Abstract: Highlights•Multi-granularity characterization of behavioral and temporal features.•Utilize data efficiently and mitigate imbalance impact by constructing prompt samples.•Build detection model to enhance detection of malicious encrypted traffic.