A Novel Lightweight Anonymous Proxy Traffic Detection Method Based on Spatio-Temporal Features

Anonymous proxies are used by criminals for illegal network activities due to their anonymity, such as data theft and cyber attacks. Therefore, anonymous proxy traffic detection is very essential for network security. In recent years, detection based on deep learning has become a hot research topic,...

Full description

Saved in:
Bibliographic Details
Published inSensors (Basel, Switzerland) Vol. 22; no. 11; p. 4216
Main Authors He, Yanjie, Li, Wei
Format Journal Article
LanguageEnglish
Published Switzerland MDPI AG 01.06.2022
MDPI
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Anonymous proxies are used by criminals for illegal network activities due to their anonymity, such as data theft and cyber attacks. Therefore, anonymous proxy traffic detection is very essential for network security. In recent years, detection based on deep learning has become a hot research topic, since deep learning can automatically extract and select traffic features. To make (heterogeneous) network traffic adapt to the homogeneous input of typical deep learning algorithms, a major branch of existing studies convert network traffic into images for detection. However, such studies are commonly subject to the limitation of large-sized image representation of network traffic, resulting in very large storage and computational resource overhead. To address this limitation, a novel method for anonymous proxy traffic detection is proposed. The method is one of the solutions to reduce storage and computational resource overhead. Specifically, it converts the sequences of the size and inter-arrival time of the first N packets of a flow into images, and then categorizes the converted images using the one-dimensional convolutional neural network. Both proprietary and public datasets are used to validate the proposed method. The experimental results show that the converted images of the method are at least 90% smaller than that of existing image-based deep learning methods. With substantially smaller image sizes, the method can still achieve F1 scores up to 98.51% in Shadowsocks traffic detection and 99.8% in VPN traffic detection.
AbstractList Anonymous proxies are used by criminals for illegal network activities due to their anonymity, such as data theft and cyber attacks. Therefore, anonymous proxy traffic detection is very essential for network security. In recent years, detection based on deep learning has become a hot research topic, since deep learning can automatically extract and select traffic features. To make (heterogeneous) network traffic adapt to the homogeneous input of typical deep learning algorithms, a major branch of existing studies convert network traffic into images for detection. However, such studies are commonly subject to the limitation of large-sized image representation of network traffic, resulting in very large storage and computational resource overhead. To address this limitation, a novel method for anonymous proxy traffic detection is proposed. The method is one of the solutions to reduce storage and computational resource overhead. Specifically, it converts the sequences of the size and inter-arrival time of the first N packets of a flow into images, and then categorizes the converted images using the one-dimensional convolutional neural network. Both proprietary and public datasets are used to validate the proposed method. The experimental results show that the converted images of the method are at least 90% smaller than that of existing image-based deep learning methods. With substantially smaller image sizes, the method can still achieve F1 scores up to 98.51% in Shadowsocks traffic detection and 99.8% in VPN traffic detection.
Anonymous proxies are used by criminals for illegal network activities due to their anonymity, such as data theft and cyber attacks. Therefore, anonymous proxy traffic detection is very essential for network security. In recent years, detection based on deep learning has become a hot research topic, since deep learning can automatically extract and select traffic features. To make (heterogeneous) network traffic adapt to the homogeneous input of typical deep learning algorithms, a major branch of existing studies convert network traffic into images for detection. However, such studies are commonly subject to the limitation of large-sized image representation of network traffic, resulting in very large storage and computational resource overhead. To address this limitation, a novel method for anonymous proxy traffic detection is proposed. The method is one of the solutions to reduce storage and computational resource overhead. Specifically, it converts the sequences of the size and inter-arrival time of the first N packets of a flow into images, and then categorizes the converted images using the one-dimensional convolutional neural network. Both proprietary and public datasets are used to validate the proposed method. The experimental results show that the converted images of the method are at least 90% smaller than that of existing image-based deep learning methods. With substantially smaller image sizes, the method can still achieve F1 scores up to 98.51% in Shadowsocks traffic detection and 99.8% in VPN traffic detection.
