{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T05:13:16Z","timestamp":1766812396233,"version":"3.48.0"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:00:00Z","timestamp":1766448000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T00:00:00Z","timestamp":1766793600000},"content-version":"vor","delay-in-days":4,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"DOI":"10.1186\/s40537-025-01183-w","type":"journal-article","created":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T08:24:11Z","timestamp":1766478251000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Application of natural language processing techniques to network traffic processing for classification using deep learning models"],"prefix":"10.1186","volume":"12","author":[{"given":"Ana M.","family":"Maitin","sequence":"first","affiliation":[]},{"given":"Carlos","family":"Arranz-Luque","sequence":"additional","affiliation":[]},{"given":"Emilio","family":"Alba","sequence":"additional","affiliation":[]},{"given":"\u00c1lvaro J.","family":"Garc\u00eda-Tejedor","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,23]]},"reference":[{"issue":"1","key":"1183_CR1","first-page":"407","volume":"71","author":"M Umair","year":"2021","unstructured":"Umair M, Iqbal Z, Bilal M, Nebhen J, Almohamad T, Mehmood R. An efficient internet traffic classification system using deep learning for IoT. Comput Mater Contin. 2021;71(1):407\u201322.","journal-title":"Comput Mater Contin"},{"key":"1183_CR2","doi-asserted-by":"crossref","unstructured":"Cheng G, Wang S. Traffic classification based on port connection pattern. En: 2011 International Conference on Computer Science and Service System (CSSS). 2011. pp. 914-7. Web: https:\/\/ieeexplore.ieee.org\/document\/5974374","DOI":"10.1109\/CSSS.2011.5974374"},{"key":"1183_CR3","unstructured":"Azab A, Khasawneh M, Alrabaee S, Choo KKR, Sarsour M. Network traffic classification: Techniques, datasets, and challenges. Digit Commun Netw. 18 de septiembre de 2022; Web: https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2352864822001845"},{"issue":"14","key":"1183_CR4","doi-asserted-by":"publisher","first-page":"6967","DOI":"10.3390\/app12146967","volume":"12","author":"AM Maitin","year":"2022","unstructured":"Maitin AM, Romero Mu\u00f1oz JP, Garc\u00eda-Tejedor \u00c1J. Survey of machine learning techniques in the analysis of EEG signals for Parkinson\u2019s disease: A systematic review. Appl Sci Enero De. 2022;12(14):6967.","journal-title":"Appl Sci Enero De"},{"key":"1183_CR5","doi-asserted-by":"publisher","unstructured":"Samuel AL. Some Studies in Machine Learning Using the Game of Checkers. II\u2014Recent Progress. En: Levy DNL, editor. Computer Games I. New York, NY: Springer; 1988. pp. 366\u2013400. Web: https:\/\/doi.org\/10.1007\/978-1-4613-8716-9_15","DOI":"10.1007\/978-1-4613-8716-9_15"},{"key":"1183_CR6","unstructured":"Explaining Deep Learning Models for Per-packet Encrypted Network Traffic Classification. Web: https:\/\/ieeexplore.ieee.org\/document\/9887744\/"},{"key":"1183_CR7","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.comcom.2021.01.021","volume":"170","author":"M Abbasi","year":"2021","unstructured":"Abbasi M, Shahraki A, Taherkordi A. Deep learning for network traffic monitoring and analysis (NTMA): A survey. Comput Commun 15 De Marzo De. 2021;170:19\u201341.","journal-title":"Comput Commun 15 De Marzo De"},{"key":"1183_CR8","doi-asserted-by":"publisher","unstructured":"Lin X, Xiong G, Gou G, Li Z, Shi J, Yu J, ET-BERT:. A Contextualized Datagram Representation with Pre-training Transformers for Encrypted Traffic Classification. En: Proceedings of the ACM Web Conference 2022. New York, NY, USA: Association for Computing Machinery; 2022. pp. 633\u2013\u200942. (WWW \u201922). Web: https:\/\/doi.org\/10.1145\/3485447.3512217","DOI":"10.1145\/3485447.3512217"},{"key":"1183_CR9","doi-asserted-by":"crossref","unstructured":"Rombach R, Blattmann A, Lorenz D, Esser P, Ommer B. High-Resolution Image Synthesis with Latent Diffusion Models. arXiv; 2022. Web: http:\/\/arxiv.org\/abs\/2112.10752","DOI":"10.1109\/CVPR52688.2022.01042"},{"issue":"7792","key":"1183_CR10","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1038\/s41586-019-1923-7","volume":"577","author":"AW Senior","year":"2020","unstructured":"Senior AW, Evans R, Jumper J, Kirkpatrick J, Sifre L, Green T, et al. Improved protein structure prediction using potentials from deep learning. Nat Enero De. 2020;577(7792):706\u201310.","journal-title":"Nat Enero De"},{"key":"1183_CR11","unstructured":"OpenAI, Achiam J, Adler S, Agarwal S, Ahmad L, Akkaya I et al. GPT-4 Technical Report. arXiv; 2023. Web: http:\/\/arxiv.org\/abs\/2303.08774"},{"key":"1183_CR12","doi-asserted-by":"crossref","unstructured":"Vinayakumar R, Soman KP, Poornachandran P. Evaluating shallow and deep networks for secure shell (ssh)traffic analysis. En: 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI). 