{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:15:38Z","timestamp":1766268938713,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,20]],"date-time":"2018-06-20T00:00:00Z","timestamp":1529452800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,20]]},"DOI":"10.1145\/3226052.3226057","type":"proceedings-article","created":{"date-parts":[[2018,6,27]],"date-time":"2018-06-27T12:22:47Z","timestamp":1530102167000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Encrypted Traffic Identification Based on N-gram Entropy and Cumulative Sum Test"],"prefix":"10.1145","author":[{"given":"Guang","family":"Cheng","sequence":"first","affiliation":[{"name":"School of Cyber Science and Engineering, Southeast University, China, Key Laboratory of Computer Network and Information, Integration, Ministry of Education, China"}]},{"given":"Ying","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Southeast University, China, Key Laboratory of Computer Network and Information, Integration, Ministry of Education, China"}]}],"member":"320","published-online":{"date-parts":[[2018,6,20]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1109\/ICSMC.2007.4414006"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1109\/PST.2008.15"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/CICYBS.2009.4925105"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/2996758.2996768"},{"key":"e_1_3_2_1_5_1","volume-title":"Deciphering Malware's use of TLS (without Decryption). Journal of Computer Virology and Hacking Techniques","author":"Anderson Blake","year":"2016","unstructured":"Blake Anderson , Subharthi Paul , and David McGrew . 2016. Deciphering Malware's use of TLS (without Decryption). Journal of Computer Virology and Hacking Techniques ( 2016 ), 1--17. Blake Anderson, Subharthi Paul, and David McGrew. 2016. Deciphering Malware's use of TLS (without Decryption). Journal of Computer Virology and Hacking Techniques (2016), 1--17."},{"doi-asserted-by":"crossref","unstructured":"Lawrence E Bassham III Andrew L Rukhin Juan Soto James R Nechvatal Miles E Smid Elaine B Barker Stefan D Leigh Mark Levenson Mark Vangel David L Banks etal 2010. Sp 800-22 rev. 1a. a statistical test suite for random and pseudorandom number generators for cryptographic applications. (2010).  Lawrence E Bassham III Andrew L Rukhin Juan Soto James R Nechvatal Miles E Smid Elaine B Barker Stefan D Leigh Mark Levenson Mark Vangel David L Banks et al. 2010. Sp 800-22 rev. 1a. a statistical test suite for random and pseudorandom number generators for cryptographic applications. (2010).","key":"e_1_3_2_1_6_1","DOI":"10.6028\/NIST.SP.800-22r1a"},{"key":"e_1_3_2_1_7_1","volume-title":"Early Recognition of Encrypted Applications. In International Conference on Passive and Active Network Measurement. 165--175","author":"Bernaille Laurent","year":"2007","unstructured":"Laurent Bernaille and Renata Teixeira . 2007 . Early Recognition of Encrypted Applications. In International Conference on Passive and Active Network Measurement. 165--175 . Laurent Bernaille and Renata Teixeira. 2007. Early Recognition of Encrypted Applications. In International Conference on Passive and Active Network Measurement. 165--175."},{"key":"e_1_3_2_1_8_1","first-page":"655","article-title":"Identification method of encrypted traffic based on support vector machine","volume":"47","author":"Cheng Guang","year":"2017","unstructured":"Guang Cheng and Yuxiang Chen . 2017 . Identification method of encrypted traffic based on support vector machine . Journal of Southeast University 47 , 4 (2017), 655 -- 659 . Guang Cheng and Yuxiang Chen. 2017. Identification method of encrypted traffic based on support vector machine. Journal of Southeast University 47, 4 (2017), 655--659.","journal-title":"Journal of Southeast University"},{"key":"e_1_3_2_1_9_1","first-page":"152","article-title":"A flow nature classification method based on multi-features of n-gram","volume":"34","author":"Ding J","year":"2017","unstructured":"J Ding , L Huang , T Yupeng , 2017 . A flow nature classification method based on multi-features of n-gram . Computer Applications & Software 34 , 2 (2017), 152 -- 158 . J Ding, L Huang, T Yupeng, et al. 2017. A flow nature classification method based on multi-features of n-gram. Computer Applications & Software 34, 2 (2017), 152--158.","journal-title":"Computer Applications & Software"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/TNET.2012.2219591"},{"key":"e_1_3_2_1_11_1","volume-title":"Mahdi Jafari Siavoshani, and Mohammd-sadegh Saberian","author":"Lotfollahi Mohammad","year":"2017","unstructured":"Mohammad Lotfollahi , Ramin Shirali , Mahdi Jafari Siavoshani, and Mohammd-sadegh Saberian . 