{"id":"https://openalex.org/W3161863444","doi":"https://doi.org/10.1109/ddecs52668.2021.9417068","title":"Efficient Acceleration of Decision Tree Algorithms for Encrypted Network Traffic Analysis","display_name":"Efficient Acceleration of Decision Tree Algorithms for Encrypted Network Traffic Analysis","publication_year":2021,"publication_date":"2021-04-07","ids":{"openalex":"https://openalex.org/W3161863444","doi":"https://doi.org/10.1109/ddecs52668.2021.9417068","mag":"3161863444"},"language":"en","primary_location":{"id":"doi:10.1109/ddecs52668.2021.9417068","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ddecs52668.2021.9417068","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 24th International Symposium on Design and Diagnostics of Electronic Circuits &amp; Systems (DDECS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018855962","display_name":"Roman Vrana","orcid":"https://orcid.org/0000-0001-9591-3483"},"institutions":[{"id":"https://openalex.org/I60587646","display_name":"Brno University of Technology","ror":"https://ror.org/03613d656","country_code":"CZ","type":"education","lineage":["https://openalex.org/I60587646"]}],"countries":["CZ"],"is_corresponding":true,"raw_author_name":"Roman Vrana","raw_affiliation_strings":["Faculty of Information Technology, Brno University of Technology, Bo\u017eet\u011bchova, Brno, Czech Republic"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Brno University of Technology, Bo\u017eet\u011bchova, Brno, Czech Republic","institution_ids":["https://openalex.org/I60587646"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021958683","display_name":"Jan Ko\u0159enek","orcid":"https://orcid.org/0000-0002-4662-7349"},"institutions":[{"id":"https://openalex.org/I60587646","display_name":"Brno University of Technology","ror":"https://ror.org/03613d656","country_code":"CZ","type":"education","lineage":["https://openalex.org/I60587646"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Jan Korenek","raw_affiliation_strings":["Faculty of Information Technology, Brno University of Technology, Bo\u017eet\u011bchova, Brno, Czech Republic"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Brno University of Technology, Bo\u017eet\u011bchova, Brno, Czech Republic","institution_ids":["https://openalex.org/I60587646"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5018855962"],"corresponding_institution_ids":["https://openalex.org/I60587646"],"apc_list":null,"apc_paid":null,"fwci":0.5439,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.71749204,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"115","last_page":"118"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.856475830078125},{"id":"https://openalex.org/keywords/adaboost","display_name":"AdaBoost","score":0.6226385831832886},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.5914663076400757},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5770310759544373},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.5572013854980469},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep packet inspection","score":0.5508286952972412},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5154784321784973},{"id":"https://openalex.org/keywords/hardware-acceleration","display_name":"Hardware acceleration","score":0.5019173622131348},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.49008381366729736},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.47554871439933777},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4704669415950775},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.431660920381546},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4209287166595459},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.384788453578949},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3531787395477295},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.35240787267684937},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.28933972120285034},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.24252521991729736},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.12933611869812012},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10924756526947021}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.856475830078125},{"id":"https://openalex.org/C141404830","wikidata":"https://www.wikidata.org/wiki/Q2823869","display_name":"AdaBoost","level":3,"score":0.6226385831832886},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.5914663076400757},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5770310759544373},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.5572013854980469},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.5508286952972412},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5154784321784973},{"id":"https://openalex.org/C13164978","wikidata":"https://www.wikidata.org/wiki/Q600158","display_name":"Hardware acceleration","level":3,"score":0.5019173622131348},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.49008381366729736},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.47554871439933777},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4704669415950775},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.431660920381546},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4209287166595459},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.384788453578949},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3531787395477295},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.35240787267684937},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.28933972120285034},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.24252521991729736},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.12933611869812012},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10924756526947021}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ddecs52668.2021.9417068","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ddecs52668.2021.9417068","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 24th International Symposium on Design and Diagnostics of Electronic Circuits &amp; Systems (DDECS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W2162741763","https://openalex.org/W2537766808","https://openalex.org/W2613715541","https://openalex.org/W2615625656","https://openalex.org/W2625574821","https://openalex.org/W3080354144","https://openalex.org/W3084842449"],"related_works":["https://openalex.org/W3204641204","https://openalex.org/W4320483443","https://openalex.org/W2911198546","https://openalex.org/W4205958290","https://openalex.org/W4293069612","https://openalex.org/W4249229055","https://openalex.org/W2936214295","https://openalex.org/W3127425528","https://openalex.org/W4200057378","https://openalex.org/W3170784702"],"abstract_inverted_index":{"Network":[0],"traffic":[1,81],"analysis":[2],"and":[3,46,74,97,153,175],"deep":[4],"packet":[5,25],"inspection":[6],"are":[7],"time-consuming":[8],"tasks,":[9],"which":[10],"current":[11],"processors":[12],"can":[13],"not":[14],"handle":[15],"at":[16],"100":[17],"Gbps":[18],"speed.":[19],"Therefore":[20,100],"security":[21,48],"systems":[22],"need":[23,91],"fast":[24],"processing":[26,179],"with":[27,163],"hardware":[28,84,131],"acceleration.":[29],"With":[30],"the":[31,122,135,178,183],"growing":[32],"of":[33,94,105,111,125],"encrypted":[34],"network":[35,80],"traffic,":[36],"it":[37,138],"is":[38],"necessary":[39],"to":[40,57,129,134,141],"extend":[41],"Intrusion":[42],"Detection":[43],"Systems":[44],"(IDSes)":[45],"other":[47],"tools":[49,55],"by":[50,61,144,155],"new":[51],"detection":[52,152],"methods.":[53],"Security":[54],"started":[56],"use":[58,121],"classifiers":[59],"trained":[60],"machine":[62,88,112],"learning":[63,89,113],"techniques":[64,90,114],"based":[65,115],"on":[66,116,167],"decision":[67,117],"trees.":[68,118],"Random":[69,72],"Forest,":[70],"Compact":[71],"Forest":[73],"AdaBoost":[75],"provide":[76],"excellent":[77],"result":[78],"in":[79,177],"analysis.":[82],"Unfortunately,":[83],"architectures":[85],"for":[86,109,147,158],"these":[87],"high":[92],"utilisation":[93],"on-chip":[95],"memory":[96],"logic":[98],"resources.":[99,132],"we":[101],"propose":[102],"several":[103],"optimisations":[104,120,172],"highly":[106],"pipelined":[107],"architecture":[108],"acceleration":[110],"The":[119],"various":[123],"encoding":[124],"a":[126],"feature":[127],"vector":[128],"reduce":[130,142,173],"Due":[133],"proposed":[136,171,184],"optimisations,":[137],"was":[139],"possible":[140],"LUTs":[143],"70.5":[145],"%":[146,157],"HTTP":[148],"brute":[149],"force":[150],"attack":[151],"BRAMs":[154],"50":[156],"application":[159],"protocol":[160],"identification.":[161],"Both":[162],"only":[164],"negligible":[165],"impact":[166],"classifiers'":[168],"accuracy.":[169],"Moreover,":[170],"wires":[174],"multiplexors":[176],"pipeline,":[180],"positively":[181],"affecting":[182],"architecture's":[185],"maximal":[186],"achievable":[187],"frequency.":[188]},"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
