{"id":"https://openalex.org/W4285100803","doi":"https://doi.org/10.1109/comm54429.2022.9817285","title":"Unsupervised Abnormal Traffic Detection through Topological Flow Analysis","display_name":"Unsupervised Abnormal Traffic Detection through Topological Flow Analysis","publication_year":2022,"publication_date":"2022-06-16","ids":{"openalex":"https://openalex.org/W4285100803","doi":"https://doi.org/10.1109/comm54429.2022.9817285"},"language":"en","primary_location":{"id":"doi:10.1109/comm54429.2022.9817285","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comm54429.2022.9817285","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 14th International Conference on Communications (COMM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055191887","display_name":"Paul Irofti","orcid":"https://orcid.org/0000-0002-7541-4334"},"institutions":[{"id":"https://openalex.org/I141595442","display_name":"University of Bucharest","ror":"https://ror.org/02x2v6p15","country_code":"RO","type":"education","lineage":["https://openalex.org/I141595442"]}],"countries":["RO"],"is_corresponding":true,"raw_author_name":"Paul Irofti","raw_affiliation_strings":["University of Bucharest,Research Center for Logic, Optimization and Security (LOS), Faculty of Mathematics and Computer Science,Department of Computer Science,Bucharest,Romania","Department of Computer Science, Research Center for Logic, Optimization and Security (LOS), Faculty of Mathematics and Computer Science, University of Bucharest, Bucharest, Romania"],"raw_orcid":"https://orcid.org/0000-0002-7541-4334","affiliations":[{"raw_affiliation_string":"University of Bucharest,Research Center for Logic, Optimization and Security (LOS), Faculty of Mathematics and Computer Science,Department of Computer Science,Bucharest,Romania","institution_ids":["https://openalex.org/I141595442"]},{"raw_affiliation_string":"Department of Computer Science, Research Center for Logic, Optimization and Security (LOS), Faculty of Mathematics and Computer Science, University of Bucharest, Bucharest, Romania","institution_ids":["https://openalex.org/I141595442"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049988389","display_name":"Andrei P\u0103tra\u015fcu","orcid":"https://orcid.org/0000-0002-9293-9386"},"institutions":[{"id":"https://openalex.org/I141595442","display_name":"University of Bucharest","ror":"https://ror.org/02x2v6p15","country_code":"RO","type":"education","lineage":["https://openalex.org/I141595442"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Andrei Patrascu","raw_affiliation_strings":["University of Bucharest,Research Center for Logic, Optimization and Security (LOS), Faculty of Mathematics and Computer Science,Department of Computer Science,Bucharest,Romania","Department of Computer Science, Research Center for Logic, Optimization and Security (LOS), Faculty of Mathematics and Computer Science, University of Bucharest, Bucharest, Romania"],"raw_orcid":"https://orcid.org/0000-0002-9293-9386","affiliations":[{"raw_affiliation_string":"University of Bucharest,Research Center for Logic, Optimization and Security (LOS), Faculty of Mathematics and Computer Science,Department of Computer Science,Bucharest,Romania","institution_ids":["https://openalex.org/I141595442"]},{"raw_affiliation_string":"Department of Computer Science, Research Center for Logic, Optimization and Security (LOS), Faculty of Mathematics and Computer Science, University of Bucharest, Bucharest, Romania","institution_ids":["https://openalex.org/I141595442"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086061093","display_name":"Andrei Iulian Hiji","orcid":"https://orcid.org/0000-0003-0959-9227"},"institutions":[{"id":"https://openalex.org/I141595442","display_name":"University of Bucharest","ror":"https://ror.org/02x2v6p15","country_code":"RO","type":"education","lineage":["https://openalex.org/I141595442"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Andrei Iulian Hiji","raw_affiliation_strings":["University of Bucharest,Research Center for Logic, Optimization and Security (LOS), Faculty of Mathematics and Computer Science,Department of Computer Science,Bucharest,Romania","Department of Computer Science, Research Center for Logic, Optimization and Security (LOS), Faculty of Mathematics and Computer Science, University of Bucharest, Bucharest, Romania"],"raw_orcid":"https://orcid.org/0000-0003-0959-9227","affiliations":[{"raw_affiliation_string":"University of Bucharest,Research Center for Logic, Optimization and Security (LOS), Faculty of Mathematics and Computer Science,Department of Computer Science,Bucharest,Romania","institution_ids":["https://openalex.org/I141595442"]},{"raw_affiliation_string":"Department of Computer Science, Research Center for Logic, Optimization and Security (LOS), Faculty of Mathematics and Computer Science, University of