Anonymous proxies are used by criminals for illegal network activities due to their anonymity, such as data theft and cyber attacks. Therefore, anonymous proxy traffic detection is very essential for network security. In recent years, detection based on deep learning has become a hot research topic, since deep learning can automatically extract and select traffic features. To make (heterogeneous) network traffic adapt to the homogeneous input of typical deep learning algorithms, a major branch of existing studies convert network traffic into images for detection. However, such studies are commonly subject to the limitation of large-sized image representation of network traffic, resulting in very large storage and computational resource overhead. To address this limitation, a novel method for anonymous proxy traffic detection is proposed. The method is one of the solutions to reduce storage and computational resource overhead. Specifically, it converts the sequences of the size and inter-arrival time of the first packets of a flow into images, and then categorizes the converted images using the one-dimensional convolutional neural network. Both proprietary and public datasets are used to validate the proposed method. The experimental results show that the converted images of the method are at least 90% smaller than that of existing image-based deep learning methods. With substantially smaller image sizes, the method can still achieve F1 scores up to 98.51% in Shadowsocks traffic detection and 99.8% in VPN traffic detection.
Anonymous proxies are used by criminals for illegal network activities due to their anonymity, such as data theft and cyber attacks. Therefore, anonymous proxy traffic detection is very essential for network security. In recent years, detection based on deep learning has become a hot research topic, since deep learning can automatically extract and select traffic features. To make (heterogeneous) network traffic adapt to the homogeneous input of typical deep learning algorithms, a major branch of existing studies convert network traffic into images for detection. However, such studies are commonly subject to the limitation of large-sized image representation of network traffic, resulting in very large storage and computational resource overhead. To address this limitation, a novel method for anonymous proxy traffic detection is proposed. The method is one of the solutions to reduce storage and computational resource overhead. Specifically, it converts the sequences of the size and inter-arrival time of the first N packets of a flow into images, and then categorizes the converted images using the one-dimensional convolutional neural network. Both proprietary and public datasets are used to validate the proposed method. The experimental results show that the converted images of the method are at least 90% smaller than that of existing image-based deep learning methods. With substantially smaller image sizes, the method can still achieve F1 scores up to 98.51% in Shadowsocks traffic detection and 99.8% in VPN traffic detection.Anonymous proxies are used by criminals for illegal network activities due to their anonymity, such as data theft and cyber attacks. Therefore, anonymous proxy traffic detection is very essential for network security. In recent years, detection based on deep learning has become a hot research topic, since deep learning can automatically extract and select traffic features. To make (heterogeneous) network traffic adapt to the homogeneous input of typical deep learning algorithms, a major branch of existing studies convert network traffic into images for detection. However, such studies are commonly subject to the limitation of large-sized image representation of network traffic, resulting in very large storage and computational resource overhead. To address this limitation, a novel method for anonymous proxy traffic detection is proposed. The method is one of the solutions to reduce storage and computational resource overhead. Specifically, it converts the sequences of the size and inter-arrival time of the first N packets of a flow into images, and then categorizes the converted images using the one-dimensional convolutional neural network. Both proprietary and public datasets are used to validate the proposed method. The experimental results show that the converted images of the method are at least 90% smaller than that of existing image-based deep learning methods. With substantially smaller image sizes, the method can still achieve F1 scores up to 98.51% in Shadowsocks traffic detection and 99.8% in VPN traffic detection.
