{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T09:54:29Z","timestamp":1774605269729,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,4,10]],"date-time":"2023-04-10T00:00:00Z","timestamp":1681084800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,4,10]],"date-time":"2023-04-10T00:00:00Z","timestamp":1681084800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>The rapid advancement of the Internet has brought a exponential growth in network traffic. At present, devices deployed at edge nodes process huge amount of data, extract key features of network traffic and then forward them to the cloud server\/data center. However, since the efficiency of mobile terminal devices in identifying and classifying encrypted and malicious traffic lags behind, how to identify network traffic more efficiently and accurately remains a challenging problem. We design a convolutional neural network model: One-dimensional convolutional neural network with hexadecimal data (HexCNN-1D) that combines normalized processing and attention mechanisms.\u00a0By adding the attention mechanism modules Global Attention Block (GAB) and Category Attention Block (CAB), network traffic is classified and identified. By extracting effective load information from hexadecimal network traffic, our model can identify most categories of network traffic including encrypted and malicious traffic data. The experimental results show that the average accuracy is 98.8%. Our model can greatly improve the accuracy of network traffic data recognition.<\/jats:p>","DOI":"10.1186\/s13677-023-00430-w","type":"journal-article","created":{"date-parts":[[2023,4,10]],"date-time":"2023-04-10T03:02:33Z","timestamp":1681095753000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Identification of encrypted and malicious network traffic based on one-dimensional convolutional neural network"],"prefix":"10.1186","volume":"12","author":[{"given":"Yan","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Huiling","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Yanling","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Han","sequence":"additional","affiliation":[]},{"given":"Hongyang","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Xianheng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Chang","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,10]]},"reference":[{"issue":"16","key":"430_CR1","doi-asserted-by":"publisher","first-page":"12588","DOI":"10.1109\/jiot.2021.3077449","volume":"8","author":"X Zhou","year":"2021","unstructured":"Zhou X, Xu X, Liang W, Zeng Z, Yan Z (2021) Deep-Learning-Enhanced Multitarget Detection for End\u2013Edge\u2013Cloud Surveillance in Smart IoT. IEEE Internet Things J 8(16):12588\u201312596. https:\/\/doi.org\/10.1109\/jiot.2021.3077449","journal-title":"IEEE Internet Things J"},{"issue":"16","key":"430_CR2","doi-asserted-by":"publisher","first-page":"14988","DOI":"10.1109\/jiot.2021.3077937","volume":"9","author":"X Zhou","year":"2022","unstructured":"Zhou X, Yang X, Ma J, Wang KIK (2022) Energy-Efficient Smart Routing Based on Link Correlation Mining for Wireless Edge Computing in IoT. IEEE Internet Things J 9(16):14988\u201314997. https:\/\/doi.org\/10.1109\/jiot.2021.3077937","journal-title":"IEEE Internet Things J"},{"key":"430_CR3","doi-asserted-by":"publisher","unstructured":"H. Ahmed, A. Alsadoon, P. W. C. Prasad, N. Costadopoulos, L. S. Hoe and A. Elchoemi, \"Next generation cyber security solution for an eHealth