A Novel Lightweight Anonymous Proxy Traffic Detection Method Based on Spatio-Temporal Features
Anonymous proxies are used by criminals for illegal network activities due to their anonymity, such as data theft and cyber attacks. Therefore, anonymous proxy traffic detection is very essential for network security. In recent years, detection based on deep learning has become a hot research topic,...
Saved in:
Published in | Sensors (Basel, Switzerland) Vol. 22; no. 11; p. 4216 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Switzerland
MDPI AG
01.06.2022
MDPI |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Anonymous proxies are used by criminals for illegal network activities due to their anonymity, such as data theft and cyber attacks. Therefore, anonymous proxy traffic detection is very essential for network security. In recent years, detection based on deep learning has become a hot research topic, since deep learning can automatically extract and select traffic features. To make (heterogeneous) network traffic adapt to the homogeneous input of typical deep learning algorithms, a major branch of existing studies convert network traffic into images for detection. However, such studies are commonly subject to the limitation of large-sized image representation of network traffic, resulting in very large storage and computational resource overhead. To address this limitation, a novel method for anonymous proxy traffic detection is proposed. The method is one of the solutions to reduce storage and computational resource overhead. Specifically, it converts the sequences of the size and inter-arrival time of the first N packets of a flow into images, and then categorizes the converted images using the one-dimensional convolutional neural network. Both proprietary and public datasets are used to validate the proposed method. The experimental results show that the converted images of the method are at least 90% smaller than that of existing image-based deep learning methods. With substantially smaller image sizes, the method can still achieve F1 scores up to 98.51% in Shadowsocks traffic detection and 99.8% in VPN traffic detection. |
---|---|
AbstractList | Anonymous proxies are used by criminals for illegal network activities due to their anonymity, such as data theft and cyber attacks. Therefore, anonymous proxy traffic detection is very essential for network security. In recent years, detection based on deep learning has become a hot research topic, since deep learning can automatically extract and select traffic features. To make (heterogeneous) network traffic adapt to the homogeneous input of typical deep learning algorithms, a major branch of existing studies convert network traffic into images for detection. However, such studies are commonly subject to the limitation of large-sized image representation of network traffic, resulting in very large storage and computational resource overhead. To address this limitation, a novel method for anonymous proxy traffic detection is proposed. The method is one of the solutions to reduce storage and computational resource overhead. Specifically, it converts the sequences of the size and inter-arrival time of the first N packets of a flow into images, and then categorizes the converted images using the one-dimensional convolutional neural network. Both proprietary and public datasets are used to validate the proposed method. The experimental results show that the converted images of the method are at least 90% smaller than that of existing image-based