{"id":"https://openalex.org/W4390189000","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361291","title":"Research on Malicious Traffic Detection based on Word Embedding Algorithms and Neural Networks","display_name":"Research on Malicious Traffic Detection based on Word Embedding Algorithms and Neural Networks","publication_year":2023,"publication_date":"2023-11-14","ids":{"openalex":"https://openalex.org/W4390189000","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361291"},"language":"en","primary_location":{"id":"doi:10.1109/dasc/picom/cbdcom/cy59711.2023.10361291","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361291","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102880548","display_name":"Yunxin Liu","orcid":"https://orcid.org/0000-0001-7352-8955"},"institutions":[{"id":"https://openalex.org/I2250955327","display_name":"Huawei Technologies (China)","ror":"https://ror.org/00cmhce21","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250955327"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yunxin Liu","raw_affiliation_strings":["Hainan Huawei Intelligent,Hainan,China","Hainan Huawei Intelligent, Hainan, China"],"affiliations":[{"raw_affiliation_string":"Hainan Huawei Intelligent,Hainan,China","institution_ids":["https://openalex.org/I2250955327"]},{"raw_affiliation_string":"Hainan Huawei Intelligent, Hainan, China","institution_ids":["https://openalex.org/I2250955327"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047629145","display_name":"Yuliang Chen","orcid":"https://orcid.org/0000-0002-0456-7763"},"institutions":[{"id":"https://openalex.org/I76214153","display_name":"Lanzhou University","ror":"https://ror.org/01mkqqe32","country_code":"CN","type":"education","lineage":["https://openalex.org/I76214153"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuliang Chen","raw_affiliation_strings":["Lanzhou University,Lanzhou,China","Lanzhou University, Lanzhou, China"],"affiliations":[{"raw_affiliation_string":"Lanzhou University,Lanzhou,China","institution_ids":["https://openalex.org/I76214153"]},{"raw_affiliation_string":"Lanzhou University, Lanzhou, China","institution_ids":["https://openalex.org/I76214153"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100400402","display_name":"Hongtao Zhang","orcid":"https://orcid.org/0000-0003-0201-7554"},"institutions":[{"id":"https://openalex.org/I76214153","display_name":"Lanzhou University","ror":"https://ror.org/01mkqqe32","country_code":"CN","type":"education","lineage":["https://openalex.org/I76214153"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongtao Zhang","raw_affiliation_strings":["Lanzhou University,Lanzhou,China","Lanzhou University, Lanzhou, China"],"affiliations":[{"raw_affiliation_string":"Lanzhou University,Lanzhou,China","institution_ids":["https://openalex.org/I76214153"]},{"raw_affiliation_string":"Lanzhou University, Lanzhou, China","institution_ids":["https://openalex.org/I76214153"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100604365","display_name":"Qingguo Zhou","orcid":"https://orcid.org/0000-0001-8054-5446"},"institutions":[{"id":"https://openalex.org/I76214153","display_name":"Lanzhou University","ror":"https://ror.org/01mkqqe32","country_code":"CN","type":"education","lineage":["https://openalex.org/I76214153"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingguo Zhou","raw_affiliation_strings":["Lanzhou University,Lanzhou,China","Lanzhou University, Lanzhou, China"],"affiliations":[{"raw_affiliation_string":"Lanzhou University,Lanzhou,China","institution_ids":["https://openalex.org/I76214153"]},{"raw_affiliation_string":"Lanzhou University, Lanzhou, China","institution_ids":["https://openalex.org/I76214153"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109668257","display_name":"Xiaokang Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I171494771","display_name":"Shiga University","ror":"https://ror.org/01vvhy971","country_code":"JP","type":"education","lineage":["https://openalex.org/I171494771"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Xiaokang Zhou","raw_affiliation_strings":["Shiga University,Tokyo,Japan","Shiga University, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Shiga University,Tokyo,Japan","institution_ids":["https://openalex.org/I171494771"]},{"raw_affiliation_string":"Shiga University, Tokyo, Japan","institution_ids":["https://openalex.org/I171494771"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5102880548"],"corresponding_institution_ids":["https://openalex.org/I2250955327"],"apc_list":null,"apc_paid":null,"fwci":0.2006,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.53951674,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"0978","last_page":"0984"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.856926441192627},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.7090478539466858},{"id":"https://openalex.org/keywords/header","display_name":"Header","score":0.6778531670570374},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.5963422060012817},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5692045092582703},{"id":"https://openalex.org/keywords/word-embedding","display_name":"Word