{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T04:16:33Z","timestamp":1775016993648,"version":"3.50.1"},"reference-count":39,"publisher":"Pleiades Publishing Ltd","issue":"4","license":[{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Program Comput Soft"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1134\/s0361768821040058","type":"journal-article","created":{"date-parts":[[2021,7,30]],"date-time":"2021-07-30T04:08:05Z","timestamp":1627618085000},"page":"249-260","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Model of Pseudo-Random Sequences Generated by Encryption and Compression Algorithms"],"prefix":"10.1134","volume":"47","author":[{"given":"A. V.","family":"Kozachok","sequence":"first","affiliation":[]},{"given":"A. A.","family":"Spirin","sequence":"additional","affiliation":[]}],"member":"137","published-online":{"date-parts":[[2021,7,30]]},"reference":[{"key":"3597_CR1","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/TNSM.2020.2967721","volume":"17","author":"D.C. Le","year":"2020","unstructured":"Le, D.C., Zincir-Heywood, N., and Heywood, M.I., Analyzing data granularity levels for insider threat detection using machine learning, IEEE Trans. Network Serv. Manage., 2020, vol. 17, no. 1, pp. 30\u201344.","journal-title":"IEEE Trans. Network Serv. Manage."},{"key":"3597_CR2","unstructured":"Bhatiaa, A., Bahugunaa, A.A., Tiwaria, K., Haribabua, K., and Vishwakarmab, D., A survey on analyzing encrypted network traffic of mobile devices, arXiv preprint, 2020."},{"key":"3597_CR3","doi-asserted-by":"publisher","unstructured":"Mamun, M.S.I., Ghorbani, A.A., and Stakhanova, N., An entropy based encrypted traffic classifier, Lecture Notes Comput. Sci. 2015, vol. 9543. https:\/\/doi.org\/10.1007\/978-3-319-29814-6_23","DOI":"10.1007\/978-3-319-29814-6_23"},{"key":"3597_CR4","doi-asserted-by":"publisher","first-page":"1830","DOI":"10.1109\/TIFS.2017.2692682","volume":"12","author":"M. Shen","year":"2017","unstructured":"Shen, M., Wei, M., Zhu, L., and Wang, M., Classification of encrypted traffic with second-order Markov chains and application attribute bigrams, IEEE Trans. Inf. Forensics Secur., 2017, vol. 12, no. 8, pp. 1830\u20131843. https:\/\/doi.org\/10.1109\/TIFS.2017.2692682","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"3597_CR5","doi-asserted-by":"publisher","unstructured":"Zhang, Z., Kang, C., Fu, P., Cao, Z., Li, Z., and Xiong, G., Metric learning with statistical features for network traffic classification, Proc. IEEE 36th Int. Performance Computing and Communications Conf. (IPCCC), San Diego, 2017, pp. 1\u20137. https:\/\/doi.org\/10.1109\/PCCC.2017.8280467","DOI":"10.1109\/PCCC.2017.8280467"},{"key":"3597_CR6","doi-asserted-by":"publisher","unstructured":"Yang, Y., Kang, C., Gou, G., Li, Z., and Xiong, G., TLS\/SSL encrypted traffic classification with autoencoder and convolutional neural network, Proc. IEEE 20th Int. Conf. High Performance Computing and Communications; Proc. IEEE 16th Int. Conf. Smart City; Proc. IEEE 4th Int. Conf. Data Science and Systems (HPCC\/SmartCity\/DSS), Exeter, United Kingdom, 2018, pp. 362\u2013369. https:\/\/doi.org\/10.1109\/HPCC\/SmartCity\/DSS.2018.00079","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2018.00079"},{"key":"3597_CR7","doi-asserted-by":"publisher","unstructured":"Chen, Y., Zang, T., Zhang, Y., Zhouz, Y., and