{"id":"https://openalex.org/W3197295094","doi":"https://doi.org/10.1109/icccn52240.2021.9522281","title":"Realization of an Intrusion Detection use-case in ONAP with Acumos","display_name":"Realization of an Intrusion Detection use-case in ONAP with Acumos","publication_year":2021,"publication_date":"2021-07-01","ids":{"openalex":"https://openalex.org/W3197295094","doi":"https://doi.org/10.1109/icccn52240.2021.9522281","mag":"3197295094"},"language":"en","primary_location":{"id":"doi:10.1109/icccn52240.2021.9522281","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn52240.2021.9522281","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Conference on Computer Communications and Networks (ICCCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112526188","display_name":"Shabnam Sultana","orcid":null},"institutions":[{"id":"https://openalex.org/I2610724","display_name":"Chemnitz University of Technology","ror":"https://ror.org/00a208s56","country_code":"DE","type":"education","lineage":["https://openalex.org/I2610724"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Shabnam Sultana","raw_affiliation_strings":["Chair of Communication Networks Technical University of Chemnitz, Germany","Highstreet Technologies GmbH, Berlin, Germany"],"affiliations":[{"raw_affiliation_string":"Chair of Communication Networks Technical University of Chemnitz, Germany","institution_ids":["https://openalex.org/I2610724"]},{"raw_affiliation_string":"Highstreet Technologies GmbH, Berlin, Germany","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024715118","display_name":"Philippe Dooze","orcid":"https://orcid.org/0000-0001-9205-9066"},"institutions":[{"id":"https://openalex.org/I19370010","display_name":"Orange (France)","ror":"https://ror.org/035j0tq82","country_code":"FR","type":"company","lineage":["https://openalex.org/I19370010"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Philippe Dooze","raw_affiliation_strings":["Orange Labs, Lannion, France"],"affiliations":[{"raw_affiliation_string":"Orange Labs, Lannion, France","institution_ids":["https://openalex.org/I19370010"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034053137","display_name":"Vijay Venkatesh Kumar","orcid":null},"institutions":[{"id":"https://openalex.org/I1283103587","display_name":"AT&T (United States)","ror":"https://ror.org/02bbd5539","country_code":"US","type":"company","lineage":["https://openalex.org/I1283103587"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vijay Venkatesh Kumar","raw_affiliation_strings":["AT&T Services, Inc, New Jersey, USA"],"affiliations":[{"raw_affiliation_string":"AT&T Services, Inc, New Jersey, USA","institution_ids":["https://openalex.org/I1283103587"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5112526188"],"corresponding_institution_ids":["https://openalex.org/I2610724"],"apc_list":null,"apc_paid":null,"fwci":0.4585,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.65640507,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7435038685798645},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.7151023149490356},{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.624515175819397},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.5948015451431274},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5100911259651184},{"id":"https://openalex.org/keywords/python","display_name":"Python (programming language)","score":0.4397273659706116},{"id":"https://openalex.org/keywords/devops","display_name":"DevOps","score":0.42830345034599304},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.4216832220554352},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4203874170780182},{"id":"https://openalex.org/keywords/software-as-a-service","display_name":"Software as a service","score":0.41047725081443787},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3923684358596802},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16624310612678528}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7435038685798645},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.7151023149490356},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.624515175819397},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.5948015451431274},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5100911259651184},{"id":"https://openalex.org/C519991488","wikidata":"https://www.wikidata.org/wiki/Q28865","display_name":"Python (programming