{"id":"https://openalex.org/W4205984185","doi":"https://doi.org/10.1109/bigdata52589.2021.9671554","title":"Big Data Analytics Using Fuzzy Clustering for Network Security","display_name":"Big Data Analytics Using Fuzzy Clustering for Network Security","publication_year":2021,"publication_date":"2021-12-15","ids":{"openalex":"https://openalex.org/W4205984185","doi":"https://doi.org/10.1109/bigdata52589.2021.9671554"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata52589.2021.9671554","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata52589.2021.9671554","pdf_url":null,"source":{"id":"https://openalex.org/S4363607718","display_name":"2021 IEEE International Conference on Big Data (Big Data)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049344770","display_name":"Terrence P. Fries","orcid":null},"institutions":[{"id":"https://openalex.org/I200885203","display_name":"Indiana University of Pennsylvania","ror":"https://ror.org/0511cmw96","country_code":"US","type":"education","lineage":["https://openalex.org/I200885203"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Terrence P. Fries","raw_affiliation_strings":["Department of Mathematical and Computer Sciences, Indiana University of Pennsylvania, Indiana, Pennsylvania, USA"],"affiliations":[{"raw_affiliation_string":"Department of Mathematical and Computer Sciences, Indiana University of Pennsylvania, Indiana, Pennsylvania, USA","institution_ids":["https://openalex.org/I200885203"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5049344770"],"corresponding_institution_ids":["https://openalex.org/I200885203"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17342623,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"1","issue":null,"first_page":"5894","last_page":"5896"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8081979155540466},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7756717205047607},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.6730800271034241},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.6041188836097717},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.597602367401123},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5562208890914917},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.487403929233551},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4630361497402191},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.34054601192474365},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3008968234062195},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2891581952571869},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23372790217399597}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8081979155540466},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7756717205047607},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.6730800271034241},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6041188836097717},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.597602367401123},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5562208890914917},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.487403929233551},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4630361497402191},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.34054601192474365},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3008968234062195},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2891581952571869},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23372790217399597},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bigdata52589.2021.9671554","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata52589.2021.9671554","pdf_url":null,"source":{"id":"https://openalex.org/S4363607718","display_name":"2021 IEEE International Conference on Big Data (Big Data)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1980372836","https://openalex.org/W1995450389","https://openalex.org/W2012701999","https://openalex.org/W2035175061","https://openalex.org/W2061406732","https://openalex.org/W2103932836","https://openalex.org/W2110121521","https://openalex.org/W2140519269","https://openalex.org/W2198966748","https://openalex.org/W6687825632"],"related_works":["https://openalex.org/W2357468538","https://openalex.org/W1577110157","https://openalex.org/W2355007334","https://openalex.org/W4298130764","https://openalex.org/W2390009783","https://openalex.org/W2804364458","https://openalex.org/W2770593030","https://openalex.org/W4254602698","https://openalex.org/W2394461323","https://openalex.org/W2349441905"],"abstract_inverted_index":{"The":[0,33,152],"use":[1],"of":[2,18,36,142,150],"computer":[3],"networks":[4,19],"has":[5,23,39,80],"increased":[6,25],"significantly":[7],"in":[8,13,43,66,160,173],"recent":[9],"years.":[10],"This":[11,130],"proliferation,":[12],"combination":[14],"with":[15,73,123],"the":[16,21,41,120,168],"interconnection":[17],"via":[20],"Inter-net,":[22],"drastically":[24],"their":[26],"vulnerability":[27],"to":[28,54,64,84,88,105,107,111,136,156,162,175],"attack":[29,37,59,115,128],"by":[30],"malicious":[31],"agents.":[32],"wide":[34],"variety":[35],"modes":[38,60],"exacerbated":[40],"problem":[42],"detecting":[44],"attacks.":[45],"Many":[46],"current":[47],"intrusion":[48,92,137],"detection":[49,93,138],"systems":[50,118],"(IDS)":[51],"are":[52,62,97,102],"unable":[53,63,104],"identify":[55,112],"unknown":[56,114],"or":[57,61,110],"mutated":[58,124],"operate":[65],"a":[67,77,133,147],"dynamic":[68,108],"environment":[69],"as":[70],"is":[71,154],"necessary":[72],"mobile":[74],"networks.":[75],"As":[76],"result,":[78],"it":[79],"become":[81],"increasingly":[82],"important":[83],"find":[85],"new":[86],"ways":[87],"implement":[89],"and":[90,125],"manage":[91],"systems.":[94],"Classification-based":[95],"IDS":[96],"commonly":[98],"used,":[99],"however,":[100],"they":[101],"often":[103],"adapt":[106],"environments":[109],"previously":[113,126],"modes.":[116,129],"Fuzzy-based":[117],"accommodate":[119],"imprecision":[121],"associated":[122],"unidentified":[127],"research":[131],"presents":[132],"novel":[134],"approach":[135],"using":[139],"fuzzy":[140],"clustering":[141],"TCP":[143],"packets":[144],"based":[145],"upon":[146],"reduced":[148],"set":[149],"features.":[151],"method":[153,169],"shown":[155],"provide":[157],"superior":[158],"performance":[159],"comparison":[161,174],"traditional":[163],"classification":[164],"approaches.":[165],"In":[166],"addition,":[167],"demonstrates":[170],"im-proved":[171],"robustness":[172],"other":[176],"evolutionary-based":[177],"techniques.":[178]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
