{"id":"https://openalex.org/W2912629059","doi":"https://doi.org/10.1109/avss.2018.8639335","title":"Web attack forensics based on network traffic behavior characteristics and URLs","display_name":"Web attack forensics based on network traffic behavior characteristics and URLs","publication_year":2018,"publication_date":"2018-11-01","ids":{"openalex":"https://openalex.org/W2912629059","doi":"https://doi.org/10.1109/avss.2018.8639335","mag":"2912629059"},"language":"en","primary_location":{"id":"doi:10.1109/avss.2018.8639335","is_oa":false,"landing_page_url":"https://doi.org/10.1109/avss.2018.8639335","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021136987","display_name":"Guozi Sun","orcid":"https://orcid.org/0000-0003-1888-7001"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guozi SUN","raw_affiliation_strings":["Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100394072","display_name":"Lei Zhu","orcid":"https://orcid.org/0000-0003-1685-7968"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei ZHU","raw_affiliation_strings":["Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101859990","display_name":"Huakang Li","orcid":"https://orcid.org/0000-0003-1284-1993"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huakang LI","raw_affiliation_strings":["Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100446248","display_name":"Wenjun Li","orcid":"https://orcid.org/0000-0001-6121-588X"},"institutions":[{"id":"https://openalex.org/I4210126577","display_name":"Shanghai Public Security Bureau","ror":"https://ror.org/03cfv5b91","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210126577"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenjun LI","raw_affiliation_strings":["Changping Branch, Beijing Municipal Public Security Bureau, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Changping Branch, Beijing Municipal Public Security Bureau, Beijing, China","institution_ids":["https://openalex.org/I4210126577"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5021136987"],"corresponding_institution_ids":["https://openalex.org/I41198531"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.20533229,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"7","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/network-forensics","display_name":"Network forensics","score":0.8348720073699951},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7336639761924744},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5604380369186401},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.551831066608429},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5431723594665527},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.4960883557796478},{"id":"https://openalex.org/keywords/web-traffic","display_name":"Web traffic","score":0.45928052067756653},{"id":"https://openalex.org/keywords/internet-security","display_name":"Internet security","score":0.45639580488204956},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.36964744329452515},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.36182817816734314},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.23686566948890686},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.17447218298912048},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.15655338764190674},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.10958120226860046}],"concepts":[{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.8348720073699951},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7336639761924744},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5604380369186401},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.551831066608429},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5431723594665527},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.4960883557796478},{"id":"https://openalex.org/C2777672014","wikidata":"https://www.wikidata.org/wiki/Q1172573","display_name":"Web traffic","level":3,"score":0.45928052067756653},{"id":"https://openalex.org/C22111027","wikidata":"https://www.wikidata.org/wiki/Q1070427","display_name":"Internet security","level":4,"score":0.45639580488204956},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.36964744329452515},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36182817816734314},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.23686566948890686},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.17447218298912048},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.15655338764190674},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.10958120226860046}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/avss.2018.8639335","is_oa":false,"landing_page_url":"https://doi.org/10.1109/avss.2018.8639335","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6200000047683716}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1583141315","https://openalex.org/W1634549304","https://openalex.org/W2028781191","https://openalex.org/W2088174752","https://openalex.org/W2097205059","https://openalex.org/W2099440707","https://openalex.org/W2100537916","https://openalex.org/W2106474518","https://openalex.org/W2112029993","https://openalex.org/W2114271194","https://openalex.org/W2131528687","https://openalex.org/W2133244081","https://openalex.org/W2162808666","https://openalex.org/W2167498973","https://openalex.org/W2541841318","https://openalex.org/W2755248774","https://openalex.org/W2760031121","https://openalex.org/W2789805432","https://openalex.org/W6674600362","https://openalex.org/W6676001191"],"related_works":["https://openalex.org/W2035643924","https://openalex.org/W1685415006","https://openalex.org/W2347635077","https://openalex.org/W2373766741","https://openalex.org/W4207048601","https://openalex.org/W3005595329","https://openalex.org/W1874694327","https://openalex.org/W2809183419","https://openalex.org/W2354977938","https://openalex.org/W109647043"],"abstract_inverted_index":{"With":[0],"the":[1,7,18,21,83,94],"continuous":[2],"development":[3],"of":[4,14,20,28,85],"Internet":[5,8],"technology,":[6],"has":[9,23],"penetrated":[10],"into":[11],"every":[12],"aspect":[13],"people's":[15],"lives,":[16],"and":[17,36,46,49,56],"importance":[19],"network":[22,29,39,44,50,76,86],"also":[24],"increased.":[25],"The":[26],"technology":[27],"attack":[30,65,72],"is":[31],"constantly":[32],"becoming":[33,54],"more":[34,55,57],"complex":[35],"diversified.":[37],"Many":[38],"applications":[40],"suffer":[41],"from":[42],"various":[43],"attacks":[45],"security":[47,51],"threats,":[48],"problems":[52],"are":[53,61],"serious,":[58],"new":[59,70],"requirements":[60],"imposed":[62],"on":[63,82,93],"Web":[64,71],"forensics.":[66],"We":[67],"propose":[68],"a":[69],"forensics":[73],"method":[74,89],"combining":[75],"traffic":[77],"characteristics":[78,84],"with":[79],"URLs":[80],"based":[81],"traffic.":[87],"Our":[88],"achieved":[90],"satisfactory":[91],"results":[92],"test":[95],"data":[96],"set.":[97]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
