{"id":"https://openalex.org/W4388937339","doi":"https://doi.org/10.1109/icccnt56998.2023.10306937","title":"Designing and Implementing an Effective Cybersecurity Home Lab for Detection and Monitoring","display_name":"Designing and Implementing an Effective Cybersecurity Home Lab for Detection and Monitoring","publication_year":2023,"publication_date":"2023-07-06","ids":{"openalex":"https://openalex.org/W4388937339","doi":"https://doi.org/10.1109/icccnt56998.2023.10306937"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt56998.2023.10306937","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccnt56998.2023.10306937","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074220095","display_name":"Charanjeet Dadiyala","orcid":"https://orcid.org/0000-0001-6191-4904"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Charanjeet Dadiyala","raw_affiliation_strings":["Shri Ramdeobaba College of Engineering and Management,Department of CSE (Cyber Security),Nagpur,India","Department of CSE (Cyber Security), Shri Ramdeobaba College of Engineering and Management, Nagpur, India"],"affiliations":[{"raw_affiliation_string":"Shri Ramdeobaba College of Engineering and Management,Department of CSE (Cyber Security),Nagpur,India","institution_ids":[]},{"raw_affiliation_string":"Department of CSE (Cyber Security), Shri Ramdeobaba College of Engineering and Management, Nagpur, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093324027","display_name":"Prasanna Tangade","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Prasanna Tangade","raw_affiliation_strings":["Shri Ramdeobaba College of Engineering and Management,Department of CSE (Cyber Security),Nagpur,India","Department of CSE (Cyber Security), Shri Ramdeobaba College of Engineering and Management, Nagpur, India"],"affiliations":[{"raw_affiliation_string":"Shri Ramdeobaba College of Engineering and Management,Department of CSE (Cyber Security),Nagpur,India","institution_ids":[]},{"raw_affiliation_string":"Department of CSE (Cyber Security), Shri Ramdeobaba College of Engineering and Management, Nagpur, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066646559","display_name":"Gaurav Singh","orcid":"https://orcid.org/0000-0002-8418-0154"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gaurav Singh","raw_affiliation_strings":["Shri Ramdeobaba College of Engineering and Management,Department of CSE (Cyber Security),Nagpur,India","Department of CSE (Cyber Security), Shri Ramdeobaba College of Engineering and Management, Nagpur, India"],"affiliations":[{"raw_affiliation_string":"Shri Ramdeobaba College of Engineering and Management,Department of CSE (Cyber Security),Nagpur,India","institution_ids":[]},{"raw_affiliation_string":"Department of CSE (Cyber Security), Shri Ramdeobaba College of Engineering and Management, Nagpur, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093324028","display_name":"Vishal Bhutada","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Vishal Bhutada","raw_affiliation_strings":["Shri Ramdeobaba College of Engineering and Management,Department of CSE (Cyber Security),Nagpur,India","Department of CSE (Cyber Security), Shri Ramdeobaba College of Engineering and Management, Nagpur, India"],"affiliations":[{"raw_affiliation_string":"Shri Ramdeobaba College of Engineering and Management,Department of CSE (Cyber Security),Nagpur,India","institution_ids":[]},{"raw_affiliation_string":"Department of CSE (Cyber Security), Shri Ramdeobaba College of Engineering and Management, Nagpur, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093324029","display_name":"Ayush Bhattad","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ayush Bhattad","raw_affiliation_strings":["Shri Ramdeobaba College of Engineering and Management,Department of CSE (Cyber Security),Nagpur,India","Department of CSE (Cyber Security), Shri Ramdeobaba College of Engineering and Management, Nagpur, India"],"affiliations":[{"raw_affiliation_string":"Shri Ramdeobaba College of Engineering and Management,Department of CSE (Cyber Security),Nagpur,India","institution_ids":[]},{"raw_affiliation_string":"Department of CSE (Cyber Security), Shri Ramdeobaba College of Engineering and Management, Nagpur, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093324030","display_name":"Nandan Partani","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nandan Partani","raw_affiliation_strings":["Shri Ramdeobaba College of Engineering and Management,Department of CSE (Cyber Security),Nagpur,India","Department of CSE (Cyber Security), Shri Ramdeobaba College of Engineering and Management, Nagpur, India"],"affiliations":[{"raw_affiliation_string":"Shri Ramdeobaba College of Engineering and Management,Department of CSE (Cyber Security),Nagpur,India","institution_ids":[]},{"raw_affiliation_string":"Department of CSE (Cyber Security), Shri Ramdeobaba College of Engineering and Management, Nagpur, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017317586","display_name":"Rohan Jangid","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rohan Jangid","raw_affiliation_strings":["Shri Ramdeobaba College of Engineering and Management,Department of CSE (Cyber Security),Nagpur,India","Department of CSE (Cyber Security), Shri Ramdeobaba College of Engineering and Management, Nagpur, India"],"affiliations":[{"raw_affiliation_string":"Shri