Wang, Y., Rethinking encrypted traffic classification: A multi-attribute associated fingerprint approach, Proc. IEEE 27th Int. Conf. Network Protocols (ICNP), Chicago, 2019, pp. 1\u201311. https:\/\/doi.org\/10.1109\/ICNP.2019.8888043","DOI":"10.1109\/ICNP.2019.8888043"},{"key":"3597_CR8","doi-asserted-by":"publisher","first-page":"54024","DOI":"10.1109\/ACCESS.2019.2912896","volume":"7","author":"P. Wang","year":"2019","unstructured":"Wang, P., Chen, X., Ye, F., and Sun, Z., A survey of techniques for mobile service encrypted traffic classification using deep learning, IEEE Access, 2019, vol. 7, pp. 54024\u201354033. https:\/\/doi.org\/10.1109\/ACCESS.2019.2912896","journal-title":"IEEE Access"},{"key":"3597_CR9","doi-asserted-by":"publisher","first-page":"845","DOI":"10.24507\/ijicic.15.03.845","volume":"15","author":"Z. Tang","year":"2019","unstructured":"Tang, Z., Zeng, X., and Sheng, Y., Entropy-based feature extraction algorithm for encrypted and non-encrypted compressed traffic classification, Int. J. ICIC, 2019, vol. 15, no. 3, pp. 845\u2013860. https:\/\/doi.org\/10.24507\/ijicic.15.03.845","journal-title":"Int. J. ICIC"},{"key":"3597_CR10","doi-asserted-by":"publisher","unstructured":"Obasi, T.C., Encrypted network traffic classification using ensemble learning techniques, PhD Dissertation, Carleton Univ., 2020. https:\/\/doi.org\/10.22215\/etd\/2020-14171","DOI":"10.22215\/etd\/2020-14171"},{"key":"3597_CR11","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1007\/s11042-019-08088-w","volume":"79","author":"P. Choudhury","year":"2020","unstructured":"Choudhury, P., Kumar, K.P., Nandi, S., and Athithan, G., An empirical approach towards characterization of encrypted and unencrypted VoIP traffic, Multimedia Tools Appl., 2020, vol. 79, nos. 1\u20132, pp. 603\u2013631. https:\/\/doi.org\/10.1007\/s11042-019-08088-w","journal-title":"Multimedia Tools Appl."},{"key":"3597_CR12","doi-asserted-by":"publisher","first-page":"102711","DOI":"10.1016\/j.jnca.2020.102711","volume":"166","author":"Z. Yao","year":"2020","unstructured":"Yao, Z., Ge, J., Wu, Y., Lin, X., He, R., and Ma, Y., Encrypted traffic classification based on Gaussian mixture models and hidden Markov models, J. Network Comput. Appl., 2020, vol. 166, p. 102711. https:\/\/doi.org\/10.1016\/j.jnca.2020.102711","journal-title":"J. Network Comput. Appl."},{"key":"3597_CR13","doi-asserted-by":"publisher","first-page":"1576","DOI":"10.3390\/sym12091576","volume":"12","author":"G. Baldini","year":"2020","unstructured":"Baldini, G., Hernandez-Ramos, J.L., Nowak, S., Neisse, R., and Nowak, M., Mitigation of privacy threats due to encrypted traffic analysis through a policy-based framework and mud profiles, Symmetry, 2020, vol. 12, no. 9, p. 1576. https:\/\/doi.org\/10.3390\/sym12091576","journal-title":"Symmetry"},{"key":"3597_CR14","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MNET.011.1900366","volume":"34","author":"M. Shen","year":"2020","unstructured":"Shen, M., Liu, Y., Zhu, L., Xu, K., Du, X., and Guizani, N., Optimizing feature selection for efficient encrypted traffic classification: A systematic approach, IEEE Network, 2020, vol. 34, no. 4, pp. 20\u201327. https:\/\/doi.org\/10.1109\/MNET.011.1900366","journal-title":"IEEE Network"},{"key":"3597_CR15","doi-asserted-by":"publisher","unstructured":"Panchenko, A., Lanze, F., Pennekamp, J., Engel, T., Zinnen, A., Henze, M., and Wehrle, K., Website fingerprinting at Internet scale, Proc. Network and Distributed System Security Symp., 2016, pp. 21\u201324. https:\/\/doi.org\/10.14722\/ndss.2016.23477","DOI":"10.14722\/ndss.2016.23477"},{"key":"3597_CR16","doi-asserted-by":"publisher","unstructured":"Wei, S., Ding, Y., and Han, X., TDSC: Two-stage DDoS detection and defense system based on clustering, Proc. 47th Annu. IEEE\/IFIP Int. Conf. Dependable Systems and Networks Workshops (DSN-W), 2017, pp.