{"id":"https://openalex.org/W4402811833","doi":"https://doi.org/10.1109/csr61664.2024.10679388","title":"A Time-Series and Density-Based Filter for DNS Log Reduction and Analysis","display_name":"A Time-Series and Density-Based Filter for DNS Log Reduction and Analysis","publication_year":2024,"publication_date":"2024-09-02","ids":{"openalex":"https://openalex.org/W4402811833","doi":"https://doi.org/10.1109/csr61664.2024.10679388"},"language":"en","primary_location":{"id":"doi:10.1109/csr61664.2024.10679388","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/csr61664.2024.10679388","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033148844","display_name":"Taylor Perkins","orcid":"https://orcid.org/0000-0002-5388-217X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Taylor Perkins","raw_affiliation_strings":["Cyber and Strategic Risk Deloitte,Canada"],"affiliations":[{"raw_affiliation_string":"Cyber and Strategic Risk Deloitte,Canada","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068379293","display_name":"Brian Lachine","orcid":"https://orcid.org/0009-0000-1177-371X"},"institutions":[{"id":"https://openalex.org/I51768193","display_name":"Royal Military College of Canada","ror":"https://ror.org/04yr71909","country_code":"CA","type":"education","lineage":["https://openalex.org/I51768193"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Brian Lachine","raw_affiliation_strings":["Royal Military College of Canada,Department of Electrical and Computer Engineering,Canada"],"affiliations":[{"raw_affiliation_string":"Royal Military College of Canada,Department of Electrical and Computer Engineering,Canada","institution_ids":["https://openalex.org/I51768193"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5033148844"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17502142,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"1","issue":null,"first_page":"303","last_page":"308"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9829000234603882,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9829000234603882,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9629999995231628,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9394999742507935,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.628084659576416},{"id":"https://openalex.org/keywords/series","display_name":"Series (stratigraphy)","score":0.6167246103286743},{"id":"https://openalex.org/keywords/time-series","display_name":"Time series","score":0.6092744469642639},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5824089050292969},{"id":"https://openalex.org/keywords/filter","display_name":"Filter (signal processing)","score":0.44027090072631836},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.38740605115890503},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.26154693961143494},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.11330631375312805},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.08499985933303833}],"concepts":[{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.628084659576416},{"id":"https://openalex.org/C143724316","wikidata":"https://www.wikidata.org/wiki/Q312468","display_name":"Series (stratigraphy)","level":2,"score":0.6167246103286743},{"id":"https://openalex.org/C151406439","wikidata":"https://www.wikidata.org/wiki/Q186588","display_name":"Time series","level":2,"score":0.6092744469642639},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5824089050292969},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.44027090072631836},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.38740605115890503},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.26154693961143494},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.11330631375312805},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.08499985933303833},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csr61664.2024.10679388","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/csr61664.2024.10679388","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1828150029","https://openalex.org/W2755886689","https://openalex.org/W2888897661","https://openalex.org/W2906784802","https://openalex.org/W2996378475","https://openalex.org/W3012201245","https://openalex.org/W3094378670","https://openalex.org/W3099460858","https://openalex.org/W3125745247","https://openalex.org/W3161297440","https://openalex.org/W4213362721","https://openalex.org/W4220740553","https://openalex.org/W4281673920","https://openalex.org/W4296441549","https://openalex.org/W4313289362","https://openalex.org/W4320031109","https://openalex.org/W4323045928","https://openalex.org/W4327948860","https://openalex.org/W6637131181","https://openalex.org/W6728422914","https://openalex.org/W6743979602","https://openalex.org/W6745039170","https://openalex.org/W6761940909","https://openalex.org/W6763226943","https://openalex.org/W6779137011","https://openalex.org/W6783367248","https://openalex.org/W6798522063","https://openalex.org/W6854660890","https://openalex.org/W6910681941"],"related_works":["https://openalex.org/W2051487156","https://openalex.org/W2073681303","https://openalex.org/W2053286651","https://openalex.org/W2181743346","https://openalex.org/W2187401768","https://openalex.org/W1919101720","https://openalex.org/W2352590024","https://openalex.org/W2622688551","https://openalex.org/W1550175370","https://openalex.org/W1990205660"],"abstract_inverted_index":{"The":[0,79,136,184],"Domain":[1],"Name":[2],"Service":[3],"(DNS)":[4],"is":[5,44,87,96,107],"fundamental":[6],"to":[7,110,117,131,142,150,161,179,188,200,214,236],"the":[8,12,16,30,112,127],"successful":[9],"operation":[10],"of":[11,81,100,114,122,129,138,216],"Internet,":[13],"providing":[14],"behind":[15],"scenes":[17],"translation":[18],"between":[19,39],"Uniform":[20],"Resource":[21],"Locators":[22],"(URLs)":[23],"used":[24,53],"by":[25,57,134,195],"humans":[26],"and":[27,29,41,48,76,89,103,125,144,165,176,198,207,233],"machines":[28],"Internet":[31],"Protocol":[32],"(IP)":[33],"addresses":[34],"required":[35],"for":[36,49,54,227],"data":[37,130],"transmission":[38],"hosts":[40],"servers.":[42],"DNS":[43,67,82,115,152,166,181,208],"ubiquitous":[45],"across":[46],"networks":[47,86],"decades":[50],"has":[51,61],"been":[52,62],"malicious":[55,158,217],"purposes":[56],"threat":[58],"actors.":[59],"There":[60,106],"significant":[63,88],"research":[64,140],"in":[65,84,98,192,204],"detecting":[66],"protocol":[68],"abuse":[69,167],"leveraging":[70,90],"statistical":[71],"analysis,":[72],"natural":[73],"language":[74],"processing":[75,102],"machine":[77],"learning.":[78],"volume":[80],"traffic":[83,159],"enterprise":[85],"detection":[91,123],"techniques":[92,124],"on":[93],"large":[94],"datasets":[95],"costly":[97],"terms":[99],"time,":[101],"memory":[104],"resources.":[105],"a":[108,146,172,189,222],"need":[109],"reduce":[111,126,151,180],"size":[113,154,194,226],"logs":[116],"enable":[118,162],"more":[119],"efficient":[120,163],"use":[121],"amount":[128],"be":[132],"reviewed":[133],"analysts.":[135],"aim":[137],"this":[139,220],"was":[141],"develop":[143],"evaluate":[145],"log":[147,153,182,193],"filtering":[148],"technique":[149,170],"while":[155,211],"retaining":[156,212],"sufficient":[157],"samples":[160],"analysis":[164],"detection.":[168],"This":[169],"leverages":[171],"single":[173],"time-delta":[174],"feature":[175],"density-based":[177],"clustering":[178],"size.":[183],"results":[185],"showed":[186],"up":[187,199,213],"76%":[190],"decrease":[191],"row":[196],"count":[197],"99":[201],"%":[202],"reduction":[203],"user":[205],"IP":[206],"query":[209],"pairs":[210],"83%":[215],"traffic.":[218],"Operationally,":[219],"provides":[221],"much":[223],"reduced":[224],"dataset":[225],"analysts":[228],"that":[229],"requires":[230],"less":[231],"time":[232],"computational":[234],"resources":[235],"process.":[237]},"counts_by_year":[],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
