{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T00:22:55Z","timestamp":1772065375582,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T00:00:00Z","timestamp":1497571200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572115"],"award-info":[{"award-number":["61572115"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Basic Research of Sichuan Province","award":["2016JY0007"],"award-info":[{"award-number":["2016JY0007"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1007\/s12083-017-0566-4","type":"journal-article","created":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T03:42:49Z","timestamp":1497584569000},"page":"592-601","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Tor anonymous traffic identification based on gravitational clustering"],"prefix":"10.1007","volume":"11","author":[{"given":"Zhihong","family":"Rao","sequence":"first","affiliation":[]},{"given":"Weina","family":"Niu","sequence":"additional","affiliation":[]},{"given":"XiaoSong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hongwei","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,16]]},"reference":[{"key":"566_CR1","doi-asserted-by":"crossref","unstructured":"Kido H, Yanagisawa Y, Satoh T (2005) An anonymous communication technique using dummies for location-based services. In: Proceedings of the International Society for Magnetic Resonance in Medicine on Pervasive Services, ICPS\u201905, pp 88\u201397","DOI":"10.1109\/PERSER.2005.1506394"},{"key":"566_CR2","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464","volume-title":"The second-generation onion router[R]","author":"R Dingledine","year":"2004","unstructured":"Dingledine R, Mathewson N, Syverson P (2004) The second-generation onion router[R]. Naval Research Lab, Washington, DC"},{"key":"566_CR3","unstructured":"Danezis G, Diaz C (2008) A survey of anonymous communication channels[R]. Technical Report MSRTR- 2008-35, Microsoft Research"},{"key":"566_CR4","doi-asserted-by":"crossref","unstructured":"Sherry J, Lan C, Popa R (2015) Blindbox: Deep packet inspection over encrypted traffic. In: Proceedings of ACM Conference on Special Interest Group on Data Communication, SIGCOMM 2015, pp 213\u2013226","DOI":"10.1145\/2785956.2787502"},{"key":"566_CR5","doi-asserted-by":"crossref","unstructured":"Teuton J, Peterson E, Nordwall D et al (2013) LINEBACkER: Bio-inspired data reduction toward real time network traffic analysis. In: Proceedings of 2013 6th International Symposium on IEEE, pp 170\u2013174","DOI":"10.1109\/ISRCS.2013.6623771"},{"key":"566_CR6","unstructured":"Ranjan S, Robinson J, Chen F Machine learning based botnet detection using real-time connectivity graph based traffic features. U.S. Patent 8,762,298[P]. 2014-6-24"},{"key":"566_CR7","unstructured":"M\u00fcnz G, Li S, Carle G (2007) Traffic anomaly detection using k-means clustering. In: Proceedings of GI\/ITG Workshop MMBnet. pp 13\u201314"},{"key":"566_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.aap.2012.10.016","volume":"51","author":"J De O\u00f1a","year":"2013","unstructured":"De O\u00f1a J, L\u00f3pez G, Mujalli R et al (2013) Analysis of traffic accidents on rural highways using Latent Class Clustering and Bayesian Networks. Accid Anal Prev 51:1\u201310","journal-title":"Accid Anal Prev"},{"issue":"3","key":"566_CR9","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1109\/TETC.2014.2330519","volume":"2","author":"A Fahad","year":"2014","unstructured":"Fahad A, Alshatri N, Tari Z et al (2014) A survey of clustering algorithms for big data: Taxonomy and empirical analysis. IEEE Trans Emerg Top Comput 2(3):267\u2013279","journal-title":"IEEE Trans Emerg Top