deep learning methods. With substantially smaller image sizes, the method can still achieve F1 scores up to 98.51% in Shadowsocks traffic detection and 99.8% in VPN traffic detection. Anonymous proxies are used by criminals for illegal network activities due to their anonymity, such as data theft and cyber attacks. Therefore, anonymous proxy traffic detection is very essential for network security. In recent years, detection based on deep learning has become a hot research topic, since deep learning can automatically extract and select traffic features. To make (heterogeneous) network traffic adapt to the homogeneous input of typical deep learning algorithms, a major branch of existing studies convert network traffic into images for detection. However, such studies are commonly subject to the limitation of large-sized image representation of network traffic, resulting in very large storage and computational resource overhead. To address this limitation, a novel method for anonymous proxy traffic detection is proposed. The method is one of the solutions to reduce storage and computational resource overhead. Specifically, it converts the sequences of the size and inter-arrival time of the first N packets of a flow into images, and then categorizes the converted images using the one-dimensional convolutional neural network. Both proprietary and public datasets are used to validate the proposed method. The experimental results show that the converted images of the method are at least 90% smaller than that of existing image-based deep learning methods. With substantially smaller image sizes, the method can still achieve F1 scores up to 98.51% in Shadowsocks traffic detection and 99.8% in VPN traffic detection. Anonymous proxies are used by criminals for illegal network activities due to their anonymity, such as data theft and cyber attacks. Therefore, anonymous proxy traffic detection is very essential for network security. In recent years, detection based on deep learning has become a hot research topic, since deep learning can automatically extract and select traffic features. To make (heterogeneous) network traffic adapt to the homogeneous input of typical deep learning algorithms, a major branch of existing studies convert network traffic into images for detection. However, such studies are commonly subject to the limitation of large-sized image representation of network traffic, resulting in very large storage and computational resource overhead. To address this limitation, a novel method for anonymous proxy traffic detection is proposed. The method is one of the solutions to reduce storage and computational resource overhead. Specifically, it converts the sequences of the size and inter-arrival time of the first packets of a flow into images, and then categorizes the converted images using the one-dimensional convolutional neural network. Both proprietary and public datasets are used to validate the proposed method. The experimental results show that the converted images of the method are at least 90% smaller than that of existing image-based deep learning methods. With substantially smaller image sizes, the method can still achieve F1 scores up to 98.51% in Shadowsocks traffic detection and 99.8% in VPN traffic detection. Anonymous proxies are used by criminals for illegal network activities due to their anonymity, such as data theft and cyber attacks. Therefore, anonymous proxy traffic detection is very essential for network security. In recent years, detection based on deep learning