{"id":"https://openalex.org/W2065807626","doi":"https://doi.org/10.1109/glocom.2012.6503226","title":"Classification of malicious network streams using honeynets","display_name":"Classification of malicious network streams using honeynets","publication_year":2012,"publication_date":"2012-12-01","ids":{"openalex":"https://openalex.org/W2065807626","doi":"https://doi.org/10.1109/glocom.2012.6503226","mag":"2065807626"},"language":"en","primary_location":{"id":"doi:10.1109/glocom.2012.6503226","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2012.6503226","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090859126","display_name":"Fahim H. Abbasi","orcid":"https://orcid.org/0000-0002-4573-8506"},"institutions":[{"id":"https://openalex.org/I51158804","display_name":"Massey University","ror":"https://ror.org/052czxv31","country_code":"NZ","type":"education","lineage":["https://openalex.org/I51158804"]}],"countries":["NZ"],"is_corresponding":true,"raw_author_name":"Fahim H. Abbasi","raw_affiliation_strings":["School of Engineering and Advanced Technology (SEAT), Massey University, Palmerston North, New Zealand","School of Engineering and Advanced Technology (SEAT) Massey University Palmerston North New Zealand"],"affiliations":[{"raw_affiliation_string":"School of Engineering and Advanced Technology (SEAT), Massey University, Palmerston North, New Zealand","institution_ids":["https://openalex.org/I51158804"]},{"raw_affiliation_string":"School of Engineering and Advanced Technology (SEAT) Massey University Palmerston North New Zealand","institution_ids":["https://openalex.org/I51158804"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002757843","display_name":"Richard Harris","orcid":"https://orcid.org/0000-0001-7943-9005"},"institutions":[{"id":"https://openalex.org/I51158804","display_name":"Massey University","ror":"https://ror.org/052czxv31","country_code":"NZ","type":"education","lineage":["https://openalex.org/I51158804"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Richard J. Harris","raw_affiliation_strings":["School of Engineering and Advanced Technology (SEAT), Massey University, Palmerston North, New Zealand","School of Engineering and Advanced Technology (SEAT) Massey University Palmerston North New Zealand"],"affiliations":[{"raw_affiliation_string":"School of Engineering and Advanced Technology (SEAT), Massey University, Palmerston North, New Zealand","institution_ids":["https://openalex.org/I51158804"]},{"raw_affiliation_string":"School of Engineering and Advanced Technology (SEAT) Massey University Palmerston North New Zealand","institution_ids":["https://openalex.org/I51158804"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102987770","display_name":"Giovanni Moretti","orcid":"https://orcid.org/0000-0002-5268-1819"},"institutions":[{"id":"https://openalex.org/I51158804","display_name":"Massey University","ror":"https://ror.org/052czxv31","country_code":"NZ","type":"education","lineage":["https://openalex.org/I51158804"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Giovanni Moretti","raw_affiliation_strings":["School of Engineering and Advanced Technology (SEAT), Massey University, Palmerston North, New Zealand","School of Engineering and Advanced Technology (SEAT) Massey University Palmerston North New Zealand"],"affiliations":[{"raw_affiliation_string":"School of Engineering and Advanced Technology (SEAT), Massey University, Palmerston North, New Zealand","institution_ids":["https://openalex.org/I51158804"]},{"raw_affiliation_string":"School of Engineering and Advanced Technology (SEAT) Massey University Palmerston North New Zealand","institution_ids":["https://openalex.org/I51158804"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061260755","display_name":"Aun Haider","orcid":"https://orcid.org/0000-0003-2005-3559"},"institutions":[{"id":"https://openalex.org/I51158804","display_name":"Massey University","ror":"https://ror.org/052czxv31","country_code":"NZ","type":"education","lineage":["https://openalex.org/I51158804"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Aun Haider","raw_affiliation_strings":["School of Engineering and Advanced Technology (SEAT), Massey University, Palmerston North, New Zealand","School of Engineering and Advanced Technology (SEAT) Massey University Palmerston North New Zealand"],"affiliations":[{"raw_affiliation_string":"School of Engineering and Advanced Technology (SEAT), Massey University, Palmerston North, New Zealand","institution_ids":["https://openalex.org/I51158804"]},{"raw_affiliation_string":"School of Engineering and Advanced Technology (SEAT) Massey University Palmerston North New Zealand","institution_ids":["https://openalex.org/I51158804"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091294525","display_name":"Nafees Anwar","orcid":null},"institutions":[{"id":"https://openalex.org/I51158804","display_name":"Massey University","ror":"https://ror.org/052czxv31","country_code":"NZ","type":"education","lineage":["https://openalex.org/I51158804"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Nafees Anwar","raw_affiliation_strings":["School of Engineering and Advanced Technology (SEAT), Massey University, Palmerston North, New Zealand","School of Engineering and Advanced Technology (SEAT) Massey University Palmerston North New Zealand"],"affiliations":[{"raw_affiliation_string":"School of Engineering and Advanced Technology (SEAT), Massey University, Palmerston North, New Zealand","institution_ids":["https://openalex.org/I51158804"]},{"raw_affiliation_string":"School of Engineering and Advanced Technology (SEAT) Massey University Palmerston North New