Audience Academic
Author Li, Wei
He, Yanjie
AuthorAffiliation School of Computer Science and Technology, Xi’an Jiaotong University, Xi’an 710049, China; liw@xjtu.edu.cn
AuthorAffiliation_xml – name: School of Computer Science and Technology, Xi’an Jiaotong University, Xi’an 710049, China; liw@xjtu.edu.cn
Author_xml – sequence: 1
  givenname: Yanjie
  orcidid: 0000-0002-2250-4002
  surname: He
  fullname: He, Yanjie
– sequence: 2
  givenname: Wei
  surname: Li
  fullname: Li, Wei
BackLink https://www.ncbi.nlm.nih.gov/pubmed/35684837$$D View this record in MEDLINE/PubMed
BookMark eNptkllvEzEQx1eoiB7wwBdAK_ECD2l97Xr8ghQKhUrhkAivWF7vOHG0uw72ppBvj0NK1FbIko_xb_72HKfF0RAGLIrnlJxzrshFYoxSwWj9qDjJq5gAY-Tozv64OE1pRQjjnMOT4phXNQjg8qT4MS0_hxvsyplfLMdfuJvLadbf9mGTyq8x_N6W82ic87Z8hyPa0Yeh_ITjMrTlW5OwLfP529pk-2SO_TpE05VXaMZNxPS0eOxMl_DZ7XpWfL96P7_8OJl9-XB9OZ1NbEVgnLS8qQhBKRwRWLWAtHWyAkNNLVEYi9S6WgAF1YgGpFG0IapSFg2XoAjlZ8X1XrcNZqXX0fcmbnUwXv81hLjQJo7edqh562rmWiIbAUI2tWksw7pSQAhIoC5rvdlrrTdNj63FYcwh3RO9fzP4pV6EG60oVKLiWeDVrUAMPzeYRt37ZLHrzIA5qZrVsqoJgFAZffkAXYVNHHKqdpTgwJQSmTrfUwuTA_CDC_ldm0eLvbe5F5zP9qlkAFlYQnZ4cTeEw9__1T0Dr_eAjSGliO6AUKJ3PaUPPZXZiwes9eOu3Lvoffcfjz-908wy
CitedBy_id crossref_primary_10_1109_ACCESS_2023_3323927
crossref_primary_10_3390_app122010387
crossref_primary_10_1088_1742_6596_2593_1_012007
crossref_primary_10_3390_app13169353
Cites_doi 10.1109/EnT50437.2020.9431285
10.1016/j.comnet.2021.107974
10.23919/ICACT48636.2020.9061452
10.1016/j.jnca.2015.10.003
10.1007/s00500-019-04030-2
10.1109/IHMSC.2017.132
10.1002/nem.1981
10.1016/j.cose.2022.102663
10.1007/s11554-019-00930-6
10.1155/2021/6620425
10.5220/0005740704070414
10.1109/TNSM.2021.3071441
10.1007/978-3-030-89137-4_10
10.1016/j.bspc.2021.103364
10.1155/2021/5518460
10.1016/j.comnet.2021.108472
10.1016/j.neucom.2021.01.085
10.1109/ISI.2017.8004872
10.1007/s11760-021-01964-9
10.1155/2022/4862571
10.1109/TIFS.2021.3050608
10.1007/s11416-020-00353-z
10.1109/ACCESS.2019.2907149
10.1109/CyberSA.2018.8551395
10.1016/j.jnca.2016.09.013
ContentType Journal Article
Copyright COPYRIGHT 2022 MDPI AG
2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
2022 by the authors. 2022
Copyright_xml – notice: COPYRIGHT 2022 MDPI AG
– notice: 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
– notice: 2022 by the authors. 2022
DBID AAYXX
CITATION
NPM
3V.
7X7
7XB
88E
8FI
8FJ
8FK
ABUWG
AFKRA
AZQEC
BENPR
CCPQU
DWQXO
FYUFA
GHDGH
K9.
M0S
M1P
PHGZM
PHGZT
PIMPY
PJZUB
PKEHL
PPXIY
PQEST
PQQKQ
PQUKI
PRINS
7X8
5PM
DOA
DOI 10.3390/s22114216
DatabaseName CrossRef
PubMed
ProQuest Central (Corporate)
Health & Medical Collection (ProQuest)
ProQuest Central (purchase pre-March 2016)
Medical Database (Alumni Edition)
Hospital Premium Collection
Hospital Premium Collection (Alumni Edition)
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials - QC
ProQuest Central
ProQuest One
ProQuest Central Korea
Health Research Premium Collection
Health Research Premium Collection (Alumni)
ProQuest Health & Medical Complete (Alumni)
ProQuest Health & Medical Collection
Medical Database
ProQuest Central Premium
ProQuest One Academic (New)
ProQuest Publicly Available Content Database
ProQuest Health & Medical Research Collection
ProQuest One Academic Middle East (New)
ProQuest One Health & Nursing
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
MEDLINE - Academic
PubMed Central (Full Participant titles)
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
PubMed
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest Health & Medical Complete (Alumni)