language)","level":2,"score":0.4397273659706116},{"id":"https://openalex.org/C9903902","wikidata":"https://www.wikidata.org/wiki/Q3025536","display_name":"DevOps","level":3,"score":0.42830345034599304},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.4216832220554352},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4203874170780182},{"id":"https://openalex.org/C175133352","wikidata":"https://www.wikidata.org/wiki/Q1254596","display_name":"Software as a service","level":4,"score":0.41047725081443787},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3923684358596802},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16624310612678528},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccn52240.2021.9522281","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn52240.2021.9522281","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Conference on Computer Communications and Networks (ICCCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.5899999737739563,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W2593390545","https://openalex.org/W2773599568","https://openalex.org/W2799843691","https://openalex.org/W2896431659","https://openalex.org/W2906883204","https://openalex.org/W2915905517","https://openalex.org/W3000711000","https://openalex.org/W6734414336","https://openalex.org/W6772818813"],"related_works":["https://openalex.org/W4220665054","https://openalex.org/W3154253302","https://openalex.org/W3111012486","https://openalex.org/W3101146292","https://openalex.org/W4287554096","https://openalex.org/W4282831387","https://openalex.org/W3113480566","https://openalex.org/W4313188367","https://openalex.org/W4377008314","https://openalex.org/W3148697485"],"abstract_inverted_index":{"With":[0],"Software-Defined":[1],"Networking":[2],"and":[3,17,28,35,42,61,71,93,103,131,204,212],"Machine":[4],"Learning/Artificial":[5],"Intelligence":[6],"(ML/AI)":[7],"reaching":[8],"new":[9],"paradigms":[10],"in":[11,22,58,99,174],"their":[12],"corresponding":[13],"fields,":[14],"both":[15,231],"academia":[16],"industry":[18],"have":[19],"exhibited":[20],"interests":[21,36],"discovering":[23],"unique":[24],"aspects":[25],"of":[26,49,69,117,156,163,186,210,227,230],"intelligent":[27],"autonomous":[29],"communication":[30,171],"networks.":[31,172],"Transforming":[32],"such":[33,118,179],"intentions":[34],"to":[37,63,87,106,127,159,196,217],"reality":[38],"involves":[39],"software":[40,64,82],"development":[41],"deployment,":[43],"which":[44],"has":[45,53],"its":[46],"own":[47],"story":[48],"significant":[50],"evolution.":[51],"There":[52],"been":[54],"a":[55,81,107,180,187,193,200],"notable":[56],"shift":[57],"the":[59,67,112,125,154,157,161,167,184,228],"strategies":[60],"approaches":[62],"development.":[65],"Today,":[66],"divergence":[68],"tools":[70],"technologies":[72],"as":[73,135,137,199],"per":[74],"demand":[75],"is":[76,153],"so":[77],"substantial":[78],"that":[79],"adapting":[80],"application":[83],"from":[84,191],"one":[85],"environment":[86],"another":[88],"could":[89,120],"involve":[90],"tedious":[91],"redesign":[92],"redevelopment.":[94],"This":[95],"implies":[96],"enormous":[97],"effort":[98],"migrating":[100],"existing":[101],"applications":[102,119],"research":[104],"works":[105],"modern":[108,168],"industrial":[109],"setup.":[110],"Additionally,":[111],"struggles":[113],"with":[114,221],"sustainability":[115],"maintenance":[116],"be":[121,140,197],"painful.":[122],"Concerning":[123],"ML/AI,":[124],"capabilities":[126],"train,":[128],"deploy,":[129],"retrain,":[130],"re-deploy":[132],"AI":[133],"models":[134,165],"quickly":[136],"possible":[138],"will":[139],"crucial":[141],"for":[142],"AI-driven":[143],"network":[144],"systems.":[145],"An":[146],"end-to-end":[147,223],"workflow":[148,224],"using":[149,202],"unified":[150],"open-source":[151,232],"frameworks":[152],"need":[155],"hour":[158],"facilitate":[160],"integration":[162,229],"ML/AI":[164],"into":[166],"software-driven":[169],"virtualized":[170],"Hence,":[173],"our":[175],"paper,":[176],"we":[177],"present":[178],"prototype":[181],"by":[182],"demonstrating":[183],"journey":[185],"sample":[188],"SVM":[189],"classifier":[190],"being":[192],"python":[194],"script":[195],"deployed":[198],"micro-service":[201],"ONAP":[203],"Acumos.":[205],"While":[206],"illustrating":[207],"various":[208],"features":[209],"Acumos":[211],"ONAP,":[213],"this":[214],"paper":[215],"intends":[216],"make":[218],"readers":[219],"familiar":[220],"an":[222],"taking":[225],"advantage":[226],"platforms.":[233]},"counts_by_year":[{"year":2023,"cited_by_count":3}],"updated_date":"2025-11-25T21:42:39.735039","created_date":"2025-10-10T00:00:00"}
