{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T13:53:09Z","timestamp":1754488389815,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,9]],"date-time":"2022-12-09T00:00:00Z","timestamp":1670544000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,9]]},"DOI":"10.1145\/3579895.3579899","type":"proceedings-article","created":{"date-parts":[[2023,4,4]],"date-time":"2023-04-04T17:20:44Z","timestamp":1680628844000},"page":"18-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Identify VPN Traffic Under HTTPS Tunnel Using Three-Dimensional Sequence Features"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7136-1493","authenticated-orcid":false,"given":"Yaning","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer Science (National Pilot Software Engineering School), Beijing University of Posts and Telecommunications Beijing, China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9922-7250","authenticated-orcid":false,"given":"Weishi","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Computer Science (National Pilot Software Engineering School), Beijing University of Posts and Telecommunications Beijing, China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2676-8064","authenticated-orcid":false,"given":"Shuzhuang","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science (National Pilot Software Engineering School), Beijing University of Posts and Telecommunications Beijing, China, China"}]}],"member":"320","published-online":{"date-parts":[[2023,4,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1002\/nem.2090"},{"key":"e_1_3_2_1_2_1","volume-title":"Transnational cybercrime is getting worse and stronger, China and ASEAN seek to join hands","author":"Huang Y","year":"2015","unstructured":"Huang Y , Lin Y. Transnational cybercrime is getting worse and stronger, China and ASEAN seek to join hands . 2015 . http:\/\/www.12377.cn\/txt\/2015-09\/15\/content_8235494. Huang Y, Lin Y. Transnational cybercrime is getting worse and stronger, China and ASEAN seek to join hands. 2015. http:\/\/www.12377.cn\/txt\/2015-09\/15\/content_8235494."},{"key":"e_1_3_2_1_3_1","volume-title":"Data Analytics And Assessment (Cyber SA)","author":"Miller S","year":"2018","unstructured":"Miller S , Curran K , Lunney T. Multilayer perceptron neural network for detection of encrypted VPN network traffic[C]\/\/2018 International Conference On Cyber Situational Awareness , Data Analytics And Assessment (Cyber SA) . IEEE , 2018 : 1-8. Miller S, Curran K, Lunney T. Multilayer perceptron neural network for detection of encrypted VPN network traffic[C]\/\/2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). IEEE, 2018: 1-8."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJDCF.286756"},{"key":"e_1_3_2_1_5_1","unstructured":"Peterson A. 2014. \u2018The Sony Pictures hack explained.\u2019 Washington Post 18 December. Available at: https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2014\/12\/18\/the-sony-pictures-hack-explained\/  Peterson A. 2014. \u2018The Sony Pictures hack explained.\u2019 Washington Post 18 December. Available at: https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2014\/12\/18\/the-sony-pictures-hack-explained\/"},{"key":"e_1_3_2_1_6_1","volume-title":"CNN. Available at: http:\/\/money.cnn.com\/2014\/12\/24\/technology\/security\/sony-hack-facts\/","author":"Pagliery J.","year":"2017","unstructured":"Pagliery , J. 2014. What caused Sony hack: What we know now , CNN. Available at: http:\/\/money.cnn.com\/2014\/12\/24\/technology\/security\/sony-hack-facts\/ ( Accessed : 6 December 2017 ) Pagliery, J. 2014. What caused Sony hack: What we know now, CNN. Available at: http:\/\/money.cnn.com\/2014\/12\/24\/technology\/security\/sony-hack-facts\/ (Accessed: 6 December 2017)"},{"key":"e_1_3_2_1_7_1","volume-title":"troyhunt.com","author":"Observations","year":"2017","unstructured":"Observations and thoughts on the LinkedIn data breach , troyhunt.com . 