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest One Health & Nursing
ProQuest Central China
ProQuest Central
ProQuest Health & Medical Research Collection
Health Research Premium Collection
Health and Medicine Complete (Alumni Edition)
ProQuest Central Korea
Health & Medical Research Collection
ProQuest Central (New)
ProQuest Medical Library (Alumni)
ProQuest One Academic Eastern Edition
ProQuest Hospital Collection
Health Research Premium Collection (Alumni)
ProQuest Hospital Collection (Alumni)
ProQuest Health & Medical Complete
ProQuest Medical Library
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
MEDLINE - Academic
DatabaseTitleList CrossRef



PubMed
MEDLINE - Academic
Publicly Available Content Database
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: NPM
  name: PubMed
  url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
– sequence: 3
  dbid: BENPR
  name: ProQuest Central
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1424-8220
ExternalDocumentID oai_doaj_org_article_3df62fd07b4847b6abc2e6598008781f
PMC9185453
A728856078
35684837
10_3390_s22114216
Genre Journal Article
GeographicLocations China
GeographicLocations_xml – name: China
GrantInformation_xml – fundername: National Natural Science Foundation of China
  grantid: 61672026
GroupedDBID ---
123
2WC
53G
5VS
7X7
88E
8FE
8FG
8FI
8FJ
AADQD
AAHBH
AAYXX
ABDBF
ABUWG
ACUHS
ADBBV
ADMLS
AENEX
AFKRA
AFZYC
ALIPV
ALMA_UNASSIGNED_HOLDINGS
BENPR
BPHCQ
BVXVI
CCPQU
CITATION
CS3
D1I
DU5
E3Z
EBD
ESX
F5P
FYUFA
GROUPED_DOAJ
GX1
HH5
HMCUK
HYE
IAO
ITC
KQ8
L6V
M1P
M48
MODMG
M~E
OK1
OVT
P2P
P62
PHGZM
PHGZT
PIMPY
PQQKQ
PROAC
PSQYO
RNS
RPM
TUS
UKHRP
XSB
~8M
3V.
ABJCF
ARAPS
HCIFZ
KB.
M7S
NPM
PDBOC
PMFND
7XB
8FK
AZQEC
DWQXO
K9.
PJZUB
PKEHL
PPXIY
PQEST
PQUKI
PRINS
7X8
5PM
PUEGO
ID FETCH-LOGICAL-c508t-d3b500e74f04e5d8e1df758a1a67e4ace1cf648189b4b87a91b0959cea3789013
IEDL.DBID M48
ISSN 1424-8220
IngestDate Wed Aug 27 01:34:09 EDT 2025
Thu Aug 21 13:46:03 EDT 2025
Fri Jul 11 12:43:32 EDT 2025
Fri Jul 25 20:01:08 EDT 2025
Tue Jun 10 21:22:31 EDT 2025
Wed Feb 19 02:25:59 EST 2025
Tue Jul 01 02:41:57 EDT 2025
Thu Apr 24 23:03:35 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 11
Keywords CNN
Shadowsocks traffic detection
VPN traffic detection
spatio-temporal features
Language English
License https://creativecommons.org/licenses/by/4.0
Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c508t-d3b500e74f04e5d8e1df758a1a67e4ace1cf648189b4b87a91b0959cea3789013
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ORCID 0000-0002-2250-4002
OpenAccessLink https://www.proquest.com/docview/2674382994?pq-origsite=%requestingapplication%
PMID 35684837
PQID 2674382994
PQPubID 2032333
ParticipantIDs doaj_primary_oai_doaj_org_article_3df62fd07b4847b6abc2e6598008781f
pubmedcentral_primary_oai_pubmedcentral_nih_gov_9185453
proquest_miscellaneous_2675608849
proquest_journals_2674382994
gale_infotracacademiconefile_A728856078
pubmed_primary_35684837
crossref_primary_10_3390_s22114216
crossref_citationtrail_10_3390_s22114216
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2022-06-01
PublicationDateYYYYMMDD 2022-06-01
PublicationDate_xml – month: 06
  year: 2022
  text: 2022-06-01
  day: 01
PublicationDecade 2020
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
– name: Basel
PublicationTitle Sensors (Basel, Switzerland)
PublicationTitleAlternate Sensors (Basel)
PublicationYear 2022
Publisher MDPI AG
MDPI
Publisher_xml – name: MDPI AG
– name: MDPI
References Zeng (ref_4) 2019; 7
Cheng (ref_6) 2021; 199
ref_12
ref_11
