{"id":"https://openalex.org/W2603683982","doi":"https://doi.org/10.1109/icc.2017.7996569","title":"Distributed, multi-level network anomaly detection for datacentre networks","display_name":"Distributed, multi-level network anomaly detection for datacentre networks","publication_year":2017,"publication_date":"2017-05-01","ids":{"openalex":"https://openalex.org/W2603683982","doi":"https://doi.org/10.1109/icc.2017.7996569","mag":"2603683982"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2017.7996569","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2017.7996569","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://eprints.lancs.ac.uk/id/eprint/85203/1/IEEE_ICC2017_crc.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070454050","display_name":"Mircea Iordache","orcid":null},"institutions":[{"id":"https://openalex.org/I7882870","display_name":"University of Glasgow","ror":"https://ror.org/00vtgdb53","country_code":"GB","type":"education","lineage":["https://openalex.org/I7882870"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Mircea Iordache","raw_affiliation_strings":["School of Computing Science, University of Glasgow, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing Science, University of Glasgow, UK","institution_ids":["https://openalex.org/I7882870"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050078912","display_name":"Simon Jou\u00ebt","orcid":null},"institutions":[{"id":"https://openalex.org/I7882870","display_name":"University of Glasgow","ror":"https://ror.org/00vtgdb53","country_code":"GB","type":"education","lineage":["https://openalex.org/I7882870"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Simon Jouet","raw_affiliation_strings":["School of Computing Science, University of Glasgow, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing Science, University of Glasgow, UK","institution_ids":["https://openalex.org/I7882870"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021412159","display_name":"Angelos K. Marnerides","orcid":"https://orcid.org/0000-0002-7996-6216"},"institutions":[{"id":"https://openalex.org/I67415387","display_name":"Lancaster University","ror":"https://ror.org/04f2nsd36","country_code":"GB","type":"education","lineage":["https://openalex.org/I67415387"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Angelos K. Marnerides","raw_affiliation_strings":["InfoLab21, Lancaster University, UK"],"affiliations":[{"raw_affiliation_string":"InfoLab21, Lancaster University, UK","institution_ids":["https://openalex.org/I67415387"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021350142","display_name":"Dimitrios P. Pezaros","orcid":"https://orcid.org/0000-0003-0939-378X"},"institutions":[{"id":"https://openalex.org/I7882870","display_name":"University of Glasgow","ror":"https://ror.org/00vtgdb53","country_code":"GB","type":"education","lineage":["https://openalex.org/I7882870"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Dimitrios P. Pezaros","raw_affiliation_strings":["School of Computing Science, University of Glasgow, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing Science, University of Glasgow, UK","institution_ids":["https://openalex.org/I7882870"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5070454050"],"corresponding_institution_ids":["https://openalex.org/I7882870"],"apc_list":null,"apc_paid":null,"fwci":1.0963,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.80235415,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"2017","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8282467126846313},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.8035341501235962},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7183651924133301},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6688272356987},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.5617994666099548},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.4808681607246399},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4768337309360504},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.43376290798187256},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4236862063407898},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3970376253128052},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.27326804399490356}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8282467126846313},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.8035341501235962},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7183651924133301},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6688272356987},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.5617994666099548},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.4808681607246399},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4768337309360504},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.43376290798187256},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4236862063407898},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3970376253128052},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.27326804399490356},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/icc.2017.7996569","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2017.7996569","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},{"id":"pmh:oai:eprints.gla.ac.uk:137536","is_oa":false,"landing_page_url":"http://eprints.gla.ac.uk/view/author/35817.html>,","pdf_url":null,"source":{"id":"https://openalex.org/S4210235606","display_name":"ENLIGHTEN (Jurnal Bimbingan dan Konseling Islam)","issn_l":"2622-8912","issn":["2622-8912","2622-8920"],"is_oa":false,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},{"id":"pmh:oai:eprints.lancs.ac.uk:85203","is_oa":true,"landing_page_url":null,"pdf_url":"https://eprints.lancs.ac.uk/id/eprint/85203/1/IEEE_ICC2017_crc.pdf","source":{"id":"https://openalex.org/S4306401916","display_name":"Lancaster EPrints (Lancaster University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67415387","host_organization_name":"Lancaster University","host_organization_lineage":["https://openalex.org/I67415387"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},{"id":"mag:3046665701","is_oa":false,"landing_page_url":"https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=201902241317306862","pdf_url":null,"source":{"id":"https://openalex.org/S4306512817","display_name":"IEEE Conference Proceedings","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"IEEE Conference Proceedings","raw_type":null}],"best_oa_location":{"id":"pmh:oai:eprints.lancs.ac.uk:85203","is_oa":true,"landing_page_url":null,"pdf_url":"https://eprints.lancs.ac.uk/id/eprint/85203/1/IEEE_ICC2017_crc.pdf","source":{"id":"https://openalex.org/S4306401916","display_name":"Lancaster EPrints (Lancaster University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67415387","host_organization_name":"Lancaster University","host_organization_lineage":["https://openalex.org/I67415387"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1708471004","display_name":null,"funder_award_id":"EP/N033957/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G1983833196","display_name":null,"funder_award_id":"EP/L005255/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G5147957557","display_name":null,"funder_award_id":"EP/P004024/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G5272987910","display_name":null,"funder_award_id":"1802322","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G5303011379","display_name":null,"funder_award_id":"EP/R00692X/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G568585927","display_name":null,"funder_award_id":"EP/L026015/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2603683982.pdf","grobid_xml":"https://content.openalex.org/works/W2603683982.grobid-xml"},"referenced_works_count":12,"referenced_works":["https://openalex.org/W1552521662","https://openalex.org/W2007087405","https://openalex.org/W2023721289","https://openalex.org/W2065643612","https://openalex.org/W2080234606","https://openalex.org/W2101124613","https://openalex.org/W2110238613","https://openalex.org/W2112135709","https://openalex.org/W2127084909","https://openalex.org/W2165032725","https://openalex.org/W2172413739","https://openalex.org/W2414171621"],"related_works":["https://openalex.org/W2061466315","https://openalex.org/W2376886931","https://openalex.org/W1992118813","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W1495178644","https://openalex.org/W2185594426"],"abstract_inverted_index":{"Over":[0],"the":[1,32,105,127,133,173],"past":[2],"decade,":[3],"numerous":[4],"systems":[5],"have":[6],"been":[7],"proposed":[8],"to":[9,28,35,40,148,178,183],"detect":[10],"and":[11,63,84,99,158],"subsequently":[12],"prevent":[13],"or":[14,22],"mitigate":[15],"security":[16],"vulnerabilities.":[17],"However,":[18],"many":[19],"existing":[20],"intrusion":[21],"anomaly":[23,58,75],"detection":[24,59,76,82,144],"solutions":[25],"are":[26],"limited":[27],"a":[29,54,72,120,170],"subset":[30],"of":[31,116,126,135,172,180],"traffic":[33,97,167],"due":[34,182],"scalability":[36],"issues,":[37],"hence":[38,130],"failing":[39],"operate":[41],"at":[42,151,155,164],"line-rate":[43],"on":[44],"large,":[45],"high-speed":[46],"datacentre":[47],"networks.":[48],"In":[49],"this":[50],"paper,":[51],"we":[52],"present":[53],"two-level":[55],"solution":[56],"for":[57,80],"leveraging":[60],"independent":[61],"execution":[62],"message":[64],"passing":[65],"semantics.":[66],"We":[67],"employ":[68],"these":[69],"constructs":[70],"within":[71],"network-wide":[73],"distributed":[74],"framework":[77],"that":[78,111],"allows":[79],"greater":[81],"accuracy":[83,145],"bandwidth":[85,181],"cost":[86],"saving":[87,176],"through":[88,104],"attack":[89,128,166,185],"path":[90,161],"reconstruction.":[91],"Experimental":[92],"results":[93],"using":[94],"real":[95],"operational":[96],"traces":[98],"known":[100],"network":[101],"attacks":[102],"generated":[103],"Pytbull":[106],"IDS":[107],"evaluation":[108],"framework,":[109],"show":[110],"our":[112],"approach":[113],"is":[114],"capable":[115],"detecting":[117,156],"anomalies":[118],"in":[119],"timely":[121],"manner":[122],"while":[123],"allowing":[124],"reconstruction":[125,162],"path,":[129],"further":[131],"enabling":[132],"composition":[134],"advanced":[136],"mitigation":[137],"strategies.":[138],"The":[139],"resulting":[140],"system":[141],"shows":[142],"high":[143],"when":[146],"compared":[147],"similar":[149],"techniques,":[150],"least":[152],"20%":[153],"better":[154],"anomalies,":[157],"enables":[159],"full":[160],"even":[163],"small-to-moderate":[165],"intensities":[168],"(as":[169],"fraction":[171],"total":[174],"traffic),":[175],"up":[177],"75%":[179],"early":[184],"detection.":[186]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
