{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T09:38:32Z","timestamp":1774517912464,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T00:00:00Z","timestamp":1636761600000},"content-version":"vor","delay-in-days":1,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DARPA","award":["Contract FA8750-19-C-0079"],"award-info":[{"award-number":["Contract FA8750-19-C-0079"]}]},{"name":"NSF","award":["1953740"],"award-info":[{"award-number":["1953740"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484758","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"3366-3383","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":120,"title":["New Directions in Automated Traffic Analysis"],"prefix":"10.1145","author":[{"given":"Jordan","family":"Holland","sequence":"first","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"given":"Paul","family":"Schmitt","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"given":"Nick","family":"Feamster","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"given":"Prateek","family":"Mittal","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2899085"},{"key":"e_1_3_2_1_2_1","volume-title":"An AutoML application to forecasting bank failures. Applied Economics Letters","author":"Agrapetidou Anna","year":"2020","unstructured":"Anna Agrapetidou, Paulos Charonyktakis, Periklis Gogas, Theophilos Papadimitriou, and Ioannis Tsamardinos. 2020. An AutoML application to forecasting bank failures. Applied Economics Letters (2020), 1--5."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382208"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098163"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/EUC.2011.76"},{"key":"e_1_3_2_1_6_1","volume-title":"NetML: A Challenge for Network Traffic Analytics. arXiv preprint arXiv:2004.13006","author":"Barut Onur","year":"2020","unstructured":"Onur Barut, Yan Luo, Tong Zhang, Weigang Li, and Peilong Li. 2020. NetML: A Challenge for Network Traffic Analytics. arXiv preprint arXiv:2004.13006 (2020)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637243"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368436.1368445"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24668-8_16"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366704"},{"key":"e_1_3_2_1_11_1","unstructured":"Douglas E Comer and John C Lin. 1994. Probing TCP implementations. In Usenix Summer. 245--255."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5220\/0005740704070414"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceeedings of the 22nd USENIX Security Symposium. 605--620","author":"Durumeric Zakir","year":"2013","unstructured":"Zakir Durumeric, Eric Wustrow, and J Alex Halderman. 2013. ZMap: Fast Internet-wide scanning and its security applications. In Proceeedings of the 22nd USENIX Security Symposium. 605--620."},{"key":"e_1_3_2_1_14_1","volume-title":"AutoGluon-Tabular: Robust and Accurate AutoML for Structured Data. arXiv preprint arXiv:2003.06505","author":"Erickson Nick","year":"2020","unstructured":"Nick Erickson, Jonas Mueller, Alexander Shirkov, Hang Zhang, Pedro Larroy, Mu Li, and Alexander Smola. 2020. AutoGluon-Tabular: Robust and Accurate AutoML for Structured Data. arXiv preprint arXiv:2003.06505 (2020)."},{"key":"e_1_3_2_1_15_1","unstructured":"Matthias Feurer Aaron Klein Katharina Eggensperger Jost Springenberg Manuel Blum and Frank Hutter. 2015. Efficient and robust automated machine learning. In Advances in neural information processing systems. 2962--2970."},{"key":"e_1_3_2_1_16_1","volume-title":"Manuel Blum, and Frank Hutter.","author":"Feurer Matthias","year":"2019","unstructured":"Matthias Feurer, Aaron Klein, Katharina Eggensperger, Jost Tobias Springenberg, Manuel Blum, and Frank Hutter. 2019. Auto-sklearn: efficient and robust automated machine learning. In Automated Machine Learning. Springer, Cham, 113--134."},{"key":"e_1_3_2_1_17_1","volume-title":"Device Fingerprinting for Cyber-Physical Systems. In Network and Distributed Systems Security Symposium.","author":"Formby David","year":"2016","unstructured":"David Formby, Preethi Srinivasan, Andrew M Leonard, Jonathan D Rogers, and Raheem A Beyah. 2016a. Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems. In Network and Distributed Systems Security Symposium."},{"key":"e_1_3_2_1_18_1","volume-title":"Device Fingerprinting for Cyber-Physical Systems. In 23rd Annual Network and Distributed System Security Symposium, NDSS, 2016","author":"Formby David","year":"2016","unstructured":"David Formby, Preethi Srinivasan, Andrew M. Leonard, Jonathan D. Rogers, and Raheem A. Beyah. 2016b. Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems. In 23rd Annual Network and Distributed System Security Symposium, NDSS, 2016, San Diego, California, USA, February 21--24, 2016. http:\/\/wp.internetsociety.org\/ndss\/wp-content\/uploads\/sites\/25\/2017\/09\/who-control-your-control-system-device-fingerprinting-cyber-physical-systems.pdf"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523813"},{"key":"e_1_3_2_1_20_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Hayes Jamie","year":"2016","unstructured":"Jamie Hayes and George Danezis. 2016. k-fingerprinting: A Robust Scalable Website Fingerprinting Technique. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 1187--1203. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/hayes"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01234-2_48"},{"key":"e_1_3_2_1_22_1","volume-title":"Classifying Network Vendors at Internet scale. arXiv preprint arXiv:2006.13086","author":"Holland Jordan","year":"2020","unstructured":"Jordan Holland, Ross Teixeria, Paul Schmitt, Kevin Borgolte, Jennifer Rexford, Nick Feamster, and Jonathan Mayer. 2020. Classifying Network Vendors at Internet scale. arXiv preprint arXiv:2006.13086 (2020)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.3390\/app9163414"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330648"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080119"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.26"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/3122009.3122034"},{"key":"e_1_3_2_1_28_1","unstructured":"Stratosphere Lab. [n. d.]. Stratosphere Lab Malware Capture Facility Project. https:\/\/www.stratosphereips.org\/datasets-malware iot malware."},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the AutoML Workshop at ICML","volume":"2020","author":"LeDell Erin","year":"2020","unstructured":"Erin LeDell and S Poirier. 2020. H2o automl: Scalable automatic machine learning. In Proceedings of the AutoML Workshop at ICML, Vol. 2020."},{"key":"e_1_3_2_1_30_1","volume-title":"Workshop on Data Mining for Computer Security","volume":"40","author":"Lippmann Richard","year":"2003","unstructured":"Richard Lippmann, David Fried, Keith Piwowarski, and William Streilein. 2003. Passive operating system identification from TCP\/IP packet headers. In Workshop on Data Mining for Computer Security, Vol. 40."},{"key":"e_1_3_2_1_31_1","unstructured":"Gordon Fyodor Lyon. 2009. Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning .Insecure USA."},{"key":"e_1_3_2_1_32_1","volume-title":"Evaluating Snowflake as an Indistinguishable Censorship Circumvention Tool. arXiv preprint arXiv:2008.03254","author":"MacMillan Kyle","year":"2020","unstructured":"Kyle MacMillan, Jordan Holland, and Prateek Mittal. 2020. Evaluating Snowflake as an Indistinguishable Censorship Circumvention Tool. arXiv preprint arXiv:2008.03254 (2020)."},{"key":"e_1_3_2_1_33_1","unstructured":"Tony Miller. 2020. Passive OS Fingerprinting: Details and Techniques. http:\/\/www.ouah.org\/incosfingerp.htm."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23204"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243824"},{"key":"e_1_3_2_1_36_1","first-page":"257","article-title":"Impact of data normalization on stock index forecasting","volume":"6","author":"Nayak SC","year":"2014","unstructured":"SC Nayak, Bijan B Misra, and Himansu Sekhar Behera. 2014. Impact of data normalization on stock index forecasting. International Journal of Computer Information Systems and Industrial Management Applications, Vol. 6, 2014 (2014), 257--269.","journal-title":"International Journal of Computer Information Systems and Industrial Management Applications"},{"key":"e_1_3_2_1_37_1","volume-title":"NetML Network Traffic Analytics Challenge","author":"ML.","year":"2020","unstructured":"NetML. [n.,d.]. NetML Network Traffic Analytics Challenge 2020. https:\/\/eval.ai\/web\/challenges\/challenge-page\/526\/leaderboard\/1473 netML."},{"key":"e_1_3_2_1_38_1","unstructured":"ntop. [n. d.]. PF_RING High-speed packet capture filtering and analysis. https:\/\/www.ntop.org\/products\/packet-capture\/pf_ring\/ pfring."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0043"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/964723.383083"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Andriy Panchenko Fabian Lanze Jan Pennekamp Thomas Engel Andreas Zinnen Martin Henze and Klaus Wehrle. 2016. Website Fingerprinting at Internet Scale.. In NDSS.","DOI":"10.14722\/ndss.2016.23477"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/263109.263160"},{"key":"e_1_3_2_1_43_1","unstructured":"Jingjing Ren Daniel J. Dubois and David Choffnes. 2019. An International View of Privacy Risks for Mobile Apps. (2019). https:\/\/recon.meddle.mobi\/papers\/cross-market.pdf"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23105"},{"key":"e_1_3_2_1_45_1","unstructured":"scikit learn. [n. d.] a. Computing the Average Precision Score. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.metrics.average_precision_score.html average precision score."},{"key":"e_1_3_2_1_46_1","unstructured":"scikit learn. [n. d.] b. Tuning the hyper-parameters of an estimator. https:\/\/scikit-learn.org\/stable\/modules\/grid_search.html grid search."},{"key":"e_1_3_2_1_47_1","volume-title":"Arash Habibi Lashkari, and Ali A Ghorbani","author":"Sharafaldin Iman","year":"2018","unstructured":"Iman Sharafaldin, Arash Habibi Lashkari, and Ali A Ghorbani. 2018. Toward generating a new intrusion detection dataset and intrusion traffic characterization.. In ICISSP."},{"key":"e_1_3_2_1_48_1","unstructured":"Shodan. 2020. Shodan. https:\/\/www.shodan.io\/."},{"key":"e_1_3_2_1_49_1","volume-title":"Investigating the impact of data normalization on classification performance. Applied Soft Computing","author":"Singh Dalwinder","year":"2019","unstructured":"Dalwinder Singh and Birmohan Singh. 2019. Investigating the impact of data normalization on classification performance. Applied Soft Computing (2019), 105524."},{"key":"e_1_3_2_1_50_1","volume-title":"Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning. arXiv preprint arXiv:1801.02265","author":"Sirinam Payap","year":"2018","unstructured":"Payap Sirinam, Mohsen Imani, Marc Juarez, and Matthew Wright. 2018. Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning. arXiv preprint arXiv:1801.02265 (2018). arxiv: 1801.02265 [cs.CR]"},{"key":"e_1_3_2_1_51_1","volume-title":"Usenix Security Symposium.","author":"Smart Matthew","year":"2000","unstructured":"Matthew Smart, G Robert Malan, and Farnam Jahanian. 2000. Defeating TCP\/IP Stack Fingerprinting.. In Usenix Security Symposium."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"e_1_3_2_1_53_1","unstructured":"tcpdump. [n. d.]. Man page of PCAP. https:\/\/www.tcpdump.org\/manpages\/pcap.3pcap.html libpcap."},{"key":"e_1_3_2_1_54_1","volume-title":"Packet-Level Signatures for Smart Home Devices. In Network and Distributed System Security Symposium, NDSS","author":"Trimananda Rahmadi","year":"2020","unstructured":"Rahmadi Trimananda, Janus Varmarken, Athina Markopoulou, and Brian Demsky. 2020. Packet-Level Signatures for Smart Home Devices. In Network and Distributed System Security Symposium, NDSS. San Diego, CA, USA."},{"key":"e_1_3_2_1_55_1","volume-title":"Flowprint: Semi-supervised Mobile-app Fingerprinting on Encrypted Network Traffic. In Network and Distributed System Security Symposium. Internet Society.","author":"van Ede Thijs","year":"2020","unstructured":"Thijs van Ede, Riccardo Bortolameotti, Andrea Continella, Jingjing Ren, Daniel J Dubois, Martina Lindorfer, David Choffnes, Maarten van Steen, and Andreas Peter. 2020. Flowprint: Semi-supervised Mobile-app Fingerprinting on Encrypted Network Traffic. In Network and Distributed System Security Symposium. Internet Society."},{"key":"e_1_3_2_1_56_1","volume-title":"Network and Distributed System Security Symposium, NDSS.","author":"Venkataraman Shobha","year":"2007","unstructured":"Shobha Venkataraman, Juan Caballero, Pongsin Poosankam, Min Kang, and Dawn Song. 2007. Fig: Automatic Fingerprint Generation.. In Network and Distributed System Security Symposium, NDSS."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813715"},{"key":"e_1_3_2_1_58_1","volume-title":"Effective Attacks and Provable Defenses for Website Fingerprinting. In 23rd USENIX Security Symposium (USENIX Security 14)","author":"Wang Tao","year":"2014","unstructured":"Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, and Ian Goldberg. 2014. Effective Attacks and Provable Defenses for Website Fingerprinting. In 23rd USENIX Security Symposium (USENIX Security 14). USENIX Association, San Diego, CA, 143--157. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/wang_tao"},{"key":"e_1_3_2_1_59_1","volume-title":"Proceedings of the 26th USENIX Conference on Security Symposium","author":"Wang Tao","year":"2017","unstructured":"Tao Wang and Ian Goldberg. 2017. Walkie-Talkie: An Efficient Defense against Passive Website Fingerprinting Attacks. In Proceedings of the 26th USENIX Conference on Security Symposium (Vancouver, BC, Canada) (SEC'17). USENIX Association, USA, 1375--1390."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2780250"},{"key":"e_1_3_2_1_61_1","volume-title":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","author":"Wang W.","unstructured":"W. Wang, M. Zhu, J. Wang, X. Zeng, and Z. Yang. 2017. End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In 2017 IEEE International Conference on Intelligence and Security Informatics (ISI). Beijing, China."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1163593.1163596"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/4184196"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484758","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484758","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484758","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:50:02Z","timestamp":1763499002000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484758"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":63,"alternative-id":["10.1145\/3460120.3484758","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484758","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}