{"id":"https://openalex.org/W3094109290","doi":"https://doi.org/10.1109/iscc50000.2020.9219645","title":"Finding Persistent Elements of Anomalous Flows in Distributed Monitoring Systems","display_name":"Finding Persistent Elements of Anomalous Flows in Distributed Monitoring Systems","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3094109290","doi":"https://doi.org/10.1109/iscc50000.2020.9219645","mag":"3094109290"},"language":"en","primary_location":{"id":"doi:10.1109/iscc50000.2020.9219645","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc50000.2020.9219645","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051645641","display_name":"Zhen Cao","orcid":"https://orcid.org/0000-0002-0652-7706"},"institutions":[{"id":"https://openalex.org/I3923682","display_name":"Soochow University","ror":"https://ror.org/05t8y2r12","country_code":"CN","type":"education","lineage":["https://openalex.org/I3923682"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhen Cao","raw_affiliation_strings":["School of Computer Science and Technology, Soochow University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Soochow University, China","institution_ids":["https://openalex.org/I3923682"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053110771","display_name":"Yu-E Sun","orcid":"https://orcid.org/0000-0002-0018-4810"},"institutions":[{"id":"https://openalex.org/I3923682","display_name":"Soochow University","ror":"https://ror.org/05t8y2r12","country_code":"CN","type":"education","lineage":["https://openalex.org/I3923682"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu-E Sun","raw_affiliation_strings":["School of Rail Transportation, Soochow University, China"],"affiliations":[{"raw_affiliation_string":"School of Rail Transportation, Soochow University, China","institution_ids":["https://openalex.org/I3923682"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101998852","display_name":"He Huang","orcid":"https://orcid.org/0000-0003-2768-6607"},"institutions":[{"id":"https://openalex.org/I3923682","display_name":"Soochow University","ror":"https://ror.org/05t8y2r12","country_code":"CN","type":"education","lineage":["https://openalex.org/I3923682"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"He Huang","raw_affiliation_strings":["School of Computer Science and Technology, Soochow University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Soochow University, China","institution_ids":["https://openalex.org/I3923682"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038308682","display_name":"Hansong Guo","orcid":"https://orcid.org/0000-0002-6418-4684"},"institutions":[{"id":"https://openalex.org/I4210110458","display_name":"Institute of Electronics","ror":"https://ror.org/01z143507","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210110458"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hansong Guo","raw_affiliation_strings":["Intelligent Systems Research Institute, China Academy of Electronics and Information Technology"],"affiliations":[{"raw_affiliation_string":"Intelligent Systems Research Institute, China Academy of Electronics and Information Technology","institution_ids":["https://openalex.org/I4210110458"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071781461","display_name":"Yang Du","orcid":"https://orcid.org/0000-0003-3012-0778"},"institutions":[{"id":"https://openalex.org/I3923682","display_name":"Soochow University","ror":"https://ror.org/05t8y2r12","country_code":"CN","type":"education","lineage":["https://openalex.org/I3923682"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Du","raw_affiliation_strings":["School of Computer Science and Technology, Soochow University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Soochow University, China","institution_ids":["https://openalex.org/I3923682"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100340373","display_name":"An Liu","orcid":"https://orcid.org/0000-0002-6368-576X"},"institutions":[{"id":"https://openalex.org/I3923682","display_name":"Soochow University","ror":"https://ror.org/05t8y2r12","country_code":"CN","type":"education","lineage":["https://openalex.org/I3923682"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"An Liu","raw_affiliation_strings":["School of Computer Science and Technology, Soochow University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Soochow University, China","institution_ids":["https://openalex.org/I3923682"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045227579","display_name":"Le L\u00fc","orcid":"https://orcid.org/0000-0002-6799-9416"},"institutions":[{"id":"https://openalex.org/I3923682","display_name":"Soochow University","ror":"https://ror.org/05t8y2r12","country_code":"CN","type":"education","lineage":["https://openalex.org/I3923682"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Le Lu","raw_affiliation_strings":["School of Computer Science and Technology, Soochow University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Soochow University, China","institution_ids":["https://openalex.org/I3923682"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5051645641"],"corresponding_institution_ids":["https://openalex.org/I3923682"],"apc_list":null,"apc_paid":null,"fwci":0.3084,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.61720769,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bloom-filter","display_name":"Bloom