{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T19:34:32Z","timestamp":1773776072085,"version":"3.50.1"},"reference-count":72,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100006769","name":"Russian Science Foundation","doi-asserted-by":"publisher","award":["21-79-10431"],"award-info":[{"award-number":["21-79-10431"]}],"id":[{"id":"10.13039\/501100006769","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3191431","type":"journal-article","created":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T19:35:54Z","timestamp":1657913754000},"page":"77883-77897","source":"Crossref","is-referenced-by-count":18,"title":["Is Encrypted ClientHello a Challenge for Traffic Classification?"],"prefix":"10.1109","volume":"10","author":[{"given":"Danil","family":"Shamsimukhametov","sequence":"first","affiliation":[{"name":"Wireless Networks Laboratory, Institute for Information Transmission Problems of the Russian Academy of Sciences, Moscow, Russia"}]},{"given":"Anton","family":"Kurapov","sequence":"additional","affiliation":[{"name":"Wireless Networks Laboratory, Institute for Information Transmission Problems of the Russian Academy of Sciences, Moscow, Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2674-7674","authenticated-orcid":false,"given":"Mikhail","family":"Liubogoshchev","sequence":"additional","affiliation":[{"name":"Wireless Networks Laboratory, Institute for Information Transmission Problems of the Russian Academy of Sciences, Moscow, Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5541-4671","authenticated-orcid":false,"given":"Evgeny","family":"Khorov","sequence":"additional","affiliation":[{"name":"Wireless Networks Laboratory, Institute for Information Transmission Problems of the Russian Academy of Sciences, Moscow, Russia"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"HTTPS Encryption on the Web","year":"2022"},{"key":"ref2","volume-title":"Let\u2019s Encrypt Stats","year":"2021"},{"key":"ref3","volume-title":"Encrypted Server Name Indication for TLS 1.3","author":"Rescorla","year":"2019"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/EnT50460.2021.9681767"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131376"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/4707909"},{"key":"ref7","first-page":"1","article-title":"On the importance of encrypted-SNI (ESNI) to censorship circumvention","volume-title":"Proc. 9th USENIX Workshop Free Open Commun. Internet (FOCI)","author":"Chai"},{"key":"ref8","volume-title":"TLS Encrypted Client Hello","author":"Rescorla","year":"2022"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.05.035"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108472"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8446"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-23483-7_435"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/springerreference_538"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8701"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8484"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2962018"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.40"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.1900366"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102711"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9020324"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-017-0306-6"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140423"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23456"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355601"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-016-0030-7"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23511"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228647"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2996758.2996768"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2016.7785325"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098163"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-8059-5_13"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.02.010"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2016.016"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422958"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.9735\/2229-3981"},{"issue":"11","key":"ref36","first-page":"1","article-title":"The applications of deep learning on traffic identification","volume":"24","author":"Wang","year":"2015","journal-title":"BlackHat USA"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3991\/ijet.v13i04.8466"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004872"},{"key":"ref40","volume-title":"ISCX VPN-nonVPN Encrypted Network Traffic Dataset","year":"2022"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04030-2"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2018.00074"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2019.2940675"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2019.00071"},{"key":"ref45","volume-title":"HTTPs Websites Dataset","author":"Shbair","year":"2016"},{"key":"ref46","article-title":"Deep learning for network traffic classification","author":"Bayat","year":"2021","journal-title":"arXiv:2106.12693"},{"key":"ref47","volume-title":"Encrypt That SNI: Firefox Edition","year":"2021"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6066"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7301"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7366"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7627"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6520"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.17487\/rfc9149"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8879"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8449"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4681"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8422"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7250"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5746"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7685"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5077"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7924"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6961"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8472"},{"key":"ref65","volume-title":"The HTTP Archive Tracks How the Web is Built","year":"2022"},{"key":"ref66","volume-title":"Splitcap","year":"2021"},{"key":"ref67","volume-title":"Scapy: Packet Crafting for Python2 and Python3","year":"2021"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.17487\/RFC9000"},{"key":"ref69","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"Pedregosa","year":"2011","journal-title":"J. Mach. Learn. Res."},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-020-2649-2"},{"key":"ref71","volume-title":"Keras","author":"Chollet","year":"2015"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2004.843247"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09830745.pdf?arnumber=9830745","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T06:30:31Z","timestamp":1706769031000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9830745\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":72,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3191431","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}