Bucharest, Bucharest, Romania","institution_ids":["https://openalex.org/I141595442"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5055191887"],"corresponding_institution_ids":["https://openalex.org/I141595442"],"apc_list":null,"apc_paid":null,"fwci":0.5707,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.67662753,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7930098176002502},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7610709071159363},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6709957718849182},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5758621692657471},{"id":"https://openalex.org/keywords/unsupervised-learning","display_name":"Unsupervised learning","score":0.5029265284538269},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4645276963710785},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.41753727197647095},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4091684818267822},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3865607976913452},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.2550213932991028},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18316105008125305}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7930098176002502},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7610709071159363},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6709957718849182},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5758621692657471},{"id":"https://openalex.org/C8038995","wikidata":"https://www.wikidata.org/wiki/Q1152135","display_name":"Unsupervised learning","level":2,"score":0.5029265284538269},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4645276963710785},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.41753727197647095},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4091684818267822},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3865607976913452},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2550213932991028},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18316105008125305}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/comm54429.2022.9817285","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comm54429.2022.9817285","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 14th International Conference on Communications (COMM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W157603173","https://openalex.org/W187043655","https://openalex.org/W1963624219","https://openalex.org/W2014439806","https://openalex.org/W2089554624","https://openalex.org/W2097714558","https://openalex.org/W2107409339","https://openalex.org/W2134641333","https://openalex.org/W2162275200","https://openalex.org/W2170689836","https://openalex.org/W2296719434","https://openalex.org/W2462597051","https://openalex.org/W2762776925","https://openalex.org/W2785259781","https://openalex.org/W2902415114","https://openalex.org/W2944210580","https://openalex.org/W2963190580","https://openalex.org/W2963445059","https://openalex.org/W3000501050","https://openalex.org/W3011778916","https://openalex.org/W3036195893","https://openalex.org/W3047132966","https://openalex.org/W3093410479","https://openalex.org/W3205985117","https://openalex.org/W4254182148","https://openalex.org/W6607543680","https://openalex.org/W6757844995"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W1590307681","https://openalex.org/W4312814274","https://openalex.org/W4285370786","https://openalex.org/W2296488620","https://openalex.org/W2358353312","https://openalex.org/W4285233543","https://openalex.org/W4230838436"],"abstract_inverted_index":{"Cyberthreats":[0],"are":[1,92],"a":[2,76,83,111,120],"permanent":[3],"concern":[4],"in":[5,68,115,131],"our":[6,138],"modern":[7],"technological":[8],"world.":[9],"In":[10],"the":[11,28,59,69,71,87,125],"recent":[12],"years,":[13],"sophisticated":[14],"traffic":[15,53,143],"analysis":[16],"techniques":[17],"and":[18,30,145],"anomaly":[19,133],"detection":[20,134],"(AD)":[21],"algorithms":[22],"have":[23],"been":[24],"employed":[25],"to":[26,44],"face":[27],"more":[29,31],"subversive":[32],"adversarial":[33],"attacks.":[34],"A":[35],"malicious":[36,77],"intrusion,":[37],"defined":[38],"as":[39,106],"an":[40],"invasive":[41],"action":[42],"in-tending":[43],"illegally":[45],"exploit":[46],"private":[47],"resources,":[48],"manifests":[49],"through":[50],"unusual":[51],"data":[52],"and/or":[54],"abnormal":[55],"connectivity":[56,73,128],"pattern.":[57],"Despite":[58],"plethora":[60],"of":[61,75,86,113,127],"statistical":[62,89],"or":[63],"signature-based":[64],"detectors":[65,91],"currently":[66],"provided":[67],"literature,":[70],"topological":[72],"component":[74],"flow":[78],"is":[79],"less":[80],"exploited.":[81],"Furthermore,":[82],"great":[84],"proportion":[85],"existing":[88],"intrusion":[90],"based":[93],"on":[94,99,140],"supervised":[95],"learning,":[96],"that":[97,123],"relies":[98],"labeled":[100],"data.":[101],"By":[102],"viewing":[103],"network":[104,142],"flows":[105],"weighted":[107],"directed":[108],"interactions":[109],"between":[110],"pair":[112],"nodes,":[114],"this":[116],"paper":[117],"we":[118],"present":[119],"simple":[121],"method":[122],"facilitate":[124],"use":[126],"graph":[129],"features":[130],"unsupervised":[132],"algorithms.":[135],"We":[136],"test":[137],"methodology":[139],"real":[141],"datasets":[144],"observe":[146],"several":[147],"improvements":[148],"over":[149],"standard":[150],"AD.":[151]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
