{"id":"https://openalex.org/W2159677016","doi":"https://doi.org/10.1109/icc.2005.1494469","title":"Efficient content-based detection of zero-day worms","display_name":"Efficient content-based detection of zero-day worms","publication_year":2005,"publication_date":"2005-01-01","ids":{"openalex":"https://openalex.org/W2159677016","doi":"https://doi.org/10.1109/icc.2005.1494469","mag":"2159677016"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2005.1494469","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2005.1494469","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE International Conference on Communications, 2005. ICC 2005. 2005","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028229413","display_name":"Periklis Akritidis","orcid":null},"institutions":[{"id":"https://openalex.org/I8901234","display_name":"Foundation for Research and Technology Hellas","ror":"https://ror.org/052rphn09","country_code":"GR","type":"facility","lineage":["https://openalex.org/I8901234"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"P. Akritidis","raw_affiliation_strings":["Inst. of Comput. Sci., Hellas Found. for Res. & Technol., Greece","Foundation for Research & Technology Hellas, Institute for Computer Science, Heraklion, Greece"],"affiliations":[{"raw_affiliation_string":"Inst. of Comput. Sci., Hellas Found. for Res. & Technol., Greece","institution_ids":[]},{"raw_affiliation_string":"Foundation for Research & Technology Hellas, Institute for Computer Science, Heraklion, Greece","institution_ids":["https://openalex.org/I8901234"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040738010","display_name":"Kostas G. Anagnostakis","orcid":null},"institutions":[{"id":"https://openalex.org/I79576946","display_name":"University of Pennsylvania","ror":"https://ror.org/00b30xv10","country_code":"US","type":"education","lineage":["https://openalex.org/I79576946"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"K. Anagnostakis","raw_affiliation_strings":["Distributed Systems Laboratory, CIS Department, University of Pennsylvania, Philadelphia, PA, USA"],"affiliations":[{"raw_affiliation_string":"Distributed Systems Laboratory, CIS Department, University of Pennsylvania, Philadelphia, PA, USA","institution_ids":["https://openalex.org/I79576946"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006368259","display_name":"Evangelos P. Markatos","orcid":"https://orcid.org/0000-0003-3563-7733"},"institutions":[{"id":"https://openalex.org/I8901234","display_name":"Foundation for Research and Technology Hellas","ror":"https://ror.org/052rphn09","country_code":"GR","type":"facility","lineage":["https://openalex.org/I8901234"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"E.P. Markatos","raw_affiliation_strings":["Foundation for Research & Technology Hellas, Institute for Computer Science, Heraklion, Greece"],"affiliations":[{"raw_affiliation_string":"Foundation for Research & Technology Hellas, Institute for Computer Science, Heraklion, Greece","institution_ids":["https://openalex.org/I8901234"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5028229413"],"corresponding_institution_ids":["https://openalex.org/I8901234"],"apc_list":null,"apc_paid":null,"fwci":5.9696,"has_fulltext":false,"cited_by_count":38,"citation_normalized_percentile":{"value":0.96683066,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"837","last_page":"843 Vol. 2"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7965008020401001},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.592263400554657},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5697671175003052},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.516358494758606},{"id":"https://openalex.org/keywords/zero","display_name":"Zero (linguistics)","score":0.4699532985687256},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4152239263057709},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3426346778869629},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1678890883922577}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7965008020401001},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.592263400554657},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5697671175003052},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.516358494758606},{"id":"https://openalex.org/C2780813799","wikidata":"https://www.wikidata.org/wiki/Q3274237","display_name":"Zero (linguistics)","level":2,"score":0.4699532985687256},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4152239263057709},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3426346778869629},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1678890883922577},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2005.1494469","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2005.1494469","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE International Conference on Communications, 2005. ICC 2005. 2005","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321917","display_name":"General Secretariat for Research and Technology","ror":"https://ror.org/04yeh8h63"},{"id":"https://openalex.org/F4320337345","display_name":"Office of Naval Research","ror":"https://ror.org/00rk2pe57"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W88694106","https://openalex.org/W132371169","https://openalex.org/W1498585374","https://openalex.org/W1597305440","https://openalex.org/W1605124321","https://openalex.org/W1609518033","https://openalex.org/W1674877186","https://openalex.org/W1781758015","https://openalex.org/W1977141583","https://openalex.org/W1993865637","https://openalex.org/W2033811087","https://openalex.org/W2039390926","https://openalex.org/W2092043296","https://openalex.org/W2105510432","https://openalex.org/W2134006599","https://openalex.org/W2151839674","https://openalex.org/W4243255773","https://openalex.org/W6603729080","https://openalex.org/W6605402778","https://openalex.org/W6629791766","https://openalex.org/W6635716266","https://openalex.org/W6636189822","https://openalex.org/W6636190696","https://openalex.org/W6637096788","https://openalex.org/W6638056121"],"related_works":["https://openalex.org/W2065457896","https://openalex.org/W3173234801","https://openalex.org/W2167984027","https://openalex.org/W3021302227","https://openalex.org/W10630519","https://openalex.org/W1919377569","https://openalex.org/W3144288563","https://openalex.org/W3013650182","https://openalex.org/W3123907821","https://openalex.org/W2989283631"],"abstract_inverted_index":{"Recent":[0],"cybersecurity":[1],"incidents":[2],"suggest":[3,89],"that":[4,11,83,90],"Internet":[5],"worms":[6,35,63,98],"can":[7],"spread":[8],"so":[9],"fast":[10],"in-time":[12],"human-mediated":[13],"reaction":[14],"is":[15,36,93],"not":[16],"possible,":[17],"and":[18,42],"therefore":[19],"initial":[20],"response":[21],"to":[22,25,37,40,71,95],"cyberattacks":[23],"has":[24],"be":[26,38],"automated.":[27],"The":[28],"first":[29,47],"step":[30],"towards":[31],"combating":[32],"new":[33,62],"unknown":[34],"able":[39,94],"detect":[41],"identify":[43,96],"them":[44],"at":[45,100],"the":[46,101,104],"stages":[48],"of":[49],"their":[50],"spread.":[51],"In":[52],"this":[53],"paper,":[54],"we":[55],"present":[56],"a":[57],"novel":[58,97],"method":[59,78],"for":[60],"detecting":[61],"based":[64],"on":[65],"identifying":[66],"similar":[67],"packet":[68],"contents":[69],"directed":[70],"multiple":[72],"destination":[73],"hosts.":[74],"We":[75],"evaluate":[76],"our":[77,91],"using":[79],"real":[80,85],"traffic":[81],"traces":[82],"contain":[84],"worms.":[86],"Our":[87],"results":[88],"approach":[92],"while":[99],"same":[102],"time":[103],"generated":[105],"false":[106],"alarms":[107],"reach":[108],"as":[109,111],"low":[110],"zero":[112],"percent.":[113]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
