{"id":"https://openalex.org/W2772129543","doi":"https://doi.org/10.1109/icacci.2017.8125851","title":"Evaluating shallow and deep networks for secure shell (ssh)traffic analysis","display_name":"Evaluating shallow and deep networks for secure shell (ssh)traffic analysis","publication_year":2017,"publication_date":"2017-09-01","ids":{"openalex":"https://openalex.org/W2772129543","doi":"https://doi.org/10.1109/icacci.2017.8125851","mag":"2772129543"},"language":"en","primary_location":{"id":"doi:10.1109/icacci.2017.8125851","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2017.8125851","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112825787","display_name":"R. Vinayakumar","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"R Vinayakumar","raw_affiliation_strings":["Amrita Vishwa Vidyapeetham, Coimbatore, Tamil Nadu, IN"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidyapeetham, Coimbatore, Tamil Nadu, IN","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113113768","display_name":"K. P. Soman","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"K. P. Soman","raw_affiliation_strings":["Centre for Computational Engineering and Networking (CEN), Amrita School of Engineering, Coimbatore"],"affiliations":[{"raw_affiliation_string":"Centre for Computational Engineering and Networking (CEN), Amrita School of Engineering, Coimbatore","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029900047","display_name":"Prabaharan Poornachandran","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Prabaharan Poornachandran","raw_affiliation_strings":["Center for Cyber Security Systems and Networks, Amrita University, India"],"affiliations":[{"raw_affiliation_string":"Center for Cyber Security Systems and Networks, Amrita University, India","institution_ids":["https://openalex.org/I81556334"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5112825787"],"corresponding_institution_ids":["https://openalex.org/I81556334"],"apc_list":null,"apc_paid":null,"fwci":3.5224,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.93833542,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"266","last_page":"274"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/recurrent-neural-network","display_name":"Recurrent neural network","score":0.826775074005127},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7939790487289429},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5891839265823364},{"id":"https://openalex.org/keywords/binary-classification","display_name":"Binary classification","score":0.5034744143486023},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.4614068567752838},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.457304984331131},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.41445744037628174},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.38075536489486694},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.35558125376701355},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.21294516324996948},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1682198941707611}],"concepts":[{"id":"https://openalex.org/C147168706","wikidata":"https://www.wikidata.org/wiki/Q1457734","display_name":"Recurrent neural network","level":3,"score":0.826775074005127},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7939790487289429},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5891839265823364},{"id":"https://openalex.org/C66905080","wikidata":"https://www.wikidata.org/wiki/Q17005494","display_name":"Binary classification","level":3,"score":0.5034744143486023},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.4614068567752838},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.457304984331131},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.41445744037628174},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.38075536489486694},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.35558125376701355},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.21294516324996948},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1682198941707611},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icacci.2017.8125851","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2017.8125851","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.4399999976158142,"display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W80917968","https://openalex.org/W162146437","https://openalex.org/W1516506771","https://openalex.org