organization,\" 2017 5th International Conference on Information and Communication Technology (ICoIC7), pp. 1\u20135, 2017, doi: https:\/\/doi.org\/10.1109\/ICoICT.2017.807 4723.","DOI":"10.1109\/ICoICT.2017.807"},{"issue":"5","key":"430_CR4","doi-asserted-by":"publisher","first-page":"3930","DOI":"10.1109\/jiot.2021.3100755","volume":"9","author":"SI Popoola","year":"2022","unstructured":"Popoola SI, Ande R, Adebisi B, Gui G, Hammoudeh M, Jogunola O (2022) Federated Deep Learning for Zero-Day Botnet Attack Detection in IoT-Edge Devices. IEEE Internet Things J 9(5):3930\u20133944. https:\/\/doi.org\/10.1109\/jiot.2021.3100755","journal-title":"IEEE Internet Things J"},{"issue":"18","key":"430_CR5","doi-asserted-by":"publisher","first-page":"17058","DOI":"10.1109\/jiot.2021.3131981","volume":"9","author":"J Ning","year":"2022","unstructured":"Ning J et al (2022) Malware Traffic Classification Using Domain Adaptation and Ladder Network for Secure Industrial Internet of Things. IEEE Internet Things J 9(18):17058\u201317069. https:\/\/doi.org\/10.1109\/jiot.2021.3131981","journal-title":"IEEE Internet Things J"},{"issue":"5","key":"430_CR6","doi-asserted-by":"publisher","first-page":"3272","DOI":"10.1109\/tnse.2021.3098011","volume":"9","author":"M Kumar","year":"2022","unstructured":"Kumar M, Mukherjee P, Verma K, Verma S, Rawat DB (2022) Improved Deep Convolutional Neural Network Based Malicious Node Detection and Energy-Efficient Data Transmission in Wireless Sensor Networks. IEEE Transactions on Network Science and Engineering 9(5):3272\u20133281. https:\/\/doi.org\/10.1109\/tnse.2021.3098011","journal-title":"IEEE Transactions on Network Science and Engineering"},{"issue":"22","key":"430_CR7","doi-asserted-by":"publisher","first-page":"22194","DOI":"10.1109\/jiot.2021.3091981","volume":"9","author":"Q Sun","year":"2022","unstructured":"Sun Q, Shi Y (2022) Model Predictive Control as a Secure Service for Cyber-Physical Systems: A Cloud-Edge Framework. IEEE Internet Things J 9(22):22194\u201322203. https:\/\/doi.org\/10.1109\/jiot.2021.3091981","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"430_CR8","doi-asserted-by":"publisher","first-page":"1262","DOI":"10.1109\/tcc.2020.2985651","volume":"10","author":"B He","year":"2022","unstructured":"He B, Wang J, Qi Q, Sun H, Liao J (2022) Towards Intelligent Provisioning of Virtualized Network Functions in Cloud of Things: A Deep Reinforcement Learning Based Approach. IEEE Transactions on Cloud Computing 10(2):1262\u20131274. https:\/\/doi.org\/10.1109\/tcc.2020.2985651","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"430_CR9","doi-asserted-by":"publisher","unstructured":"K. Yu, L. -z. Tan, X. -j. Wu and Z. -y. Gai, \"Machine Learning Driven Network Routing,\" 2019 6th International Conference on Systems and Informatics (ICSAI), pp. 705\u2013712, 2019, doi: https:\/\/doi.org\/10.1109\/ICSAI 48974.2019.9010507.","DOI":"10.1109\/ICSAI"},{"key":"430_CR10","doi-asserted-by":"publisher","unstructured":"B. Yang and D. Liu, \"Research on Network Traffic Identification based on Machine Learning and Deep Packet Inspection,\" 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), pp. 1887\u20131891, 2019, doi: https:\/\/doi.org\/10.1109\/ITNEC.2019.8729153.","DOI":"10.1109\/ITNEC.2019.8729153"},{"key":"430_CR11","doi-asserted-by":"publisher","unstructured":"S. Dong, P. Wang, and K. Abbas, \"A survey on deep learning and its applications, \" Computer Science Review, vol. 40, p. 100379, 