2017. pp. 266\u2013\u200974. Web: https:\/\/ieeexplore.ieee.org\/document\/8125851","DOI":"10.1109\/ICACCI.2017.8125851"},{"key":"1183_CR13","doi-asserted-by":"crossref","unstructured":"Yang H, He Q, Liu Z, Zhang Q. Malicious encryption traffic detection based on NLP. Secur Commun Netw. 3 de agosto de 2021;2021:e9960822.","DOI":"10.1155\/2021\/9960822"},{"key":"1183_CR14","unstructured":"Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN et al. Attention Is All You Need. arXiv; 2017. Web: http:\/\/arxiv.org\/abs\/1706.03762"},{"key":"1183_CR15","doi-asserted-by":"crossref","unstructured":"Cheng J, He R, Yuepeng E, Wu Y, You J, Li T. Real-Time Encrypted Traffic Classification via Lightweight Neural Networks. En: GLOBECOM 2020\u20132020 IEEE Global Communications Conference. 2020. pp. 1\u20136. Web: https:\/\/ieeexplore.ieee.org\/document\/9322309","DOI":"10.1109\/GLOBECOM42002.2020.9322309"},{"key":"1183_CR16","doi-asserted-by":"publisher","first-page":"141674","DOI":"10.1109\/ACCESS.2023.3343189","volume":"11","author":"M Seydali","year":"2023","unstructured":"Seydali M, Khunjush F, Akbari B, Dogani J. CBS: A deep learning approach for encrypted traffic classification with mixed Spatio-Temporal and statistical features. IEEE Access. 2023;11:141674\u2013702.","journal-title":"IEEE Access"},{"issue":"4","key":"1183_CR17","doi-asserted-by":"publisher","first-page":"5165","DOI":"10.1007\/s10586-023-04234-0","volume":"27","author":"M Seydali","year":"2024","unstructured":"Seydali M, Khunjush F, Dogani J. Streaming traffic classification: a hybrid deep learning and big data approach. Clust Comput 1 De Julio De. 2024;27(4):5165\u201393.","journal-title":"Clust Comput 1 De Julio De"},{"key":"1183_CR18","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.inffus.2021.02.009","volume":"72","author":"J Zhao","year":"2021","unstructured":"Zhao J, Jing X, Yan Z, Pedrycz W. Network traffic classification for data fusion: A survey. Inf Fusion 1 De Agosto De. 2021;72:22\u201347.","journal-title":"Inf Fusion 1 De Agosto De"},{"key":"1183_CR19","doi-asserted-by":"publisher","first-page":"18042","DOI":"10.1109\/ACCESS.2017.2747560","volume":"5","author":"M Lopez-Martin","year":"2017","unstructured":"Lopez-Martin M, Carro B, Sanchez-Esguevillas A, Lloret J. Network traffic classifier with convolutional and recurrent neural networks for internet of things. IEEE Access. 2017;5:18042\u201350.","journal-title":"IEEE Access"},{"issue":"2","key":"1183_CR20","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1109\/TNSM.2019.2899085","volume":"16","author":"G Aceto","year":"2019","unstructured":"Aceto G, Ciuonzo D, Montieri A, Pescap\u00e9 A. Mobile encrypted traffic classification using deep learning: experimental evaluation, lessons learned, and challenges. IEEE Trans Netw Serv Manag Junio De. 2019;16(2):445\u201358.","journal-title":"IEEE Trans Netw Serv Manag Junio De"},{"key":"1183_CR21","doi-asserted-by":"crossref","unstructured":"Aceto G, Ciuonzo D, Montieri A, Pescap\u00e9 A. Mobile Encrypted Traffic Classification Using Deep Learning. En: 2018 Network Traffic Measurement and Analysis Conference (TMA). 2018. pp. 1\u20138. Web: https:\/\/ieeexplore.ieee.org\/document\/8506558","DOI":"10.23919\/TMA.2018.8506558"},{"key":"1183_CR22","doi-asserted-by":"publisher","unstructured":"Ting KM. Confusion Matrix. En: Sammut C, Webb GI, editores. Encyclopedia of Machine Learning. Boston, MA: Springer US; 2010. pp. 209\u2013209. Web: https:\/\/doi.org\/10.1007\/978-0-387-30164-8_157","DOI":"10.1007\/978-0-387-30164-8_157"},{"key":"1183_CR23","unstructured":"A Coefficient of Agreement for Nominal Scales - Jacob Cohen. 1960. Web: https:\/\/journals.sagepub.com\/doi\/10.1177\/001316446002000104"},{"issue":"5","key":"1183_CR24","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/j.compbiolchem.2004.09.006","volume":"28","author":"J Gorodkin","year":"2004","unstructured":"Gorodkin J. Comparing two K-category assignments by a K-category correlation coefficient. Comput Biol Chem 1 De Diciembre De. 2004;28(5):367\u201374.","journal-title":"Comput Biol Chem 1 De Diciembre De"},{"key":"1183_CR25","unstructured":"Pattern Recognition and Machine Learning. Web: https:\/\/link.springer.com\/book\/9780387310732"},{"key":"1183_CR26","unstructured":"VPN. 2016| Datasets| Research| Canadian Institute for Cybersecurity| UNB. Web: https:\/\/www.unb.ca\/cic\/datasets\/vpn.html"},{"key":"1183_CR27","first-page":"106944","volume":"165","author":"G Aceto","year":"2019","unstructured":"Aceto G, Ciuonzo D, Montieri A, Pescap\u00e8 A. MIMETIC: mobile encrypted traffic classification using multimodal deep learning. Comput Netw 24 De Diciembre De. 2019;165:106944.","journal-title":"Comput Netw 24 De Diciembre De"}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s40537-025-01183-w","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01183-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01183-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T05:10:59Z","timestamp":1766812259000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s40537-025-01183-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,23]]},"references-count":27,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["1183"],"URL":"https:\/\/doi.org\/10.1186\/s40537-025-01183-w","relation":{},"ISSN":["2196-1115"],"issn-type":[{"type":"electronic","value":"2196-1115"}],"subject":[],"published":{"date-parts":[[2025,12,23]]},"assertion":[{"value":"1 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"277"}}