{"id":"https://openalex.org/W4206651265","doi":"https://doi.org/10.1109/idaacs53288.2021.9660920","title":"Analysis of Anomaly Detection and Identification Methods in 5G Traffic","display_name":"Analysis of Anomaly Detection and Identification Methods in 5G Traffic","publication_year":2021,"publication_date":"2021-09-22","ids":{"openalex":"https://openalex.org/W4206651265","doi":"https://doi.org/10.1109/idaacs53288.2021.9660920"},"language":"en","primary_location":{"id":"doi:10.1109/idaacs53288.2021.9660920","is_oa":false,"landing_page_url":"https://doi.org/10.1109/idaacs53288.2021.9660920","pdf_url":null,"source":{"id":"https://openalex.org/S4363607971","display_name":"2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005854497","display_name":"\u0422\u0430\u043c\u0430\u0440\u0430 \u0420\u0430\u0434\u0456\u0432\u0456\u043b\u043e\u0432\u0430","orcid":"https://orcid.org/0000-0001-5975-0269"},"institutions":[{"id":"https://openalex.org/I107158390","display_name":"Kharkiv National University of Radio Electronics","ror":"https://ror.org/01ctj1b90","country_code":"UA","type":"education","lineage":["https://openalex.org/I107158390"]},{"id":"https://openalex.org/I8765205","display_name":"V. N. Karazin Kharkiv National University","ror":"https://ror.org/03ftejk10","country_code":"UA","type":"education","lineage":["https://openalex.org/I8765205"]}],"countries":["UA"],"is_corresponding":true,"raw_author_name":"Tamara Radivilova","raw_affiliation_strings":["V.V.Popovskyy Dept.of Infocommunication Engineering, Kharkiv National University of Radio Electronics, Kharkiv, Ukraine"],"affiliations":[{"raw_affiliation_string":"V.V.Popovskyy Dept.of Infocommunication Engineering, Kharkiv National University of Radio Electronics, Kharkiv, Ukraine","institution_ids":["https://openalex.org/I8765205","https://openalex.org/I107158390"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082804247","display_name":"Lyudmyla Kirichenko","orcid":"https://orcid.org/0000-0002-2780-7993"},"institutions":[{"id":"https://openalex.org/I107158390","display_name":"Kharkiv National University of Radio Electronics","ror":"https://ror.org/01ctj1b90","country_code":"UA","type":"education","lineage":["https://openalex.org/I107158390"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Lyudmyla Kirichenko","raw_affiliation_strings":["Dept. of Applied mathematics, Kharkiv National University of Radio Electronics, Kharkiv, Ukraine"],"affiliations":[{"raw_affiliation_string":"Dept. of Applied mathematics, Kharkiv National University of Radio Electronics, Kharkiv, Ukraine","institution_ids":["https://openalex.org/I107158390"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022580879","display_name":"\u041e\u043b\u0435\u043a\u0441\u0430\u043d\u0434\u0440 \u041b\u0435\u043c\u0435\u0448\u043a\u043e","orcid":"https://orcid.org/0000-0002-0609-6520"},"institutions":[{"id":"https://openalex.org/I8765205","display_name":"V. N. Karazin Kharkiv National University","ror":"https://ror.org/03ftejk10","country_code":"UA","type":"education","lineage":["https://openalex.org/I8765205"]},{"id":"https://openalex.org/I107158390","display_name":"Kharkiv National University of Radio Electronics","ror":"https://ror.org/01ctj1b90","country_code":"UA","type":"education","lineage":["https://openalex.org/I107158390"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Oleksandr Lemeshko","raw_affiliation_strings":["V.V.Popovskyy Dept.of Infocommunication Engineering, Kharkiv National University of Radio Electronics, Kharkiv, Ukraine"],"affiliations":[{"raw_affiliation_string":"V.V.Popovskyy Dept.of Infocommunication Engineering, Kharkiv National University of Radio Electronics, Kharkiv, Ukraine","institution_ids":["https://openalex.org/I8765205","https://openalex.org/I107158390"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030079813","display_name":"Dmytro Ageyev","orcid":"https://orcid.org/0000-0002-2686-3854"},"institutions":[{"id":"https://openalex.org/I107158390","display_name":"Kharkiv National University of Radio Electronics","ror":"https://ror.org/01ctj1b90","country_code":"UA","type":"education","lineage":["https://openalex.org/I107158390"]},{"id":"https://openalex.org/I8765205","display_name":"V. N. Karazin Kharkiv National University","ror":"https://ror.org/03ftejk10","country_code":"UA","type":"education","lineage":["https://openalex.org/I8765205"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Dmytro