2021, https:\/\/doi.org\/10.1016\/j.cosrev.2021.100379.","DOI":"10.1016\/j.cosrev.2021.100379"},{"issue":"4","key":"430_CR12","doi-asserted-by":"publisher","first-page":"3295","DOI":"10.1109\/jiot.2022.3179231","volume":"10","author":"X Zhou","year":"2023","unstructured":"Zhou X et al (2023) Edge-Enabled Two-Stage Scheduling Based on Deep Reinforcement Learning for Internet of Everything. IEEE Internet Things J 10(4):3295\u20133304. https:\/\/doi.org\/10.1109\/jiot.2022.3179231","journal-title":"IEEE Internet Things J"},{"key":"430_CR13","doi-asserted-by":"publisher","unstructured":"M. Li, D. Han, X. Yin, H. Liu, D. Li, \"Design and Implementation of an Anomaly Network Traffic Detection Model Integrating Temporal and Spatial Features\",\u00a0Security and Communication Networks, vol. 2021, Article ID 7045823, 15 pages, 2021. https:\/\/doi.org\/10.1155\/2021\/7045823.","DOI":"10.1155\/2021\/7045823"},{"key":"430_CR14","doi-asserted-by":"publisher","unstructured":"A. Karpathy, G. Toderici, S. Shetty, T. Leung, R. Sukthankar and L. Fei-Fei, \"Large-Scale Video Classification with Convolutional Neural Networks,\"\u00a02014 IEEE Conference on Computer Vision and Pattern Recognition, pp. 1725\u20131732, 2014, doi: https:\/\/doi.org\/10.1109\/CVPR.2014.223.","DOI":"10.1109\/CVPR.2014.223"},{"key":"430_CR15","doi-asserted-by":"publisher","unstructured":"J. Zhao, X. Jing, Z. Yan, W. Pedrycz, \"Network traffic classification for data fusion: A survey, \" Information Fusion. pp. 22\u201347, 2021, https:\/\/doi.org\/10.1016\/j.inffus.2021.02.009.","DOI":"10.1016\/j.inffus.2021.02.009"},{"issue":"1","key":"430_CR16","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1109\/tpds.2012.98","volume":"24","author":"J Zhang","year":"2013","unstructured":"Zhang J, Xiang Y, Wang Y, Zhou W, Xiang Y, Guan Y (2013) Network Traffic Classification Using Correlation Information. IEEE Trans Parallel Distrib Syst 24(1):104\u2013117. https:\/\/doi.org\/10.1109\/tpds.2012.98","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"430_CR17","doi-asserted-by":"publisher","unstructured":"Velan, Petr, et al. \"A survey of methods for encrypted traffic classification and analysis,\"\u00a0International Journal of Network Management. pp. 355\u2013374. 2015, https:\/\/doi.org\/10.1002\/nem.1901.","DOI":"10.1002\/nem.1901"},{"key":"430_CR18","doi-asserted-by":"publisher","unstructured":"Y. Hu, D. -M. Chiu and J. C. S. Lui, \"Application Identification Based on Network Behavioral Profiles,\"\u00a02008 16th Interntional Workshop on Quality of Service, Enschede, Netherlands, pp. 219\u2013228, 2008, doi: https:\/\/doi.org\/10.1109\/IWQOS.2008.31.","DOI":"10.1109\/IWQOS.2008.31"},{"key":"430_CR19","doi-asserted-by":"publisher","unstructured":"LiJuan Zhang, DongMing Li, Jing Shi and JunNan Wang, \"P2P-based weighted behavioral characteristics of deep packet inspection algorithm,\"\u00a02010 International Conference on Computer, Mechatronics, Control and Electronic Engineering, Changchun, pp. 468\u2013470, 2010, doi: https:\/\/doi.org\/10.1109\/CMCE.2010.5610457.","DOI":"10.1109\/CMCE.2010.5610457"},{"key":"430_CR20","doi-asserted-by":"publisher","unstructured":"F.\u00a0Risso,\u00a0M.\u00a0Baldi,\u00a0O.\u00a0Morandi,\u00a0A.\u00a0Baldini\u00a0and\u00a0P.\u00a0Monclus,\u00a0\"Lightweight,\u00a0Payload-Based\u00a0Traffic\u00a0Classification:\u00a0An\u00a0Experimental\u00a0Evaluation,\"\u00a0IEEE\u00a0International\u00a0Conference\u00a0on\u00a0Communications,\u00a0pp.