\u00a0101\u2013102. https:\/\/doi.org\/10.1109\/DSN-W.2017.11","DOI":"10.1109\/DSN-W.2017.11"},{"key":"3597_CR17","doi-asserted-by":"publisher","first-page":"132502","DOI":"10.1109\/ACCESS.2020.3009733","volume":"8","author":"K.S. Sahoo","year":"2020","unstructured":"Sahoo, K.S., Tripathy, B.K., Naik, K., Ramasubbareddy, S., Balusamy, B., Khari, M., and Burgos, D., An evolutionary SVM model for DDoS attack detection in software defined networks, IEEE Access, 2020, vol. 8, pp. 132502\u2013132513. https:\/\/doi.org\/10.1109\/ACCESS.2020.3009733","journal-title":"IEEE Access"},{"key":"3597_CR18","doi-asserted-by":"publisher","first-page":"012064","DOI":"10.1088\/1742-6596\/1203\/1\/012064","volume":"1203","author":"E.V. Grechishnikov","year":"2019","unstructured":"Grechishnikov, E.V., Dobryshin, M.M., Kochedykov, S.S., and Novoselcev, V.I., Algorithmic model of functioning of the system to detect and counter cyber attacks on virtual private network, J. Phys.: Conf. Ser., 2019, vol. 1203, no. 1, p. 012064. https:\/\/doi.org\/10.1088\/1742-6596\/1203\/1\/012064","journal-title":"J. Phys.: Conf. Ser."},{"key":"3597_CR19","unstructured":"Dobryshin, M.M., Proposal for improving systems for countering DDoS attacks, Telekommunikatsii, 2018, no. 10, pp. 32\u201338."},{"key":"3597_CR20","unstructured":"Dobryshin, M.M., Spirin, A.A., and Laktionov, A.D., Proposals for early detection of Botnet destructive effects on computer communication networks, Telekommunikatsii, 2020, no. 12, pp. 25\u201329."},{"key":"3597_CR21","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1109\/JSAC.2018.2815442","volume":"36","author":"L. Zhu","year":"2018","unstructured":"Zhu, L., Tang, X., Shen, M., Du, X., and Guizani, M., Privacy-preserving DDoS attack detection using cross-domain traffic in software defined networks, IEEE J. Sel. Areas Commun., 2018, vol. 36, no. 3, pp. 628\u2013643. https:\/\/doi.org\/10.1109\/JSAC.2018.2815442","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"3597_CR22","doi-asserted-by":"publisher","first-page":"2553","DOI":"10.1109\/TIFS.2018.2823697","volume":"13","author":"F. Wang","year":"2018","unstructured":"Wang, F., Quach, T.T., Wheeler, J., Aimone, J.B., and James, C.D., Sparse coding for n-gram feature extraction and training for file fragment classification, IEEE Trans. Inf. Forensics Secur., 2018, vol. 13, no. 10, pp. 2553\u20132562. https:\/\/doi.org\/10.1109\/TIFS.2018.2823697","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"3597_CR23","doi-asserted-by":"publisher","first-page":"6","DOI":"10.15394\/jdfsl.2017.1472","volume":"12","author":"K. Karampidis","year":"2017","unstructured":"Karampidis, K. and Papadourakis, G., File type identification-computational intelligence for digital forensics, J. Digital Forensics, \n               Secur. Law, 2017, vol. 12, no. 2, p. 