filter","score":0.7679564356803894},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7535375356674194},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5550381541252136},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5497888326644897},{"id":"https://openalex.org/keywords/filter","display_name":"Filter (signal processing)","score":0.49794459342956543},{"id":"https://openalex.org/keywords/network-element","display_name":"Network element","score":0.461845338344574},{"id":"https://openalex.org/keywords/data-flow-diagram","display_name":"Data flow diagram","score":0.4505414068698883},{"id":"https://openalex.org/keywords/element","display_name":"Element (criminal law)","score":0.4459783732891083},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4383418560028076},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.26244738698005676},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.08616283535957336}],"concepts":[{"id":"https://openalex.org/C147224247","wikidata":"https://www.wikidata.org/wiki/Q885373","display_name":"Bloom filter","level":2,"score":0.7679564356803894},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7535375356674194},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5550381541252136},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5497888326644897},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.49794459342956543},{"id":"https://openalex.org/C129119673","wikidata":"https://www.wikidata.org/wiki/Q4418003","display_name":"Network element","level":2,"score":0.461845338344574},{"id":"https://openalex.org/C489000","wikidata":"https://www.wikidata.org/wiki/Q747385","display_name":"Data flow diagram","level":2,"score":0.4505414068698883},{"id":"https://openalex.org/C200288055","wikidata":"https://www.wikidata.org/wiki/Q2621792","display_name":"Element (criminal law)","level":2,"score":0.4459783732891083},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4383418560028076},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.26244738698005676},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.08616283535957336},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscc50000.2020.9219645","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc50000.2020.9219645","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1968574530","https://openalex.org/W1982092405","https://openalex.org/W2012549717","https://openalex.org/W2033896090","https://openalex.org/W2068803497","https://openalex.org/W2117239687","https://openalex.org/W2123845384","https://openalex.org/W2138326128","https://openalex.org/W2148665392","https://openalex.org/W2170810185","https://openalex.org/W2577957252","https://openalex.org/W2790391732","https://openalex.org/W2790487556","https://openalex.org/W2797539974","https://openalex.org/W2979299514"],"related_works":["https://openalex.org/W2086572746","https://openalex.org/W2604468458","https://openalex.org/W2157216338","https://openalex.org/W1662107788","https://openalex.org/W121740227","https://openalex.org/W2019498998","https://openalex.org/W167670219","https://openalex.org/W2045812595","https://openalex.org/W2152656769","https://openalex.org/W2376580194"],"abstract_inverted_index":{"This":[0],"paper":[1],"concentrates":[2],"on":[3,52,131,206,234],"the":[4,38,49,68,83,100,113,132,148,156,161,170,176,187,198,212],"issue":[5],"of":[6,10,48,85,103,109,115,150,183,190],"detecting":[7,23],"persistent":[8,53,90],"elements":[9,91,102,149,157],"anomalous":[11,39,86],"flows":[12,105,111,152],"in":[13,22,43,57,67,76,112,160,220,223],"a":[14,34,116,226,230],"distributed":[15,44,58,117],"monitoring":[16],"system,":[17,118],"which":[18,71,165],"has":[19],"many":[20],"applications":[21],"cyber-attacks,":[24],"forecasting":[25],"influenza,":[26],"analyzing":[27],"search":[28],"keywords,":[29],"and":[30,89,93,121,143,153,175,217,229],"etc.":[31],"However,":[32],"only":[33,64],"few":[35],"studies":[36,51],"consider":[37],"flow":[40,66,87],"detection":[41,55,88],"problem":[42,56],"systems.":[45],"Meanwhile,":[46],"most":[47],"existing":[50],"element":[54,107,163],"systems":[59],"assume":[60],"that":[61,126,158,195,211],"there":[62],"is":[63,72],"one":[65],"data":[69,138,193],"stream,":[70],"not":[73,159],"always":[74],"true":[75],"practice.":[77],"In":[78],"this":[79],"paper,":[80],"we":[81],"combine":[82],"problems":[84],"finding,":[92],"propose":[94],"an":[95,181],"efficient":[96],"mechanism":[97,214],"to":[98,146,185],"find":[99],"t-persistent":[101,162],"p-anomalous":[104],"from":[106],"sets":[108],"numerous":[110],"monitors":[114,174],"where":[119],"t":[120],"p":[122],"are":[123],"system":[124],"parameters":[125],"can":[127,166,196],"be":[128],"defined":[129],"based":[130,205,233],"application":[133],"requirement.":[134],"We":[135,178],"adopt":[136],"tight":[137,192],"structures":[139,194],"such":[140],"as":[141],"bitmap":[142],"bloom":[144],"filter":[145,154],"record":[147],"different":[151],"out":[155],"set,":[164],"help":[167],"us":[168],"reduce":[169],"communication":[171,200,221],"overhead":[172,222],"between":[173],"controller.":[177],"also":[179],"give":[180],"analysis":[182],"how":[184],"get":[186],"optimal":[188],"settings":[189],"these":[191],"minimize":[197],"total":[199],"overhead.":[201],"The":[202],"experiment":[203],"results":[204],"real":[207],"network":[208],"traces":[209],"show":[210],"proposed":[213],"achieves":[215],"76.1%":[216],"69.2%":[218],"reduction":[219],"comparison":[224],"with":[225],"straightforward":[227],"solution":[228,232],"state-of-the-art":[231],"coding":[235],"cuckoo":[236],"filter,":[237],"respectively.":[238]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
