{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T03:27:11Z","timestamp":1769311631369,"version":"3.49.0"},"reference-count":29,"publisher":"Tech Science Press","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.063308","type":"journal-article","created":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T04:28:41Z","timestamp":1744345721000},"page":"5811-5829","source":"Crossref","is-referenced-by-count":1,"title":["Real-Time Identification Technology for Encrypted DNS Traffic with Privacy Protection"],"prefix":"10.32604","volume":"83","author":[{"given":"Zhipeng","family":"Qin","sequence":"first","affiliation":[]},{"given":"Hanbing","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Biyang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yitao","family":"Li","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","series-title":"2021 IEEE European Symposium on Security and Privacy (EuroS&P)","first-page":"252","article-title":"Privacy of DNS-over-HTTPS: requiem for a dream?","author":"Csikor","year":"2021"},{"key":"ref2","doi-asserted-by":"crossref","unstructured":"Siby S, Juarez M, Diaz C, Vallina-Rodriguez N, Troncoso C. Encrypted DNS\u2013> privacy? A traffic analysis perspective. arXiv:1906.09682. 2019.","DOI":"10.14722\/ndss.2020.24301"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"2","DOI":"10.12968\/S1361-3723(22)70572-6","article-title":"DNS: the good, the bad and the moot","volume":"2022","author":"Kambourakis","year":"2022","journal-title":"Comput Fraud Secur"},{"key":"ref4","unstructured":"Hoffman PE. DNS security extensions (DNSSEC). RFC 9364. 2023 [cited 2025 Feb 10]. Available from: https:\/\/docs.microsoft.com\/zh-cn\/previous-versions\/windows\/it-pro\/windows-server-2008-R2-and-2008\/ee683904(v=ws.10)."},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3547331","article-title":"A survey on DNS encryption: current development, malware misuse, and inference techniques","volume":"55","author":"Lyu","year":"2022","journal-title":"ACM Comput Surv"},{"key":"ref6","series-title":"2021 IEEE International Conference on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom)","first-page":"352","article-title":"Encrypt DNS traffic: automated feature learning method for detecting DNS tunnels","author":"Ding","year":"2021"},{"key":"ref7","series-title":"2020 IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Cloud and Big Data Computing, International Conference on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","first-page":"63","article-title":"Detection of doh tunnels using time-series classification of encrypted traffic","author":"MontazeriShatoori","year":"2020"},{"key":"ref8","series-title":"2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT)","first-page":"1","article-title":"Detecting malicious dns over https traffic using machine learning","author":"Singh","year":"2020"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"47","DOI":"10.3390\/computers12030047","article-title":"Detection of DoH traffic tunnels using deep learning for encrypted traffic classification","volume":"12","author":"Alzighaibi","year":"2023","journal-title":"Computers"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"19070","DOI":"10.1109\/JIOT.2024.3359297","article-title":"Edge computing for Industry 5.0: Fundamental, applications and research challenges","volume":"11","author":"Sharma","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1622","DOI":"10.1109\/COMST.2021.3075439","article-title":"Federated learning for internet of things: a comprehensive survey","volume":"23","author":"Nguyen","year":"2021","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"102463","DOI":"10.1016\/j.cose.2021.102463","article-title":"Research on lightweight anomaly detection of multimedia traffic in edge computing","volume":"111","author":"Zhao","year":"2021","journal-title":"Comput Secur"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"108146","DOI":"10.1016\/j.patcog.2021.108146","article-title":"Edge computing enabled video segmentation for real-time traffic monitoring in internet of vehicles","volume":"121","author":"Wan","year":"2022","journal-title":"Pattern Recognit"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"165","DOI":"10.2298\/CSIS200424038K","article-title":"Deep RNN-based network traffic classification scheme in edge computing system","volume":"19","author":"Kim","year":"2022","journal-title":"Comput Sci Inf Syst"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"2101","DOI":"10.1109\/TVT.2021.3057109","article-title":"Online traffic flow prediction for edge computing-enhanced autonomous and connected vehicles","volume":"70","author":"Song","year":"2021","journal-title":"IEEE Trans Vehicular Technol"},{"key":"ref16","first-page":"603","article-title":"Reviewing the transformational impact of edge computing on real-time data processing and analytics","volume":"5","author":"Modupe","year":"2024","journal-title":"Comput Sci IT Res J"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3679013","article-title":"When federated learning meets privacy-preserving computation","volume":"56","author":"Chen","year":"2024","journal-title":"ACM Comput Surv"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/s13042-022-01647-y","article-title":"A survey on federated learning: challenges and applications","volume":"14","author":"Wen","year":"2023","journal-title":"Int J Mach Learn Cybern"},{"key":"ref19","article-title":"Federated learning for network traffic analysis","author":"Huang","year":"2023","journal-title":"Politecnico di Torino"},{"key":"ref20","series-title":"2024 International Conference on Computing, Networking and Communications (ICNC)","first-page":"875","article-title":"Federated learning-based solution for DDoS detection in SDN","author":"Mateus","year":"2024"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"103597","DOI":"10.1016\/j.cose.2023.103597","article-title":"FLAD: adaptive federated learning for DDoS attack detection","volume":"137","author":"Doriguzzi-Corin","year":"2024","journal-title":"Comput Secur"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"6305","DOI":"10.3390\/s23146305","article-title":"Botnet detection and mitigation model for IoT networks using federated learning","volume":"23","author":"de Caldas Filho","year":"2023","journal-title":"Sensors"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"1898","DOI":"10.1109\/TCCN.2021.3101239","article-title":"Edge device identification based on federated learning and network traffic feature engineering","volume":"8","author":"He","year":"2021","journal-title":"IEEE Trans Cogn Commun Netw"},{"key":"ref24","series-title":"ICC 2020\u20132020 IEEE International Conference on Communications (ICC)","first-page":"1","article-title":"Client-edge-cloud hierarchical federated learning","author":"Liu","year":"2020"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"3799","DOI":"10.1109\/JIOT.2022.3174469","article-title":"Edge-based federated deep reinforcement learning for IoT traffic management","volume":"10","author":"Jarwan","year":"2022","journal-title":"IEEE Internet Things J"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"7751","DOI":"10.1109\/JIOT.2020.2991401","article-title":"Privacy-preserving traffic flow prediction: a federated learning approach","volume":"7","author":"Liu","year":"2020","journal-title":"IEEE Internet Things J"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"103091","DOI":"10.1016\/j.sysarc.2024.103091","article-title":"Network traffic classification based on federated semi-supervised learning","volume":"149","author":"Wang","year":"2024","journal-title":"J Syst Archit"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1109\/TC.2024.3474180","article-title":"Federated learning based DDoS attacks detection in large scale software-defined network","volume":"74","author":"Fotse","year":"2024","journal-title":"IEEE Trans Comput"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"e13","DOI":"10.1561\/116.00000102","article-title":"Editorial for the special issue on learning, security, AIoT for emerging communication\/networking systems","volume":"12","author":"Lai","year":"2023","journal-title":"APSIPA Trans Signal Inf Process"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-3\/TSP_CMC_63308\/TSP_CMC_63308.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:28:57Z","timestamp":1763342937000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n3\/61040"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":29,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.063308","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}