{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T01:14:00Z","timestamp":1752282840666,"version":"3.28.0"},"reference-count":49,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T00:00:00Z","timestamp":1641945600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T00:00:00Z","timestamp":1641945600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,1,12]]},"DOI":"10.1109\/icoin53446.2022.9687165","type":"proceedings-article","created":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T21:55:09Z","timestamp":1643320509000},"page":"18-23","source":"Crossref","is-referenced-by-count":5,"title":["TMorph: A Traffic Morphing Framework to Test Network Defenses Against Adversarial Attacks"],"prefix":"10.1109","author":[{"given":"Zhenning","family":"Xu","sequence":"first","affiliation":[]},{"given":"Hassan","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Radu","family":"Muresan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.005"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.12.012"},{"journal-title":"Ntop","year":"2021","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2894290"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1882-5_19"},{"year":"2016","key":"ref30"},{"journal-title":"Rapid7","year":"2021","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6639362"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"journal-title":"Palo alto firewall","year":"2021","key":"ref34"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665944"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/NaNA.2019.00043"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2930717"},{"journal-title":"Malware analysis dataset","year":"2021","key":"ref2"},{"journal-title":"Internet traffic classification","year":"2021","key":"ref1"},{"key":"ref20","first-page":"239","article-title":"Autofuzz: Automated network protocol fuzzing framework","volume":"10","author":"gorbunov","year":"2010","journal-title":"International Journal of Computer Science and Network Security"},{"key":"ref22","article-title":"Ip over voice-over-ip for censorship circumvention","author":"houmansadr","year":"2012","journal-title":"arXiv preprint arXiv 1207 2683"},{"key":"ref21","article-title":"Bypassing firewalls: tools and techniques","author":"hill","year":"2000","journal-title":"12th Annual First Conference"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/UBMK.2019.8907177"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328749"},{"key":"ref26","article-title":"Advanced polymorphic worms: Evading ids by blending in with normal traffic","author":"kolesnikov","year":"2005","journal-title":"Technical report Georgia Institute of Technology"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP49622.2020.9259387"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08506-7_1"},{"key":"ref11","article-title":"Evasion techniques: Sneaking through your intrusion detection\/prevention systems","volume":"14","author":"tsung-huan","year":"2011","journal-title":"IEEE Communications Surveys & Tutorials"},{"journal-title":"Yazan Siam","year":"2013","key":"ref40"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(99)80115-1"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3424155"},{"key":"ref14","article-title":"ndpi: Opensource high-speed deep packet inspection","author":"deri","year":"2014","journal-title":"In 2014 International Wireless Communications and Mobile Computing Conference"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516657"},{"key":"ref16","article-title":"Marionette: A programmable network traffic obfuscation system","author":"dyer","year":"2015","journal-title":"24th USENIX Security Symp"},{"key":"ref17","first-page":"241","article-title":"Polymorphic blending attacks","author":"fogla","year":"2006","journal-title":"In USENIX Security Symposium"},{"key":"ref18","article-title":"Intrusion detection evasion techniques and case studies","author":"gibbs","year":"2017","journal-title":"SANS Institute"},{"journal-title":"HTTPS encryption on the web","year":"2020","key":"ref19"},{"journal-title":"Trickbot dataset","year":"2021","key":"ref4"},{"journal-title":"Snort (software)","year":"2021","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098163"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346858"},{"key":"ref8","article-title":"Packet generation and network based attacks with scapy","author":"biondi","year":"2005","journal-title":"CanSecWest\/core05"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC47524.2020.9031116"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3386367.3431311"},{"key":"ref9","article-title":"Flame: A flow-level anomaly modeling engine","author":"brauckhoff","year":"2008","journal-title":"CSET"},{"key":"ref46","article-title":"Dust: A blocking-resistant internet transport protocol","author":"wiley","year":"2011","journal-title":"Technical Report"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382212"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SmartCloud.2019.00032"},{"year":"2015","author":"zalewski","key":"ref47"},{"key":"ref42","first-page":"8","article-title":"Towards systematic evaluation of the evadability of bot\/botnet detection methods","author":"stinson","year":"2008","journal-title":"USENIX Workshop on Offensive Technologies (WOOT)"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1080\/03064220701738651"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599855"}],"event":{"name":"2022 International Conference on Information Networking (ICOIN)","start":{"date-parts":[[2022,1,12]]},"location":"Jeju-si, Korea, Republic of","end":{"date-parts":[[2022,1,15]]}},"container-title":["2022 International Conference on Information Networking (ICOIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9687102\/9687106\/09687165.pdf?arnumber=9687165","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T21:26:59Z","timestamp":1650922019000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9687165\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,12]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/icoin53446.2022.9687165","relation":{},"subject":[],"published":{"date-parts":[[2022,1,12]]}}}