2017 . Available at: https:\/\/www.troyhunt.com\/observations-and-thoughts-on-the-linkedin-data-breach\/ (Accessed: 6 December 2017). Observations and thoughts on the LinkedIn data breach, troyhunt.com. 2017. Available at: https:\/\/www.troyhunt.com\/observations-and-thoughts-on-the-linkedin-data-breach\/ (Accessed: 6 December 2017)."},{"key":"e_1_3_2_1_8_1","unstructured":"Ministry of Industry and Information Technology of the People's Republic of China. 2020. http:\/\/www.miit.gov.cn\/n1146295\/n1652858\/n1652930\/n3757020\/c5471946\/content.  Ministry of Industry and Information Technology of the People's Republic of China. 2020. http:\/\/www.miit.gov.cn\/n1146295\/n1652858\/n1652930\/n3757020\/c5471946\/content."},{"key":"e_1_3_2_1_9_1","volume-title":"freedom on the net2018.https:\/\/freedomhouse.org\/report\/freedom-net\/freedom-net-2018\/rise-digital-authoritarianism","author":"House F.","year":"2018","unstructured":"House , F. The rise of digital authoritarianism. freedom on the net2018.https:\/\/freedomhouse.org\/report\/freedom-net\/freedom-net-2018\/rise-digital-authoritarianism , 2018 House, F.The rise of digital authoritarianism. freedom on the net2018.https:\/\/freedomhouse.org\/report\/freedom-net\/freedom-net-2018\/rise-digital-authoritarianism, 2018"},{"key":"e_1_3_2_1_10_1","unstructured":"Google. 2022. https:\/\/transparencyreport.google.com\/https\/overview?hl=zh_CN.  Google. 2022. https:\/\/transparencyreport.google.com\/https\/overview?hl=zh_CN."},{"key":"e_1_3_2_1_11_1","volume-title":"Exploring tor's activity through long-term passive TLS traffic measurement[C]\/\/International Conference on Passive and Active Network Measurement","author":"Amann J","year":"2016","unstructured":"Amann J , Sommer R. Exploring tor's activity through long-term passive TLS traffic measurement[C]\/\/International Conference on Passive and Active Network Measurement . Springer , Cham , 2016 : 3-15. Amann J, Sommer R. Exploring tor's activity through long-term passive TLS traffic measurement[C]\/\/International Conference on Passive and Active Network Measurement. Springer, Cham, 2016: 3-15."},{"key":"e_1_3_2_1_12_1","first-page":"2019","article-title":"VPN Traffic Detection in SSL-Protected Channel[J]","author":"Zain M","year":"2019","unstructured":"Zain ul Abideen M , Saleem S , Ejaz M . VPN Traffic Detection in SSL-Protected Channel[J] . Security and Communication Networks , 2019 , 2019 . Zain ul Abideen M, Saleem S, Ejaz M. VPN Traffic Detection in SSL-Protected Channel[J]. Security and Communication Networks, 2019, 2019.","journal-title":"Security and Communication Networks"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Draper-Gil\n      G Lashkari\n      A H Mamun M S I Characterization of encrypted and vpn traffic using time-related[C]\/\/Proceedings of the 2nd international conference on information systems security and privacy (ICISSP).\n  2016\n  : \n  407\n  -\n  414\n  .  Draper-Gil G Lashkari A H Mamun M S I Characterization of encrypted and vpn traffic using time-related[C]\/\/Proceedings of the 2nd international conference on information systems security and privacy (ICISSP). 2016: 407-414.","DOI":"10.5220\/0005740704070414"},{"key":"e_1_3_2_1_14_1","unstructured":"Lashkari\n      A H Draper-Gil\n      G Mamun M S I Characterization of tor traffic using time based features[C]\/\/ICISSp.\n  2017\n  : \n  253\n  -\n  262\n  .  Lashkari A H Draper-Gil G Mamun M S I Characterization of tor traffic using time based features[C]\/\/ICISSp. 2017: 253-262."},{"key":"e_1_3_2_1_15_1","unstructured":"\u4f55\u6c38\u5fe0 \u674e\u54cd \u9648\u7f8e\u73b2 \u7b49. \u57fa\u4e8e\u4e91\u6d41\u91cf\u6df7\u6dc6\u7684 Tor \u533f\u540d\u901a\u4fe1\u8bc6\u522b\u65b9\u6cd5[J]. 2017.  \u4f55\u6c38\u5fe0 \u674e\u54cd \u9648\u7f8e\u73b2 \u7b49. \u57fa\u4e8e\u4e91\u6d41\u91cf\u6df7\u6dc6\u7684 Tor \u533f\u540d\u901a\u4fe1\u8bc6\u522b\u65b9\u6cd5[J]. 2017."