Ageyev","raw_affiliation_strings":["V.V.Popovskyy Dept.of Infocommunication Engineering, Kharkiv National University of Radio Electronics, Kharkiv, Ukraine"],"affiliations":[{"raw_affiliation_string":"V.V.Popovskyy Dept.of Infocommunication Engineering, Kharkiv National University of Radio Electronics, Kharkiv, Ukraine","institution_ids":["https://openalex.org/I8765205","https://openalex.org/I107158390"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049838473","display_name":"Oksana Mulesa","orcid":"https://orcid.org/0000-0002-6117-5846"},"institutions":[{"id":"https://openalex.org/I77443782","display_name":"Uzhhorod National University","ror":"https://ror.org/01x3jjv63","country_code":"UA","type":"education","lineage":["https://openalex.org/I77443782"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Oksana Mulesa","raw_affiliation_strings":["Department of Software Systems, Uzhhorod National University, Uzhhorod, Ukraine"],"affiliations":[{"raw_affiliation_string":"Department of Software Systems, Uzhhorod National University, Uzhhorod, Ukraine","institution_ids":["https://openalex.org/I77443782"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021396156","display_name":"Andrii Ilkov","orcid":"https://orcid.org/0000-0002-9709-2946"},"institutions":[{"id":"https://openalex.org/I4210092241","display_name":"Ivan Kozhedub Kharkiv National Air Force University","ror":"https://ror.org/00gyn5p04","country_code":"UA","type":"education","lineage":["https://openalex.org/I4210092241"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Andrii Ilkov","raw_affiliation_strings":["Educational Department, Ivan Kozhedub Kharkiv National Air Force University, Kharkiv, Ukraine"],"affiliations":[{"raw_affiliation_string":"Educational Department, Ivan Kozhedub Kharkiv National Air Force University, Kharkiv, Ukraine","institution_ids":["https://openalex.org/I4210092241"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5005854497"],"corresponding_institution_ids":["https://openalex.org/I107158390","https://openalex.org/I8765205"],"apc_list":null,"apc_paid":null,"fwci":4.004,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.95521274,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":93,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1108","last_page":"1113"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.8025861978530884},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.6845954060554504},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6562005281448364},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.5444005131721497},{"id":"https://openalex.org/keywords/fractal-analysis","display_name":"Fractal analysis","score":0.5190663933753967},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.5069189667701721},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.4808674454689026},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.47763481736183167},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.4367517828941345},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.43618646264076233},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.42413175106048584},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3735765218734741},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3631390333175659},{"id":"https://openalex.org/keywords/fractal","display_name":"Fractal","score":0.35486742854118347},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2052980661392212},{"id":"https://openalex.org/keywords/fractal-dimension","display_name":"Fractal dimension","score":0.1926921010017395}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.8025861978530884},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.6845954060554504},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6562005281448364},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.5444005131721497},{"id":"https://openalex.org/C162494671","wikidata":"https://www.wikidata.org/wiki/Q2845227","display_name":"Fractal