Comput"},{"issue":"1","key":"566_CR10","doi-asserted-by":"crossref","first-page":"85","DOI":"10.6339\/JDS.2005.03(1).192","volume":"3","author":"H Finch","year":"2005","unstructured":"Finch H (2005) Comparison of distance measures in cluster analysis with dichotomous data. J Data Sci 3(1):85\u2013100","journal-title":"J Data Sci"},{"issue":"8","key":"566_CR11","first-page":"387","volume":"5","author":"G Nath","year":"2016","unstructured":"Nath G, Kumar V, Reddy KS (2016) Scalable self-conscious spectral clustering. IJRCCT 5(8):387\u2013393","journal-title":"IJRCCT"},{"key":"566_CR12","unstructured":"Said AB, Hadjidj R, Foufou S (2015) Cluster validity index based on jeffrey divergence. Pattern Analysis and Applications, pp 1\u201311"},{"key":"566_CR13","unstructured":"Bauer KS, Sherr M, Grunwald D (2011) ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation. CSET"},{"issue":"017","key":"566_CR14","first-page":"57","volume":"3","author":"L Jiangtao","year":"2005","unstructured":"Jiangtao L, Yongling J (2005) Survey of P2P traffic identification and engineering technology. Telecommun Sci 3(017):57\u201361","journal-title":"Telecommun Sci"},{"issue":"1","key":"566_CR15","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/TDSC.2008.23","volume":"7","author":"S Peter","year":"2010","unstructured":"Peter S, Westhoff D, Castelluccia C (2010) A survey on the encryption of convergecast traffic with in-network processing. IEEE Trans Dependable Secure Comput 7(1):20\u201334","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"566_CR16","unstructured":"M\u00f6ller U, Cottrell L, Palfrader P, Sassaman L (2003) Mixmaster protocol\u0142version 2. Draft"},{"key":"566_CR17","unstructured":"Tor metrics portal[EB\/OL]. https:\/\/metrics.torproject.org\/:TheTorProject , 2013"},{"key":"566_CR18","doi-asserted-by":"crossref","unstructured":"Wang X, Shi J, Fang B et al (2013) An empirical analysis of family in the Tor network. In: Proceedings of the 2013 IEEE International Conference on Communications (ICC Conference on SIGCOMM]\/\/Communications (ICC). IEEE, pp 1995\u20132000","DOI":"10.1109\/ICC.2013.6654817"},{"issue":"7","key":"566_CR19","first-page":"1538","volume":"51","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Yang Q, Yang B, Wu Z (2014) A Tor Anonymous Communication System with Security. Enhancements[J]. J Comput Res Developement 51(7):1538\u20131546","journal-title":"J Comput Res Developement"},{"key":"566_CR20","first-page":"21","volume":"92","author":"X Feng","year":"2014","unstructured":"Feng X, Tianbo L, Puxin Y, Wanjiang H, Xiaomeng Z, Hongyu Y (2014) Designs of routerupdate and SOCKS proxy for Tor anonymous communication system[J]. WIT Trans Eng Sci 92:21\u201329","journal-title":"WIT Trans Eng Sci"},{"key":"566_CR21","unstructured":"John H, Amir H Bypassing Chinese Censorship without Proxies Using Cached Content"},{"key":"566_CR22","unstructured":"L7filter, application layer packet classifier for linux. http:\/\/l7-filter.sourceforge.net\/"},{"key":"566_CR23","unstructured":"Opendpi. http:\/\/code.google.com\/p\/opendpi\/"},{"issue":"2","key":"566_CR24","doi-asserted-by":"publisher","first-page":"56 C64","DOI":"10.1109\/MNET.2014.6786614","volume":"28","author":"W Donato","year":"2014","unstructured":"Donato W, Dainotti A et al (2014) Traffic identification engine: an open platform for traffic classification. IEEE Netw 28(2):56 C64","journal-title":"IEEE Netw"},{"key":"566_CR25","unstructured":"Arndt D. Calculating flow statistics using netmate. https:\/\/dan.arndt.ca\/nims\/calculating-flow-statistics-using-netmate\/"},{"key":"566_CR26","unstructured":"Sebastian Zander NW netai - network traffic based application