{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:44:04Z","timestamp":1740149044491,"version":"3.37.3"},"reference-count":16,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,7,8]],"date-time":"2020-07-08T00:00:00Z","timestamp":1594166400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702235","61801073","19KJB510019"],"award-info":[{"award-number":["61702235","61801073","19KJB510019"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702235","61801073","19KJB510019"],"award-info":[{"award-number":["61702235","61801073","19KJB510019"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010023","name":"Natural Science Research of Jiangsu Higher Education Institutions of China","doi-asserted-by":"publisher","award":["61702235","61801073","19KJB510019"],"award-info":[{"award-number":["61702235","61801073","19KJB510019"]}],"id":[{"id":"10.13039\/501100010023","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008045","name":"Nanjing University of Information Science and Technology","doi-asserted-by":"publisher","award":["61702235","61801073","19KJB510019"],"award-info":[{"award-number":["61702235","61801073","19KJB510019"]}],"id":[{"id":"10.13039\/501100008045","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,7,8]]},"abstract":"<jats:p>With the rapid growth of the encrypted network traffic, the identification to it becomes a hot topic in information security. Since the existing methods have difficulties in identifying the application which the encrypted traffic belongs to, a new encrypted traffic identification scheme is proposed in this paper. The proposed scheme has two levels. In the first level, the entropy and estimation of Monte Carlo <jats:italic>\u03c0<\/jats:italic> value as features are used to identify the encrypted traffic by C4.5 decision tree. In the second level, the application types are distinguished from the encrypted traffic selected above. First, the variational automatic encoder is used to extract the layer features, which is combined with the frequently-used stream features. Meanwhile, the mutual information is used to reduce the dimensionality of the combination features. Finally, the random forest classifier is used to obtain the optimal result. Compared with the existing methods, the experimental results show that the proposed scheme not only has faster convergence speed but also achieves better performance in the recognition accuracy, recall rate, and F1-Measure, which is higher than 97%.<\/jats:p>","DOI":"10.1155\/2020\/8863169","type":"journal-article","created":{"date-parts":[[2020,7,8]],"date-time":"2020-07-08T23:31:31Z","timestamp":1594251091000},"page":"1-10","source":"Crossref","is-referenced-by-count":3,"title":["An Encrypted Traffic Identification Scheme Based on the Multilevel Structure and Variational Automatic Encoder"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8557-9899","authenticated-orcid":true,"given":"Jiangtao","family":"Zhai","sequence":"first","affiliation":[{"name":"School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, China"},{"name":"School of Electronics & Information Engineering, Jiangsu University of Science & Technology, Zhenjiang, China"}]},{"given":"Huaifeng","family":"Shi","sequence":"additional","affiliation":[{"name":"School of Automation, Nanjing University of Science & Technology, Nanjing, China"}]},{"given":"Mingqian","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Changzhou Vocational Institute of Mechatronic Technology, Changzhou 213164, China"}]},{"given":"Zhongjun","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Electronics & Information Engineering, Jiangsu University of Science & Technology, Zhenjiang, China"}]},{"given":"Junjun","family":"Xing","sequence":"additional","affiliation":[{"name":"School of Electronics & Information Engineering, Jiangsu University of Science & Technology, Zhenjiang, China"}]}],"member":"311","reference":[{"issue":"11","key":"2","first-page":"1127","volume":"57","year":"2017","journal-title":"Journal of Tsing Hua University (Natural Science Edition)"},{"issue":"9","key":"3","first-page":"154","volume":"37","year":"2016","journal-title":"Journal of Software"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.08.238"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31966-5_4"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2017.2692682"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.3724\/sp.j.1001.2013.04279"},{"issue":"2","key":"10","first-page":"142","volume":"42","year":"2015","journal-title":"Computer Science"},{"issue":"4","key":"11","first-page":"555","volume":"4","year":"2014","journal-title":"Computer & Digital Engineering"},{"issue":"4","key":"12","first-page":"655","volume":"47","year":"2017","journal-title":"Journal of Southeast University"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.3724\/sp.j.1001.2009.03444"},{"issue":"11","key":"14","first-page":"2870","volume":"27","year":"2016","journal-title":"Journal of Software"},{"issue":"11","key":"15","first-page":"1530","volume":"35","year":"2014","journal-title":"Journal of Northeastern University"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2848210"},{"first-page":"124","volume-title":"Encrypted traffic classification based on an improved clustering algorithm","year":"2013","key":"18"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04030-2"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.11.007"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8863169.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8863169.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8863169.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,8]],"date-time":"2020-07-08T23:31:37Z","timestamp":1594251097000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8863169\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,8]]},"references-count":16,"alternative-id":["8863169","8863169"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8863169","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2020,7,8]]}}}