Zealand","institution_ids":["https://openalex.org/I51158804"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5090859126"],"corresponding_institution_ids":["https://openalex.org/I51158804"],"apc_list":null,"apc_paid":null,"fwci":1.773,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.8582406,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"1907","issue":null,"first_page":"891","last_page":"897"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.826140820980072},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.6734016537666321},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.6270829439163208},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6140722036361694},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.557415246963501},{"id":"https://openalex.org/keywords/streams","display_name":"STREAMS","score":0.548446774482727},{"id":"https://openalex.org/keywords/data-stream-mining","display_name":"Data stream mining","score":0.536550760269165},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.5258315801620483},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5170333981513977},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.46678125858306885},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4648202061653137},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.4170711636543274},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.400827020406723},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.35410362482070923},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2480299174785614},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.15731048583984375},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1408219039440155},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.08785626292228699}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.826140820980072},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6734016537666321},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6270829439163208},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6140722036361694},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.557415246963501},{"id":"https://openalex.org/C42090638","wikidata":"https://www.wikidata.org/wiki/Q4048907","display_name":"STREAMS","level":2,"score":0.548446774482727},{"id":"https://openalex.org/C89198739","wikidata":"https://www.wikidata.org/wiki/Q3079880","display_name":"Data stream mining","level":2,"score":0.536550760269165},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.5258315801620483},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5170333981513977},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.46678125858306885},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4648202061653137},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.4170711636543274},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.400827020406723},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.35410362482070923},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2480299174785614},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.15731048583984375},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1408219039440155},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.08785626292228699},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/glocom.2012.6503226","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2012.6503226","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4699999988079071,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1484917059","https://openalex.org/W1490025813","https://openalex.org/W1531318324","https://openalex.org/W1646278814","https://openalex.org/W1842847600","https://openalex.org/W1965895350","https://openalex.org/W1974606629","https://openalex.org/W2001496424","https://openalex.org/W2005406777","https://openalex.org/W2128859735","https://openalex.org/W2134237944","https://openalex.org/W2154734688","https://openalex.org/W2155615465","https://openalex.org/W2164215197","https://openalex.org/W2170519370","https://openalex.org/W2952484491","https://openalex.org/W6629285517","https://openalex.org/W6636771404","https://openalex.org/W6638918635"],"related_works":["https://openalex.org/W2929621094","https://openalex.org/W1996006176","https://openalex.org/W4285325964","https://openalex.org/W2061466315","https://openalex.org/W2376886931","https://openalex.org/W1992118813","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481"],"abstract_inverted_index":{"Misuse-based":[0],"intrusion":[1],"detection":[2,42],"systems":[3],"alone":[4],"cannot":[5],"cope":[6],"with":[7],"the":[8,12,28,61,110,122,125,133],"dynamic":[9],"nature":[10],"of":[11,21,66,71,84,107,124],"security":[13],"threats":[14],"faced":[15],"today":[16],"by":[17,43,76,81,129],"organizations":[18],"globally.":[19],"Variants":[20],"malware":[22],"and":[23,93,121],"exploits":[24],"are":[25,100],"emerging":[26],"on":[27],"global":[29],"canvas":[30],"at":[31],"an":[32],"ever-increasing":[33],"rate.":[34],"There":[35],"is":[36,79,114,127],"a":[37,56,118],"need":[38],"to":[39,59,102],"automate":[40],"their":[41,45],"observing":[44],"malicious":[46,72,95],"footprints":[47],"over":[48],"network":[49,73,91],"streams.":[50],"In":[51],"this":[52],"paper":[53],"we":[54],"evaluate":[55],"proposed":[57],"technique":[58,113],"measure":[60],"relative":[62],"similarity":[63],"or":[64,87],"level":[65],"maliciousness":[67],"between":[68,89],"different":[69],"categories":[70],"streams":[74,92,108],"captured":[75],"honeynets.":[77],"This":[78,112],"measured":[80],"quantifying":[82],"areas":[83],"analogous":[85],"information":[86],"entropy":[88],"incoming":[90],"reference":[94],"samples.":[96],"Machine":[97],"learning":[98],"methods":[99],"used":[101],"quickly":[103],"cluster":[104],"similar":[105],"groups":[106],"from":[109],"datasets.":[111],"then":[115],"evaluated":[116],"using":[117,130],"large":[119],"dataset":[120],"correctness":[123],"classifier":[126],"verified":[128],"`area":[131],"under":[132],"receiver":[134],"operating":[135],"characteristic":[136],"curves'(ROC":[137],"AUC)":[138],"measures":[139],"across":[140],"various":[141],"string":[142],"metric-based":[143],"classifiers.":[144]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
