Text this: Traceback analysis of abnormal access to electronic resources from the perspective of encrypted traffic