{"id":"https://openalex.org/W2117203415","doi":"https://doi.org/10.1109/cicybs.2009.4925084","title":"A case study: Using architectural features to improve sophisticated denial-of-service attack detections","display_name":"A case study: Using architectural features to improve sophisticated denial-of-service attack detections","publication_year":2009,"publication_date":"2009-03-01","ids":{"openalex":"https://openalex.org/W2117203415","doi":"https://doi.org/10.1109/cicybs.2009.4925084","mag":"2117203415"},"language":"en","primary_location":{"id":"doi:10.1109/cicybs.2009.4925084","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cicybs.2009.4925084","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE Symposium on Computational Intelligence in Cyber Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101502386","display_name":"Ran Tao","orcid":"https://orcid.org/0000-0003-4564-4312"},"institutions":[{"id":"https://openalex.org/I121820613","display_name":"Louisiana State University","ror":"https://ror.org/05ect4e57","country_code":"US","type":"education","lineage":["https://openalex.org/I121820613"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ran Tao","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Louisiana State University, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Louisiana State University, USA","institution_ids":["https://openalex.org/I121820613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101863952","display_name":"Li Yang","orcid":"https://orcid.org/0000-0003-0314-503X"},"institutions":[{"id":"https://openalex.org/I177097968","display_name":"University of Tennessee at Chattanooga","ror":"https://ror.org/00nqb1v70","country_code":"US","type":"education","lineage":["https://openalex.org/I177097968"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Li Yang","raw_affiliation_strings":["Department of Computer Science and Engineering, University of Tennessee, Chattanooga, USA","Department of Computer Science and Engineering, University of Tennessee at Chattanooga, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Tennessee, Chattanooga, USA","institution_ids":["https://openalex.org/I177097968"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Tennessee at Chattanooga, USA","institution_ids":["https://openalex.org/I177097968"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101893942","display_name":"Lu Peng","orcid":"https://orcid.org/0000-0002-8579-5687"},"institutions":[{"id":"https://openalex.org/I121820613","display_name":"Louisiana State University","ror":"https://ror.org/05ect4e57","country_code":"US","type":"education","lineage":["https://openalex.org/I121820613"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lu Peng","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Louisiana State University, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Louisiana State University, USA","institution_ids":["https://openalex.org/I121820613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100365249","display_name":"\u0411\u0438\u043d \u041b\u0438","orcid":"https://orcid.org/0000-0003-0831-092X"},"institutions":[{"id":"https://openalex.org/I121820613","display_name":"Louisiana State University","ror":"https://ror.org/05ect4e57","country_code":"US","type":"education","lineage":["https://openalex.org/I121820613"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bin Li","raw_affiliation_strings":["Department of Experimental Statistics, Louisiana State University, USA","Department of Experimental Statistics Louisiana State University USA"],"affiliations":[{"raw_affiliation_string":"Department of Experimental Statistics, Louisiana State University, USA","institution_ids":["https://openalex.org/I121820613"]},{"raw_affiliation_string":"Department of Experimental Statistics Louisiana State University USA","institution_ids":["https://openalex.org/I121820613"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015660593","display_name":"Alma Cemerlic","orcid":null},"institutions":[{"id":"https://openalex.org/I177097968","display_name":"University of Tennessee at Chattanooga","ror":"https://ror.org/00nqb1v70","country_code":"US","type":"education","lineage":["https://openalex.org/I177097968"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alma Cemerlic","raw_affiliation_strings":["Department of Computer Science and Engineering, University of Tennessee, Chattanooga, USA","Department of Computer Science and Engineering, University of Tennessee at Chattanooga, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Tennessee, Chattanooga, USA","institution_ids":["https://openalex.org/I177097968"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Tennessee at Chattanooga, USA","institution_ids":["https://openalex.org/I177097968"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101502386"],"corresponding_institution_ids":["https://openalex.org/I121820613"],"apc_list":null,"apc_paid":null,"fwci":0.7281,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.74700677,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"13","last_page":"18"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7868876457214355},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7748821973800659},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7714791893959045},{"id":"https://openalex.org/keywords/host-based-intrusion-detection-system","display_name":"Host-based intrusion detection