identification. http:\/\/caia.swin.edu.au\/urp\/dstc\/netai\/"},{"issue":"1","key":"566_CR27","doi-asserted-by":"publisher","first-page":"5C16","DOI":"10.1145\/1198255.1198257","volume":"37","author":"M Crotti","year":"2007","unstructured":"Crotti M, Dusi M, Gringoli F, Salgarelli L (2007) Traffic classification through simple statistical fingerprinting. SIGCOMM Comput Commun Rev 37(1):5C16. doi: 10.1145\/1198255.1198257","journal-title":"SIGCOMM Comput Commun Rev"},{"key":"566_CR28","doi-asserted-by":"crossref","unstructured":"Jamil HA, Zarei R, Fadlelssied NO, Aliyu M, Nor SM, Marsono MN Analysis of features selection for p2p traffic detection using support vector machine. In: Proceedings of the 2013 International Conference of Information and Communication Technology(ICoICT), IEEE, 2013; 116C121","DOI":"10.1109\/ICoICT.2013.6574558"},{"issue":"1","key":"566_CR29","doi-asserted-by":"publisher","first-page":"223C 239","DOI":"10.1109\/TNN.2006.883010","volume":"18","author":"T Auld","year":"2007","unstructured":"Auld T, Moore AW, Gull SF (2007) Bayesian neural networks for internet traffic classification. IEEE Trans Neural Netw 18(1):223C 239","journal-title":"IEEE Trans Neural Netw"},{"key":"566_CR30","doi-asserted-by":"crossref","unstructured":"Zander S, Nguyen T, Armitage G Automated traffic classification and application identification using machine learning. 2005. 30th Anniversary. The IEEE Conference on Local Computer Networks, IEEE, 2005; 250C257","DOI":"10.1109\/LCN.2005.35"},{"key":"566_CR31","unstructured":"Xu K, Zhang M, Ye M, Qin Z, Westberg L, Westholmb T (2009) Ntrs:Afsm-based traffic identification system"},{"key":"566_CR32","doi-asserted-by":"publisher","first-page":"229C240","DOI":"10.1145\/1090191.1080119","volume":"35","author":"T Karagiannis","year":"2005","unstructured":"Karagiannis T, Papagiannaki K, Faloutsos M (2005) Blinc: multilevel traffic classification in the dark. ACM SIGCOMM Comput Commun Rev 35:229C240. ACM","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"issue":"6","key":"566_CR33","doi-asserted-by":"publisher","first-page":"849C863","DOI":"10.1016\/j.comnet.2008.11.005","volume":"53","author":"Y Hu","year":"2009","unstructured":"Hu Y, Chiu DM, Lui JC (2009) Profiling and identification of p2p traffic. Comput Netw 53(6):849C863. doi: 10.1016\/j.comnet.2008.11.005 . http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1389128608003848 , traffic Classification and Its Applications to Modern Networks","journal-title":"Comput Netw"},{"issue":"8","key":"566_CR34","first-page":"1866C1873","volume":"8","author":"J Yan","year":"2013","unstructured":"Yan J, Fan X (2013) Hfbp: Identifying p2p traffic by host level and flow level behavior profiles. J Netw 8(8):1866C1873","journal-title":"J Netw"},{"issue":"3","key":"566_CR35","doi-asserted-by":"publisher","first-page":"540C546","DOI":"10.3724\/SP.J.1001.2013.04253","volume":"24","author":"GF He","year":"2014","unstructured":"He GF, Yang M, Luo JZ, Zhang L (2014) Online identification of Tor anonymous communication traffic. J Softw 24(3):540C546. doi: 10.3724\/SP.J.1001.2013.04253","journal-title":"J Softw"},{"key":"566_CR36","first-page":"10","volume":"7","author":"A Alaeddin","year":"2015","unstructured":"Alaeddin A, Ali H, Jalal A (2015) A model for detecting tor encrypted traffic using supervised machine learning[J]. I J Comput Netw Inf Secur 7:10\u201323","journal-title":"I J Comput Netw Inf Secur"},{"issue":"3","key":"566_CR37","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: A survey. ACM Comput Surv (CSUR) 41(3):15","journal-title":"ACM Comput Surv (CSUR)"},{"key":"566_CR38","doi-asserted-by":"crossref","unstructured":"Arndt DJ, Zincir-Heywood AN (2011) A comparison of three machine learning techniques for encrypted network traffic analysis. In: Proceedings of 2011 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA), pp 107C114","DOI":"10.1109\/CISDA.2011.5945941"},{"key":"566_CR39","doi-asserted-by":"crossref","unstructured":"Wang Y, Zhang Z, Guo L, Li S (2011) Using entropy to classify traffic more deeply. In: Proceedings of 2011 6th IEEE International Conference on Networking, Architecture and Storage (NAS), pp 45C52","DOI":"10.1109\/NAS.2011.18"},{"key":"566_CR40","doi-asserted-by":"crossref","unstructured":"Silveira F, Diot C, Taft N, Govindan R (2010) ASTUTE: Detecting a different class of traffic anomalies. In: Proceedings of the ACM SIGCOMM 2010 Conference on SIGCOMM, pp 267\u2013278","DOI":"10.1145\/1851182.1851215"},{"key":"566_CR41","unstructured":"Bauer K S, Sherr M, Grunwald D (2011) ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation[C]. CSET"},{"key":"566_CR42","doi-asserted-by":"crossref","unstructured":"Kanda Y, Fukuda K, Sugawara T (2010) A flow analysis for mining traffic anoMalies. In: Proceedings of the IEEE International Conference on Communications, pp 23\u201327","DOI":"10.1109\/ICC.2010.5502463"},{"key":"566_CR43","doi-asserted-by":"crossref","unstructured":"Barker J, Hannay P, Szewczyk P (2011) Using traffic analysis to identify the second generation onion router. In: Proceedings IFIP 9th International Conference on Embedded and Ubiquitous Computing (EUC 2011), pp 72\u201378","DOI":"10.1109\/EUC.2011.76"},{"key":"566_CR44","unstructured":"Winter P, Lindskog S (2012) How the Great Firewall of China is Blocking Tor. In: Proceedings of 2nd USENIX Workshop on Free and Open Communications on the Internet, pp 1"},{"key":"566_CR45","doi-asserted-by":"crossref","unstructured":"Krawczyk H (2003) SIGMA: The SIGn-and-MAc\u2019approach to authenticated Diffie-Hellman and its use in the IKE protocols. In: Proceedings of 23rd Annual International Cryptology Conference, pp. 400\u2013425. Deri L and PF RING M http:\/\/www.ntop.Org[J].PFRING.html","DOI":"10.1007\/978-3-540-45146-4_24"},{"key":"566_CR46","unstructured":"Deri L (2011) PF RING M http:\/\/www.ntop.Org[J].PFRING.html"},{"key":"566_CR47","doi-asserted-by":"publisher","unstructured":"Wang J, Liu A, Yan T, Zeng Z A Resource Allocation Model Based on Double-sided Combinational Auctions for Transparent Computing, Peer-to-Peer Networking and Applications. Applications. doi: 10.1007\/s12083-017-0556-6","DOI":"10.1007\/s12083-017-0556-6"},{"key":"566_CR48","doi-asserted-by":"publisher","unstructured":"Liu Y, Liu A, Li Y, Li Z, Choi Y-J, Sekiya H, Li J (2017) APMD: A fast data transmission protocol with reliability guarantee for pervasive sensing data communication. Pervasive and Mobile Computing. doi: 10.1016\/j.pmcj.2017.03.012","DOI":"10.1016\/j.pmcj.2017.03.012"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-017-0566-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-017-0566-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-017-0566-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T20:17:03Z","timestamp":1719260223000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-017-0566-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,16]]},"references-count":48,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,5]]}},"alternative-id":["566"],"URL":"https:\/\/doi.org\/10.1007\/s12083-017-0566-4","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,6,16]]},"assertion":[{"value":"17 March 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 April 2017","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 June 2017","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}