6. https:\/\/doi.org\/10.15394\/jdfsl.2017.1472","journal-title":"Secur. Law"},{"key":"3597_CR24","doi-asserted-by":"publisher","first-page":"15","DOI":"10.17562\/PB-56-2","volume":"56","author":"K. Karampidis","year":"2017","unstructured":"Karampidis, K., Kavallieratou, E., and Papadourakis, G., Comparison of classification algorithms for file type detection: A digital forensics perspective, Polybits, 2017, vol. 56, pp. 15\u201320. https:\/\/doi.org\/10.17562\/PB-56-2","journal-title":"Polybits"},{"key":"3597_CR25","doi-asserted-by":"publisher","first-page":"1117","DOI":"10.3103\/S0146411618080345","volume":"52","author":"A.V. Kozachok","year":"2018","unstructured":"Kozachok, A.V., Development of a heuristic mechanism for detection of malware programs based on hidden Markov models, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1117\u20131123. https:\/\/doi.org\/10.3103\/S0146411618080345","journal-title":"Autom. Control Comput. Sci."},{"key":"3597_CR26","unstructured":"Srinivas, M., Nayak, A., and Bhatt, A., Forged file detection and steganographic content identification (FFDASCI) using deep learning techniques, 2019. http:\/\/ceur-ws.org\/Vol-2380\/paper_142.pdf."},{"key":"3597_CR27","doi-asserted-by":"publisher","unstructured":"Konaray, S.K., Toprak, A., Pek, G.M., Ak\u00e7ekoce, H., and K\u0131l\u0131n\u00e7, D., Detecting file types using machine learning algorithms, Proc. Innovations in Intelligent Systems and Applications Conf., 2019, pp. 1\u20134. https:\/\/doi.org\/10.1109\/ASYU48272.2019.8946393","DOI":"10.1109\/ASYU48272.2019.8946393"},{"key":"3597_CR28","doi-asserted-by":"publisher","first-page":"2916","DOI":"10.1109\/TIFS.2019.2911156","volume":"14","author":"F. Casino","year":"2019","unstructured":"Casino, F., Choo, K.K.R., and Patsakis, C., Hedge: Efficient traffic classification of encrypted and compressed packets, IEEE Trans. Inf. Forensics Secur., 2019, vol. 14, no. 11, pp. 2916\u20132926. https:\/\/doi.org\/10.1109\/TIFS.2019.2911156","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"3597_CR29","doi-asserted-by":"publisher","unstructured":"De Gaspari, F., Hitaj, D., Pagnotta, G., De Carli, L., and Mancini, L.V., EnCoD: Distinguishing compressed and encrypted file fragments, Proc. Int. Conf. Network and System Security, Springer, 2020, pp. 42\u201362. https:\/\/doi.org\/10.1007\/978-3-030-65745-1_3","DOI":"10.1007\/978-3-030-65745-1_3"},{"key":"3597_CR30","doi-asserted-by":"publisher","unstructured":"Mousavi, S.S., Detecting disk sectors data types using hidden Markov model, Proc. 17th Int. ISC Conf. Information Security and Cryptology (ISCISC), 2020, pp. 60\u201364. https:\/\/doi.org\/10.1109\/ISCISC51277.2020.9261906","DOI":"10.1109\/ISCISC51277.2020.9261906"},{"key":"3597_CR31","doi-asserted-by":"crossref","unstructured":"Cheng, L., Liu, F., and Yao, D., Enterprise data breach: Causes, challenges, prevention, and future directions, Wiley Interdiscip. Rev.: Data Mining Knowl. Discovery, 2017, vol. 7, no. 5.","DOI":"10.1002\/widm.1211"},{"key":"3597_CR32","doi-asserted-by":"crossref","unstructured":"Doroud, H., et al., Speeding-up DPI traffic classification with chaining, Proc. IEEE Global Communications Conf. (GLOBECOM), 2018.","DOI":"10.1109\/GLOCOM.2018.8648137"},{"key":"3597_CR33","unstructured":"Hahn, D., Apthorpe, N., and Feamster, N., Detecting compressed cleartext traffic from consumer Internet of Things devices, arXiv preprint, 2018."