ref_10
Sandula (ref_28) 2022; 16
ref_31
ref_30
Shen (ref_32) 2021; 16
Lin (ref_8) 2021; 190
ref_19
Shim (ref_14) 2017; 27
ref_17
Khan (ref_27) 2021; 440
Wang (ref_16) 2015; 24
Johnson (ref_22) 2021; 11
Hajjar (ref_15) 2015; 58
Hu (ref_21) 2021; 2021
Lu (ref_23) 2016; 76
Jiang (ref_29) 2021; 2021
ref_24
Zhang (ref_26) 2022; 19
ref_20
Cheng (ref_13) 2020; 16
Lan (ref_7) 2022; 116
Xu (ref_25) 2022; 73
ref_3
ref_2
Shapira (ref_9) 2021; 18
Ji (ref_1) 2022; 2022
Guo (ref_5) 2020; 17
Lotfollahi (ref_18) 2020; 24
References_xml – ident: ref_3
– ident: ref_24
– ident: ref_11
  doi: 10.1109/EnT50437.2020.9431285
– volume: 19
  start-page: 1
  year: 2022
  ident: ref_26
  article-title: SAR target recognition using only simulated data for training by hierarchically combining CNN and image similarity
  publication-title: IEEE Geosci. Remote Sens. Lett.
– volume: 190
  start-page: 107974
  year: 2021
  ident: ref_8
  article-title: TSCRNN: A novel classification scheme of encrypted traffic based on flow spatiotemporal features for efficient management of iiot
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2021.107974
– ident: ref_31
  doi: 10.23919/ICACT48636.2020.9061452
– volume: 58
  start-page: 130
  year: 2015
  ident: ref_15
  article-title: Network traffic application identification based on message size analysis
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2015.10.003
– volume: 24
  start-page: 1999
  year: 2020
  ident: ref_18
  article-title: Deep packet: A novel approach for encrypted traffic classification using deep learning
  publication-title: Soft Comput.
  doi: 10.1007/s00500-019-04030-2
– ident: ref_12
  doi: 10.1109/IHMSC.2017.132
– volume: 27
  start-page: 5
  year: 2017
  ident: ref_14
  article-title: Application traffic classification using payload size sequence signature
  publication-title: Int. J. Netw. Manag.
  doi: 10.1002/nem.1981
– volume: 116
  start-page: 102663
  year: 2022
  ident: ref_7
  article-title: Darknetsec: A novel self-attentive deep learning method for darknet traffic classification and application identification
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2022.102663
– volume: 17
  start-page: 103
  year: 2020
  ident: ref_5
  article-title: Deep learning-based real-time VPN encrypted traffic identification methods
  publication-title: Real Time Image Process.
  doi: 10.1007/s11554-019-00930-6
– volume: 2021
  start-page: 6620425
  year: 2021
  ident: ref_29
  article-title: Application research of key frames extraction technology combined with optimized faster R-CNN algorithm in traffic video analysis
  publication-title: Complexity
  doi: 10.1155/2021/6620425
– ident: ref_30
  doi: 10.5220/0005740704070414
– volume: 18
  start-page: 1218
  year: 2021
  ident: ref_9
  article-title: Flowpic: A generic representation for encrypted traffic classification and applications identification
  publication-title: IEEE Trans. Netw. Serv. Manag.
  doi: 10.1109/TNSM.2021.3071441
– ident: ref_17
  doi: 10.1007/978-3-030-89137-4_10
– volume: 73
  start-page: 103364
  year: 2022
  ident: ref_25
  article-title: Gesture recognition using dual-stream CNN based on fusion of semg energy kernel phase portrait and IMU amplitude image
  publication-title: Biomed. Signal Process. Control
  doi: 10.1016/j.bspc.2021.103364
– ident: ref_2
– volume: 2021
  start-page: 5518460
  year: 2021
  ident: ref_21
  article-title: Cld-net: A network combining CNN and LSTM for internet encrypted traffic classification
  publication-title: Secur. Commun. Netw.
