I. Introduction
Detecting encrypted malicious traffic presents a formidable cybersecurity challenge in the digital domain. As Internet technology advances, a growing number of users are adopting encrypted communication protocols. Google's Transparency Report [1] published in 2022 revealed that the adoption of encrypted protocols has risen from 50% in 2014 to 95%. Furthermore, 97% of the top 100 global websites use Hypertext Transfer Protocol Secure (HTTPS). Although encryption technology can effectively protect user privacy, more and more attackers are beginning to use SSL/TLS encryption protocols to communicate with C&C servers in malicious software in order to evade detection. According to a report by Sophos Labs [2], most of the content detected in malicious TLS traffic comes from the initial malware infection, including loaders, payload deliverers, and document-based installers. Therefore, there is an urgent need to explore techniques for detecting encrypted traffic to protect user privacy, enhance network security defenses, identify and prevent malicious activities, and improve the security and reliability of networks.