\u00a05869\u20135875,\u00a02008, doi:\u00a0https:\/\/doi.org\/10.1109\/ICC.2008.1097.","DOI":"10.1109\/ICC.2008.1097"},{"key":"430_CR21","doi-asserted-by":"publisher","unstructured":"Cao Z, Xiong G, Zhao Y, et al,\u00a0\"A survey on encrypted traffic classification,\" [C]\/\/International Conference on Applications and Techniques in Information Security. vol. 490,\u00a0pp. 73\u201381, 2014, https:\/\/doi.org\/10.1007\/978-3-662-45670-5_8.","DOI":"10.1007\/978-3-662-45670-5_8"},{"issue":"3","key":"430_CR22","doi-asserted-by":"publisher","first-page":"1255","DOI":"10.1109\/tnet.2021.3136707","volume":"30","author":"Q Wu","year":"2022","unstructured":"Wu Q, He K, Chen X, Yu S, Zhang J (2022) Deep Transfer Learning Across Cities for Mobile Traffic Prediction. IEEE\/ACM Trans Networking 30(3):1255\u20131267. https:\/\/doi.org\/10.1109\/tnet.2021.3136707","journal-title":"IEEE\/ACM Trans Networking"},{"key":"430_CR23","doi-asserted-by":"publisher","unstructured":"M. Mainuddin, Z. Duan, Y. Dong, S. Salman and T. Taami, \"IoT Device Identification Based on Network Traffic Characteristics,\"\u00a0GLOBECOM 2022 - 2022 IEEE Global Communications Conference, pp. 6067\u20136072, 2022, doi: https:\/\/doi.org\/10.1109\/GLOBECOM48099.2022.10001639.","DOI":"10.1109\/GLOBECOM48099.2022.10001639"},{"key":"430_CR24","doi-asserted-by":"publisher","unstructured":"T. Zheng and B. Li, \"Poisoning Attacks on Deep Learning based Wireless Traffic Prediction,\"\u00a0IEEE INFOCOM 2022 - IEEE Conference on Computer Communications, pp. 660\u2013669, 2022, doi: https:\/\/doi.org\/10.1109\/INFOCOM48880.2022.9796791.","DOI":"10.1109\/INFOCOM48880.2022.9796791"},{"key":"430_CR25","doi-asserted-by":"publisher","unstructured":"A. Priya, S. Nandi and R. S. Goswami, \"An Analysis of real-time network traffic for identification of browser and application of user using clustering algorithm,\" 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), pp. 441\u2013445, 2018, doi: https:\/\/doi.org\/10.1109\/ICACCCN.2018.8748706.","DOI":"10.1109\/ICACCCN.2018.8748706"},{"key":"430_CR26","doi-asserted-by":"publisher","unstructured":"D. Wang, L. Zhang, Zhenlong Yuan, Y. Xue and Y. Dong, \"Characterizing Application Behaviors for classifying P2P traffic,\" 2014 International Conference on Computing, Networking and Communications (ICNC), pp. 21\u201325, 2014, doi: https:\/\/doi.org\/10.1109\/ICCNC.2014.6785298.","DOI":"10.1109\/ICCNC.2014.6785298"},{"key":"430_CR27","doi-asserted-by":"publisher","unstructured":"Coull S E and Dyer K P, \"Traffic analysis of encrypted messaging services: Apple imessage and beyond, \" ACM SIGCOMM Computer Communication Review, pp. 5\u201311, 2014, https:\/\/doi.org\/10.1145\/267704 6.2677048.","DOI":"10.1145\/267704"},{"key":"430_CR28","doi-asserted-by":"publisher","unstructured":"M. Di Mauro and M. Longo, \"Revealing encrypted WebRTC traffic via machine learning tools,\"\u00a02015 12th International Joint Conference on e-Business and Telecommunications (ICETE), pp. 259\u2013266. 