has become a hot research topic, since deep learning can automatically extract and select traffic features. To make (heterogeneous) network traffic adapt to the homogeneous input of typical deep learning algorithms, a major branch of existing studies convert network traffic into images for detection. However, such studies are commonly subject to the limitation of large-sized image representation of network traffic, resulting in very large storage and computational resource overhead. To address this limitation, a novel method for anonymous proxy traffic detection is proposed. The method is one of the solutions to reduce storage and computational resource overhead. Specifically, it converts the sequences of the size and inter-arrival time of the first N packets of a flow into images, and then categorizes the converted images using the one-dimensional convolutional neural network. Both proprietary and public datasets are used to validate the proposed method. The experimental results show that the converted images of the method are at least 90% smaller than that of existing image-based deep learning methods. With substantially smaller image sizes, the method can still achieve F1 scores up to 98.51% in Shadowsocks traffic detection and 99.8% in VPN traffic detection.Anonymous proxies are used by criminals for illegal network activities due to their anonymity, such as data theft and cyber attacks. Therefore, anonymous proxy traffic detection is very essential for network security. In recent years, detection based on deep learning has become a hot research topic, since deep learning can automatically extract and select traffic features. To make (heterogeneous) network traffic adapt to the homogeneous input of typical deep learning algorithms, a major branch of existing studies convert network traffic into images for detection. However, such studies are commonly subject to the limitation of large-sized image representation of network traffic, resulting in very large storage and computational resource overhead. To address this limitation, a novel method for anonymous proxy traffic detection is proposed. The method is one of the solutions to reduce storage and computational resource overhead. Specifically, it converts the sequences of the size and inter-arrival time of the first N packets of a flow into images, and then categorizes the converted images using the one-dimensional convolutional neural network. Both proprietary and public datasets are used to validate the proposed method. The experimental results show that the converted images of the method are at least 90% smaller than that of existing image-based deep learning methods. With substantially smaller image sizes, the method can still achieve F1 scores up to 98.51% in Shadowsocks traffic detection and 99.8% in VPN traffic detection. |
Audience | Academic |
Author | Li, Wei He, Yanjie |
AuthorAffiliation | School of Computer Science and Technology, Xi’an Jiaotong University, Xi’an 710049, China; liw@xjtu.edu.cn |
AuthorAffiliation_xml | – name: School of Computer Science and Technology, Xi’an Jiaotong University, Xi’an 710049, China; liw@xjtu.edu.cn |
Author_xml | – sequence: 1 givenname: Yanjie orcidid: 0000-0002-2250-4002 surname: He fullname: He, Yanjie – sequence: 2 givenname: Wei surname: Li fullname: Li, Wei |
BackLink | https://www.ncbi.nlm.nih.gov/pubmed/35684837$$D View this record in MEDLINE/PubMed |