/W1520795727","https://openalex.org/W1544101352","https://openalex.org/W1800991598","https://openalex.org/W1851171594","https://openalex.org/W1966809779","https://openalex.org/W1973979667","https://openalex.org/W2095979141","https://openalex.org/W2098454077","https://openalex.org/W2099940443","https://openalex.org/W2100537916","https://openalex.org/W2101234009","https://openalex.org/W2132111557","https://openalex.org/W2133661814","https://openalex.org/W2134641333","https://openalex.org/W2136922672","https://openalex.org/W2150755264","https://openalex.org/W2262045390","https://openalex.org/W2402144811","https://openalex.org/W2541841318","https://openalex.org/W2576897537","https://openalex.org/W2789305555","https://openalex.org/W2802348331","https://openalex.org/W2953384591","https://openalex.org/W3214373139","https://openalex.org/W4245460974","https://openalex.org/W6675354045","https://openalex.org/W6679621003","https://openalex.org/W6679898850","https://openalex.org/W6692777677","https://openalex.org/W6713134421","https://openalex.org/W6748074358","https://openalex.org/W6751698863","https://openalex.org/W6803782233"],"related_works":["https://openalex.org/W4225394202","https://openalex.org/W4298287631","https://openalex.org/W2953061907","https://openalex.org/W3032952384","https://openalex.org/W3034302643","https://openalex.org/W1847088711","https://openalex.org/W3036642985","https://openalex.org/W2964335273","https://openalex.org/W2046798493","https://openalex.org/W1997162386"],"abstract_inverted_index":{"The":[0,149,210],"family":[1,140],"of":[2,42,53,72,129,141,204],"recurrent":[3],"neural":[4],"network":[5,130,132,135],"(RNN)":[6],"mechanisms":[7,56,173,217],"are":[8,86,137,151],"largely":[9],"used":[10,138],"for":[11,62,118,139],"the":[12,51,58,69,111,161,166,180,222],"various":[13,54,79,127],"tasks":[14],"in":[15,39,160,177,200],"natural":[16],"language":[17],"processing,":[18],"speech":[19],"recognition,":[20],"image":[21],"processing":[22],"and":[23,81,92,108,114,134,168,202,206,229],"many":[24],"others":[25],"due":[26],"to":[27,34,49,144,154,179,213,220],"they":[28],"established":[29],"as":[30,75,196],"a":[31,193],"powerful":[32],"mechanism":[33,191],"capture":[35,221],"dynamic":[36,223],"temporal":[37,224],"behaviors":[38],"arbitrary":[40],"length":[41],"large-scale":[43],"sequence":[44],"data.":[45],"This":[46],"paper":[47],"attempts":[48],"know":[50],"effectiveness":[52],"RNN":[55,142,172,216],"on":[57,110,164],"traffic":[59],"classification":[60,170,208],"specifically":[61],"Secure":[63],"Shell":[64],"(SSH)":[65],"protocol":[66],"by":[67,226],"modeling":[68],"feature":[70],"sets":[71],"statistical":[73],"flows":[74],"time-series":[76],"obtained":[77],"from":[78,87],"public":[80],"private":[82],"traces.":[83],"These":[84],"traces":[85],"NIMS":[88],"(Network":[89],"Information":[90],"Management":[91],"Security":[93],"Group),":[94],"DARPA":[95,103],"(Defense":[96],"Advanced":[97],"Research":[98],"Projects":[99],"Agency)":[100],"1999":[101,104],"Week1,":[102],"Week3,":[105],"MAWI":[106],"(Measurement":[107],"Analysis":[109],"WIDE":[112],"Internet),":[113],"NLANR":[115],"(National":[116],"Laboratory":[117],"Applied":[119],"Network":[120],"Research)":[121],"Active":[122],"Measurement":[123],"Project":[124],"(AMP).":[125],"A":[126],"configurations":[128],"topologies,":[131],"parameters":[133],"structures":[136],"architectures":[143],"identify":[145],"an":[146],"optimal":[147],"architecture.":[148],"experiments":[150],"run":[152],"up":[153],"1000":[155],"epochs":[156],"with":[157],"learning":[158,184],"rate":[159],"range":[162],"[0.01-05]":[163],"both":[165],"binary":[167,205],"multiclass":[169],"settings.":[171],"have":[174,218],"performed":[175],"well":[176],"comparison":[178],"other":[181],"classical":[182],"machine":[183],"algorithms.":[185],"Moreover,":[186],"long":[187],"short-term":[188],"memory":[189],"(LSTM)":[190],"is":[192,234],"modified":[194],"RNN,":[195],"achieved":[197],"highest":[198],"accuracy":[199],"cross-validation":[201],"testing":[203],"multi-class":[207],"cases.":[209],"background":[211],"reason":[212],"that":[214],"is,":[215],"capability":[219],"dependencies":[225],"storing":[227],"information":[228],"updating":[230],"them,":[231],"when":[232],"it":[233],"necessary":[235],"across":[236],"time-steps.":[237]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":9}],"updated_date":"2026-01-13T01:12:25.745995","created_date":"2025-10-10T00:00:00"}
