{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:46:45Z","timestamp":1750308405301,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T00:00:00Z","timestamp":1573776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,15]]},"DOI":"10.1145\/3371676.3371705","type":"proceedings-article","created":{"date-parts":[[2020,1,14]],"date-time":"2020-01-14T04:40:36Z","timestamp":1578976836000},"page":"47-50","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A Method of Detecting the Abnormal Encrypted Traffic Based on Machine Learning and Behavior Characteristics"],"prefix":"10.1145","author":[{"given":"Bin","family":"Kong","sequence":"first","affiliation":[{"name":"School of Economics and Management, Beijing Jiaotong University"}]},{"given":"Zhangpu","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Guangming","family":"Zhou","sequence":"additional","affiliation":[{"name":"China National Salt Industry Group Co., Ltd, Beijing, China"}]},{"given":"Xiaoyan","family":"Yu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2020,1,13]]},"reference":[{"issue":"12","key":"e_1_3_2_1_1_1","first-page":"39","article-title":"Research on Abnormal Network Traffic Detection Based on Machine Learning[J]","volume":"2017","author":"Chen Sheng","year":"2017","unstructured":"Chen Sheng , Zhu Guoshneg, Qi Xiaoyun , Lei Longfei, Zhen Jia , Wu Shanchao, and Wu Mengyu . 2017 . Research on Abnormal Network Traffic Detection Based on Machine Learning[J] . Information and Communication , 2017 ( 12 ): 39 -- 42 . Chen Sheng, Zhu Guoshneg, Qi Xiaoyun, Lei Longfei, Zhen Jia, Wu Shanchao, and Wu Mengyu. 2017. Research on Abnormal Network Traffic Detection Based on Machine Learning[J]. Information and Communication, 2017(12):39--42.","journal-title":"Information and Communication"},{"volume-title":"Design and Implementation of Network Traffic Classification System Based on Decision Tree [D]","author":"Wang Haizhong","key":"e_1_3_2_1_2_1","unstructured":"Wang Haizhong . 2014. Design and Implementation of Network Traffic Classification System Based on Decision Tree [D] . University of Chinese Academy of Sciences(School of Engineering Management and Information Technology) . Wang Haizhong. 2014. Design and Implementation of Network Traffic Classification System Based on Decision Tree [D]. University of Chinese Academy of Sciences(School of Engineering Management and Information Technology)."},{"key":"e_1_3_2_1_3_1","volume-title":"Proc. of the INFOCOM IEEE Conf. on Computer Communications Workshops. San Diego: IEEE Press","author":"Aceto G.","year":"2010","unstructured":"Aceto , G. Dainotti , A. Donato , W. and Pescap\u00e9 , A . 2010. PortLoad: Taking the best of two worlds in traffic classification . In: Proc. of the INFOCOM IEEE Conf. on Computer Communications Workshops. San Diego: IEEE Press , 2010 . 1--5. Aceto, G. Dainotti, A. Donato, W. and Pescap\u00e9, A. 2010. PortLoad: Taking the best of two worlds in traffic classification. In: Proc. of the INFOCOM IEEE Conf. on Computer Communications Workshops. San Diego: IEEE Press, 2010. 1--5."},{"key":"e_1_3_2_1_4_1","unstructured":"Guo ZB. and Qiu ZD. 2008. Identification of BitTorrent traffic for high speed network using packet sampling and application signatures.Journal of Computer Research and Development 45(2):227--236.  Guo ZB. and Qiu ZD. 2008. Identification of BitTorrent traffic for high speed network using packet sampling and application signatures.Journal of Computer Research and Development 45(2):227--236."},{"key":"e_1_3_2_1_5_1","volume-title":"Proc. of the ACM SIGCOMM 2008 Conf. on Data Communication (SIGCOMM","author":"Smith R.","year":"2008","unstructured":"Smith , R. Estan , C. Jha , S. and Kong , SJ . 2008. Deflating the big bang: Fast and scalable deep packet inspection with extended finite automata.In: Bahl V, Wetherall D, Savage S, Stoica I, eds . Proc. of the ACM SIGCOMM 2008 Conf. on Data Communication (SIGCOMM 2008 ). New York : ACM Press. 207--218. Smith, R. Estan, C. Jha, S. and Kong, SJ. 2008. Deflating the big bang: Fast and scalable deep packet inspection with extended finite automata.In: Bahl V, Wetherall D, Savage S, Stoica I, eds. Proc. of the ACM SIGCOMM 2008 Conf. on Data Communication (SIGCOMM 2008). New York: ACM Press. 207--218."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.01.005"},{"key":"e_1_3_2_1_7_1","volume-title":"New York(USA)","author":"Sen S.","year":"2004","unstructured":"Sen , S. Spatscheck , O. and Wang , D . 2004. Accurate, scalable in network identification of P2P traffic using application signatures [C] \/\/In WWW2004 . New York(USA) , 2004 . Sen, S. Spatscheck, O. and Wang, D. 2004. Accurate, scalable in network identification of P2P traffic using application signatures [C] \/\/In WWW2004. New York(USA), 2004."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.12.002"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.4.7.622-629"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of SIGCOMM","author":"Karagiannis T.","year":"2005","unstructured":"Karagiannis , T. , Papagiannaki , K. , and Faloutsos , M . 2005. BLINC:multilevel traffic classification in the dark [C] . Proceedings of SIGCOMM , Philadelphia, PA, USA , 2005 : 229--240. Karagiannis, T., Papagiannaki, K., and Faloutsos, M. 2005. BLINC:multilevel traffic classification in the dark [C]. Proceedings of SIGCOMM, Philadelphia, PA, USA, 2005: 229--240."},{"key":"e_1_3_2_1_12_1","article-title":"A characterization of broadband user behavior and their e-business activities[J]","volume":"2004","author":"Marques Neto H. T.","year":"2004","unstructured":"Marques Neto , H. T. , Almeida , J. M. , and Rocha , L. C. D. , 2004 . A characterization of broadband user behavior and their e-business activities[J] . ACM SIGMETRICS Performance Evaluation Review , 2004 , 32(3): 3--13. Marques Neto, H. T., Almeida, J. M., and Rocha, L. C. D., et al.. 2004. A characterization of broadband user behavior and their e-business activities[J]. ACM SIGMETRICS Performance Evaluation Review, 2004, 32(3): 3--13.","journal-title":"ACM SIGMETRICS Performance Evaluation Review"}],"event":{"name":"ICCNS 2019: 2019 the 9th International Conference on Communication and Network Security","sponsor":["University of Tokyo","Chongqing University of Posts and Telecommunications"],"location":"Chongqing China","acronym":"ICCNS 2019"},"container-title":["Proceedings of the 2019 9th International Conference on Communication and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3371676.3371705","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3371676.3371705","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:45:23Z","timestamp":1750268723000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3371676.3371705"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,15]]},"references-count":12,"alternative-id":["10.1145\/3371676.3371705","10.1145\/3371676"],"URL":"https:\/\/doi.org\/10.1145\/3371676.3371705","relation":{},"subject":[],"published":{"date-parts":[[2019,11,15]]},"assertion":[{"value":"2020-01-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}