2015, https:\/\/doi.org\/10.5220\/0005542202590266.","DOI":"10.5220\/0005542202590266"},{"issue":"4","key":"430_CR29","doi-asserted-by":"publisher","first-page":"4197","DOI":"10.1109\/TNSM.2021.3120804","volume":"18","author":"S Dong","year":"2021","unstructured":"Dong S, Xia Y, Peng T (2021) Network abnormal traffic detection model based on semisupervised deep reinforcement learning. IEEE Trans Netw Serv Manage 18(4):4197\u20134212. https:\/\/doi.org\/10.1109\/TNSM.2021.3120804","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"430_CR30","doi-asserted-by":"publisher","unstructured":"S. Dong, \"Multi class svm algorithm with active learning for network traffic classification, \" Expert Systems with Applications, vol. 176, pp. 114885, 2021, https:\/\/doi.org\/10.1016\/j.eswa.2021.114885.","DOI":"10.1016\/j.eswa.2021.114885"},{"key":"430_CR31","doi-asserted-by":"publisher","unstructured":"W. Wang, M. Zhu, J. Wang, X. Zeng and Z. Yang, \"End-to-end encrypted traffic classification with one-dimensional convolution neural networks,\"\u00a02017 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 43\u201348, 2017, doi: https:\/\/doi.org\/10.1109\/ISI.2017.8004872.","DOI":"10.1109\/ISI.2017.8004872"},{"key":"430_CR32","doi-asserted-by":"publisher","unstructured":"Wang W, Zhu M, Zeng X, et al., \"Malware traffic classification using convolutional neural network for representation learning,\" 2017 International conference on information networking (ICOIN). pp. 712\u2013717, 2017, doi: https:\/\/doi.org\/10.1109\/ICOIN.2017.7899588.","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"430_CR33","doi-asserted-by":"publisher","unstructured":"Lotfollahi M, Jafari Siavoshani M, Shirali Hossein Zade R, et al., \"Deep packet: A novel approach for encrypted traffic classification using deep learning,\" Soft Computing, pp. 1999\u20132012, 2020, https:\/\/doi.org\/10.1007\/s00500-019-04030-2.","DOI":"10.1007\/s00500-019-04030-2"},{"key":"430_CR34","doi-asserted-by":"publisher","unstructured":"Z. Zou, J. Ge, H. Zheng, Y. Wu, C. Han, and Z. Yao, \"Encrypted Traffic Classification with a Convolutional Long Short-Term Memory Neural Network,\" 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS), pp. 329\u2013334, 2018, doi: https:\/\/doi.org\/10.1109\/HPCC\/SmartCity\/DSS.2018.00074.","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2018.00074"},{"key":"430_CR35","doi-asserted-by":"publisher","first-page":"132950","DOI":"10.1109\/access.2020.3010637","volume":"8","author":"Z Bu","year":"2020","unstructured":"Bu Z, Zhou B, Cheng P, Zhang K, Ling Z-H (2020) Encrypted Network Traffic Classification Using Deep and Parallel Network-in-Network Models. IEEE Access 8:132950\u2013132959. https:\/\/doi.org\/10.1109\/access.2020.3010637","journal-title":"IEEE Access"},{"key":"430_CR36","doi-asserted-by":"publisher","unstructured":"H. Zhou, Y. Wang, X. Lei, and Y. Liu, \"A Method of Improved CNN Traffic Classification,\" presented at the 2017 13th International Conference on Computational Intelligence and Security (CIS), pp. 177\u2013181, 2017, doi: https:\/\/doi.org\/10.1109\/CIS.2017.00046.","DOI":"10.1109\/CIS.2017.00046"},{"key":"430_CR37","doi-asserted-by":"publisher","unstructured":"Samanta RK, Sanyal G, Bhattacharjee P, (2009)\u00a0\" Study and Analysis of Cellular Wireless Networks with Multiclass Traffic, \" 2009 IEEE International Advance Computing Conference, pp. 1081\u20131086.\u00a0https:\/\/doi.org\/10.1109\/IADCC.2009.4809164.","DOI":"10.1109\/IADCC.2009.4809164"},{"issue":"6","key":"430_CR38","doi-asserted-by":"publisher","first-page":"1483","DOI":"10.1109\/TPAMI.2019.2895781","volume":"42","author":"MM Kalayeh","year":"2020","unstructured":"Kalayeh MM, Shah M (2020) Training Faster by Separating Modes of Variation in Batch-Normalized Models. IEEE Trans Pattern Anal Mach Intell 42(6):1483\u20131500. https:\/\/doi.org\/10.1109\/TPAMI.2019.2895781","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"430_CR39","doi-asserted-by":"publisher","unstructured":"M. Awais, M. T. Bin Iqbal, and S. H. Bae, \"Revisiting Internal Covariate Shift for Batch Normalization,\" IEEE Trans Neural Netw Learn Syst, vol. 32, no. 11, pp. 5082\u20135092, Nov 2021, doi: https:\/\/doi.org\/10.1109\/TNNLS.2020.3026784.","DOI":"10.1109\/TNNLS.2020.3026784"},{"key":"430_CR40","doi-asserted-by":"publisher","unstructured":"S. Woo, J. Park, J.