{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:10:06Z","timestamp":1766268606576,"version":"3.37.3"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2018,2,6]],"date-time":"2018-02-06T00:00:00Z","timestamp":1517875200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s11227-018-2268-y","type":"journal-article","created":{"date-parts":[[2018,2,6]],"date-time":"2018-02-06T06:19:35Z","timestamp":1517897975000},"page":"4910-4927","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Real-time identification of three Tor pluggable transports using machine learning techniques"],"prefix":"10.1007","volume":"74","author":[{"given":"Mohammad Hassan Mojtahed","family":"Soleimani","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7131-1047","authenticated-orcid":false,"given":"Muharram","family":"Mansoorizadeh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0703-5949","authenticated-orcid":false,"given":"Mohammad","family":"Nassiri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,6]]},"reference":[{"key":"2268_CR1","volume-title":"Introduction to machine learning","author":"E Alpaydin","year":"2014","unstructured":"Alpaydin E (2014) Introduction to machine learning. MIT press, Cambridge"},{"issue":"6","key":"2268_CR2","doi-asserted-by":"publisher","first-page":"1863","DOI":"10.1016\/j.jnca.2012.07.010","volume":"35","author":"R Antonello","year":"2012","unstructured":"Antonello R, Fernandes S, Kamienski C, Sadok D, Kelner J, G\u00f3Dor I, Szab\u00f3 G, Westholm T (2012) Deep packet inspection tools and techniques in commodity platforms: challenges and trends. J Netw Comput Appl 35(6):1863\u20131878","journal-title":"J Netw Comput Appl"},{"unstructured":"Arndt D (2016) Netmate flow calculator \n                    https:\/\/dan.arndt.ca\/projects\/netmate-flowcalc\/\n                    \n                  . Accessed 10 Nov 2015","key":"2268_CR3"},{"doi-asserted-by":"crossref","unstructured":"Barker J, Hannay P, Szewczyk P (2011) Using traffic analysis to identify the second generation onion router. In: 2011 IFIP 9th International Conference on Embedded and Ubiquitous Computing (EUC), IEEE, pp 72\u201378","key":"2268_CR4","DOI":"10.1109\/EUC.2011.76"},{"issue":"7","key":"2268_CR5","doi-asserted-by":"publisher","first-page":"1142","DOI":"10.1177\/1461444811398031","volume":"13","author":"R Bendrath","year":"2011","unstructured":"Bendrath R, Mueller M (2011) The end of the net as we know it? Deep packet inspection and internet governance. New Media Soc 13(7):1142\u20131160","journal-title":"New Media Soc"},{"doi-asserted-by":"crossref","unstructured":"Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. Technical Report, DTIC Document","key":"2268_CR6","DOI":"10.21236\/ADA465464"},{"doi-asserted-by":"crossref","unstructured":"Dong H, Sun GL, Li DD (2013) A hybrid method for network traffic classification. In: 2013 International Conference on Measurement, Information and Control (ICMIC), vol 1. IEEE, pp 653\u2013656","key":"2268_CR7","DOI":"10.1109\/MIC.2013.6758047"},{"doi-asserted-by":"crossref","unstructured":"Ensafi R, Fifield D, Winter P, Feamster N, Weaver N, Paxson V (2015) Examining how the great firewall discovers hidden circumvention servers. In: Proceedings of the 2015 ACM Conference on Internet Measurement Conference, ACM, pp 445\u2013458","key":"2268_CR8","DOI":"10.1145\/2815675.2815690"},{"issue":"1","key":"2268_CR9","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall M, Frank E, Holmes G, Pfahringer B, Reutemann P, Witten IH (2009) The Weka data mining software: an update. ACM SIGKDD Explor Newslett 11(1):10\u201318","journal-title":"ACM SIGKDD Explor Newslett"},{"doi-asserted-by":"crossref","unstructured":"Hodo E, Bellekens X, Iorkyase E, Hamilton A, Tachtatzis C, Atkinson R (2017) Machine learning approach for detection of nontor traffic. arXiv preprint \n                    arXiv:1708.08725","key":"2268_CR10","DOI":"10.1145\/3098954.3106068"},{"unstructured":"Project T (2016) Obfs3. \n                    https:\/\/gitweb.torproject.org\/pluggable-transports\/obfsproxy.git\/tree\/doc\/obfs3\/obfs3-protocol-spec.txt\n                    \n                  . Accessed 10 Nov 2015","key":"2268_CR11"},{"unstructured":"Project T (2016) Tor pluggable transports. \n                    https:\/\/www.torproject.org\/docs\/pluggable-transports.html.en\n                    \n                  . Accessed 10 Nov 2015","key":"2268_CR12"},{"doi-asserted-by":"crossref","unstructured":"Shahbar K, Zincir-Heywood AN (2015) Traffic flow analysis of tor pluggable transports. In: 2015 11th International Conference on Network and Service Management (CNSM), IEEE, pp 178\u2013181","key":"2268_CR13","DOI":"10.1109\/CNSM.2015.7367356"},{"doi-asserted-by":"crossref","unstructured":"Song M, Xiong G, Li Z, Peng J, Guo L (2013) A de-anonymize attack method based on traffic analysis. In: 2013 8th International ICST Conference on Communications and Networking in China (CHINACOM), IEEE, pp 455\u2013460","key":"2268_CR14","DOI":"10.1109\/ChinaCom.2013.6694639"},{"doi-asserted-by":"crossref","unstructured":"Sun GL, Xue Y, Dong Y, Wang D, Li C (2010) An novel hybrid method for effectively classifying encrypted traffic. In: 2010 IEEE Global Telecommunications Conference (GLOBECOM 2010), IEEE, pp 1\u20135","key":"2268_CR15","DOI":"10.1109\/GLOCOM.2010.5683649"},{"doi-asserted-by":"crossref","unstructured":"Wang L, Dyer KP, Akella A, Ristenpart T, Shrimpton T (2015) Seeing through network-protocol obfuscation. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, ACM, pp 57\u201369","key":"2268_CR16","DOI":"10.1145\/2810103.2813715"},{"unstructured":"Winter P, Lindskog S (2012) How china is blocking tor. arXiv preprint \n                    arXiv:1204.0447","key":"2268_CR17"},{"doi-asserted-by":"crossref","unstructured":"Winter P, Pulls T, Fuss J (2013) ScrambleSuit: A polymorphic network protocol to circumvent censorship. In: Proceedings of the 12th ACM Workshop on Privacy in the Electronic Society, ACM, pp 213\u2013224","key":"2268_CR18","DOI":"10.1145\/2517840.2517856"},{"issue":"3","key":"2268_CR19","doi-asserted-by":"publisher","first-page":"1285","DOI":"10.1007\/s11227-012-0788-4","volume":"66","author":"M Yang","year":"2013","unstructured":"Yang M, Luo J, Zhang L, Wang X, Fu X (2013) How to block tors hidden bridges: detecting methods and countermeasures. J. Supercomput. 66(3):1285\u20131305","journal-title":"J. Supercomput."}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-018-2268-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-018-2268-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-018-2268-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,5]],"date-time":"2019-02-05T20:37:32Z","timestamp":1549399052000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-018-2268-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,6]]},"references-count":19,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["2268"],"URL":"https:\/\/doi.org\/10.1007\/s11227-018-2268-y","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2018,2,6]]},"assertion":[{"value":"6 February 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}