{"id":"https://openalex.org/W2982698137","doi":"https://doi.org/10.1109/icnp.2019.8888078","title":"Network Intrusion Detection System as a Service on OpenStack Cloud","display_name":"Network Intrusion Detection System as a Service on OpenStack Cloud","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W2982698137","doi":"https://doi.org/10.1109/icnp.2019.8888078","mag":"2982698137"},"language":"en","primary_location":{"id":"doi:10.1109/icnp.2019.8888078","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnp.2019.8888078","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 27th International Conference on Network Protocols (ICNP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100387708","display_name":"Chen Xu","orcid":"https://orcid.org/0000-0002-1198-4178"},"institutions":[{"id":"https://openalex.org/I177097968","display_name":"University of Tennessee at Chattanooga","ror":"https://ror.org/00nqb1v70","country_code":"US","type":"education","lineage":["https://openalex.org/I177097968"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Chen Xu","raw_affiliation_strings":["The University of Tennessee at Chattanooga"],"affiliations":[{"raw_affiliation_string":"The University of Tennessee at Chattanooga","institution_ids":["https://openalex.org/I177097968"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100747986","display_name":"Ruipeng Zhang","orcid":"https://orcid.org/0000-0002-8180-5438"},"institutions":[{"id":"https://openalex.org/I177097968","display_name":"University of Tennessee at Chattanooga","ror":"https://ror.org/00nqb1v70","country_code":"US","type":"education","lineage":["https://openalex.org/I177097968"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ruipeng Zhang","raw_affiliation_strings":["The University of Tennessee at Chattanooga"],"affiliations":[{"raw_affiliation_string":"The University of Tennessee at Chattanooga","institution_ids":["https://openalex.org/I177097968"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048083201","display_name":"Mengjun Xie","orcid":"https://orcid.org/0000-0001-5089-9614"},"institutions":[{"id":"https://openalex.org/I177097968","display_name":"University of Tennessee at Chattanooga","ror":"https://ror.org/00nqb1v70","country_code":"US","type":"education","lineage":["https://openalex.org/I177097968"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mengjun Xie","raw_affiliation_strings":["The University of Tennessee at Chattanooga"],"affiliations":[{"raw_affiliation_string":"The University of Tennessee at Chattanooga","institution_ids":["https://openalex.org/I177097968"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101863952","display_name":"Li Yang","orcid":"https://orcid.org/0000-0003-0314-503X"},"institutions":[{"id":"https://openalex.org/I177097968","display_name":"University of Tennessee at Chattanooga","ror":"https://ror.org/00nqb1v70","country_code":"US","type":"education","lineage":["https://openalex.org/I177097968"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Li Yang","raw_affiliation_strings":["The University of Tennessee at Chattanooga"],"affiliations":[{"raw_affiliation_string":"The University of Tennessee at Chattanooga","institution_ids":["https://openalex.org/I177097968"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100387708"],"corresponding_institution_ids":["https://openalex.org/I177097968"],"apc_list":null,"apc_paid":null,"fwci":1.061,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.79868716,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"2"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8567426800727844},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7818906307220459},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6827896237373352},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5918418765068054},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5459756255149841},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5386490821838379},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.4791671335697174},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep packet inspection","score":0.4668377637863159},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33512067794799805}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8567426800727844},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7818906307220459},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6827896237373352},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5918418765068054},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5459756255149841},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5386490821838379},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.4791671335697174},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.4668377637863159},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33512067794799805}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icnp.2019.8888078","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnp.2019.8888078","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 27th International Conference on Network Protocols (ICNP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5199999809265137,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W2576364334","https://openalex.org/W2754338111","https://openalex.org/W2892214024","https://openalex.org/W2954353134","https://openalex.org/W2963197901","https://openalex.org/W6748171980"],"related_works":["https://openalex.org/W1763364427","https://openalex.org/W2113638848","https://openalex.org/W1966873961","https://openalex.org/W2166366748","https://openalex.org/W2955769717","https://openalex.org/W75761354","https://openalex.org/W3150865008","https://openalex.org/W1987611202","https://openalex.org/W2188148132","https://openalex.org/W164565936"],"abstract_inverted_index":{"Cloud":[0],"computing":[1,6],"has":[2],"become":[3,37],"a":[4,38,47,53,60,85,89,117,127],"major":[5],"paradigm":[7],"and":[8,21,27,32,68,106],"data":[9,22],"processing":[10],"approach":[11,141],"in":[12,65,75,108],"almost":[13],"all":[14],"sectors.":[15],"To":[16],"ensure":[17],"normal":[18],"business":[19],"operation":[20],"security,":[23],"performing":[24],"traffic":[25,71],"monitoring":[26],"detecting":[28],"suspicious":[29],"network":[30,34],"packets":[31],"possible":[33],"intrusions":[35],"have":[36],"daily":[39],"job":[40],"for":[41,130],"tenant":[42,48,67,77],"administrators.":[43],"Using":[44],"existing":[45,149],"tools,":[46],"administrator":[49],"can":[50,100],"set":[51],"up":[52],"Network":[54,122],"Intrusion":[55,123],"Detection":[56,124],"System":[57,125],"(NIDS)":[58],"on":[59],"virtual":[61],"machine":[62],"(VM)":[63],"instance":[64,81],"the":[66,70,76,79,109,148],"mirror":[69],"from":[72],"other":[73],"instances":[74],"to":[78,147],"NIDS":[80],"via":[82],"Tap":[83],"as":[84,126],"Service":[86,128],"(TaaS)":[87],"or":[88],"Switched":[90],"Port":[91],"Analyzer":[92],"(SPAN)":[93],"port.":[94],"However,":[95],"this":[96,113],"type":[97],"of":[98],"mechanisms":[99],"consume":[101],"significant":[102],"resources":[103],"(e.g.,":[104],"CPU":[105,145],"bandwidth)":[107],"cloud":[110],"environment.":[111],"In":[112],"work,":[114],"we":[115],"propose":[116],"new":[118],"lightweight":[119],"approach,":[120],"namely":[121],"(NIDSaaS),":[129],"OpenStack":[131],"cloud.":[132],"Our":[133],"preliminary":[134],"experimental":[135],"results":[136],"show":[137],"that":[138],"our":[139],"NIDSaaS":[140],"consumes":[142],"much":[143],"less":[144],"compared":[146],"TaaS":[150],"approach.":[151]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
