{"id":"https://openalex.org/W4378084788","doi":"https://doi.org/10.1080/24751839.2023.2215135","title":"Abnormal network packets identification using header information collected from Honeywall architecture","display_name":"Abnormal network packets identification using header information collected from Honeywall architecture","publication_year":2023,"publication_date":"2023-05-23","ids":{"openalex":"https://openalex.org/W4378084788","doi":"https://doi.org/10.1080/24751839.2023.2215135"},"language":"en","primary_location":{"id":"doi:10.1080/24751839.2023.2215135","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1080/24751839.2023.2215135","pdf_url":"https://www.tandfonline.com/doi/pdf/10.1080/24751839.2023.2215135?needAccess=true&role=button","source":{"id":"https://openalex.org/S4210226961","display_name":"Journal of Information and Telecommunication","issn_l":"2475-1839","issn":["2475-1839","2475-1847"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Information and Telecommunication","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.tandfonline.com/doi/pdf/10.1080/24751839.2023.2215135?needAccess=true&role=button","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008340408","display_name":"Kha V. Nguyen","orcid":null},"institutions":[{"id":"https://openalex.org/I177733328","display_name":"Can Tho University","ror":"https://ror.org/0071qz696","country_code":"VN","type":"education","lineage":["https://openalex.org/I177733328"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Kha Van Nguyen","raw_affiliation_strings":["Can Tho Department of Science and Technology, Can Tho, Vietnam"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Can Tho Department of Science and Technology, Can Tho, Vietnam","institution_ids":["https://openalex.org/I177733328"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101729014","display_name":"H\u1ea3i Thanh Nguy\u1ec5n","orcid":"https://orcid.org/0000-0002-1386-1390"},"institutions":[{"id":"https://openalex.org/I177733328","display_name":"Can Tho University","ror":"https://ror.org/0071qz696","country_code":"VN","type":"education","lineage":["https://openalex.org/I177733328"]}],"countries":["VN"],"is_corresponding":true,"raw_author_name":"Hai Thanh Nguyen","raw_affiliation_strings":["College of Information and Communication Technology, Can Tho University, Can Tho, Vietnam"],"raw_orcid":"https://orcid.org/0000-0002-1386-1390","affiliations":[{"raw_affiliation_string":"College of Information and Communication Technology, Can Tho University, Can Tho, Vietnam","institution_ids":["https://openalex.org/I177733328"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073166305","display_name":"Thang Quyet Le","orcid":null},"institutions":[{"id":"https://openalex.org/I177733328","display_name":"Can Tho University","ror":"https://ror.org/0071qz696","country_code":"VN","type":"education","lineage":["https://openalex.org/I177733328"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Thang Quyet Le","raw_affiliation_strings":["College of Information and Communication Technology, Can Tho University, Can Tho, Vietnam"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Information and Communication Technology, Can Tho University, Can Tho, Vietnam","institution_ids":["https://openalex.org/I177733328"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5104120363","display_name":"Quang Nhat Minh Truong","orcid":null},"institutions":[{"id":"https://openalex.org/I177733328","display_name":"Can Tho University","ror":"https://ror.org/0071qz696","country_code":"VN","type":"education","lineage":["https://openalex.org/I177733328"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Quang Nhat Minh Truong","raw_affiliation_strings":["College of Information Technology, Can Tho University of Technology, Can Tho, Vietnam"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Information Technology, Can Tho University of Technology, Can Tho, Vietnam","institution_ids":["https://openalex.org/I177733328"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101729014"],"corresponding_institution_ids":["https://openalex.org/I177733328"],"apc_list":{"value":925,"currency":"GBP","value_usd":1134},"apc_paid":{"value":925,"currency":"GBP","value_usd":1134},"fwci":0.5854,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.66991419,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"7","issue":"4","first_page":"437","last_page":"461"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/header","display_name":"Header","score":0.8315702676773071},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7801344394683838},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7203490734100342},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.6700196266174316},{"id":"https://openalex.org/keywords/attack-patterns","display_name":"Attack patterns","score":0.6319725513458252},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6318767070770264},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6017576456069946},{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.5960591435432434},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5789922475814819},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.556033730506897},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5133854150772095},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.4470934271812439},{"id":"https://openalex.org/keywords/network-forensics","display_name":"Network forensics","score":0.4376007616519928},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.42971962690353394},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.4137350618839264},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.33098965883255005},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.31796395778656006},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2574506402015686},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.14104324579238892}],"concepts":[{"id":"https://openalex.org/C48105269","wikidata":"https://www.wikidata.org/wiki/Q1141160","display_name":"Header","level":2,"score":0.8315702676773071},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7801344394683838},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7203490734100342},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.6700196266174316},{"id":"https://openalex.org/C2780741293","wikidata":"https://www.wikidata.org/wiki/Q4818019","display_name":"Attack