{"id":"https://openalex.org/W2089716217","doi":"https://doi.org/10.1109/apnoms.2011.6077028","title":"Automatic attack detection and correction system development","display_name":"Automatic attack detection and correction system development","publication_year":2011,"publication_date":"2011-09-01","ids":{"openalex":"https://openalex.org/W2089716217","doi":"https://doi.org/10.1109/apnoms.2011.6077028","mag":"2089716217"},"language":"en","primary_location":{"id":"doi:10.1109/apnoms.2011.6077028","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apnoms.2011.6077028","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 13th Asia-Pacific Network Operations and Management Symposium","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026015382","display_name":"Teerapat Sanguankotchakorn","orcid":null},"institutions":[{"id":"https://openalex.org/I38538140","display_name":"Asian Institute of Technology","ror":"https://ror.org/0403qcr87","country_code":"TH","type":"education","lineage":["https://openalex.org/I38538140"]}],"countries":["TH"],"is_corresponding":true,"raw_author_name":"Teerapat Sanguankotchakorn","raw_affiliation_strings":["Telecommunications Field of Study School of Engineering and Technology, Asian Institute of Technology, Thailand","Telecommunications Field of Study, School of Engineering and Technology, Asian Institute of Technology, Thailand"],"affiliations":[{"raw_affiliation_string":"Telecommunications Field of Study School of Engineering and Technology, Asian Institute of Technology, Thailand","institution_ids":["https://openalex.org/I38538140"]},{"raw_affiliation_string":"Telecommunications Field of Study, School of Engineering and Technology, Asian Institute of Technology, Thailand","institution_ids":["https://openalex.org/I38538140"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021549170","display_name":"Thanatorn Dechasawatwong","orcid":null},"institutions":[{"id":"https://openalex.org/I38538140","display_name":"Asian Institute of Technology","ror":"https://ror.org/0403qcr87","country_code":"TH","type":"education","lineage":["https://openalex.org/I38538140"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Thanatorn Dechasawatwong","raw_affiliation_strings":["Telecommunications Field of Study School of Engineering and Technology, Asian Institute of Technology, Thailand","Telecommunications Field of Study, School of Engineering and Technology, Asian Institute of Technology, Thailand"],"affiliations":[{"raw_affiliation_string":"Telecommunications Field of Study School of Engineering and Technology, Asian Institute of Technology, Thailand","institution_ids":["https://openalex.org/I38538140"]},{"raw_affiliation_string":"Telecommunications Field of Study, School of Engineering and Technology, Asian Institute of Technology, Thailand","institution_ids":["https://openalex.org/I38538140"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5026015382"],"corresponding_institution_ids":["https://openalex.org/I38538140"],"apc_list":null,"apc_paid":null,"fwci":0.3501,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.63397829,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9675999879837036,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9426000118255615,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6261351108551025},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3438725769519806}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6261351108551025},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3438725769519806}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/apnoms.2011.6077028","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apnoms.2011.6077028","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 13th Asia-Pacific Network Operations and Management Symposium","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.800000011920929,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W27869909","https://openalex.org/W2044584990","https://openalex.org/W2151554935","https://openalex.org/W3198540106","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W4402327032","https://openalex.org/W2382290278"],"abstract_inverted_index":{"Recently,":[0],"there":[1],"are":[2,8,71,99,157,241],"increasingly":[3],"numerous":[4],"hacking":[5,17],"techniques":[6,213,240],"which":[7],"used":[9],"to":[10,36,57,67,78,82,90,137,159,162,179,183,198,203],"compromise":[11],"the":[12,27,38,51,58,61,69,88,91,100,121,133,141,150,160,164,167,175,180,191,200,208,224],"computer":[13],"systems.":[14],"One":[15],"popular":[16],"technique":[18,25],"is":[19],"called":[20,135],"Man-in-the-Middle":[21],"attack":[22],"[1].":[23],"This":[24],"uses":[26],"weakness":[28],"of":[29,60,96,123,210],"ARP":[30,142,170,177,186],"protocol":[31],"[5]":[32],"namely":[33],"\u201cARP":[34],"spoofing\u201d":[35],"damage":[37],"users":[39,70],"on":[40],"both":[41],"confidentiality":[42],"and":[43,86,105,139,153,230,245,249],"privacy":[44],"issues.":[45],"It":[46,233],"does":[47,110,116],"not":[48,118],"only":[49,73],"steal":[50],"sensitive":[52],"information,":[53],"but":[54],"also":[55],"leads":[56],"collapse":[59],"network":[62,161],"communications.":[63],"The":[64,93,145],"current":[65],"methods":[66],"secure":[68],"mainly":[72],"passive":[74],"detections;":[75],"for":[76],"example,":[77],"monitor":[79],"invalid":[80,192],"MAC":[81],"IP":[83],"addresses":[84],"mappings,":[85],"give":[87],"alerts":[89],"administrators.":[92],"main":[94],"disadvantages":[95],"this":[97,129],"method":[98],"time":[101],"lag":[102],"between":[103],"learning":[104],"detecting":[106,248],"spoofing.":[107],"Moreover,":[108],"it":[109,117,172],"neither":[111],"correct":[112,140,176,184],"spoofing":[113,143],"automatically,":[114],"nor":[115],"resolve":[119],"at":[120],"root":[122],"problems":[124],"(the":[125],"attacker's":[126,201],"host).":[127],"In":[128,189],"work,":[130],"we":[131],"propose":[132],"algorithm":[134,146,168],"\u201cSmartARP\u201d":[136],"detect":[138],"attack.":[144],"works":[147],"as":[148,219],"follows:":[149],"constructed":[151],"ARP-Request":[152],"TCP":[154],"SYN":[155],"packets":[156,178,194],"sent":[158,197],"verify":[163],"inconsistencies.":[165],"When":[166],"detects":[169],"spoofing,":[171],"will":[173,195],"send":[174],"victim's":[181],"hosts":[182],"their":[185],"caches":[187],"automatically.":[188],"addition,":[190],"ARP-Reply":[193],"be":[196,235],"update":[199],"host":[202],"deny":[204],"it.":[205],"We":[206],"measure":[207],"performance":[209],"our":[211,238],"proposed":[212,239],"using":[214],"various":[215],"evaluation":[216],"metrics":[217],"such":[218],"Response":[220],"time,":[221,223],"Correction":[222,226],"Successful":[225],"ratio,":[227],"CPU":[228],"Usage":[229],"Network":[231],"Utilization.":[232],"can":[234],"shown":[236],"that":[237],"fast,":[242],"intelligent,":[243],"scalable":[244],"reliable":[246],"in":[247],"correcting":[250],"attacks.":[251]},"counts_by_year":[{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