BookMark | eNptkllvEzEQx1eoiB7wwBdAK_ECD2l97Xr8ghQKhUrhkAivWF7vOHG0uw72ppBvj0NK1FbIko_xb_72HKfF0RAGLIrnlJxzrshFYoxSwWj9qDjJq5gAY-Tozv64OE1pRQjjnMOT4phXNQjg8qT4MS0_hxvsyplfLMdfuJvLadbf9mGTyq8x_N6W82ic87Z8hyPa0Yeh_ITjMrTlW5OwLfP529pk-2SO_TpE05VXaMZNxPS0eOxMl_DZ7XpWfL96P7_8OJl9-XB9OZ1NbEVgnLS8qQhBKRwRWLWAtHWyAkNNLVEYi9S6WgAF1YgGpFG0IapSFg2XoAjlZ8X1XrcNZqXX0fcmbnUwXv81hLjQJo7edqh562rmWiIbAUI2tWksw7pSQAhIoC5rvdlrrTdNj63FYcwh3RO9fzP4pV6EG60oVKLiWeDVrUAMPzeYRt37ZLHrzIA5qZrVsqoJgFAZffkAXYVNHHKqdpTgwJQSmTrfUwuTA_CDC_ldm0eLvbe5F5zP9qlkAFlYQnZ4cTeEw9__1T0Dr_eAjSGliO6AUKJ3PaUPPZXZiwes9eOu3Lvoffcfjz-908wy |
CitedBy_id | crossref_primary_10_1109_ACCESS_2023_3323927 crossref_primary_10_3390_app122010387 crossref_primary_10_1088_1742_6596_2593_1_012007 crossref_primary_10_3390_app13169353 |
Cites_doi | 10.1109/EnT50437.2020.9431285 10.1016/j.comnet.2021.107974 10.23919/ICACT48636.2020.9061452 10.1016/j.jnca.2015.10.003 10.1007/s00500-019-04030-2 10.1109/IHMSC.2017.132 10.1002/nem.1981 10.1016/j.cose.2022.102663 10.1007/s11554-019-00930-6 10.1155/2021/6620425 10.5220/0005740704070414 10.1109/TNSM.2021.3071441 10.1007/978-3-030-89137-4_10 10.1016/j.bspc.2021.103364 10.1155/2021/5518460 10.1016/j.comnet.2021.108472 10.1016/j.neucom.2021.01.085 10.1109/ISI.2017.8004872 10.1007/s11760-021-01964-9 10.1155/2022/4862571 10.1109/TIFS.2021.3050608 10.1007/s11416-020-00353-z 10.1109/ACCESS.2019.2907149 10.1109/CyberSA.2018.8551395 10.1016/j.jnca.2016.09.013 |
ContentType | Journal Article |
Copyright | COPYRIGHT 2022 MDPI AG 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. 2022 by the authors. 2022 |
Copyright_xml | – notice: COPYRIGHT 2022 MDPI AG – notice: 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. – notice: 2022 by the authors. 2022 |
DBID | AAYXX CITATION NPM 3V. 7X7 7XB 88E 8FI 8FJ 8FK ABUWG AFKRA AZQEC BENPR CCPQU DWQXO FYUFA GHDGH K9. M0S M1P PHGZM PHGZT PIMPY PJZUB PKEHL PPXIY PQEST PQQKQ PQUKI PRINS 7X8 5PM DOA |
DOI | 10.3390/s22114216 |
DatabaseName | CrossRef PubMed ProQuest Central (Corporate) Health & Medical Collection (ProQuest) ProQuest Central (purchase pre-March 2016) Medical Database (Alumni Edition) Hospital Premium Collection Hospital Premium Collection (Alumni Edition) ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials - QC ProQuest Central ProQuest One ProQuest Central Korea Health Research Premium Collection Health Research Premium Collection (Alumni) ProQuest Health & Medical Complete (Alumni) ProQuest Health & Medical Collection Medical Database ProQuest Central Premium ProQuest One Academic (New) ProQuest Publicly Available Content Database ProQuest Health & Medical Research Collection ProQuest One Academic Middle East (New) ProQuest One Health & Nursing ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China MEDLINE - Academic PubMed Central (Full Participant titles) DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef PubMed Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest Health & Medical Complete (Alumni) ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest One Health & Nursing ProQuest Central China ProQuest Central ProQuest Health & Medical Research Collection Health Research Premium Collection Health and Medicine Complete (Alumni Edition) ProQuest Central Korea Health & Medical Research Collection ProQuest Central (New) ProQuest Medical Library (Alumni) ProQuest One Academic Eastern Edition ProQuest Hospital Collection Health Research Premium Collection (Alumni) ProQuest Hospital Collection (Alumni) ProQuest Health & Medical Complete ProQuest Medical Library ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) MEDLINE - Academic |
