{"id":"https://openalex.org/W2111197709","doi":"https://doi.org/10.1109/ccgrid.2005.1558541","title":"Instant attack stopper in InfiniBand architecture","display_name":"Instant attack stopper in InfiniBand architecture","publication_year":2005,"publication_date":"2005-01-01","ids":{"openalex":"https://openalex.org/W2111197709","doi":"https://doi.org/10.1109/ccgrid.2005.1558541","mag":"2111197709"},"language":"en","primary_location":{"id":"doi:10.1109/ccgrid.2005.1558541","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccgrid.2005.1558541","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"CCGrid 2005. IEEE International Symposium on Cluster Computing and the Grid, 2005.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020465953","display_name":"Manhee Lee","orcid":"https://orcid.org/0000-0002-4258-8901"},"institutions":[{"id":"https://openalex.org/I91045830","display_name":"Texas A&M University","ror":"https://ror.org/01f5ytq51","country_code":"US","type":"education","lineage":["https://openalex.org/I91045830"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Manhee Lee","raw_affiliation_strings":["Department of Computer Science, Texas A and M University, College Station, TX, USA","Department of Computer Science, TexasA&MUniversity College Station"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Texas A and M University, College Station, TX, USA","institution_ids":["https://openalex.org/I91045830"]},{"raw_affiliation_string":"Department of Computer Science, TexasA&MUniversity College Station","institution_ids":["https://openalex.org/I91045830"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002298749","display_name":"Eun Jung Kim","orcid":null},"institutions":[{"id":"https://openalex.org/I91045830","display_name":"Texas A&M University","ror":"https://ror.org/01f5ytq51","country_code":"US","type":"education","lineage":["https://openalex.org/I91045830"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Eun Jung Kim","raw_affiliation_strings":["Department of Computer Science, Texas A and M University, College Station, TX, USA","Department of Computer Science, TexasA&MUniversity College Station"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Texas A and M University, College Station, TX, USA","institution_ids":["https://openalex.org/I91045830"]},{"raw_affiliation_string":"Department of Computer Science, TexasA&MUniversity College Station","institution_ids":["https://openalex.org/I91045830"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084141859","display_name":"Ki Hwan Yum","orcid":"https://orcid.org/0000-0002-3130-1434"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ki Hwan Yum","raw_affiliation_strings":["Department of Computer Science, University of Texas Texas at San Antonio, San Antonio, TX"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Texas Texas at San Antonio, San Antonio, TX","institution_ids":["https://openalex.org/I45438204"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019985625","display_name":"M. Yousif","orcid":"https://orcid.org/0009-0005-9263-950X"},"institutions":[{"id":"https://openalex.org/I1343180700","display_name":"Intel (United States)","ror":"https://ror.org/01ek73717","country_code":"US","type":"company","lineage":["https://openalex.org/I1343180700"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"M. Yousif","raw_affiliation_strings":["Advanced Component Division Intel Corporation, Hillsboro, OR, USA"],"affiliations":[{"raw_affiliation_string":"Advanced Component Division Intel Corporation, Hillsboro, OR, USA","institution_ids":["https://openalex.org/I1343180700"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5020465953"],"corresponding_institution_ids":["https://openalex.org/I91045830"],"apc_list":null,"apc_paid":null,"fwci":0.2595,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.65000683,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"105","last_page":"110 Vol. 1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.804704487323761},{"id":"https://openalex.org/keywords/infiniband","display_name":"InfiniBand","score":0.7117700576782227},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6572467088699341},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5789989829063416},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5056273937225342},{"id":"https://openalex.org/keywords/cluster","display_name":"Cluster (spacecraft)","score":0.488679438829422},{"id":"https://openalex.org/keywords/sophistication","display_name":"Sophistication","score":0.45311886072158813},{"id":"https://openalex.org/keywords/enterprise-information-security-architecture","display_name":"Enterprise