{"id":"https://openalex.org/W2115755211","doi":"https://doi.org/10.1109/aina.2003.1192971","title":"SecureDirect: proactive security through content based traffic control","display_name":"SecureDirect: proactive security through content based traffic control","publication_year":2003,"publication_date":"2003-12-22","ids":{"openalex":"https://openalex.org/W2115755211","doi":"https://doi.org/10.1109/aina.2003.1192971","mag":"2115755211"},"language":"en","primary_location":{"id":"doi:10.1109/aina.2003.1192971","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aina.2003.1192971","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051313555","display_name":"Joe B. Stevens","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"J. Stevens","raw_affiliation_strings":["Jens Corporation, USA"],"affiliations":[{"raw_affiliation_string":"Jens Corporation, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088225525","display_name":"Shadan Saniepour","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"S. Saniepour","raw_affiliation_strings":["Jens Corporation, USA"],"affiliations":[{"raw_affiliation_string":"Jens Corporation, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5051313555"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.2361,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.63705025,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"7","issue":null,"first_page":"704","last_page":"709"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/stateful-firewall","display_name":"Stateful firewall","score":0.7778538465499878},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7561731338500977},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7013838291168213},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.6851608157157898},{"id":"https://openalex.org/keywords/blocking","display_name":"Blocking (statistics)","score":0.5745717287063599},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5657734870910645},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.49261289834976196},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.4671696126461029},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.44215258955955505},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.4120938777923584},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14997106790542603}],"concepts":[{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.7778538465499878},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7561731338500977},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7013838291168213},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.6851608157157898},{"id":"https://openalex.org/C144745244","wikidata":"https://www.wikidata.org/wiki/Q4927286","display_name":"Blocking (statistics)","level":2,"score":0.5745717287063599},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5657734870910645},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.49261289834976196},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.4671696126461029},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.44215258955955505},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.4120938777923584},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14997106790542603},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/aina.2003.1192971","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aina.2003.1192971","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W273512233","https://openalex.org/W1481915258","https://openalex.org/W2084044852","https://openalex.org/W2123886726","https://openalex.org/W2155547871"],"related_works":["https://openalex.org/W2583381754","https://openalex.org/W2144255176","https://openalex.org/W2222333653","https://openalex.org/W1970797462","https://openalex.org/W109977192","https://openalex.org/W2566747981","https://openalex.org/W4312120139","https://openalex.org/W2809541058","https://openalex.org/W2389068513","https://openalex.org/W2133389611"],"abstract_inverted_index":{"The":[0,114],"exponential":[1],"growth":[2],"of":[3,21,24,53,63,116,137,157,164,167,173],"Internet":[4],"traffic":[5,85,91,98],"has":[6,27],"made":[7],"public":[8],"servers":[9],"increasingly":[10],"vulnerable":[11],"to":[12,105,128,141,145],"unauthorized":[13],"accesses":[14],"and":[15,51,90,131,135,159],"intrusions.":[16],"So":[17],"far":[18],"the":[19,49,61,129,143,162,174],"focus":[20],"most":[22],"studies":[23],"this":[25,45,117,155],"problem":[26,62],"been":[28],"on":[29,96],"either":[30],"blocking":[31],"unused":[32],"ports":[33],"(fire-walling)":[34],"or":[35],"detecting":[36],"attacks":[37,138],"with":[38,70],"an":[39,57,68,100,106],"intrusion":[40,64],"detection":[41],"system":[42,118],"(IDS).":[43],"In":[44],"paper":[46],"we":[47],"introduce":[48],"design":[50],"implementation":[52,172],"SecureDirect,":[54],"which":[55],"is":[56,76,103,119],"attempt":[58],"at":[59],"addressing":[60],"prevention":[65],"by":[66],"combining":[67],"IDS":[69],"a":[71,77,125,165],"stateful":[72],"load":[73,80],"balancer":[74,81],"SecureDirect":[75],"real":[78],"time":[79],"that":[82,120],"distinguishes":[83],"between":[84],"coming":[86],"from":[87,93,99],"\"good\"":[88],"clients":[89],"originating":[92],"attackers.":[94],"Based":[95],"this,":[97],"identified":[101],"attacker":[102,130],"redirected":[104],"alternative":[107],"server":[108],"where":[109],"damage":[110],"can":[111],"be":[112],"mitigated.":[113],"advantage":[115],"it":[121],"blocks":[122],"intrusions":[123],"in":[124,139],"manner":[126],"transparent":[127],"allows":[132],"for":[133,154],"observation":[134],"investigation":[136],"order":[140],"enable":[142],"administrator":[144],"take":[146],"appropriate":[147],"action.":[148],"We":[149],"also":[150],"suggest":[151],"possible":[152],"uses":[153],"type":[156],"system,":[158],"then":[160],"present":[161],"results":[163],"series":[166],"stress":[168],"tests":[169],"against":[170],"our":[171],"idea.":[175]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
