{"id":"https://openalex.org/W2155493099","doi":"https://doi.org/10.1109/fuzzy.2007.4295666","title":"Detecting Denial of Service Attacks with Bayesian Classifiers and the Random Neural Network","display_name":"Detecting Denial of Service Attacks with Bayesian Classifiers and the Random Neural Network","publication_year":2007,"publication_date":"2007-06-01","ids":{"openalex":"https://openalex.org/W2155493099","doi":"https://doi.org/10.1109/fuzzy.2007.4295666","mag":"2155493099"},"language":"en","primary_location":{"id":"doi:10.1109/fuzzy.2007.4295666","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fuzzy.2007.4295666","pdf_url":null,"source":{"id":"https://openalex.org/S4210187232","display_name":"Proceedings of ... IEEE International Conference on Fuzzy Systems","issn_l":"1098-7584","issn":["1098-7584"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2007 IEEE International Fuzzy Systems Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Gulay Oke","orcid":null},"institutions":[{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Gulay Oke","raw_affiliation_strings":["Intelligent Systems and Networks Group, Dept of Electrical and Electronic Engineering, Imperial College London, UK"],"affiliations":[{"raw_affiliation_string":"Intelligent Systems and Networks Group, Dept of Electrical and Electronic Engineering, Imperial College London, UK","institution_ids":["https://openalex.org/I47508984"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089908689","display_name":"George Loukas","orcid":"https://orcid.org/0000-0003-3559-5182"},"institutions":[{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"George Loukas","raw_affiliation_strings":["Intelligent Systems and Networks Group, Dept of Electrical and Electronic Engineering, Imperial College London, UK"],"affiliations":[{"raw_affiliation_string":"Intelligent Systems and Networks Group, Dept of Electrical and Electronic Engineering, Imperial College London, UK","institution_ids":["https://openalex.org/I47508984"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074413858","display_name":"Erol Gelenbe","orcid":"https://orcid.org/0000-0001-9688-2201"},"institutions":[{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Erol Gelenbe","raw_affiliation_strings":["Intelligent Systems and Networks Group, Dept of Electrical and Electronic Engineering, Imperial College London, UK"],"affiliations":[{"raw_affiliation_string":"Intelligent Systems and Networks Group, Dept of Electrical and Electronic Engineering, Imperial College London, UK","institution_ids":["https://openalex.org/I47508984"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I47508984"],"apc_list":null,"apc_paid":null,"fwci":3.5286,"has_fulltext":false,"cited_by_count":66,"citation_normalized_percentile":{"value":0.93845631,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9750999808311462,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7922189235687256},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7822007536888123},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.7158495783805847},{"id":"https://openalex.org/keywords/recurrent-neural-network","display_name":"Recurrent neural network","score":0.5875211358070374},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4981534481048584},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4929471015930176},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.47419053316116333},{"id":"https://openalex.org/keywords/bayesian-probability","display_name":"Bayesian probability","score":0.4738892912864685},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3813662528991699},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2850274443626404}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7922189235687256},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7822007536888123},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.7158495783805847},{"id":"https://openalex.org/C147168706","wikidata":"https://www.wikidata.org/wiki/Q1457734","display_name":"Recurrent neural network","level":3,"score":0.5875211358070374},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4981534481048584},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4929471015930176},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.47419053316116333},{"id":"https://openalex.org/C107673813","wikidata":"https://www.wikidata.org/wiki/Q812534","display_name":"Bayesian