},{"key":"e_1_3_2_1_16_1","volume-title":"Meek-based tor traffic identification with hidden markov model[C]\/\/2018 IEEE 20th International Conference on High Performance Computing and Communications","author":"Yao Z","year":"2018","unstructured":"Yao Z , Ge J , Wu Y , Meek-based tor traffic identification with hidden markov model[C]\/\/2018 IEEE 20th International Conference on High Performance Computing and Communications ; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS). IEEE , 2018 : 335-340. Yao Z, Ge J, Wu Y, Meek-based tor traffic identification with hidden markov model[C]\/\/2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS). IEEE, 2018: 335-340."},{"key":"e_1_3_2_1_17_1","volume-title":"Multilayer perceptron neural network for detection of encrypted VPN network traffic[C]\/\/2018 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA)","author":"Miller S","year":"2018","unstructured":"Miller S , Curran K , Lunney T. Multilayer perceptron neural network for detection of encrypted VPN network traffic[C]\/\/2018 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA) . IEEE , 2018 : 1-8. Miller S, Curran K, Lunney T. Multilayer perceptron neural network for detection of encrypted VPN network traffic[C]\/\/2018 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA). IEEE, 2018: 1-8."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJWNBT.2020070104"},{"volume-title":"Seeing through network-protocol obfuscation[C]\/\/Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 2015: 57-69","author":"Wang L","key":"e_1_3_2_1_19_1","unstructured":"Wang L , Dyer K P , Akella A , Seeing through network-protocol obfuscation[C]\/\/Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 2015: 57-69 . Wang L, Dyer K P, Akella A, Seeing through network-protocol obfuscation[C]\/\/Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 2015: 57-69."},{"key":"e_1_3_2_1_20_1","volume-title":"End-to-end encrypted traffic classification with one-dimensional convolution neural networks[C]\/\/2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","author":"Wang W","year":"2017","unstructured":"Wang W , Zhu M , Wang J , End-to-end encrypted traffic classification with one-dimensional convolution neural networks[C]\/\/2017 IEEE International Conference on Intelligence and Security Informatics (ISI) . IEEE , 2017 : 43-48. Wang W, Zhu M, Wang J, End-to-end encrypted traffic classification with one-dimensional convolution neural networks[C]\/\/2017 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2017: 43-48."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-019-00930-6"},{"key":"e_1_3_2_1_22_1","volume-title":"Three-dimensional convolutional neural network based traffic classification for wireless communications[C]\/\/2018 IEEE Global Conference on Signal and Information Processing (GlobalSIP)","author":"Ran J","year":"2018","unstructured":"Ran J , Chen Y , Li S. Three-dimensional convolutional neural network based traffic classification for wireless communications[C]\/\/2018 IEEE Global Conference on Signal and Information Processing (GlobalSIP) . IEEE , 2018 : 624-627. Ran J, Chen Y, Li S. Three-dimensional convolutional neural network based traffic classification for wireless communications[C]\/\/2018 IEEE Global Conference on Signal and Information Processing (GlobalSIP). IEEE, 2018: 624-627."}],"event":{"name":"ICNCC 2022: 2022 The 11th International Conference on Networks, Communication and Computing","acronym":"ICNCC 2022","location":"Beijing China"},"container-title":["Proceedings of the 2022 11th International Conference on Networks, Communication and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579895.3579899","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3579895.3579899","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:17Z","timestamp":1750183697000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579895.3579899"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,9]]},"references-count":22,"alternative-id":["10.1145\/3579895.3579899","10.1145\/3579895"],"URL":"https:\/\/doi.org\/10.1145\/3579895.3579899","relation":{},"subject":[],"published":{"date-parts":[[2022,12,9]]},"assertion":[{"value":"2023-04-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}