{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T05:59:52Z","timestamp":1769925592289,"version":"3.49.0"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T00:00:00Z","timestamp":1719878400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T00:00:00Z","timestamp":1719878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100007129","name":"Shandong Provincial Natural Science Foundation","doi-asserted-by":"crossref","award":["ZR2022LZH007"],"award-info":[{"award-number":["ZR2022LZH007"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Joint fund for smart computing of Shandong Natural Science Foundation","award":["2021GXRC108"],"award-info":[{"award-number":["2021GXRC108"]}]},{"name":"open project of State Key Laboratory of Computer Architecture","award":["2021GXRC024"],"award-info":[{"award-number":["2021GXRC024"]}]},{"name":"the Major Scientific and Technological Innovation Project in Shandong Province","award":["2021CXG010506"],"award-info":[{"award-number":["2021CXG010506"]}]},{"name":"the Major Scientific and Technological Innovation Project in Shandong Province","award":["2022CXG010504"],"award-info":[{"award-number":["2022CXG010504"]}]},{"name":"\"New Universities 20 items\" Funding Project of Jinan","award":["22-3-4-xxgg-5-nsh"],"award-info":[{"award-number":["22-3-4-xxgg-5-nsh"]}]},{"name":"\"New Universities 20 items\" Funding Project of Jinan","award":["21-1-4-sf-2-nsh"],"award-info":[{"award-number":["21-1-4-sf-2-nsh"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s00607-024-01306-w","type":"journal-article","created":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T14:03:38Z","timestamp":1719929018000},"page":"2875-2896","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Packet header-based reweight-long short term memory (Rew-LSTM) method for encrypted network traffic classification"],"prefix":"10.1007","volume":"106","author":[{"given":"Jiangang","family":"Hou","sequence":"first","affiliation":[]},{"given":"Xin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hongji","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Chun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Lizhen","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Zhi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Changzhen","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,2]]},"reference":[{"key":"1306_CR1","doi-asserted-by":"publisher","first-page":"107166","DOI":"10.1016\/j.infsof.2023.107166","volume":"157","author":"J Chen","year":"2023","unstructured":"Chen J, Lv T, Cai S et al (2023) A novel detection model for abnormal network traffic based on bidirectional temporal convolutional network. Inf Softw Technol 157:107166","journal-title":"Inf Softw Technol"},{"key":"1306_CR2","doi-asserted-by":"crossref","unstructured":"Li Y, Guo H, Hou J, et al (2021) A survey of encrypted malicious traffic detection. In: 2021 International conference on communications, computing, cybersecurity, and informatics (CCCI). IEEE, pp 1\u20137","DOI":"10.1109\/CCCI52664.2021.9583191"},{"key":"1306_CR3","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.inffus.2021.02.009","volume":"72","author":"J Zhao","year":"2021","unstructured":"Zhao J, Jing X, Yan Z et al (2021) Network traffic classification for data fusion: a survey. Inf Fusion 72:22\u201347","journal-title":"Inf Fusion"},{"key":"1306_CR4","doi-asserted-by":"crossref","unstructured":"Wang W, Zhu M, Zeng X et al (2017) Malware traffic classification using convolutional neural network for representation learning. In: 2017 International conference on information networking (ICOIN). IEEE, pp 712\u2013717","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"1306_CR5","doi-asserted-by":"crossref","unstructured":"Li Y, Kong X, Hou J et al (2022) NIN-DSC: a network traffic anomaly detection method based on deep learning. In: 2022 7th international conference on signal and image processing (ICSIP). IEEE, pp 390\u2013394","DOI":"10.1109\/ICSIP55141.2022.9886658"},{"key":"1306_CR6","doi-asserted-by":"crossref","unstructured":"He Y, Li W (2020) Image-based encrypted traffic classification with convolution neural networks. In: 2020 IEEE fifth international conference on data science in cyberspace (DSC). IEEE, pp 271\u2013278","DOI":"10.1109\/DSC50466.2020.00048"},{"key":"1306_CR7","unstructured":"Azab A, Khasawneh M, Alrabaee S, et al (2022) Network traffic classification: techniques, datasets, and challenges. Digital Commun Netw"},{"key":"1306_CR8","doi-asserted-by":"publisher","first-page":"18042","DOI":"10.1109\/ACCESS.2017.2747560","volume":"5","author":"M Lopez-Martin","year":"2017","unstructured":"Lopez-Martin M, Carro B, Sanchez-Esguevillas A et al (2017) Network traffic classifier with convolutional and recurrent neural networks for internet of things. IEEE Access 5:18042\u201318050","journal-title":"IEEE Access"},{"key":"1306_CR9","doi-asserted-by":"crossref","unstructured":"Zhou H, Wang Y, Lei X, et al (2017) A method of improved