{"id":"https://openalex.org/W2886486119","doi":"https://doi.org/10.1109/icc.2018.8422082","title":"eyeDNS: Monitoring a University Campus Network","display_name":"eyeDNS: Monitoring a University Campus Network","publication_year":2018,"publication_date":"2018-05-01","ids":{"openalex":"https://openalex.org/W2886486119","doi":"https://doi.org/10.1109/icc.2018.8422082","mag":"2886486119"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2018.8422082","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2018.8422082","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087754462","display_name":"Chandan Chowdhury","orcid":null},"institutions":[{"id":"https://openalex.org/I189590672","display_name":"Kansas State University","ror":"https://ror.org/05p1j8758","country_code":"US","type":"education","lineage":["https://openalex.org/I189590672"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Chandan Chowdhury","raw_affiliation_strings":["Dept. of Computer Science, Kansas State University, Manhattan, KS, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science, Kansas State University, Manhattan, KS, USA","institution_ids":["https://openalex.org/I189590672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011578928","display_name":"Dalton A. Hahn","orcid":"https://orcid.org/0000-0002-7117-2155"},"institutions":[{"id":"https://openalex.org/I189590672","display_name":"Kansas State University","ror":"https://ror.org/05p1j8758","country_code":"US","type":"education","lineage":["https://openalex.org/I189590672"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dalton A. Hahn","raw_affiliation_strings":["Dept. of Computer Science, Kansas State University, Manhattan, KS, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science, Kansas State University, Manhattan, KS, USA","institution_ids":["https://openalex.org/I189590672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025614785","display_name":"Matthew R. French","orcid":null},"institutions":[{"id":"https://openalex.org/I189590672","display_name":"Kansas State University","ror":"https://ror.org/05p1j8758","country_code":"US","type":"education","lineage":["https://openalex.org/I189590672"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Matthew R. French","raw_affiliation_strings":["Dept. of Computer Science, Kansas State University, Manhattan, KS, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science, Kansas State University, Manhattan, KS, USA","institution_ids":["https://openalex.org/I189590672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019645276","display_name":"Eugene Y. Vassermann","orcid":null},"institutions":[{"id":"https://openalex.org/I4210159349","display_name":"Micro Focus (United States)","ror":"https://ror.org/05phbf047","country_code":"US","type":"company","lineage":["https://openalex.org/I4210159349"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Eugene Y. Vassermann","raw_affiliation_strings":["Micro Focus, Sunnyvale, CA, USA"],"affiliations":[{"raw_affiliation_string":"Micro Focus, Sunnyvale, CA, USA","institution_ids":["https://openalex.org/I4210159349"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058488385","display_name":"Pratyusa K. Manadhata","orcid":null},"institutions":[{"id":"https://openalex.org/I189590672","display_name":"Kansas State University","ror":"https://ror.org/05p1j8758","country_code":"US","type":"education","lineage":["https://openalex.org/I189590672"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Pratyusa K. Manadhata","raw_affiliation_strings":["Dept. of Computer Science, Kansas State University, Manhattan, KS, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science, Kansas State University, Manhattan, KS, USA","institution_ids":["https://openalex.org/I189590672"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034290852","display_name":"Alexandru G. Bardas","orcid":"https://orcid.org/0000-0003-3043-5905"},"institutions":[{"id":"https://openalex.org/I146416000","display_name":"University of Kansas","ror":"https://ror.org/001tmjg57","country_code":"US","type":"education","lineage":["https://openalex.org/I146416000"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alexandru G. Bardas","raw_affiliation_strings":["EECS Department, University of Kansas, Lawrence, KS, USA"],"affiliations":[{"raw_affiliation_string":"EECS Department, University of Kansas, Lawrence, KS, USA","institution_ids":["https://openalex.org/I146416000"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5087754462"],"corresponding_institution_ids":["https://openalex.org/I189590672"],"apc_list":null,"apc_paid":null,"fwci":0.1951,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.57011674,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/domain-name-system","display_name":"Domain Name System","score":0.8223272562026978},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7982840538024902},{"id":"https://openalex.org/keywords/intranet","display_name":"Intranet","score":0.7355179190635681},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5934376120567322},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5783844590187073},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5644510984420776},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.512679934501648},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.509468138217926},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4816383421421051},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4774494767189026},{"id":"https://openalex.org/keywords/campus-network","display_name":"Campus network","score":0.4260086119174957},{"id":"https://openalex.org/keywords/network-monitoring","display_name":"Network