patterns","level":3,"score":0.6319725513458252},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6318767070770264},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6017576456069946},{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.5960591435432434},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5789922475814819},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.556033730506897},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5133854150772095},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.4470934271812439},{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.4376007616519928},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.42971962690353394},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.4137350618839264},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.33098965883255005},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.31796395778656006},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2574506402015686},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.14104324579238892},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1080/24751839.2023.2215135","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1080/24751839.2023.2215135","pdf_url":"https://www.tandfonline.com/doi/pdf/10.1080/24751839.2023.2215135?needAccess=true&role=button","source":{"id":"https://openalex.org/S4210226961","display_name":"Journal of Information and Telecommunication","issn_l":"2475-1839","issn":["2475-1839","2475-1847"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Information and Telecommunication","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:ca08169918c341fcb55effc83406d363","is_oa":true,"landing_page_url":"https://doaj.org/article/ca08169918c341fcb55effc83406d363","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Information and Telecommunication, Vol 7, Iss 4, Pp 437-461 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1080/24751839.2023.2215135","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1080/24751839.2023.2215135","pdf_url":"https://www.tandfonline.com/doi/pdf/10.1080/24751839.2023.2215135?needAccess=true&role=button","source":{"id":"https://openalex.org/S4210226961","display_name":"Journal of Information and Telecommunication","issn_l":"2475-1839","issn":["2475-1839","2475-1847"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Information and Telecommunication","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7400000095367432}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4378084788.pdf","grobid_xml":"https://content.openalex.org/works/W4378084788.grobid-xml"},"referenced_works_count":44,"referenced_works":["https://openalex.org/W1851171594","https://openalex.org/W1990680872","https://openalex.org/W2099940443","https://openalex.org/W2508613954","https://openalex.org/W2526596238","https://openalex.org/W2589534713","https://openalex.org/W2611159092","https://openalex.org/W2624938815","https://openalex.org/W2753352458","https://openalex.org/W2890507837","https://openalex.org/W2943456202","https://openalex.org/W2946002947","https://openalex.org/W2973801020","https://openalex.org/W2990698784","https://openalex.org/W2991709539","https://openalex.org/W2992586311","https://openalex.org/W2997111441","https://openalex.org/W2997442262","https://openalex.org/W3014983979","https://openalex.org/W3016650017","https://openalex.org/W3021219025","https://openalex.org/W3024556656","https://openalex.org/W3043103359","https://openalex.org/W3047609445","https://openalex.org/W3090710579","https://openalex.org/W3106212564","https://openalex.org/W3114883118","https://openalex.org/W3115616859","https://openalex.org/W3136258292","https://openalex.org/W3173318817","https://openalex.org/W3195892385","https://openalex.org/W3196843980","https://openalex.org/W3197490684","https://openalex.org/W3198099470","https://openalex.org/W3198885851","https://openalex.org/W3200118354","https://openalex.org/W4200331022","https://openalex.org/W4212966121","https://openalex.org/W4250685322","https://openalex.org/W4255489320","https://openalex.org/W4284974780","https://openalex.org/W4294691718","https://openalex.org/W4297100880","https://openalex.org/W4319989145"],"related_works":["https://openalex.org/W2130329553","https://openalex.org/W2347635077","https://openalex.org/W2086021498","https://openalex.org/W2393143026","https://openalex.org/W2365578302","https://openalex.org/W2294488712","https://openalex.org/W2258115363","https://openalex.org/W2800346278","https://openalex.org/W4220783909","https://openalex.org/W2036903135"],"abstract_inverted_index":{"Most":[0],"devices":[1],"are":[2],"now":[3],"connected":[4],"through":[5],"the":[6,56,140,147,155,158],"Internet,":[7],"so":[8],"cybersecurity":[9],"issues":[10],"have":[11,60,132],"raised":[12],"concerns.":[13],"This":[14],"study":[15],"proposes":[16],"network":[17,28,44,81],"services":[18],"in":[19,125],"a":[20,175],"virtual":[21],"environment":[22],"to":[23,42,64,99,115,138,162,165,173],"collect,":[24],"analyze":[25],"and":[26,53,67,102,169],"identify":[27],"attacks":[29,82,101,168],"with":[30,71,87,134],"various":[31],"techniques.":[32],"Our":[33,118],"contributions":[34],"include":[35],"multi-fold.":[36],"First,":[37],"we":[38,59,92,131],"deployed":[39],"Honeynet":[40],"architecture":[41],"collect":[43,109],"packets,":[45],"including":[46],"actual":[47],"cyber-attacks":[48],"performed":[49],"by":[50,146],"real":[51],"hackers":[52],"crackers.":[54],"In":[55],"second":[57],"contribution,":[58],"leveraged":[61],"some":[62],"techniques":[63],"normalize":[65],"data":[66,111],"extract":[68],"header":[69],"information":[70],"29":[72],"features":[73],"from":[74],"200,000":[75],"samples":[76],"of":[77,80],"many":[78],"types":[79],"for":[83,112],"abnormal":[84],"packet":[85],"identification":[86],"machine":[88],"learning":[89],"algorithms.":[90],"Furthermore,":[91],"introduce":[93],"an":[94],"Adaptive":[95],"Cybersecurity":[96],"(AC)":[97],"system":[98,106,159],"detect":[100,166],"provide":[103,170],"warnings.":[104],"The":[105],"can":[107],"automatically":[108],"more":[110],"further":[113],"analysis":[114],"improve":[116],"performance.":[117],"proposed":[119],"method":[120],"performs":[121],"better":[122],"than":[123],"Snort":[124],"detecting":[126],"dangerous":[127],"malicious":[128],"attacks.":[129],"Finally,":[130],"experimented":[133],"different":[135],"cyber-attack":[136],"approaches":[137],"exploit":[139],"ten":[141],"website":[142],"security":[143],"risks":[144],"recommended":[145],"Open":[148],"Web":[149],"Application":[150],"Security":[151],"Project":[152],"(OWASP).":[153],"From":[154],"research":[156],"results,":[157],"is":[160],"expected":[161],"be":[163],"able":[164],"cybercriminal":[167],"early":[171],"warnings":[172],"prevent":[174],"potential":[176],"cyber-attack.":[177]},"counts_by_year":[{"year":2024,"cited_by_count":3}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