  doi: 10.1155/2021/5518460
– volume: 199
  start-page: 108472
  year: 2021
  ident: ref_6
  article-title: MATEC: A lightweight neural network for online encrypted traffic classification
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2021.108472
– volume: 440
  start-page: 111
  year: 2021
  ident: ref_27
  article-title: Image scene geometry recognition using low-level features fusion at multi-layer deep CNN
  publication-title: Neurocomputing
  doi: 10.1016/j.neucom.2021.01.085
– ident: ref_19
  doi: 10.1109/ISI.2017.8004872
– volume: 16
  start-page: 103
  year: 2022
  ident: ref_28
  article-title: Cnn-based camera motion classification using HSI color model for compressed videos
  publication-title: Signal Image Video Process.
  doi: 10.1007/s11760-021-01964-9
– volume: 2022
  start-page: 4862571
  year: 2022
  ident: ref_1
  article-title: Security analysis of shadowsocks(r) protocol
  publication-title: Secur. Commun. Netw.
  doi: 10.1155/2022/4862571
– volume: 16
  start-page: 2367
  year: 2021
  ident: ref_32
  article-title: Accurate decentralized application identification via encrypted traffic analysis using graph neural networks
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2021.3050608
– volume: 16
  start-page: 217
  year: 2020
  ident: ref_13
  article-title: ACER: Detecting shadowsocks server based on active probe technology
  publication-title: J. Comput. Virol. Hacking Tech.
  doi: 10.1007/s11416-020-00353-z
– volume: 11
  start-page: 44
  year: 2021
  ident: ref_22
  article-title: Application of deep learning on the characterization of tor traffic using time based features
  publication-title: J. Internet Serv. Inf. Secur.
– volume: 24
  start-page: 1
  year: 2015
  ident: ref_16
  article-title: The applications of deep learning on traffic identification
  publication-title: BlackHat USA
– volume: 7
  start-page: 41017
  year: 2019
  ident: ref_4
  article-title: Flow context and host behavior based shadowsocks’s traffic identification
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2907149
– ident: ref_10
  doi: 10.1109/CyberSA.2018.8551395
– ident: ref_20
– volume: 76
  start-page: 60
  year: 2016
  ident: ref_23
  article-title: High performance traffic classification based on message size sequence and distribution
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2016.09.013
SSID ssj0023338
Score 2.3988101
Snippet Anonymous proxies are used by criminals for illegal network activities due to their anonymity, such as data theft and cyber attacks. Therefore, anonymous proxy...
SourceID doaj
pubmedcentral
proquest
gale
pubmed
crossref
SourceType Open Website