system","score":0.6739851236343384},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.5617243647575378},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.4926808476448059},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.41193145513534546},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3744926452636719},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3698897361755371},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3240237832069397},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.32282593846321106},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2511971890926361},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.21427398920059204},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.16790771484375}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7868876457214355},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7748821973800659},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7714791893959045},{"id":"https://openalex.org/C90936777","wikidata":"https://www.wikidata.org/wiki/Q917189","display_name":"Host-based intrusion detection system","level":4,"score":0.6739851236343384},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.5617243647575378},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.4926808476448059},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41193145513534546},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3744926452636719},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3698897361755371},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3240237832069397},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32282593846321106},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2511971890926361},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.21427398920059204},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.16790771484375},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/cicybs.2009.4925084","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cicybs.2009.4925084","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE Symposium on Computational Intelligence in Cyber Security","raw_type":"proceedings-article"},{"id":"pmh:oai:repository.lsu.edu:ag_exst_pubs-1633","is_oa":false,"landing_page_url":"https://repository.lsu.edu/ag_exst_pubs/634","pdf_url":null,"source":{"id":"https://openalex.org/S4210169993","display_name":"Civil War Book Review","issn_l":"1528-6592","issn":["1528-6592"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310315936","host_organization_name":"Louisiana State University","host_organization_lineage":["https://openalex.org/P4310315936"],"host_organization_lineage_names":["Louisiana State University"],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Faculty Publications","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1508882636","https://openalex.org/W1553177637","https://openalex.org/W1563061804","https://openalex.org/W1583975142","https://openalex.org/W1678356000","https://openalex.org/W1967949770","https://openalex.org/W1975973384","https://openalex.org/W2001968297","https://openalex.org/W2027023879","https://openalex.org/W2041700825","https://openalex.org/W2056081083","https://openalex.org/W2063863347","https://openalex.org/W2081357650","https://openalex.org/W2087853663","https://openalex.org/W2102831150","https://openalex.org/W2119030343","https://openalex.org/W2128599397","https://openalex.org/W2135143063","https://openalex.org/W2138834221","https://openalex.org/W2156571267","https://openalex.org/W2159160833","https://openalex.org/W2164256494","https://openalex.org/W2295705535","https://openalex.org/W2994517056","https://openalex.org/W4250493029","https://openalex.org/W6633219197","https://openalex.org/W6682904970"],"related_works":["https://openalex.org/W3148526535","https://openalex.org/W2380962566","https://openalex.org/W2368379890","https://openalex.org/W2183525346","https://openalex.org/W2350859535","https://openalex.org/W2009124313","https://openalex.org/W2379417114","https://openalex.org/W2184360008","https://openalex.org/W2081159194","https://openalex.org/W2383965035"],"abstract_inverted_index":{"Application":[0],"features":[1],"such":[2],"as":[3],"port":[4],"numbers":[5],"are":[6,28,65],"used":[7,29],"by":[8,30],"network-based":[9],"intrusion":[10,32],"detection":[11,33,143],"systems":[12,34],"(NIDSs)":[13],"to":[14,36,67,86],"detect":[15,37],"attacks":[16,52,64],"coming":[17],"from":[18],"networks.":[19],"System":[20],"calls":[21],"and":[22,49,72,106,130],"the":[23,43,70,73,95,124,142],"operating":[24,74,128],"system":[25,75,129],"related":[26],"information":[27],"host-based":[31],"(HIDSs)":[35],"intrusions":[38,61],"towards":[39],"a":[40,80,110,116,138],"host.":[41],"However,":[42],"relationship":[44],"between":[45],"hardware":[46,97],"architecture":[47,98,131],"events":[48],"denial-of-service":[50],"(DoS)":[51],"has":[53],"not":[54],"been":[55],"well":[56],"revealed.":[57],"When":[58],"increasingly":[59],"sophisticated":[60,148],"emerge,":[62],"some":[63],"able":[66],"bypass":[68],"both":[69],"application":[71],"level":[76,132],"feature":[77],"monitors.":[78],"Therefore,":[79],"more":[81],"effective":[82],"solution":[83],"is":[84],"required":[85],"enhance":[87],"existing":[88],"HIDSs.":[89],"In":[90],"this":[91],"paper,":[92],"we":[93],"identify":[94],"following":[96],"features:":[99],"instruction":[100],"count,":[101],"cache":[102],"miss,":[103],"bus":[104],"traffic":[105],"integrate":[107],"them":[108],"into":[109],"novel":[111],"HIDS":[112,136],"framework":[113],"based":[114],"on":[115],"modern":[117],"statistical":[118],"gradient":[119],"boosting":[120],"trees":[121],"model.":[122],"Through":[123],"integration":[125],"of":[126,141,147],"application,":[127],"features,":[133],"our":[134],"proposed":[135],"demonstrates":[137],"significant":[139],"improvement":[140],"rate":[144],"in":[145],"terms":[146],"DoS":[149],"intrusions.":[150]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
