{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:29:33Z","timestamp":1766449773101,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T00:00:00Z","timestamp":1606089600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"U.S. Army Combat Capabilities Development Command Army Research Laboratory","award":["W911NF-13-2-0045"],"award-info":[{"award-number":["W911NF-13-2-0045"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,23]]},"DOI":"10.1145\/3386367.3431311","type":"proceedings-article","created":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T22:53:05Z","timestamp":1606258385000},"page":"183-197","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["You do (not) belong here"],"prefix":"10.1145","author":[{"given":"Shitong","family":"Zhu","sequence":"first","affiliation":[{"name":"University of California, Riverside"}]},{"given":"Shasha","family":"Li","sequence":"additional","affiliation":[{"name":"University of California, Riverside"}]},{"given":"Zhongjie","family":"Wang","sequence":"additional","affiliation":[{"name":"University of California, Riverside"}]},{"given":"Xun","family":"Chen","sequence":"additional","affiliation":[{"name":"Samsung Research America"}]},{"given":"Zhiyun","family":"Qian","sequence":"additional","affiliation":[{"name":"University of California, Riverside"}]},{"given":"Srikanth V.","family":"Krishnamurthy","sequence":"additional","affiliation":[{"name":"University of California, Riverside"}]},{"given":"Kevin S.","family":"Chan","sequence":"additional","affiliation":[{"name":"US Army Research Laboratory"}]},{"given":"Ananthram","family":"Swami","sequence":"additional","affiliation":[{"name":"US Army Research Laboratory"}]}],"member":"320","published-online":{"date-parts":[[2020,11,24]]},"reference":[{"volume-title":"MAWI Working Group Traffic Archive","key":"e_1_3_2_2_1_1","unstructured":"[n.d.]. MAWI Working Group Traffic Archive . http:\/\/mawi.wide.ad.jp\/mawi\/. Accessed: 2020-06-26. [n.d.]. MAWI Working Group Traffic Archive. http:\/\/mawi.wide.ad.jp\/mawi\/. Accessed: 2020-06-26."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3143361.3143399"},{"key":"e_1_3_2_2_3_1","unstructured":"P Neira Ayuso. 2008. The conntrack-tools user manual.  P Neira Ayuso. 2008. The conntrack-tools user manual."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363189"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131377"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1179"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2675450"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2925639"},{"key":"e_1_3_2_2_9_1","volume-title":"Proc. USENIX Security Symposium","volume":"2001","author":"Kreibich Christian","year":"2001","unstructured":"Christian Kreibich , Mark Handley , and V Paxson . 2001 . Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics . In Proc. USENIX Security Symposium , Vol. 2001 . Christian Kreibich, Mark Handley, and V Paxson. 2001. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In Proc. USENIX Security Symposium, Vol. 2001."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131376"},{"key":"e_1_3_2_2_11_1","volume-title":"Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency. arXiv preprint arXiv:2007.09763","author":"Li Shasha","year":"2020","unstructured":"Shasha Li , Shitong Zhu , Sudipta Paul , Amit Roy-Chowdhury , Chengyu Song , Srikanth Krishnamurthy , Ananthram Swami , and Kevin S Chan . 2020. Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency. arXiv preprint arXiv:2007.09763 ( 2020 ). Shasha Li, Shitong Zhu, Sudipta Paul, Amit Roy-Chowdhury, Chengyu Song, Srikanth Krishnamurthy, Ananthram Swami, and Kevin S Chan. 2020. Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency. arXiv preprint arXiv:2007.09763 (2020)."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00730"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3234200.3234238"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308897.3308960"},{"key":"e_1_3_2_2_15_1","unstructured":"William Mendenhall Robert J Beaver and Barbara M Beaver. 2012. Introduction to probability and statistics. Cengage Learning.  William Mendenhall Robert J Beaver and Barbara M Beaver. 2012. Introduction to probability and statistics. Cengage Learning."},{"key":"e_1_3_2_2_16_1","unstructured":"Yisroel Mirsky. 2020. Kitsune-py. https:\/\/github.com\/ymirsky\/Kitsune-py.  Yisroel Mirsky. 2020. Kitsune-py. https:\/\/github.com\/ymirsky\/Kitsune-py."},{"key":"e_1_3_2_2_17_1","volume-title":"Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018","author":"Mirsky Yisroel","year":"2018","unstructured":"Yisroel Mirsky , Tomer Doitshman , Yuval Elovici , and Asaf Shabtai . 2018 . Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018 , San Diego, California, USA , February 18-21, 2018. The Internet Society. http:\/\/wp.internetsociety.org\/ndss\/wp-content\/uploads\/sites\/25\/2018\/02\/ndss2018_03A-3_Mirsky_paper.pdf Yisroel Mirsky, Tomer Doitshman, Yuval Elovici, and Asaf Shabtai. 2018. Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, 2018. The Internet Society. http:\/\/wp.internetsociety.org\/ndss\/wp-content\/uploads\/sites\/25\/2018\/02\/ndss2018_03A-3_Mirsky_paper.pdf"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"crossref","unstructured":"Jon Postel. 1981. RFC0791: Internet Protocol.  Jon Postel. 1981. RFC0791: Internet Protocol.","DOI":"10.17487\/rfc0791"},{"key":"e_1_3_2_2_19_1","volume-title":"RFC 5961","author":"Ramaiah Anantha","year":"2010","unstructured":"Anantha Ramaiah , R Stewart , and Mitesh Dalal . 2010. Improving TCP's robustness to blind in-window attacks. Internet Engineering Task Force , RFC 5961 ( 2010 ). Anantha Ramaiah, R Stewart, and Mitesh Dalal. 2010. Improving TCP's robustness to blind in-window attacks. Internet Engineering Task Force, RFC 5961 (2010)."},{"key":"e_1_3_2_2_20_1","volume-title":"Transmission control protocol. J. Postel. September 981","author":"IETF","year":"1981","unstructured":"IETF RFC793. 1981. Transmission control protocol. J. Postel. September 981 ( 1981 ). IETF RFC793. 1981. Transmission control protocol. J. Postel. September 981 (1981)."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00678"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131374"},{"key":"e_1_3_2_2_23_1","volume-title":"SYMTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery. In Network and Distributed System Security Symposium (NDSS).","author":"Wang Zhongjie","year":"2020","unstructured":"Zhongjie Wang , Shitong Zhu , Yue Cao , Zhiyun Qian , Chengyu Song , Srikanth V Krishnamurthy , Kevin S Chan , and Tracy D Braun . 2020 . SYMTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery. In Network and Distributed System Security Symposium (NDSS). Zhongjie Wang, Shitong Zhu, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V Krishnamurthy, Kevin S Chan, and Tracy D Braun. 2020. SYMTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2566669"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098052"}],"event":{"name":"CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Barcelona Spain","acronym":"CoNEXT '20"},"container-title":["Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3386367.3431311","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3386367.3431311","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:32:04Z","timestamp":1750195924000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3386367.3431311"}},"subtitle":["detecting DPI evasion attacks with context learning"],"short-title":[],"issued":{"date-parts":[[2020,11,23]]},"references-count":26,"alternative-id":["10.1145\/3386367.3431311","10.1145\/3386367"],"URL":"https:\/\/doi.org\/10.1145\/3386367.3431311","relation":{},"subject":[],"published":{"date-parts":[[2020,11,23]]},"assertion":[{"value":"2020-11-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}