{"id":"https://openalex.org/W2135236398","doi":"https://doi.org/10.1109/iscc.2013.6754942","title":"Efficient fingerprint extraction for high performance Intrusion Detection System","display_name":"Efficient fingerprint extraction for high performance Intrusion Detection System","publication_year":2013,"publication_date":"2013-07-01","ids":{"openalex":"https://openalex.org/W2135236398","doi":"https://doi.org/10.1109/iscc.2013.6754942","mag":"2135236398"},"language":"en","primary_location":{"id":"doi:10.1109/iscc.2013.6754942","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc.2013.6754942","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080666877","display_name":"Haiyang Jiang","orcid":"https://orcid.org/0000-0002-9438-998X"},"institutions":[{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]},{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haiyang Jiang","raw_affiliation_strings":["Institute of Computing Technology, Chinese Academy of Sciences (CAS), China","Inst. of Comput. Technol., Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Computing Technology, Chinese Academy of Sciences (CAS), China","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Inst. of Comput. Technol., Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030689390","display_name":"Gaogang Xie","orcid":"https://orcid.org/0000-0003-4964-1135"},"institutions":[{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gaogang Xie","raw_affiliation_strings":["Institute of Computing Technology, Chinese Academy of Sciences (CAS), China","Inst. of Comput. Technol., Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Computing Technology, Chinese Academy of Sciences (CAS), China","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Inst. of Comput. Technol., Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010294597","display_name":"Kav\u00e9 Salamatian","orcid":"https://orcid.org/0000-0001-5557-9134"},"institutions":[{"id":"https://openalex.org/I70900168","display_name":"Universit\u00e9 Savoie Mont Blanc","ror":"https://ror.org/04gqg1a07","country_code":"FR","type":"education","lineage":["https://openalex.org/I70900168"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Kave Salamatian","raw_affiliation_strings":["University of Savoie, France","Univ. of Savoie, Savoie, France"],"affiliations":[{"raw_affiliation_string":"University of Savoie, France","institution_ids":["https://openalex.org/I70900168"]},{"raw_affiliation_string":"Univ. of Savoie, Savoie, France","institution_ids":["https://openalex.org/I70900168"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5080666877"],"corresponding_institution_ids":["https://openalex.org/I125839683","https://openalex.org/I19820366","https://openalex.org/I4210090176"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.16373538,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"18","issue":null,"first_page":"000179","last_page":"000184"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.8303551077842712},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.7899343967437744},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7362496852874756},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.7024698257446289},{"id":"https://openalex.org/keywords/filter","display_name":"Filter (signal processing)","score":0.698118269443512},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6601383686065674},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.5089380741119385},{"id":"https://openalex.org/keywords/fingerprint-recognition","display_name":"Fingerprint recognition","score":0.5061768889427185},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4789315164089203},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.47497695684432983},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.4660566747188568},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4479776620864868},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4272571802139282},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.23172441124916077},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.12750095129013062}],"concepts":[{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.8303551077842712},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.7899343967437744},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7362496852874756},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.7024698257446289},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.698118269443512},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6601383686065674},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.5089380741119385},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.5061768889427185},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4789315164089203},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.47497695684432983},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.4660566747188568},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4479776620864868},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4272571802139282},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.23172441124916077},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.12750095129013062},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscc.2013.6754942","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc.2013.6754942","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W124244495","https://openalex.org/W1964124216","https://openalex.org/W1966873961","https://openalex.org/W1983096721","https://openalex.org/W2073434065","https://openalex.org/W2083843618","https://openalex.org/W2096474000","https://openalex.org/W2099964107","https://openalex.org/W2100893630","https://openalex.org/W2112157632","https://openalex.org/W2147228424","https://openalex.org/W2149072529","https://openalex.org/W2160883880","https://openalex.org/W2162325900","https://openalex.org/W4292169167","https://openalex.org/W6676760049"],"related_works":["https://openalex.org/W3014822659","https://openalex.org/W2117826006","https://openalex.org/W1621827506","https://openalex.org/W4362496757","https://openalex.org/W2051501574","https://openalex.org/W2124627279","https://openalex.org/W2050967184","https://openalex.org/W2566091814","https://openalex.org/W2114937328","https://openalex.org/W2148654711"],"abstract_inverted_index":{"Deep":[0],"Packet":[1],"Inspection":[2],"(DPI)":[3],"module":[4,107],"in":[5,56,63,88,135,140,151,201,212],"Intrusion":[6],"Detection":[7],"Systems":[8],"(IDSes)":[9],"consists":[10],"of":[11,31,70,85,105,132,166,180,209],"two":[12,145,194],"components:":[13],"Pre-filter":[14,19,157],"and":[15,34,98,124,259],"Rule":[16],"Verification":[17],"(RV).":[18],"adopts":[20],"Multi-Pattern":[21],"Matching":[22],"(MPM)":[23],"engine":[24],"to":[25,52,110],"filter":[26],"out":[27],"the":[28,53,57,61,76,86,95,111,121,126,130,152,167,177,185,213,226,238,246,255],"vast":[29],"majority":[30],"benign":[32],"packets":[33,40,97],"then":[35],"leave":[36],"a":[37,64,68,82,197,206],"few":[38],"suspicious":[39,96],"with":[41,196],"false":[42,48,101,181],"positives":[43,49,182],"into":[44,237],"RV":[45,91,136,173],"component.":[46,137],"These":[47],"are":[50,73],"due":[51],"scanning":[54],"process":[55],"pre-filter:":[58],"it":[59],"detects":[60],"traffic":[62,211],"single":[65],"pass":[66],"against":[67],"set":[69,118,164],"fingerprints,":[71],"which":[72],"extracted":[74,112],"from":[75,161,176],"given":[77],"ruleset":[78,258],"by":[79,184,232,250],"selecting":[80],"only":[81],"small":[83,207],"portion":[84],"patterns":[87],"each":[89,219],"signature.":[90],"component":[92,174],"precisely":[93],"checks":[94],"eliminates":[99],"these":[100,144,193],"positives.":[102],"The":[103],"performance":[104,158],"DPI":[106],"is":[108],"related":[109],"fingerprint":[113,117,154,163,187,220],"set.":[114,188],"An":[115],"efficient":[116],"should":[119],"improve":[120],"pre-filter":[122],"throughput,":[123],"at":[125,251],"same":[127],"time":[128],"decrease":[129],"count":[131],"checking":[133],"activities":[134],"We":[138,189],"show":[139,241],"this":[141,202],"paper":[142],"that":[143,242],"requirements":[146,195],"cannot":[147],"be":[148],"simultaneously":[149],"satisfied":[150],"existing":[153],"extraction":[155,199],"strategies.":[156],"greatly":[159],"benefits":[160],"smaller":[162,186],"because":[165],"more":[168],"compact":[169],"MPM":[170],"engine.":[171],"But":[172],"suffers":[175],"higher":[178],"rate":[179],"caused":[183],"optimally":[190],"trade":[191],"off":[192],"new":[198],"method":[200,236],"work.":[203],"Through":[204],"analysing":[205],"amount":[208],"training":[210],"initial":[214],"phase,":[215],"our":[216,234,243],"strategy":[217,244],"gives":[218],"candidate":[221],"an":[222],"empirical":[223],"weight":[224],"for":[225],"subsequent":[227],"extraction.":[228],"Experimental":[229],"results":[230],"obtained":[231],"integrating":[233],"proposed":[235],"Snort":[239],"IDS":[240,247],"improves":[245],"average":[248],"throughput":[249],"least":[252],"69%":[253],"over":[254],"latest":[256],"real":[257,260],"traffic.":[261]},"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