DatabaseTitleList | CrossRef PubMed MEDLINE - Academic Publicly Available Content Database |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: NPM name: PubMed url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 3 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1424-8220 |
ExternalDocumentID | oai_doaj_org_article_3df62fd07b4847b6abc2e6598008781f PMC9185453 A728856078 35684837 10_3390_s22114216 |
Genre | Journal Article |
GeographicLocations | China |
GeographicLocations_xml | – name: China |
GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 61672026 |
GroupedDBID | --- 123 2WC 53G 5VS 7X7 88E 8FE 8FG 8FI 8FJ AADQD AAHBH AAYXX ABDBF ABUWG ACUHS ADBBV ADMLS AENEX AFKRA AFZYC ALIPV ALMA_UNASSIGNED_HOLDINGS BENPR BPHCQ BVXVI CCPQU CITATION CS3 D1I DU5 E3Z EBD ESX F5P FYUFA GROUPED_DOAJ GX1 HH5 HMCUK HYE IAO ITC KQ8 L6V M1P M48 MODMG M~E OK1 OVT P2P P62 PHGZM PHGZT PIMPY PQQKQ PROAC PSQYO RNS RPM TUS UKHRP XSB ~8M 3V. ABJCF ARAPS HCIFZ KB. M7S NPM PDBOC PMFND 7XB 8FK AZQEC DWQXO K9. PJZUB PKEHL PPXIY PQEST PQUKI PRINS 7X8 5PM PUEGO |
ID | FETCH-LOGICAL-c508t-d3b500e74f04e5d8e1df758a1a67e4ace1cf648189b4b87a91b0959cea3789013 |
IEDL.DBID | M48 |
ISSN | 1424-8220 |
IngestDate | Wed Aug 27 01:34:09 EDT 2025 Thu Aug 21 13:46:03 EDT 2025 Fri Jul 11 12:43:32 EDT 2025 Fri Jul 25 20:01:08 EDT 2025 Tue Jun 10 21:22:31 EDT 2025 Wed Feb 19 02:25:59 EST 2025 Tue Jul 01 02:41:57 EDT 2025 Thu Apr 24 23:03:35 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 11 |
Keywords | CNN Shadowsocks traffic detection VPN traffic detection spatio-temporal features |
Language | English |
License | https://creativecommons.org/licenses/by/4.0 Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c508t-d3b500e74f04e5d8e1df758a1a67e4ace1cf648189b4b87a91b0959cea3789013 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
ORCID | 0000-0002-2250-4002 |
OpenAccessLink | https://www.proquest.com/docview/2674382994?pq-origsite=%requestingapplication% |
PMID | 35684837 |
PQID | 2674382994 |
PQPubID | 2032333 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_3df62fd07b4847b6abc2e6598008781f pubmedcentral_primary_oai_pubmedcentral_nih_gov_9185453 proquest_miscellaneous_2675608849 proquest_journals_2674382994 gale_infotracacademiconefile_A728856078 pubmed_primary_35684837 crossref_primary_10_3390_s22114216 crossref_citationtrail_10_3390_s22114216 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2022-06-01 |
PublicationDateYYYYMMDD | 2022-06-01 |
PublicationDate_xml | – month: 06 year: 2022 text: 2022-06-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | Switzerland |
PublicationPlace_xml | – name: Switzerland – name: Basel |
PublicationTitle | Sensors (Basel, Switzerland) |
PublicationTitleAlternate | Sensors (Basel) |
PublicationYear | 2022 |
Publisher | MDPI AG MDPI |
Publisher_xml | – name: MDPI AG – name: MDPI |
References | Zeng (ref_4) 2019; 7 Cheng (ref_6) 2021; 199 ref_12 ref_11 ref_10 Sandula (ref_28) 2022; 16 ref_31 ref_30 Shen (ref_32) 2021; 16 Lin (ref_8) 2021; 190 ref_19 Shim (ref_14) 2017; 27 ref_17 Khan (ref_27) 2021; 440 Wang (ref_16) 2015; 24 Johnson (ref_22) 2021; 11 Hajjar (ref_15) 2015; 58 Hu (ref_21) 2021; 2021 Lu (ref_23) 2016; 76 Jiang (ref_29) 2021; 2021 ref_24 Zhang (ref_26) 2022; 19 ref_20 Cheng (ref_13) 2020; 16 Lan (ref_7) 2022; 116 Xu (ref_25) 2022; 73 ref_3 ref_2 Shapira (ref_9) 2021; 18 Ji (ref_1) 2022; 2022 Guo (ref_5) 2020; 17 Lotfollahi (ref_18) 2020; 24 |