},{"key":"3597_CR34","doi-asserted-by":"crossref","unstructured":"Wood, D., Apthorpe, N., and Feamster, N., Cleartext data transmissions in consumer IoT medical devices, Proc. Workshop Internet of Things Security and Privacy, 2017.","DOI":"10.1145\/3139937.3139939"},{"key":"3597_CR35","doi-asserted-by":"publisher","unstructured":"Scaife, N., Carter, H., Traynor, P., and Butler, K.R., Cryptolock (and drop it): Stopping ransomware attacks on user data, Proc. IEEE 36th Int. Conf. Distributed Computing Systems (ICDCS), 2016, pp. 303\u2013312. https:\/\/doi.org\/10.1109\/ICDCS.2016.46","DOI":"10.1109\/ICDCS.2016.46"},{"key":"3597_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11416-016-0283-1","volume":"14","author":"E. Raff","year":"2018","unstructured":"Raff, E., Zak, R., Cox, R., Sylvester, J., Yacci, P., Ward, R., and Nicholas, C., An investigation of byte n-gram features for malware classification, J. Comput. Virology Hacking Tech., 2018, vol. 14, no. 1, pp. 1\u201320. https:\/\/doi.org\/10.1007\/s11416-016-0283-1","journal-title":"J. Comput. Virology Hacking Tech."},{"key":"3597_CR37","doi-asserted-by":"publisher","unstructured":"Kozachok, A.V. and Spirin, A.A., Algorithm for classification of pseudo-random sequences, Vestn. Voronezh. Gos. Univ., Ser.: Sist. Anal. Inf. Tekhnol., 2020, no. 1, pp.\u00a087\u201398. https:\/\/doi.org\/10.17308\/sait.2020.1\/2595","DOI":"10.17308\/sait.2020.1\/2595"},{"key":"3597_CR38","first-page":"55","volume":"23","author":"A.V. Kozachok","year":"2020","unstructured":"Kozachok, A.V., Spirin, A.A., and Golembiovskaya, O.M., Algorithm for classification of pseudo-random sequences based on random forest, Dokl. Tomsk. \n               Gos. Univ. Sist. Upr. Radioelektron., 2020, vol. 23, no. 3, pp.\u00a055\u201360.","journal-title":"Gos. Univ. Sist. Upr. Radioelektron."},{"key":"3597_CR39","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/s11416-017-0309-3","volume":"14","author":"A.V. Kozachok","year":"2018","unstructured":"Kozachok, A.V. and Kozachok, V.I., Construction and evaluation of the new heuristic malware detection mechanism based on executable files static analysis, J. Comput. Virology Hacking Tech., 2018, vol. 14, no. 3, pp. 225\u2013231. https:\/\/doi.org\/10.1007\/s11416-017-0309-3","journal-title":"J. Comput. Virology Hacking Tech."}],"container-title":["Programming and Computer Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768821040058.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1134\/S0361768821040058","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768821040058.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T02:41:21Z","timestamp":1775011281000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1134\/S0361768821040058"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7]]},"references-count":39,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["3597"],"URL":"https:\/\/doi.org\/10.1134\/s0361768821040058","relation":{},"ISSN":["0361-7688","1608-3261"],"issn-type":[{"value":"0361-7688","type":"print"},{"value":"1608-3261","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7]]},"assertion":[{"value":"3 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 March 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 March 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 July 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}