analysis","level":4,"score":0.5190663933753967},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.5069189667701721},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.4808674454689026},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.47763481736183167},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.4367517828941345},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.43618646264076233},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.42413175106048584},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3735765218734741},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3631390333175659},{"id":"https://openalex.org/C40636538","wikidata":"https://www.wikidata.org/wiki/Q81392","display_name":"Fractal","level":2,"score":0.35486742854118347},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2052980661392212},{"id":"https://openalex.org/C26546657","wikidata":"https://www.wikidata.org/wiki/Q1412452","display_name":"Fractal dimension","level":3,"score":0.1926921010017395},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/idaacs53288.2021.9660920","is_oa":false,"landing_page_url":"https://doi.org/10.1109/idaacs53288.2021.9660920","pdf_url":null,"source":{"id":"https://openalex.org/S4363607971","display_name":"2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7400000095367432}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W2122646361","https://openalex.org/W2135150457","https://openalex.org/W2169365377","https://openalex.org/W2750680230","https://openalex.org/W2754384272","https://openalex.org/W2770942607","https://openalex.org/W2782015931","https://openalex.org/W2785033548","https://openalex.org/W2794280825","https://openalex.org/W2810550035","https://openalex.org/W2907491542","https://openalex.org/W2911782868","https://openalex.org/W2934386458","https://openalex.org/W2964150305","https://openalex.org/W2980416117","https://openalex.org/W2997960816","https://openalex.org/W3005936585","https://openalex.org/W3015320242","https://openalex.org/W3045292453","https://openalex.org/W3066109448","https://openalex.org/W3083297424","https://openalex.org/W3105920235","https://openalex.org/W3110907450","https://openalex.org/W3128615737","https://openalex.org/W3134928269","https://openalex.org/W3158718852","https://openalex.org/W3176559823","https://openalex.org/W3184256881","https://openalex.org/W4239856175"],"related_works":["https://openalex.org/W2765763546","https://openalex.org/W4386482731","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W1557094818","https://openalex.org/W4390188535","https://openalex.org/W4256682929","https://openalex.org/W335511927","https://openalex.org/W2471811227","https://openalex.org/W4214835788"],"abstract_inverted_index":{"Anomaly":[0],"detection":[1],"is":[2,52,127,138,149,157],"an":[3],"important":[4],"task":[5],"in":[6,130],"5G":[7],"technology":[8],"and":[9,79,141,181],"many":[10],"other":[11],"areas":[12],"of":[13,21,48,56,62,85,88,94,100,105,112,172,178],"human":[14],"life.":[15],"In":[16],"this":[17],"paper,":[18],"statistical":[19],"methods":[20,51,58,90],"data":[22],"analysis,":[23,27],"such":[24],"as":[25],"survival":[26,190],"time":[28,111],"series":[29],"analysis":[30,37,84,136,154,166,191],"(fractal),":[31],"classification":[32],"method":[33,40,114,126,137,167],"(decision":[34],"trees),":[35],"cluster":[36,153],"(DBSCAN),":[38],"entropy":[39,135],"were":[41,70],"chosen":[42,71],"to":[43,115],"detect":[44,116],"anomalies.":[45,162],"A":[46,82],"description":[47],"the":[49,60,86,92,98,103,109,117,123,128,152,164,189],"selected":[50],"given.":[53],"Simulation":[54],"modeling":[55],"these":[57,89],"on":[59,97],"example":[61],"telecommunication":[63],"network":[64],"traffic":[65],"was":[66,188],"performed.":[67],"As":[68],"anomalies":[69,95],"DDoS":[72],"attacks,":[73],"UDP-flood,":[74],"TCP":[75],"SYN,":[76],"ARP":[77],"attacks":[78],"HTTP":[80],"flood.":[81],"comparative":[83],"performance":[87],"for":[91],"identification":[93],"(attacks)":[96],"probability":[99,104,171,177],"detecting":[101],"anomalies,":[102,174],"false":[106,146,179],"positive":[107],"detection,":[108],"running":[110,184],"each":[113],"anomaly.":[118],"Experimental":[119],"results":[120],"showed":[121,168],"that":[122],"decision":[124],"tree":[125],"best":[129],"all":[131],"comparison":[132],"parameters.":[133],"The":[134,186],"slightly":[139,144,158],"slower,":[140],"it":[142],"gives":[143],"more":[145],"positives.":[147],"This":[148],"followed":[150],"by":[151],"method,":[155],"which":[156],"worse":[159],"at":[160],"identifying":[161,173],"Then":[163],"fractal":[165],"a":[169,175,182],"lower":[170],"higher":[176],"positives":[180],"longer":[183],"time.":[185],"worst":[187],"method.":[192]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