References_xml | – ident: ref_3 – ident: ref_24 – ident: ref_11 doi: 10.1109/EnT50437.2020.9431285 – volume: 19 start-page: 1 year: 2022 ident: ref_26 article-title: SAR target recognition using only simulated data for training by hierarchically combining CNN and image similarity publication-title: IEEE Geosci. Remote Sens. Lett. – volume: 190 start-page: 107974 year: 2021 ident: ref_8 article-title: TSCRNN: A novel classification scheme of encrypted traffic based on flow spatiotemporal features for efficient management of iiot publication-title: Comput. Netw. doi: 10.1016/j.comnet.2021.107974 – ident: ref_31 doi: 10.23919/ICACT48636.2020.9061452 – volume: 58 start-page: 130 year: 2015 ident: ref_15 article-title: Network traffic application identification based on message size analysis publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2015.10.003 – volume: 24 start-page: 1999 year: 2020 ident: ref_18 article-title: Deep packet: A novel approach for encrypted traffic classification using deep learning publication-title: Soft Comput. doi: 10.1007/s00500-019-04030-2 – ident: ref_12 doi: 10.1109/IHMSC.2017.132 – volume: 27 start-page: 5 year: 2017 ident: ref_14 article-title: Application traffic classification using payload size sequence signature publication-title: Int. J. Netw. Manag. doi: 10.1002/nem.1981 – volume: 116 start-page: 102663 year: 2022 ident: ref_7 article-title: Darknetsec: A novel self-attentive deep learning method for darknet traffic classification and application identification publication-title: Comput. Secur. doi: 10.1016/j.cose.2022.102663 – volume: 17 start-page: 103 year: 2020 ident: ref_5 article-title: Deep learning-based real-time VPN encrypted traffic identification methods publication-title: Real Time Image Process. doi: 10.1007/s11554-019-00930-6 – volume: 2021 start-page: 6620425 year: 2021 ident: ref_29 article-title: Application research of key frames extraction technology combined with optimized faster R-CNN algorithm in traffic video analysis publication-title: Complexity doi: 10.1155/2021/6620425 – ident: ref_30 doi: 10.5220/0005740704070414 – volume: 18 start-page: 1218 year: 2021 ident: ref_9 article-title: Flowpic: A generic representation for encrypted traffic classification and applications identification publication-title: IEEE Trans. Netw. Serv. Manag. doi: 10.1109/TNSM.2021.3071441 – ident: ref_17 doi: 10.1007/978-3-030-89137-4_10 – volume: 73 start-page: 103364 year: 2022 ident: ref_25 article-title: Gesture recognition using dual-stream CNN based on fusion of semg energy kernel phase portrait and IMU amplitude image publication-title: Biomed. Signal Process. Control doi: 10.1016/j.bspc.2021.103364 – ident: ref_2 – volume: 2021 start-page: 5518460 year: 2021 ident: ref_21 article-title: Cld-net: A network combining CNN and LSTM for internet encrypted traffic classification publication-title: Secur. Commun. Netw. doi: 10.1155/2021/5518460 – volume: 199 start-page: 108472 year: 2021 ident: ref_6 article-title: MATEC: A lightweight neural network for online encrypted traffic classification publication-title: Comput. Netw. doi: 10.1016/j.comnet.2021.108472 – volume: 440 start-page: 111 year: 2021 ident: ref_27 article-title: Image scene geometry recognition using low-level features fusion at multi-layer deep CNN publication-title: Neurocomputing doi: 10.1016/j.neucom.2021.01.085 – ident: ref_19 doi: 10.1109/ISI.2017.8004872 – volume: 16 start-page: 103 year: 2022 ident: ref_28 article-title: Cnn-based camera motion classification using HSI color model for compressed videos publication-title: Signal Image Video Process. doi: 10.1007/s11760-021-01964-9 – volume: 2022 start-page: 4862571 year: 2022 ident: ref_1 