2017 . Deep Packet : A Novel Approach For Encrypted Traffic Classification Using Deep Learning . arXiv preprint arXiv:1709.02656 (2017). Mohammad Lotfollahi, Ramin Shirali, Mahdi Jafari Siavoshani, and Mohammd-sadegh Saberian. 2017. Deep Packet: A Novel Approach For Encrypted Traffic Classification Using Deep Learning. arXiv preprint arXiv:1709.02656 (2017)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1109\/MSP.2007.48"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1109\/MASCOTS.2006.6"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1007\/978-3-540-31966-5_4"},{"key":"e_1_3_2_1_15_1","first-page":"154","article-title":"Review and perspective on encrypted traffic identification research","volume":"37","author":"Pan W","year":"2016","unstructured":"W Pan , G Cheng , X Guo , 2016 . Review and perspective on encrypted traffic identification research . Journal on Communications 37 , 9 (2016), 154 -- 167 . W Pan, G Cheng, X Guo, et al. 2016. Review and perspective on encrypted traffic identification research. Journal on Communications 37, 9 (2016), 154--167.","journal-title":"Journal on Communications"},{"key":"e_1_3_2_1_16_1","volume-title":"WENC: HTTPS Encrypted Traffic Classification Using Weighted Ensemble Learning and Markov Chain. In Trustcom\/bigdatase\/icess. 50--57.","author":"Pan Wubin","year":"2017","unstructured":"Wubin Pan , Guang Cheng , and Yongning Tang . 2017 . WENC: HTTPS Encrypted Traffic Classification Using Weighted Ensemble Learning and Markov Chain. In Trustcom\/bigdatase\/icess. 50--57. Wubin Pan, Guang Cheng, and Yongning Tang. 2017. WENC: HTTPS Encrypted Traffic Classification Using Weighted Ensemble Learning and Markov Chain. In Trustcom\/bigdatase\/icess. 50--57."},{"doi-asserted-by":"crossref","unstructured":"Xu Peng Lin Sen etal 2009. Internet traffic classification using C4. 5 decision tree. (2009).  Xu Peng Lin Sen et al. 2009. Internet traffic classification using C4. 5 decision tree. (2009).","key":"e_1_3_2_1_17_1","DOI":"10.3724\/SP.J.1001.2009.03444"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1002\/nem.1901"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1002\/nem.1901"},{"key":"e_1_3_2_1_20_1","first-page":"32","article-title":"Research progress and prospects of network traffic classification","volume":"1","author":"Xiong G","year":"2012","unstructured":"G Xiong , J Meng , and Z Cao . 2012 . Research progress and prospects of network traffic classification . Journal of Integration Technology 1 , 1 (2012), 32 -- 42 . G Xiong, J Meng, and Z Cao. 2012. Research progress and prospects of network traffic classification. Journal of Integration Technology 1, 1 (2012), 32--42.","journal-title":"Journal of Integration Technology"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.3724\/SP.J.1001.2013.04279"}],"event":{"sponsor":["AsiaFI Asia Future Internet","FIF Future Internet Forum"],"acronym":"CFI 2018","name":"CFI 2018: The 13th International Conference on Future Internet Technologies","location":"Seoul Republic of Korea"},"container-title":["Proceedings of the 13th International Conference on Future Internet Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3226052.3226057","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3226052.3226057","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:15:01Z","timestamp":1750281301000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3226052.3226057"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,20]]},"references-count":21,"alternative-id":["10.1145\/3226052.3226057","10.1145\/3226052"],"URL":"https:\/\/doi.org\/10.1145\/3226052.3226057","relation":{},"subject":[],"published":{"date-parts":[[2018,6,20]]},"assertion":[{"value":"2018-06-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}