monitoring","score":0.41219577193260193},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3670099377632141},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.26132500171661377}],"concepts":[{"id":"https://openalex.org/C35026560","wikidata":"https://www.wikidata.org/wiki/Q8767","display_name":"Domain Name System","level":3,"score":0.8223272562026978},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7982840538024902},{"id":"https://openalex.org/C2778059363","wikidata":"https://www.wikidata.org/wiki/Q483426","display_name":"Intranet","level":3,"score":0.7355179190635681},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5934376120567322},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5783844590187073},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5644510984420776},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.512679934501648},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.509468138217926},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4816383421421051},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4774494767189026},{"id":"https://openalex.org/C2780944068","wikidata":"https://www.wikidata.org/wiki/Q1093877","display_name":"Campus network","level":2,"score":0.4260086119174957},{"id":"https://openalex.org/C81877898","wikidata":"https://www.wikidata.org/wiki/Q1965787","display_name":"Network monitoring","level":2,"score":0.41219577193260193},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3670099377632141},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.26132500171661377}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2018.8422082","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2018.8422082","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W17316494","https://openalex.org/W80155331","https://openalex.org/W128912056","https://openalex.org/W155384935","https://openalex.org/W196740607","https://openalex.org/W1561983441","https://openalex.org/W1971731579","https://openalex.org/W2082550445","https://openalex.org/W2101737524","https://openalex.org/W2118868484","https://openalex.org/W2132449179","https://openalex.org/W2146048137","https://openalex.org/W2168248885","https://openalex.org/W2401054255","https://openalex.org/W2411584187","https://openalex.org/W2464432954","https://openalex.org/W2509891819","https://openalex.org/W2549994809","https://openalex.org/W2550748449","https://openalex.org/W2555495615","https://openalex.org/W2556675027","https://openalex.org/W2614012654","https://openalex.org/W2750680860","https://openalex.org/W4299510600","https://openalex.org/W6600692465","https://openalex.org/W6603260413","https://openalex.org/W6605293327","https://openalex.org/W6606342502","https://openalex.org/W6608030608","https://openalex.org/W6633578641","https://openalex.org/W6713023146","https://openalex.org/W6715104073","https://openalex.org/W6719105664","https://openalex.org/W6737949167","https://openalex.org/W6743799543"],"related_works":["https://openalex.org/W2357241812","https://openalex.org/W2393949237","https://openalex.org/W2352498629","https://openalex.org/W424804532","https://openalex.org/W2357840812","https://openalex.org/W2381274985","https://openalex.org/W2376156781","https://openalex.org/W4387712150","https://openalex.org/W2391036959","https://openalex.org/W1974181637"],"abstract_inverted_index":{"The":[0],"Domain":[1],"Name":[2],"System":[3],"(DNS)":[4],"is":[5,19,54,163],"responsible":[6],"for":[7,35,86],"mapping":[8],"human":[9],"readable":[10],"domain":[11],"names":[12],"to":[13,37,58,131,198],"internet":[14,24],"protocol":[15],"(IP)":[16],"addresses.":[17],"DNS":[18,52,64,95,147,186],"a":[20,30,55,68,72,81,99,111,117,190],"ubiquitous":[21],"part":[22],"of":[23,46,63,94,119,146,153,185],"and":[25,32,42,83,92,107,144,159,172,180,201],"intranet":[26],"communication,":[27],"making":[28],"it":[29],"convenient":[31],"comprehensive":[33],"source":[34],"data":[36,108,125,187],"infer":[38],"network":[39,115,155],"health,":[40],"performance,":[41],"security.":[43],"A":[44],"victim":[45],"its":[47,175],"own":[48],"success,":[49],"monitoring":[50],"real-time":[51,88],"traffic":[53,96],"challenge":[56],"due":[57],"sheer":[59],"volume:":[60],"huge":[61],"amounts":[62],"packets":[65],"flow":[66],"through":[67],"typical":[69],"enterprise":[70],"in":[71,177],"single":[73],"day.":[74],"In":[75],"this":[76],"paper,":[77],"we":[78,123],"describe":[79],"eyeDNS,":[80],"scalable":[82],"extensible":[84],"system":[85],"near":[87],"aggregation,":[89,143],"storage,":[90],"analysis,":[91],"visualization":[93,145],"collected":[97,188],"by":[98,167],"hardware":[100],"back-end.":[101],"We":[102],"report":[103],"on":[104,110],"eyeDNS's":[105],"deployment":[106],"collection":[109],"large":[112,183],"public":[113],"university's":[114,169],"over":[116],"timeframe":[118],"15":[120],"months.":[121],"Moreover,":[122],"leveraged":[124],"from":[126,182,189],"the":[127,136,168],"following":[128],"6":[129],"months":[130],"validate":[132],"findings":[133],"made":[134],"during":[135],"initial":[137],"timeframe.":[138],"With":[139],"fast":[140],"query":[141],"response,":[142],"data,":[148],"eyeDNS":[149,162],"helped":[150],"identify":[151],"instances":[152],"anomalous":[154],"use,":[156],"malware-specific":[157],"behaviors,":[158],"scamming":[160],"activities.":[161],"currently":[164],"being":[165],"used":[166],"security":[170],"personnel":[171],"has":[173],"demonstrated":[174],"effectiveness":[176],"extracting":[178],"trends":[179],"outliers":[181],"volumes":[184],"diverse":[191],"environment,":[192],"where":[193],"even":[194],"commercial":[195],"tools":[196],"struggle":[197],"provide":[199],"timely":[200],"actionable":[202],"analysis.":[203]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