probability","level":2,"score":0.4738892912864685},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3813662528991699},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2850274443626404},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/fuzzy.2007.4295666","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fuzzy.2007.4295666","pdf_url":null,"source":{"id":"https://openalex.org/S4210187232","display_name":"Proceedings of ... IEEE International Conference on Fuzzy Systems","issn_l":"1098-7584","issn":["1098-7584"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2007 IEEE International Fuzzy Systems Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:gala.gre.ac.uk:15022","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401244","display_name":"Greenwich Academic Literature Archive (University of Greenwich)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I55060895","host_organization_name":"University of Greenwich","host_organization_lineage":["https://openalex.org/I55060895"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Conference Proceedings"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.390.8752","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.390.8752","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://staffweb.cms.gre.ac.uk/~lg47/publications/OkeLoukasGelenbe-FuzzIEEE2007.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1492357069","https://openalex.org/W1502950617","https://openalex.org/W1504632689","https://openalex.org/W1534501262","https://openalex.org/W1548031162","https://openalex.org/W1831741989","https://openalex.org/W1839501360","https://openalex.org/W1987936832","https://openalex.org/W1995405963","https://openalex.org/W1996503769","https://openalex.org/W1996623555","https://openalex.org/W2006004974","https://openalex.org/W2033960944","https://openalex.org/W2041905826","https://openalex.org/W2069523214","https://openalex.org/W2084611853","https://openalex.org/W2107377751","https://openalex.org/W2116183119","https://openalex.org/W2124776405","https://openalex.org/W2146189323","https://openalex.org/W2148014295","https://openalex.org/W2160820123","https://openalex.org/W2168470593","https://openalex.org/W2170529556","https://openalex.org/W2212848973","https://openalex.org/W2614225773","https://openalex.org/W4239875977","https://openalex.org/W4241227991","https://openalex.org/W6629290357","https://openalex.org/W6648912413","https://openalex.org/W6648982606"],"related_works":["https://openalex.org/W2883256816","https://openalex.org/W2171408034","https://openalex.org/W3003320923","https://openalex.org/W2106140982","https://openalex.org/W2152313554","https://openalex.org/W3048672182","https://openalex.org/W1509300825","https://openalex.org/W2054620577","https://openalex.org/W3092582874","https://openalex.org/W2065450024"],"abstract_inverted_index":{"Denial":[0],"of":[1,45,54,85,107],"service":[2],"(DoS)":[3],"is":[4,15,26,51],"a":[5,21,69,108,142,155],"prevalent":[6],"threat":[7],"in":[8,34,154],"today's":[9],"networks.":[10],"While":[11],"such":[12,124],"an":[13,125],"attack":[14,139],"not":[16],"difficult":[17],"to":[18,40,128],"launch,":[19],"defending":[20],"network":[22,94],"resource":[23],"against":[24,49],"it":[25],"disproportionately":[27],"difficult,":[28],"and":[29,77,80,90,134,138],"despite":[30],"the":[31,52,60,91,104,113],"extensive":[32],"research":[33],"recent":[35],"years,":[36],"DoS":[37,50,143],"attacks":[38],"continue":[39],"harm.":[41],"The":[42,96],"first":[43],"goal":[44],"any":[46],"protection":[47],"scheme":[48],"detection":[53],"its":[55],"existence,":[56],"ideally":[57],"long":[58],"before":[59],"destructive":[61],"traffic":[62,140,152],"build-up.":[63],"In":[64],"this":[65],"paper":[66],"we":[67,78],"propose":[68],"generic":[70],"approach":[71],"which":[72,102],"uses":[73],"multiple":[74],"Bayesian":[75],"classifiers,":[76],"present":[79,146],"compare":[81],"four":[82],"different":[83,151],"implementations":[84],"it,":[86],"combining":[87],"likelihood":[88],"estimation":[89],"random":[92],"neural":[93,110],"(RNN).":[95],"RNNs":[97],"are":[98],"biologically":[99],"inspired":[100],"structures":[101],"represent":[103],"true":[105],"functioning":[106],"biophysical":[109],"network,":[111],"where":[112],"signals":[114],"travel":[115],"as":[116],"spikes":[117],"rather":[118],"than":[119],"analog":[120],"signals.":[121],"We":[122,145],"use":[123],"RNN":[126],"structure":[127],"fuse":[129],"real-time":[130],"networking":[131,157],"statistical":[132],"data":[133,153],"distinguish":[135],"between":[136],"normal":[137],"during":[141],"attack.":[144],"experimental":[147],"results":[148],"obtained":[149],"for":[150],"large":[156],"testbed.":[158]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":5},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-10T00:00:00"}
