi, M., Jafari\u00a0Siavoshani, M., Shirali Hossein\u00a0Zade, R., Saberian, M.: Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft Comput. 24(3), 1999\u20132012 (2020)","DOI":"10.1007\/s00500-019-04030-2"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Wang, X., Chen, S., Su, J.: App-Net: a hybrid neural network for encrypted mobile traffic classification. In: Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 424\u2013429 (2020)","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162891"},{"issue":"1","key":"1_CR16","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1109\/COMST.2022.3208196","volume":"25","author":"M Shen","year":"2022","unstructured":"Shen, M., et al.: Machine learning-powered encrypted network traffic analysis: a comprehensive survey. IEEE Commun. Surv. Tut. 25(1), 791\u2013824 (2022)","journal-title":"IEEE Commun. Surv. Tut."},{"issue":"4","key":"1_CR17","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MNET.011.1900366","volume":"34","author":"M Shen","year":"2020","unstructured":"Shen, M., Liu, Y., Zhu, L., Xu, K., et al.: Optimizing feature selection for efficient encrypted traffic classification: a systematic approach. IEEE Netw. 34(4), 20\u201327 (2020)","journal-title":"IEEE Netw."},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Draper-Gil, G., Lashkari, A.H., Mamun, M.S.I., Ghorbani, A.A.: Characterization of encrypted and VPN traffic using time-related features. In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP), pp. 407\u2013414 (2016)","DOI":"10.5220\/0005740704070414"},{"key":"1_CR19","unstructured":"Lashkari, A.H., Draper-Gil, G., Mamun, M.S.I., Ghorbani, A.A., et\u00a0al.: Characterization of tor traffic using time based features. In: Proceedings of the 3rd International Conference on Information Systems Security and Privacy (ICISSP), pp. 253\u2013262 (2017)"},{"key":"1_CR20","unstructured":"Wang, S., Li, B.Z., Khabsa, M., Fang, H., Ma, H.: Linformer: self-attention with linear complexity. arXiv preprint arXiv:2006.04768 (2020)"},{"key":"1_CR21","unstructured":"Devlin, J., Chang, M.W., Lee, K., Toutanova, K.: BERT: pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)"},{"key":"1_CR22","unstructured":"Vaswani, A., Shazeer, N., Parmar, N., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems (NIPS), vol. 30, pp. 6000\u20136010 (2017)"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Sirinam, P., Imani, M., Juarez, M., Wright, M.: Deep fingerprinting: undermining website fingerprinting defenses with deep learning. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 1928\u20131943 (2018)","DOI":"10.1145\/3243734.3243768"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-8801-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,24]],"date-time":"2024-12-24T08:02:54Z","timestamp":1735027374000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-8801-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,25]]},"ISBN":["9789819788002","9789819788019"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-8801-9_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,25]]},"assertion":[{"value":"25 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Communications Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mytilene","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icics2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icics2024.aegean.gr","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}