{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T17:42:27Z","timestamp":1771954947097,"version":"3.50.1"},"reference-count":50,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,15]],"date-time":"2021-10-15T00:00:00Z","timestamp":1634256000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,15]],"date-time":"2021-10-15T00:00:00Z","timestamp":1634256000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,15]],"date-time":"2021-10-15T00:00:00Z","timestamp":1634256000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,15]]},"DOI":"10.1109\/ccci52664.2021.9583191","type":"proceedings-article","created":{"date-parts":[[2021,10,27]],"date-time":"2021-10-27T16:06:55Z","timestamp":1635350815000},"page":"1-7","source":"Crossref","is-referenced-by-count":11,"title":["A Survey of Encrypted Malicious Traffic Detection"],"prefix":"10.1109","author":[{"given":"Yanmiao","family":"Li","sequence":"first","affiliation":[]},{"given":"Hao","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Jiangang","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Tongqing","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Zhi","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"128","article-title":"Intelligent detection method on network malicious traffic based on sample enhancement [J]","volume":"41","author":"chen","year":"2020","journal-title":"Journal on Communications"},{"key":"ref38","first-page":"155","article-title":"Multitier ensemble classifiers for malicious network traffic detection [J]","volume":"39","author":"wang","year":"2018","journal-title":"Journal on Communications"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800819"},{"key":"ref32","article-title":"Research on Detection of Malicious Traffic in High-Speed Network","author":"ruan","year":"2010","journal-title":"2010 National Conference on communication security [C]"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICISSEC.2016.7885840"},{"key":"ref30","first-page":"66","article-title":"Survey of encrypted malicious traffic detection based on deep learning [J]","volume":"6","author":"zhai","year":"2020","journal-title":"Chinese Journal of Network and Information Security"},{"key":"ref37","year":"2020","journal-title":"UCI KDD Archive[EB\/OL]"},{"key":"ref36","year":"2020","journal-title":"2000 DARPA Intrusion Detection Scenario Specific Datasets &#x2014; MIT Lincoln Laboratory[EB\/OL]"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.5220\/0005740704070414"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC47524.2020.9031116"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2019.00020"},{"key":"ref29","first-page":"221","article-title":"Convolutional Neural Networks for Classification of Malware Assembly Code[M]","author":"gibert","year":"2017","journal-title":"Frontiers in Artificial Intelligence and Applications"},{"key":"ref2","year":"2020","journal-title":"Let&#x2019;s Encrypt Stats - Let&#x2019;s Encrypt - Free SSL\/TLS Certificates[EB\/OL]"},{"key":"ref1","year":"2020","journal-title":"Cisco ETA - Provides Solution for Detecting Malware in Encrypted Traffic[EB\/OL]"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/app8112196"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2609907"},{"key":"ref21","article-title":"detecting-apt-activity-with-network-traffic-analysis-whitepaper-en[J]","author":"villeneuve","year":"0"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800819"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2996758.2996768"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148798"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004872"},{"key":"ref50","year":"2020","journal-title":"Network security level protection system 2 0 standard officially released&#x2013;IT&#x2013;People&#x2019;s Network [EB\/OL]"},{"key":"ref10","year":"2020","journal-title":"Detection of Encrypted Communication Traffic of Malware - Know [EB\/OL]"},{"key":"ref11","year":"2020","journal-title":"A report on the first detection engine for encrypted traffic in China - Know [EB\/OL]"},{"key":"ref40","first-page":"24","article-title":"HTTP malicious traffic detection method based on hybrid structure deep neural network [J]","volume":"40","author":"li","year":"2019","journal-title":"Journal on Communications"},{"key":"ref12","year":"2020","journal-title":"Behind the &#x201C;private domain flow&#x201D; the interests promote the black industry chain and malicious marketing is rampant - Know [EB\/OL]"},{"key":"ref13","year":"0","journal-title":"Introducing Stealth Malware Taxonomy"},{"key":"ref14","article-title":"A Review of Malicious Traffic Feature Extraction [J]","author":"lu","year":"0"},{"key":"ref15","first-page":"114","article-title":"The principle and defense of CC attack [J]","author":"liu","year":"2016","journal-title":"Computer knowledge and technology(experience skill)"},{"key":"ref16","year":"2020","journal-title":"2017 Internet Security Threat Report[EB\/OL]"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3097766.3097771"},{"key":"ref18","first-page":"358","author":"okada","year":"2011","journal-title":"Comparisons of Machine Learning Algorithms for Application Identification of Encrypted Traffic[M]"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.5120\/16286-6185"},{"key":"ref4","year":"2020","journal-title":"SSL Traffic Growth - Malware is Moving Heavily to HTTPS - Cyren[EB\/OL]"},{"key":"ref3","year":"2020","journal-title":"HTTPS Encryption mechanism - SXISZERO - Blog Garden [EB\/OL]"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1080\/15361055.2020.1820804"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298977"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1080\/03610918.2018.1511806"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1360\/jos180967"},{"key":"ref46","first-page":"139","article-title":"A learning algorithm for over fitting of BP network [J]","author":"wu","year":"2008","journal-title":"Journal of Southeast University (Natural Science Edition)"},{"key":"ref45","article-title":"Learning representations by back-propagating errors[J]","author":"e r d","year":"0"},{"key":"ref48","year":"2020","journal-title":"ROC Precision Recall TPR FPR Understanding - Brief Book [EB\/OL]"},{"key":"ref47","year":"2020","journal-title":"Explanation of TP TN FP and FN Guyubit&#x2019;s blog CSDN blog [EB\/OL]"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.01.064"},{"key":"ref41","first-page":"77","article-title":"Scheme for identifying malware traffic with TLS data based on machine learning [J]","volume":"6","author":"luo","year":"2020","journal-title":"Chinese Journal of Network and Information Security"},{"key":"ref44","article-title":"Detailed explanation of cross entropy loss function principle Cigar-CSDNBlog Cross entropy loss function [EB\/OL]","year":"2020"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2018.8539519"}],"event":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","location":"Beijing, China","start":{"date-parts":[[2021,10,15]]},"end":{"date-parts":[[2021,10,17]]}},"container-title":["2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9583171\/9583183\/09583191.pdf?arnumber=9583191","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:55:50Z","timestamp":1652187350000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9583191\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,15]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/ccci52664.2021.9583191","relation":{},"subject":[],"published":{"date-parts":[[2021,10,15]]}}}