embedding","score":0.5648231506347656},{"id":"https://openalex.org/keywords/parsing","display_name":"Parsing","score":0.48380154371261597},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4785362184047699},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.46609488129615784},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4625842273235321},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4109458029270172},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.39438045024871826},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27926114201545715},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.2729571461677551},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2320510447025299}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.856926441192627},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.7090478539466858},{"id":"https://openalex.org/C48105269","wikidata":"https://www.wikidata.org/wiki/Q1141160","display_name":"Header","level":2,"score":0.6778531670570374},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.5963422060012817},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5692045092582703},{"id":"https://openalex.org/C2777462759","wikidata":"https://www.wikidata.org/wiki/Q18395344","display_name":"Word embedding","level":3,"score":0.5648231506347656},{"id":"https://openalex.org/C186644900","wikidata":"https://www.wikidata.org/wiki/Q194152","display_name":"Parsing","level":2,"score":0.48380154371261597},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4785362184047699},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.46609488129615784},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4625842273235321},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4109458029270172},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.39438045024871826},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27926114201545715},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.2729571461677551},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2320510447025299},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dasc/picom/cbdcom/cy59711.2023.10361291","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361291","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1510529350","https://openalex.org/W2097034581","https://openalex.org/W2150847526","https://openalex.org/W2743556905","https://openalex.org/W2771944056","https://openalex.org/W2897655170","https://openalex.org/W2897924986","https://openalex.org/W2908941882","https://openalex.org/W2913488583","https://openalex.org/W2918109107","https://openalex.org/W2966612194","https://openalex.org/W2982196009","https://openalex.org/W3007459273","https://openalex.org/W3047217884","https://openalex.org/W3096966075","https://openalex.org/W3101647584","https://openalex.org/W3119693685","https://openalex.org/W3135398540","https://openalex.org/W3167699097","https://openalex.org/W3167814386","https://openalex.org/W4220968469","https://openalex.org/W4280652331","https://openalex.org/W4319777770","https://openalex.org/W6803782233"],"related_works":["https://openalex.org/W2171597999","https://openalex.org/W2189136227","https://openalex.org/W1866537546","https://openalex.org/W630850086","https://openalex.org/W3200508093","https://openalex.org/W4372053344","https://openalex.org/W3193978431","https://openalex.org/W2988433590","https://openalex.org/W2891706772","https://openalex.org/W2144804944"],"abstract_inverted_index":{"With":[0],"the":[1,12,89],"rapid":[2],"development":[3],"of":[4],"society,":[5],"network":[6,104],"technology":[7],"continues":[8],"to":[9,60,84],"advance.":[10],"At":[11],"same":[13],"time,":[14],"people":[15],"are":[16],"also":[17],"facing":[18],"threats":[19],"from":[20,106],"malicious":[21,31,73,99,107],"traffic.":[22,78],"To":[23],"address":[24],"this":[25,27],"issue,":[26],"paper":[28],"proposes":[29],"a":[30],"traffic":[32,74,100],"detection":[33],"method":[34,44],"based":[35],"on":[36],"word":[37],"vectorization":[38],"algorithm":[39],"and":[40,56,95],"neural":[41,68],"networks.":[42],"This":[43],"combines":[45],"tasks":[46],"such":[47],"as":[48],"packet":[49],"parsing,":[50],"header":[51],"data":[52],"grayscale":[53],"image":[54],"generation,":[55],"message":[57],"feature":[58,63],"extraction":[59],"extract":[61],"effective":[62],"information.":[64],"By":[65],"combining":[66],"convolutional":[67],"networks":[69],"(CNN),":[70],"it":[71],"detects":[72],"hidden":[75],"within":[76],"normal":[77],"Experimental":[79],"results":[80],"demonstrate":[81],"that":[82],"compared":[83],"traditional":[85],"machine":[86],"learning":[87],"methods,":[88],"proposed":[90],"approach":[91],"exhibits":[92],"higher":[93],"efficiency":[94],"accuracy":[96],"in":[97],"identifying":[98],"attacks,":[101],"thereby":[102],"better-protecting":[103],"users":[105],"attacks.":[108]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