article-title: Security analysis of shadowsocks(r) protocol publication-title: Secur. Commun. Netw. doi: 10.1155/2022/4862571 – volume: 16 start-page: 2367 year: 2021 ident: ref_32 article-title: Accurate decentralized application identification via encrypted traffic analysis using graph neural networks publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2021.3050608 – volume: 16 start-page: 217 year: 2020 ident: ref_13 article-title: ACER: Detecting shadowsocks server based on active probe technology publication-title: J. Comput. Virol. Hacking Tech. doi: 10.1007/s11416-020-00353-z – volume: 11 start-page: 44 year: 2021 ident: ref_22 article-title: Application of deep learning on the characterization of tor traffic using time based features publication-title: J. Internet Serv. Inf. Secur. – volume: 24 start-page: 1 year: 2015 ident: ref_16 article-title: The applications of deep learning on traffic identification publication-title: BlackHat USA – volume: 7 start-page: 41017 year: 2019 ident: ref_4 article-title: Flow context and host behavior based shadowsocks’s traffic identification publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2907149 – ident: ref_10 doi: 10.1109/CyberSA.2018.8551395 – ident: ref_20 – volume: 76 start-page: 60 year: 2016 ident: ref_23 article-title: High performance traffic classification based on message size sequence and distribution publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2016.09.013 |
SSID | ssj0023338 |
Score | 2.3988101 |
Snippet | Anonymous proxies are used by criminals for illegal network activities due to their anonymity, such as data theft and cyber attacks. Therefore, anonymous proxy... |
SourceID | doaj pubmedcentral proquest gale pubmed crossref |
SourceType | Open Website Open Access Repository Aggregation Database Index Database Enrichment Source |
StartPage | 4216 |
SubjectTerms | Algorithms Analysis Censorship Classification CNN Computer crimes Data security Deep learning Identification Internet Machine learning Methods Neural networks Payloads Safety and security measures Shadowsocks traffic detection spatio-temporal features Virtual private networks VPN traffic detection |
SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3NaxUxEA_SUz2I1q_VWqIIelm6m6_NHl-rpYgtgi30ZMjHBAuPp9hX_fedye5b9qHgxeNuwpJMJpn5ZWd-w9hrdEKijJ2p8egTtYpW16GJUBvoWzCQg9WUjXx2bk4v1YcrfTUr9UUxYQM98CC4Q5myETk1XVB4kAbjQxRgdG-JTM22mU5ftHkbMDVCLYnIa-ARkgjqD2-EoJxRKmo-sz6FpP_Po3hmi7bjJGeG5-Q-uzd6jHwxjPQBuwOrPXZ3xiP4kH1Z8PNvP2HJPxLU_lVuO_kE7PknClXhaJWILoK_g3UJv1rxs1I9mh-hIUscnz-X6Or6YmCrWnJyD28Rjj9ilyfvL45P67FwQh3R31rXSQbdNNCp3CjQyUKbMuIC33rTgfIR2piNQlPdBxVs5_s20HVgBC8pL7aVj9kOjhGeMq4TYhy04dADAjltfG6yb4I2SSTfm1yxtxuBujiyilNxi6VDdEGyd5PsK_Zq6vp9oNL4W6cjWpWpA7FflxeoE27UCfcvnajYG1pTR3sUBxP9mGqAUyK2K7fohMW5oHdUsf3Nsrtx8944QYkZFu20qtjLqRm3Hf1L8SvAlaM--AFrVV-xJ4OWTGOW2lgi6q9Yt6U_W5Pablldfy3U3j26T0rLZ_9DCs_ZrqBcjXJltM921j9u4QV6UOtwUDbLb5wtGZ0 priority: 102 providerName: Directory of Open Access Journals – databaseName: Health & Medical Collection (ProQuest) dbid: 7X7 link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LbxMxELagXOCAeLOlIIOQ4GJ1H7bXe0IpUFWIVki0Uk6s_BgDUpSUJi1_nxmvs00E4pistRp7PM-d-Yax1-iE-Ma3WqDqq4X0RglXehAaugo0RGcUdSMfn-ijM_lpqqY54bbMZZVrnZgUdVh4ypHv11Qtb1B5ynfnvwRNjaKvq3mExk12i6DLqKSrnV4HXA3GXwOaUIOh_f6yrqlzlEabb9igBNX_t0LesEjb1ZIb5ufwHrub_UY-GRh9n92A-QN2ZwNN8CH7NuEniyuY8c8UcP9OOU8-hvf8CxWscLRNBBrBP8AqFWHN-XGaIc0P0JwFjr-_phprcTpgVs04OYmXGJQ_YmeHH0_fH4k8PkF49LpWIjROlSW0MpYSVDBQhYjRga2sbkFaD5WPWqLB7px0prVd5Sgp6ME21B1bNY_ZDtIITxlXASMdtOTQAYZzSttYRls6pUMdbKdjwd6uD7T3GVucRlzMeowx6Oz78ewL9mpcej4Aavxr0QFxZVxAGNjpj8XF9z6LVN-EqOsYytZJNLFOW-dr0KozBLNnKiTqDfG0J0lFYrzNDQe4JcK86idtbXAv6CMVbG_N9j6L8LK_vnAFezk-RuGjLyp2Dsg5WoMvMEZ2BXsy3JKR5kZpQ3D9BWu37s_WprafzH_-SADfHTpRUjW7_yfrGbtdUy9GSgntsZ3VxSU8Rw9p5V4kMfgDTOYRaA priority: 102 providerName: ProQuest |
Title | A Novel Lightweight Anonymous Proxy Traffic Detection Method Based on Spatio-Temporal Features |
URI | https://www.ncbi.nlm.nih.gov/pubmed/35684837 https://www.proquest.com/docview/2674382994 https://www.proquest.com/docview/2675608849 https://pubmed.ncbi.nlm.nih.gov/PMC9185453 https://doaj.org/article/3df62fd07b4847b6abc2e6598008781f |
Volume | 22 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lj9MwEB7t4wIHxHuzLJVBSHAJ5OFXDgi1sGWFaLWCrdQTke04gFR1l26Xx79nxkmjRuyBS6U2bmt7PPnmczzfADzDIMTlTskYb31ZzJ0WsU2cj6UvUi99bbWgbOTJVJ7M-Ie5mO_ApsZmO4GX11I7qic1Wy1e_v7x5w06_GtinEjZX11mGWWEpnIX9hGQFPnnhHcPE7I8DwWtKacrRjxMGoGh_ld7sBTU-_-9R2-BVP8A5RYijW_DrTaUZMPG9ndgxy_vws0tgcF78GXIpuc__YJ9JA7-K2yDso7xs1M6w8IQrkhHgr3z63Aua8kmoaw0GyHCVQzffw7HruOzRsZqwShuvEKefh9m4-OztydxW1EhdhiIreMqtyJJvOJ1wr2otE-rGgmDSY1UnhvnU1dLjhheWG61MkVqaZ_QeZNTwmyaP4A97KM_ACYqJD8I7r7wyPCENHVSm8QKWWWVKWQdwYvNhJaulRunqheLEmkHzX3ZzX0ET7umF43GxnWNRmSVrgHJYocPzldfy9bLyryqZVZXibIcUddKY13mpSg0Ke_pFDv1nGxa0nLCzjjT5iDgkEgGqxyqTONYMGyK4Ghj9nKzKMuMMjY0AjiP4El3Gf2RHrKYpUfLURv8Aa15EcHDZpV0fc6F1KTgH4HqrZ_eoPpXlt-_Bc3vAuMqLvLD__jfR3AjoxyNsFV0BHvr1ZV_jJHT2g5gV80Vvurx-wHsj46np58GYRdiEDzmLyh4GvM |
linkProvider | Scholars Portal |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3db9MwED-N8QA8IL4JDDAIBC_REsd2nAeEOsbUsbZCopP6tGA7DiBV7Wg7Jv4p_kbu8rVWIN722MaKbN_35e53AC_RCXGJS1WIqo-HwmkZ2sj5UPks9sqXVkvqRh6OVP9YfJzIyRb8bnthqKyy1YmVoi7mjnLku5yq5TUqT_Hu9EdIU6Po62o7QqNmiyP_6xxDtuXbw32k7yvODz6M3_fDZqpA6NAZWYVFYmUU-VSUkfCy0D4uSnSaTWxU6oVxPnalEmjHMiusTk0WW8qVOW8SahqNE3zvFbiKhjciiUonFwFegvFejV6UJFm0u-ScOlVplPqazatGA_xtANYs4GZ15pq5O7gFNxs_lfVqxroNW352B26soRfehZMeG81_-ikbUIB_XuVYWZdOYJ-oQIahLSSQCrbvV1XR14wNq5nVbA_NZ8Hw9-eqpjsc1xhZU0ZO6dnCL-_B8aVc7H3Yxj36h8BkgZEVeg4-8xg-SmXKqDSRlarghclUGcCb9kJz12CZ00iNaY4xDd193t19AC-6pac1gMe_Fu0RVboFhLld_TFffM0bEc6TolS8LKLUCjTpVhnruFcy0wTrp2Pc1GuiaU6aATfjTNPggEcijK28l3KNZ0GfLICdlux5ozKW-QWDB_C8e4zCTl9wzMwj5WgNvkBrkQXwoOaSbs-JVJrGAwSQbvDPxqE2n8y-f6sAxTN02oRMHv1_W8_gWn88HOSDw9HRY7jOqQ-kSkftwPZqceafoHe2sk8rkWDw5bJl8A9wiU4j |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9NAEB6VIiE4IN4YCiwIBBcr9r68PiCUEqqWtlElWiknzO56DUhRUpKUir_Gr2PGdtxEIG49Jl5Zuzvv8cw3AC_RCfHCZzpG1cdj6Y2KXeJDrEOeBh0qZxR1Ix8O9e6J_DhSow34veyFobLKpU6sFXU59ZQj73GqljeoPGWvassijgY7705_xDRBir60LsdpNCyyH36dY_g2f7s3QFq_4nznw_H73bidMBB7dEwWcSmcSpKQySqRQZUmpGWFDrRNrc6CtD6kvtISbVrupDOZzVNHeTMfrKAG0lTge6_A1UyolGQsG10EewJjvwbJSIg86c05p65VGqu-Yv_qMQF_G4MVa7heqbli-nZuwc3WZ2X9hsluw0aY3IEbK0iGd-Fznw2nP8OYHVCwf17nW1mXWmBHVCzD0C4SYAUbhEVdADZhh_X8araNprRk-PtTXd8dHzd4WWNGDurZLMzvwcmlXOx92MQ9hofAVIlRFnoRIQ8YSiptq6SyiVO65KXNdRXBm-WFFr7FNafxGuMC4xu6-6K7-whedEtPGzCPfy3aJqp0Cwh_u_5jOvtatOJciLLSvCqTzEk0705b53nQKjcE8WdS3NRromlBWgI3423b7IBHIrytop9xg2dB_yyCrSXZi1Z9zIsLZo_gefcYBZ--5thJQMrRGnyBMTKP4EHDJd2ehdKGRgVEkK3xz9qh1p9Mvn-rwcVzdOCkEo_-v61ncA2lrzjYG-4_huucWkLqzNQWbC5mZ-EJOmoL97SWCAZfLlsE_wDj61JZ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Novel+Lightweight+Anonymous+Proxy+Traffic+Detection+Method+Based+on+Spatio-Temporal+Features&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=He%2C+Yanjie&rft.au=Li%2C+Wei&rft.date=2022-06-01&rft.issn=1424-8220&rft.eissn=1424-8220&rft.volume=22&rft.issue=11&rft_id=info:doi/10.3390%2Fs22114216&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon |