{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T23:45:56Z","timestamp":1772495156741,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,27]],"date-time":"2022-05-27T00:00:00Z","timestamp":1653609600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Research on the system of Power Internet of Things Network Security Engineering Research Center","award":["047000KK52210036"],"award-info":[{"award-number":["047000KK52210036"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,27]]},"DOI":"10.1145\/3545801.3545820","type":"proceedings-article","created":{"date-parts":[[2022,9,9]],"date-time":"2022-09-09T16:11:58Z","timestamp":1662739918000},"page":"131-137","source":"Crossref","is-referenced-by-count":1,"title":["Deep Learning Based Malware Traffic Classification for Power Internet of Things Network Security"],"prefix":"10.1145","author":[{"given":"Tong","family":"YU","sequence":"first","affiliation":[{"name":"Electric Power Research Institute, Guangxi Power Grid Co., Ltd., China"}]},{"given":"Xin","family":"LI","sequence":"additional","affiliation":[{"name":"Electric Power Research Institute, Guangxi Power Grid Co., Ltd., China"}]},{"given":"Ying","family":"LING","sequence":"additional","affiliation":[{"name":"Electric Power Research Institute, Guangxi Power Grid Co., Ltd., China"}]},{"given":"Dongmei","family":"BIN","sequence":"additional","affiliation":[{"name":"Electric Power Research Institute, Guangxi Power Grid Co., Ltd., China"}]},{"given":"Chunyan","family":"YANG","sequence":"additional","affiliation":[{"name":"Electric Power Research Institute, Guangxi Power Grid Co., Ltd., China"}]}],"member":"320","published-online":{"date-parts":[[2022,9,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"A Survey of Payload-Based Traffic Classification Approaches","author":"Finsterbusch Michael","unstructured":"Michael Finsterbusch , Chris Richter , Eduardo Rocha , Jean-Alexander Muller , and Klaus Hanssgen . A Survey of Payload-Based Traffic Classification Approaches . Communications Surveys & Tutorials IEEE , vol. 16 , no. 2, pp. 1135- 1156. Michael Finsterbusch, Chris Richter, Eduardo Rocha, Jean-Alexander Muller, and Klaus Hanssgen. A Survey of Payload-Based Traffic Classification Approaches. Communications Surveys & Tutorials IEEE, vol. 16, no. 2, pp. 1135- 1156."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1039834.1039864"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028804"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988742"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 2006 ACM\/IEEE symposium on Architecture for networking and communications systems (ANCS '06)","author":"Yu Fang","unstructured":"Fang Yu , Zhifeng Chen , Yanlei Diao , T. V. Lakshman , and Randy H. Katz . 2006. Fast and memory-efficient regular expression matching for deep packet inspection . In Proceedings of the 2006 ACM\/IEEE symposium on Architecture for networking and communications systems (ANCS '06) . Association for Computing Machinery, New York, NY, USA, 93\u2013102. Fang Yu, Zhifeng Chen, Yanlei Diao, T. V. Lakshman, and Randy H. Katz. 2006. Fast and memory-efficient regular expression matching for deep packet inspection. In Proceedings of the 2006 ACM\/IEEE symposium on Architecture for networking and communications systems (ANCS '06). Association for Computing Machinery, New York, NY, USA, 93\u2013102."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323548.1323571"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/surv.2008.080406"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '17)","author":"Anderson Blake","year":"2017","unstructured":"Blake Anderson and David McGrew . 2017 . Machine Learning for Encrypted Malware Traffic Classification: Accounting for Noisy Labels and Non-Stationarity . In Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '17) . Association for Computing Machinery, New York, NY, USA, 1723\u20131732. Blake Anderson and David McGrew. 2017. Machine Learning for Encrypted Malware Traffic Classification: Accounting for Noisy Labels and Non-Stationarity. In Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '17). Association for Computing Machinery, New York, NY, USA, 1723\u20131732."},{"key":"e_1_3_2_1_9_1","first-page":"6","volume-title":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","author":"Ken","unstructured":"Ken F. Yu and Richard E. Harang. 2017. Machine learning in malware traffic classifications . MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM) , pp. 6 - 10 . Ken F. Yu and Richard E. Harang. 2017. Machine learning in malware traffic classifications. MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM), pp. 6-10."},{"key":"e_1_3_2_1_10_1","first-page":"313","volume-title":"Analyzing Learning-based Encrypted Malware Traffic Classification with AutoML. 2021 IEEE 21st International Conference on Communication Technology (ICCT)","author":"Isingizwe Didier Frank","year":"2021","unstructured":"Didier Frank Isingizwe , Meng Wang , Wenmao Liu , Dongsheng Wang , Tiejun Wu , and Jun Li . 2021 . Analyzing Learning-based Encrypted Malware Traffic Classification with AutoML. 2021 IEEE 21st International Conference on Communication Technology (ICCT) , pp. 313 - 322 . Didier Frank Isingizwe, Meng Wang, Wenmao Liu, Dongsheng Wang, Tiejun Wu, and Jun Li. 2021. Analyzing Learning-based Encrypted Malware Traffic Classification with AutoML. 2021 IEEE 21st International Conference on Communication Technology (ICCT), pp. 313-322."},{"key":"e_1_3_2_1_11_1","first-page":"1375","volume-title":"A Survey on Feature Selection Techniques for Internet Traffic Classification,\" 2015 International Conference on Computational Intelligence and Communication Networks (CICN)","author":"Dhote Yogesh","unstructured":"Yogesh Dhote , Shikha Agrawal , and Anjana Jayant Deen . 2015. A Survey on Feature Selection Techniques for Internet Traffic Classification,\" 2015 International Conference on Computational Intelligence and Communication Networks (CICN) , pp. 1375 - 1380 . Yogesh Dhote, Shikha Agrawal, and Anjana Jayant Deen. 2015. A Survey on Feature Selection Techniques for Internet Traffic Classification,\" 2015 International Conference on Computational Intelligence and Communication Networks (CICN), pp. 1375-1380."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence (CSAI '18)","author":"Ding Yalei","year":"2018","unstructured":"Yalei Ding and Yuqing Zhai . 2018 . Intrusion Detection System for NSL-KDD Dataset Using Convolutional Neural Networks . In Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence (CSAI '18) . Association for Computing Machinery, New York, NY, USA, 81\u201385. Yalei Ding and Yuqing Zhai. 2018. Intrusion Detection System for NSL-KDD Dataset Using Convolutional Neural Networks. In Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence (CSAI '18). Association for Computing Machinery, New York, NY, USA, 81\u201385."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176653.3176717"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3443467.3443728"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 2nd International Conference on Networking, Information Systems & Security (NISS19)","author":"Mrabet Zakaria El","year":"2019","unstructured":"Zakaria El Mrabet , Mehdi Ezzari , Hassan Elghazi , and Badr Abou El Majd . 2019 . Deep Learning-Based Intrusion Detection System for Advanced Metering Infrastructure . In Proceedings of the 2nd International Conference on Networking, Information Systems & Security (NISS19) . Association for Computing Machinery, New York, NY, USA, Article 58, 1\u20137. Zakaria El Mrabet, Mehdi Ezzari, Hassan Elghazi, and Badr Abou El Majd. 2019. Deep Learning-Based Intrusion Detection System for Advanced Metering Infrastructure. In Proceedings of the 2nd International Conference on Networking, Information Systems & Security (NISS19). Association for Computing Machinery, New York, NY, USA, Article 58, 1\u20137."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1109\/NetSoft48620.2020.9165381","volume-title":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","author":"Bendiab Gueltoum","year":"2020","unstructured":"Gueltoum Bendiab , Stavros Shiaeles , Abdulrahman Alruban , and Nicholas Kolokotronis . 2020 . IoT Malware Network Traffic Classification using Visual Representation and Deep Learning . 2020 6th IEEE Conference on Network Softwarization (NetSoft) , 2020, pp. 444 - 449 . Gueltoum Bendiab, Stavros Shiaeles, Abdulrahman Alruban, and Nicholas Kolokotronis. 2020. IoT Malware Network Traffic Classification using Visual Representation and Deep Learning. 2020 6th IEEE Conference on Network Softwarization (NetSoft), 2020, pp. 444-449."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","first-page":"712","DOI":"10.1109\/ICOIN.2017.7899588","volume-title":"2017 International Conference on Information Networking (ICOIN)","author":"Wang Wei","year":"2017","unstructured":"Wei Wang , Ming Zhu , Xuewen Zeng , Xiaozhou Ye and Yiqiang Sheng . 2017 Malware traffic classification using convolutional neural network for representation learning . 2017 International Conference on Information Networking (ICOIN) , pp. 712 - 717 . Wei Wang, Ming Zhu, Xuewen Zeng, Xiaozhou Ye and Yiqiang Sheng. 2017Malware traffic classification using convolutional neural network for representation learning. 2017 International Conference on Information Networking (ICOIN), pp. 712-717."},{"key":"e_1_3_2_1_18_1","first-page":"71","volume-title":"Android Malware Detection and Classification Based on Network Traffic Using Deep Learning. 2021 7th International Conference on Web Research (ICWR)","author":"Gohari Mahshid","year":"2021","unstructured":"Mahshid Gohari , Sattar Hashemi , and Lida Abdi . 2021 . Android Malware Detection and Classification Based on Network Traffic Using Deep Learning. 2021 7th International Conference on Web Research (ICWR) , pp. 71 - 77 . Mahshid Gohari, Sattar Hashemi, and Lida Abdi. 2021. Android Malware Detection and Classification Based on Network Traffic Using Deep Learning. 2021 7th International Conference on Web Research (ICWR), pp. 71-77."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.10.013"}],"event":{"name":"ICBDC 2022: 2022 7th International Conference on Big Data and Computing","location":"Shenzhen China","acronym":"ICBDC 2022"},"container-title":["2022 7th International Conference on Big Data and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545801.3545820","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3545801.3545820","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:48Z","timestamp":1750188648000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545801.3545820"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,27]]},"references-count":20,"alternative-id":["10.1145\/3545801.3545820","10.1145\/3545801"],"URL":"https:\/\/doi.org\/10.1145\/3545801.3545820","relation":{},"subject":[],"published":{"date-parts":[[2022,5,27]]}}}