information security architecture","score":0.4530489146709442},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.44314876198768616},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.40216898918151855},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.19979563355445862}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.804704487323761},{"id":"https://openalex.org/C2781030343","wikidata":"https://www.wikidata.org/wiki/Q922437","display_name":"InfiniBand","level":2,"score":0.7117700576782227},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6572467088699341},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5789989829063416},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5056273937225342},{"id":"https://openalex.org/C164866538","wikidata":"https://www.wikidata.org/wiki/Q367351","display_name":"Cluster (spacecraft)","level":2,"score":0.488679438829422},{"id":"https://openalex.org/C168725872","wikidata":"https://www.wikidata.org/wiki/Q991663","display_name":"Sophistication","level":2,"score":0.45311886072158813},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.4530489146709442},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.44314876198768616},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.40216898918151855},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.19979563355445862},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccgrid.2005.1558541","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccgrid.2005.1558541","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"CCGrid 2005. IEEE International Symposium on Cluster Computing and the Grid, 2005.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W2814832","https://openalex.org/W1578011075","https://openalex.org/W1643546019","https://openalex.org/W2011979817","https://openalex.org/W2042448840","https://openalex.org/W2046946959","https://openalex.org/W2053574457","https://openalex.org/W2097335022","https://openalex.org/W2098892515","https://openalex.org/W2125051957","https://openalex.org/W6600110185","https://openalex.org/W6678762438","https://openalex.org/W7046645973"],"related_works":["https://openalex.org/W2406331183","https://openalex.org/W2363988059","https://openalex.org/W2792231649","https://openalex.org/W2053215237","https://openalex.org/W1939358748","https://openalex.org/W1995426833","https://openalex.org/W3150273738","https://openalex.org/W2613555492","https://openalex.org/W2141107779","https://openalex.org/W2350246940"],"abstract_inverted_index":{"With":[0],"the":[1,10,15,30,51,63,69,87,101,148,161],"growing":[2],"popularity":[3],"of":[4,12,17,32,53,121],"cluster":[5,33,64,84],"architectures":[6],"in":[7,62,79,112,123,154,172],"datacenters":[8],"and":[9,42,139],"sophistication":[11],"computer":[13],"attacks,":[14],"design":[16,27],"highly":[18],"secure":[19],"clusters":[20],"has":[21,36],"recently":[22],"emerged":[23],"as":[24,66,68,100],"a":[25,96,113,128],"critical":[26],"issue.":[28],"However,":[29],"majority":[31],"security":[34,110,163,174,179],"research":[35],"focused":[37],"on":[38,47,143,147],"how":[39,48],"to":[40,49,82,99,176],"detect":[41],"prevent":[43],"attacks":[44,54,61,111],"rather":[45],"than":[46],"minimize":[50],"effect":[52],"once":[55],"detected.":[56],"The":[57],"action":[58],"against":[59],"detected":[60],"is":[65,77,158],"important":[67],"actual":[70],"detection":[71,75],"process":[72],"since":[73],"no":[74],"mechanism":[76],"full-proof":[78],"its":[80],"ability":[81],"protect":[83],"systems":[85],"without":[86],"effective":[88],"cluster-wide":[89],"reaction.":[90],"In":[91],"this":[92],"paper,":[93],"we":[94,116],"propose":[95],"scheme,":[97],"referred":[98],"instant":[102],"attack":[103],"stopper":[104],"(IAS)":[105],"that":[106],"can":[107],"instantly":[108],"confront":[109],"cluster.":[114],"Specifically":[115],"provide":[117],"detailed":[118],"implementation":[119],"methods":[120],"IAS":[122,141,170],"InfiniBand":[124],"architecture":[125],"(IBA)":[126],"-":[127],"new":[129],"promising":[130],"communication":[131,146],"standard":[132],"for":[133],"future":[134],"system":[135],"area":[136],"networks":[137],"(SANs)":[138],"clusters.":[140],"focuses":[142],"removing":[144],"malicious":[145],"IBA":[149],"fabric":[150],"among":[151],"processes":[152],"involved":[153],"an":[155],"attack,":[156],"which":[157],"accomplished":[159],"through":[160],"proposed":[162],"management":[164],"agent":[165],"(SeMA).":[166],"We":[167],"will":[168],"show":[169],"deployment":[171],"different":[173],"levels":[175],"meet":[177],"various":[178],"requirements.":[180]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