CNN traffic classification. In: 2017 13th international conference on computational intelligence and security (CIS). IEEE, pp 177\u2013181","DOI":"10.1109\/CIS.2017.00046"},{"key":"1306_CR10","doi-asserted-by":"crossref","unstructured":"Tong V, Tran H A, Souihi S, et al. (2018) A novel QUIC traffic classifier based on convolutional neural networks. In: 2018 IEEE global communications conference (GLOBECOM). IEEE, pp 1\u20136","DOI":"10.1109\/GLOCOM.2018.8647128"},{"key":"1306_CR11","doi-asserted-by":"crossref","unstructured":"Vu L, Bui C T, Nguyen QU (2017) A deep learning based method for handling imbalanced problem in network traffic classification. In: Proceedings of the 8th international symposium on information and communication technology, pp 333\u2013339","DOI":"10.1145\/3155133.3155175"},{"issue":"5","key":"1306_CR12","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3302","volume":"29","author":"C Zhang","year":"2018","unstructured":"Zhang C, Wang X, Li F et al (2018) Deep learning\u2013based network application classification for SDN. Trans Emerg Telecommun Technol 29(5):e3302","journal-title":"Trans Emerg Telecommun Technol"},{"key":"1306_CR13","doi-asserted-by":"publisher","first-page":"39485","DOI":"10.1109\/ACCESS.2019.2904039","volume":"7","author":"H Sun","year":"2019","unstructured":"Sun H, Xiao Y, Wang J et al (2019) Common knowledge based and one-shot learning enabled multi-task traffic classification. IEEE Access 7:39485\u201339495","journal-title":"IEEE Access"},{"key":"1306_CR14","doi-asserted-by":"crossref","unstructured":"Wang W, Zhu M, Wang J et al (2017) End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: 2017 IEEE international conference on intelligence and security informatics (ISI). IEEE, pp 43\u201348","DOI":"10.1109\/ISI.2017.8004872"},{"issue":"3","key":"1306_CR15","doi-asserted-by":"publisher","first-page":"1999","DOI":"10.1007\/s00500-019-04030-2","volume":"24","author":"M Lotfollahi","year":"2020","unstructured":"Lotfollahi M, Jafari Siavoshani M, Shirali Hossein Zade R et al (2020) Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft Comput 24(3):1999\u20132012","journal-title":"Soft Comput"},{"key":"1306_CR16","doi-asserted-by":"publisher","first-page":"4","DOI":"10.3991\/ijet.v13i04.8466","volume":"13","author":"H Huang","year":"2018","unstructured":"Huang H, Deng H, Chen J et al (2018) Automatic multi-task learning system for abnormal network traffic detection. Int J Emerg Technol Learn 13:4","journal-title":"Int J Emerg Technol Learn"},{"key":"1306_CR17","doi-asserted-by":"publisher","first-page":"45182","DOI":"10.1109\/ACCESS.2019.2908225","volume":"7","author":"Y Zeng","year":"2019","unstructured":"Zeng Y, Gu H, Wei W et al (2019) $ Deep-full-range $: a deep learning based network encrypted traffic classification and intrusion detection framework. IEEE Access 7:45182\u201345190","journal-title":"IEEE Access"},{"issue":"1","key":"1306_CR18","doi-asserted-by":"publisher","first-page":"115","DOI":"10.3390\/electronics12010115","volume":"12","author":"W Sun","year":"2023","unstructured":"Sun W, Zhang Y, Li J et al (2023) A Deep learning-based encrypted VPN traffic classification method using packet block image. Electronics 12(1):115","journal-title":"Electronics"},{"issue":"2","key":"1306_CR19","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1109\/TNSM.2019.2899085","volume":"16","author":"G Aceto","year":"2019","unstructured":"Aceto G, Ciuonzo D, Montieri A et al (2019) Mobile encrypted traffic classification using deep learning: Experimental evaluation, lessons learned, and challenges. IEEE Trans Netw Serv Manag 16(2):445\u2013458","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"1306_CR20","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1016\/j.neucom.2020.05.036","volume":"409","author":"G Aceto","year":"2020","unstructured":"Aceto G, Ciuonzo D, Montieri A et al (2020) Toward effective mobile encrypted traffic classification through deep learning. Neurocomputing 409:306\u2013315","journal-title":"Neurocomputing"},{"key":"1306_CR21","doi-asserted-by":"crossref","unstructured":"Postel J (1981) Internet protocol","DOI":"10.17487\/rfc0791"},{"key":"1306_CR22","doi-asserted-by":"crossref","unstructured":"Postel J (1981) Transmission control protocol","DOI":"10.17487\/rfc0793"},{"key":"1306_CR23","doi-asserted-by":"crossref","unstructured":"Postel J (1980) User datagram protocol","DOI":"10.17487\/rfc0768"},{"key":"1306_CR24","doi-asserted-by":"crossref","unstructured":"Postel J (1981) Internet control message protocol","DOI":"10.17487\/rfc0792"},{"key":"1306_CR25","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.future.2020.02.034","volume":"109","author":"Y Xu","year":"2020","unstructured":"Xu Y, Liu Z, Li Y et al (2020) Feature data processing: making medical data fit deep neural networks. Futur Gener Comput Syst 109:149\u2013157","journal-title":"Futur Gener Comput Syst"},{"key":"1306_CR26","unstructured":"Guo C, Berkhahn F (2016) Entity embeddings of categorical variables. arXiv:1604.06737"},{"issue":"4","key":"1306_CR27","doi-asserted-by":"publisher","first-page":"421","DOI":"10.3390\/math9040421","volume":"9","author":"R Casado-Vara","year":"2021","unstructured":"Casado-Vara R, Martin del Rey A, P\u00e9rez-Palau D et al (2021) Web traffic time series forecasting using LSTM neural networks with distributed asynchronous training. Mathematics 9(4):421","journal-title":"Mathematics"},{"issue":"6","key":"1306_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3457904","volume":"54","author":"E Papadogiannaki","year":"2021","unstructured":"Papadogiannaki E, Ioannidis S (2021) A survey on encrypted network traffic analysis applications, techniques, and countermeasures. ACM Comput Surv (CSUR) 54(6):1\u201335","journal-title":"ACM Comput Surv (CSUR)"},{"key":"1306_CR29","doi-asserted-by":"crossref","unstructured":"Hou J, Li X, Zhao K et al (2022) A survey of DNS tunnel detection. In: 2022 7th International conference on signal and image processing (ICSIP). IEEE, pp 338\u2013342","DOI":"10.1109\/ICSIP55141.2022.9886602"},{"key":"1306_CR30","doi-asserted-by":"crossref","unstructured":"Holland J, Schmitt P, Feamster N et al (2021) New directions in automated traffic analysis. In: Proceedings of the 2021 ACM SIGSAC conference on computer and communications security, pp 3366\u20133383","DOI":"10.1145\/3460120.3484758"},{"key":"1306_CR31","doi-asserted-by":"crossref","unstructured":"Azizjon M, Jumabek A, Kim W (2020) 1D CNN based network intrusion detection with normalization on imbalanced data. In: 2020 International conference on artificial intelligence in information and communication (ICAIIC). IEEE, pp 218\u2013224","DOI":"10.1109\/ICAIIC48513.2020.9064976"},{"issue":"3","key":"1306_CR32","doi-asserted-by":"publisher","first-page":"516","DOI":"10.3390\/electronics12030516","volume":"12","author":"Z Shi","year":"2023","unstructured":"Shi Z, Luktarhan N, Song Y et al (2023) BFCN: a novel classification method of encrypted traffic based on BERT and CNN. Electronics 12(3):516","journal-title":"Electronics"},{"key":"1306_CR33","doi-asserted-by":"crossref","unstructured":"Hu J, Shen L, Sun G (2018) Squeeze-and-excitation networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 7132\u20137141","DOI":"10.1109\/CVPR.2018.00745"},{"key":"1306_CR34","doi-asserted-by":"crossref","unstructured":"Qin Z, Zhang P, Wu F et al (2021) Fcanet: frequency channel attention networks. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp 783\u2013792","DOI":"10.1109\/ICCV48922.2021.00082"},{"issue":"4","key":"1306_CR35","doi-asserted-by":"publisher","first-page":"3464","DOI":"10.1109\/JSEN.2022.3140383","volume":"22","author":"Z Jia","year":"2022","unstructured":"Jia Z, Cai X, Jiao Z (2022) Multi-modal physiological signals based squeeze-and-excitation network with domain adversarial learning for sleep staging. IEEE Sens J 22(4):3464\u20133471","journal-title":"IEEE Sens J"},{"key":"1306_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2022.108594","volume":"119","author":"L Cai","year":"2022","unstructured":"Cai L, Li H, Dong W et al (2022) Micro-expression recognition using 3D DenseNet fused squeeze-and-excitation networks. Appl Soft Comput 119:108594","journal-title":"Appl Soft Comput"},{"key":"1306_CR37","doi-asserted-by":"crossref","unstructured":"Draper-Gil G, Lashkari AH, Mamun MSI et al (2016) Characterization of encrypted and vpn traffic using time-related. In: Proceedings of the 2nd international conference on information systems security and privacy (ICISSP), pp 407\u2013414","DOI":"10.5220\/0005740704070414"},{"key":"1306_CR38","doi-asserted-by":"crossref","unstructured":"Lashkari AH, Draper-Gil G, Mamun MSI et al (2017) Characterization of tor traffic using time based features. In: ICISSp, pp 253\u2013262","DOI":"10.5220\/0005740704070414"},{"key":"1306_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109614","volume":"224","author":"Z Diao","year":"2023","unstructured":"Diao Z, Xie G, Wang X et al (2023) EC-GCN: a encrypted traffic classification framework based on multi-scale graph convolution networks. Comput Netw 224:109614","journal-title":"Comput Netw"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-024-01306-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00607-024-01306-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-024-01306-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,18]],"date-time":"2024-07-18T13:20:55Z","timestamp":1721308855000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00607-024-01306-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,2]]},"references-count":39,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["1306"],"URL":"https:\/\/doi.org\/10.1007\/s00607-024-01306-w","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,2]]},"assertion":[{"value":"29 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 June 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}