Open Access Repository
Aggregation Database
Index Database
Enrichment Source
StartPage 4216
SubjectTerms Algorithms
Analysis
Censorship
Classification
CNN
Computer crimes
Data security
Deep learning
Identification
Internet
Machine learning
Methods
Neural networks
Payloads
Safety and security measures
Shadowsocks traffic detection
spatio-temporal features
Virtual private networks
VPN traffic detection
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3NaxUxEA_SUz2I1q_VWqIIelm6m6_NHl-rpYgtgi30ZMjHBAuPp9hX_fedye5b9qHgxeNuwpJMJpn5ZWd-w9hrdEKijJ2p8egTtYpW16GJUBvoWzCQg9WUjXx2bk4v1YcrfTUr9UUxYQM98CC4Q5myETk1XVB4kAbjQxRgdG-JTM22mU5ftHkbMDVCLYnIa-ARkgjqD2-EoJxRKmo-sz6FpP_Po3hmi7bjJGeG5-Q-uzd6jHwxjPQBuwOrPXZ3xiP4kH1Z8PNvP2HJPxLU_lVuO_kE7PknClXhaJWILoK_g3UJv1rxs1I9mh-hIUscnz-X6Or6YmCrWnJyD28Rjj9ilyfvL45P67FwQh3R31rXSQbdNNCp3CjQyUKbMuIC33rTgfIR2piNQlPdBxVs5_s20HVgBC8pL7aVj9kOjhGeMq4TYhy04dADAjltfG6yb4I2SSTfm1yxtxuBujiyilNxi6VDdEGyd5PsK_Zq6vp9oNL4W6cjWpWpA7FflxeoE27UCfcvnajYG1pTR3sUBxP9mGqAUyK2K7fohMW5oHdUsf3Nsrtx8944QYkZFu20qtjLqRm3Hf1L8SvAlaM--AFrVV-xJ4OWTGOW2lgi6q9Yt6U_W5Pablldfy3U3j26T0rLZ_9DCs_ZrqBcjXJltM921j9u4QV6UOtwUDbLb5wtGZ0
  priority: 102
  providerName: Directory of Open Access Journals
– databaseName: Health & Medical Collection (ProQuest)
  dbid: 7X7
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LbxMxELagXOCAeLOlIIOQ4GJ1H7bXe0IpUFWIVki0Uk6s_BgDUpSUJi1_nxmvs00E4pistRp7PM-d-Yax1-iE-Ma3WqDqq4X0RglXehAaugo0RGcUdSMfn-ijM_lpqqY54bbMZZVrnZgUdVh4ypHv11Qtb1B5ynfnvwRNjaKvq3mExk12i6DLqKSrnV4HXA3GXwOaUIOh_f6yrqlzlEabb9igBNX_t0LesEjb1ZIb5ufwHrub_UY-GRh9n92A-QN2ZwNN8CH7NuEniyuY8c8UcP9OOU8-hvf8CxWscLRNBBrBP8AqFWHN-XGaIc0P0JwFjr-_phprcTpgVs04OYmXGJQ_YmeHH0_fH4k8PkF49LpWIjROlSW0MpYSVDBQhYjRga2sbkFaD5WPWqLB7px0prVd5Sgp6ME21B1bNY_ZDtIITxlXASMdtOTQAYZzSttYRls6pUMdbKdjwd6uD7T3GVucRlzMeowx6Oz78ewL9mpcej4Aavxr0QFxZVxAGNjpj8XF9z6LVN-EqOsYytZJNLFOW-dr0KozBLNnKiTqDfG0J0lFYrzNDQe4JcK86idtbXAv6CMVbG_N9j6L8LK_vnAFezk-RuGjLyp2Dsg5WoMvMEZ2BXsy3JKR5kZpQ3D9BWu37s_WprafzH_-SADfHTpRUjW7_yfrGbtdUy9GSgntsZ3VxSU8Rw9p5V4kMfgDTOYRaA
  priority: 102
  providerName: ProQuest
Title A Novel Lightweight Anonymous Proxy Traffic Detection Method Based on Spatio-Temporal Features
URI https://www.ncbi.nlm.nih.gov/pubmed/35684837
https://www.proquest.com/docview/2674382994
https://www.proquest.com/docview/2675608849
https://pubmed.ncbi.nlm.nih.gov/PMC9185453
https://doaj.org/article/3df62fd07b4847b6abc2e6598008781f
Volume 22