Ramdeobaba College of Engineering and Management,Department of CSE (Cyber Security),Nagpur,India","institution_ids":[]},{"raw_affiliation_string":"Department of CSE (Cyber Security), Shri Ramdeobaba College of Engineering and Management, Nagpur, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5074220095"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.2009,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.5272129,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"2021","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6908673048019409},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6657662987709045},{"id":"https://openalex.org/keywords/installation","display_name":"Installation","score":0.6579439640045166},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6287062168121338},{"id":"https://openalex.org/keywords/grasp","display_name":"GRASP","score":0.6260826587677002},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.45788446068763733},{"id":"https://openalex.org/keywords/safeguarding","display_name":"Safeguarding","score":0.43464455008506775},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.42971986532211304},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.22927525639533997},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.16315943002700806},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13459688425064087}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6908673048019409},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6657662987709045},{"id":"https://openalex.org/C146778888","wikidata":"https://www.wikidata.org/wiki/Q836862","display_name":"Installation","level":2,"score":0.6579439640045166},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6287062168121338},{"id":"https://openalex.org/C171268870","wikidata":"https://www.wikidata.org/wiki/Q1486676","display_name":"GRASP","level":2,"score":0.6260826587677002},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.45788446068763733},{"id":"https://openalex.org/C2776743756","wikidata":"https://www.wikidata.org/wiki/Q5097921","display_name":"Safeguarding","level":2,"score":0.43464455008506775},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.42971986532211304},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.22927525639533997},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.16315943002700806},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13459688425064087},{"id":"https://openalex.org/C159110408","wikidata":"https://www.wikidata.org/wiki/Q121176","display_name":"Nursing","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt56998.2023.10306937","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccnt56998.2023.10306937","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W2001008003","https://openalex.org/W2117326299","https://openalex.org/W2145872064","https://openalex.org/W4205648436","https://openalex.org/W4280517953","https://openalex.org/W4296613386","https://openalex.org/W4313335694"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W2374550342"],"abstract_inverted_index":{"It":[0],"may":[1],"be":[2,54,60,189],"difficult":[3],"to":[4,22,62,78,117,128,139,156,159,169],"adopt":[5],"and":[6,19,45,91,95,100,107,125,146,165],"implement":[7],"security":[8],"concepts":[9],"in":[10,67,88,131,180],"cybersecurity":[11],"if":[12,190],"there":[13],"is":[14,28,74,113,168],"a":[15,68,75,79,132,181],"lack":[16],"of":[17,42,55,120,143,151],"practical":[18,154],"safe":[20],"infrastructure":[21],"carry":[23],"out":[24],"these":[25],"activities.":[26],"That":[27],"how":[29],"we":[30],"tackled":[31],"this":[32,52],"project.":[33],"This":[34,137],"home":[35,72,90,111,172],"lab":[36,73,112],"leads":[37],"you":[38,58,178,187,191],"through":[39],"the":[40,64,141,152],"steps":[41],"configuring,":[43],"optimizing,":[44],"safeguarding":[46],"an":[47,114],"information":[48,121,148],"technology":[49,122],"infrastructure.":[50],"Although":[51],"will":[53,59,188],"small":[56],"size,":[57],"able":[61],"apply":[63],"knowledge":[65],"obtained":[66],"real-world":[69],"large-scale/enterprise.":[70],"A":[71,110],"name":[76],"given":[77],"server":[80,83],"(or":[81],"multiple":[82],"arrangement)":[84],"that":[85],"lives":[86],"locally":[87],"your":[89,171],"hosts":[92],"many":[93],"programs":[94],"virtualized":[96],"systems":[97],"for":[98,105,163],"testing":[99],"development,":[101],"as":[102,104,175,177],"well":[103],"residential":[106],"functional":[108],"use.":[109],"environment":[115],"designed":[116],"imitate":[118],"components":[119],"infrastructure,":[123],"equipment,":[124],"configurations":[126],"comparable":[127],"those":[129],"found":[130],"commercial":[133],"or":[134],"enterprise":[135],"network.":[136],"seeks":[138],"comprehend":[140],"process":[142],"installing,":[144],"setting,":[145],"optimizing":[147],"technology.":[149],"One":[150],"most":[153],"approaches":[155],"begin":[157],"learning":[158],"analyze":[160],"network":[161,173],"data":[162],"anomalies":[164],"malicious":[166],"activities":[167],"examine":[170],"traffic":[174],"frequently":[176],"can":[179],"meaningful":[182],"way.":[183],"The":[184],"better":[185],"off":[186],"grasp":[192],"what":[193],"'normal'":[194],"looks":[195],"like.":[196]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-25T23:11:45.687758","created_date":"2025-10-10T00:00:00"}