-Y. Lee, and I. S. Kweon, \"Cbam: Convolutional block attention module, \" Computer Vision \u2013 ECCV, pp. 3\u201319, 2018, https:\/\/doi.org\/10.1007\/978-3-030-01234-2_1.","DOI":"10.1007\/978-3-030-01234-2_1"},{"issue":"1","key":"430_CR41","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1109\/TMI.2020.3023463","volume":"40","author":"A He","year":"2021","unstructured":"He A, Li T, Li N, Wang K, Fu H (2021) CABNet: Category Attention Block for Imbalanced Diabetic Retinopathy Grading. IEEE Trans Med Imaging 40(1):143\u2013153. https:\/\/doi.org\/10.1109\/TMI.2020.3023463","journal-title":"IEEE Trans Med Imaging"},{"key":"430_CR42","doi-asserted-by":"publisher","unstructured":"J. L. Garcia-Balboa, M. V. Alba-Fernandez, F. J. Ariza-L\u00f3pez and J. Rodriguez-Avi, \"Homogeneity Test for Confusion Matrices: A Method and an Example,\" IGARSS 2018 - 2018 IEEE International Geoscience and Remote Sensing Symposium, pp. 1203\u20131205, 2018, doi: https:\/\/doi.org\/10.1109\/IGARSS.2018.851 7924.","DOI":"10.1109\/IGARSS.2018.851"},{"key":"430_CR43","doi-asserted-by":"publisher","unstructured":"I. Parashchuk and I. Kotenko, \"Identification of the Traffic Model Parameters for Network and Cloud Platform Security Management,\"\u00a02020 International Scientific and Technical Conference Modern Computer Network Technologies (MoNeTeC), Moscow, Russia, pp. 1\u20136, 2020, doi: https:\/\/doi.org\/10.1109\/MoNeTeC49726.2020.9258159.","DOI":"10.1109\/MoNeTeC49726.2020.9258159"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00430-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-023-00430-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00430-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,10]],"date-time":"2023-04-10T03:06:50Z","timestamp":1681096010000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-023-00430-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,10]]},"references-count":43,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["430"],"URL":"https:\/\/doi.org\/10.1186\/s13677-023-00430-w","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-2495959\/v1","asserted-by":"object"}]},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,10]]},"assertion":[{"value":"19 January 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 March 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"No ethical approval is required, and the authors express their consent to participate in the paper.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Authors provide consent for publication.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing of interests"}},{"value":"The datasets\nanalysed during the current study are available in the UNB and github repository,\nrespectively: VPN-NonVPN Dataset (ISCXVPN2016) is:\u00a0\n                      \n                      . The USTC\n\u2013 TFC 2016 dataset is:\n                      \n                      . All other data are available from the authors\nupon reasonable request.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Data Availability"}}],"article-number":"53"}}