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lj9MwEB7t4wIHxHuzLJVBSHAJ5OFXDgi1sGWFaLWCrdQTke04gFR1l26Xx79nxkmjRuyBS6U2bmt7PPnmczzfADzDIMTlTskYb31ZzJ0WsU2cj6UvUi99bbWgbOTJVJ7M-Ie5mO_ApsZmO4GX11I7qic1Wy1e_v7x5w06_GtinEjZX11mGWWEpnIX9hGQFPnnhHcPE7I8DwWtKacrRjxMGoGh_ld7sBTU-_-9R2-BVP8A5RYijW_DrTaUZMPG9ndgxy_vws0tgcF78GXIpuc__YJ9JA7-K2yDso7xs1M6w8IQrkhHgr3z63Aua8kmoaw0GyHCVQzffw7HruOzRsZqwShuvEKefh9m4-OztydxW1EhdhiIreMqtyJJvOJ1wr2otE-rGgmDSY1UnhvnU1dLjhheWG61MkVqaZ_QeZNTwmyaP4A97KM_ACYqJD8I7r7wyPCENHVSm8QKWWWVKWQdwYvNhJaulRunqheLEmkHzX3ZzX0ET7umF43GxnWNRmSVrgHJYocPzldfy9bLyryqZVZXibIcUddKY13mpSg0Ke_pFDv1nGxa0nLCzjjT5iDgkEgGqxyqTONYMGyK4Ghj9nKzKMuMMjY0AjiP4El3Gf2RHrKYpUfLURv8Aa15EcHDZpV0fc6F1KTgH4HqrZ_eoPpXlt-_Bc3vAuMqLvLD__jfR3AjoxyNsFV0BHvr1ZV_jJHT2g5gV80Vvurx-wHsj46np58GYRdiEDzmLyh4GvM
linkProvider Scholars Portal
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3db9MwED-N8QA8IL4JDDAIBC_REsd2nAeEOsbUsbZCopP6tGA7DiBV7Wg7Jv4p_kbu8rVWIN722MaKbN_35e53AC_RCXGJS1WIqo-HwmkZ2sj5UPks9sqXVkvqRh6OVP9YfJzIyRb8bnthqKyy1YmVoi7mjnLku5yq5TUqT_Hu9EdIU6Po62o7QqNmiyP_6xxDtuXbw32k7yvODz6M3_fDZqpA6NAZWYVFYmUU-VSUkfCy0D4uSnSaTWxU6oVxPnalEmjHMiusTk0WW8qVOW8SahqNE3zvFbiKhjciiUonFwFegvFejV6UJFm0u-ScOlVplPqazatGA_xtANYs4GZ15pq5O7gFNxs_lfVqxroNW352B26soRfehZMeG81_-ikbUIB_XuVYWZdOYJ-oQIahLSSQCrbvV1XR14wNq5nVbA_NZ8Hw9-eqpjsc1xhZU0ZO6dnCL-_B8aVc7H3Yxj36h8BkgZEVeg4-8xg-SmXKqDSRlarghclUGcCb9kJz12CZ00iNaY4xDd193t19AC-6pac1gMe_Fu0RVboFhLld_TFffM0bEc6TolS8LKLUCjTpVhnruFcy0wTrp2Pc1GuiaU6aATfjTNPggEcijK28l3KNZ0GfLICdlux5ozKW-QWDB_C8e4zCTl9wzMwj5WgNvkBrkQXwoOaSbs-JVJrGAwSQbvDPxqE2n8y-f6sAxTN02oRMHv1_W8_gWn88HOSDw9HRY7jOqQ-kSkftwPZqceafoHe2sk8rkWDw5bJl8A9wiU4j
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9NAEB6VIiE4IN4YCiwIBBcr9r68PiCUEqqWtlElWiknzO56DUhRUpKUir_Gr2PGdtxEIG49Jl5Zuzvv8cw3AC_RCfHCZzpG1cdj6Y2KXeJDrEOeBh0qZxR1Ix8O9e6J_DhSow34veyFobLKpU6sFXU59ZQj73GqljeoPGWvassijgY7705_xDRBir60LsdpNCyyH36dY_g2f7s3QFq_4nznw_H73bidMBB7dEwWcSmcSpKQySqRQZUmpGWFDrRNrc6CtD6kvtISbVrupDOZzVNHeTMfrKAG0lTge6_A1UyolGQsG10EewJjvwbJSIg86c05p65VGqu-Yv_qMQF_G4MVa7heqbli-nZuwc3WZ2X9hsluw0aY3IEbK0iGd-Fznw2nP8OYHVCwf17nW1mXWmBHVCzD0C4SYAUbhEVdADZhh_X8araNprRk-PtTXd8dHzd4WWNGDurZLMzvwcmlXOx92MQ9hofAVIlRFnoRIQ8YSiptq6SyiVO65KXNdRXBm-WFFr7FNafxGuMC4xu6-6K7-whedEtPGzCPfy3aJqp0Cwh_u_5jOvtatOJciLLSvCqTzEk0705b53nQKjcE8WdS3NRromlBWgI3423b7IBHIrytop9xg2dB_yyCrSXZi1Z9zIsLZo_gefcYBZ--5thJQMrRGnyBMTKP4EHDJd2ehdKGRgVEkK3xz9qh1p9Mvn-rwcVzdOCkEo_-v61ncA2lrzjYG-4_huucWkLqzNQWbC5mZ-EJOmoL97SWCAZfLlsE_wDj61JZ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Novel+Lightweight+Anonymous+Proxy+Traffic+Detection+Method+Based+on+Spatio-Temporal+Features&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=He%2C+Yanjie&rft.au=Li%2C+Wei&rft.date=2022-06-01&rft.issn=1424-8220&rft.eissn=1424-8220&rft.volume=22&rft.issue=11&rft_id=info:doi/10.3390%2Fs22114216&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon