{"id":"https://openalex.org/W4200138746","doi":"https://doi.org/10.1109/iscc53001.2021.9631421","title":"NeVe: A Log-based Fast Incremental Network Feature Embedding Approach","display_name":"NeVe: A Log-based Fast Incremental Network Feature Embedding Approach","publication_year":2021,"publication_date":"2021-09-05","ids":{"openalex":"https://openalex.org/W4200138746","doi":"https://doi.org/10.1109/iscc53001.2021.9631421"},"language":"en","primary_location":{"id":"doi:10.1109/iscc53001.2021.9631421","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc53001.2021.9631421","pdf_url":null,"source":{"id":"https://openalex.org/S4363605778","display_name":"2021 IEEE Symposium on Computers and Communications (ISCC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042029470","display_name":"Ran Tian","orcid":"https://orcid.org/0000-0002-5679-3666"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ran Tian","raw_affiliation_strings":["University of Chinese Academy of Sciences","Institute of Computing Technology, Chinese Academy of Sciences, Beijing"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024464918","display_name":"Zulong Diao","orcid":"https://orcid.org/0000-0001-6581-7511"},"institutions":[{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]},{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zulong Diao","raw_affiliation_strings":["Institute of Computing Technology, Chinese Academy of Sciences,Beijing","Institute of Computing Technology, Chinese Academy of Sciences, Beijing","Purple Mountain Laboratories, Nanjing"],"affiliations":[{"raw_affiliation_string":"Institute of Computing Technology, Chinese Academy of Sciences,Beijing","institution_ids":["https://openalex.org/I4210090176"]},{"raw_affiliation_string":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Purple Mountain Laboratories, Nanjing","institution_ids":["https://openalex.org/I4210155350"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080666877","display_name":"Haiyang Jiang","orcid":"https://orcid.org/0000-0002-9438-998X"},"institutions":[{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haiyang Jiang","raw_affiliation_strings":["Institute of Computing Technology, Chinese Academy of Sciences,Beijing","Institute of Computing Technology, Chinese Academy of Sciences, Beijing"],"affiliations":[{"raw_affiliation_string":"Institute of Computing Technology, Chinese Academy of Sciences,Beijing","institution_ids":["https://openalex.org/I4210090176"]},{"raw_affiliation_string":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030689390","display_name":"Gaogang Xie","orcid":"https://orcid.org/0000-0003-4964-1135"},"institutions":[{"id":"https://openalex.org/I4210108629","display_name":"Computer Network Information Center","ror":"https://ror.org/01s0wyf50","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210108629"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gaogang Xie","raw_affiliation_strings":["University of Chinese Academy of Sciences","Computer Network Information Center, Chinese Academy of Sciences, Beijing"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"Computer Network Information Center, Chinese Academy of Sciences, Beijing","institution_ids":["https://openalex.org/I4210108629"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5042029470"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210090176","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.308,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.38865389,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"12","issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8366261720657349},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.6175207495689392},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5906102061271667},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5791175365447998},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5737773180007935},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5518006086349487},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5261014699935913},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.46228671073913574},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.42192280292510986},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4083938002586365},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.33892959356307983},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.23341870307922363},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.12344473600387573},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.11228501796722412}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8366261720657349},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6175207495689392},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5906102061271667},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5791175365447998},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5737773180007935},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5518006086349487},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5261014699935913},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.46228671073913574},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.42192280292510986},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4083938002586365},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.33892959356307983},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.23341870307922363},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.12344473600387573},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.11228501796722412},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscc53001.2021.9631421","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc53001.2021.9631421","pdf_url":null,"source":{"id":"https://openalex.org/S4363605778","display_name":"2021 IEEE Symposium on Computers and Communications (ISCC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5542914813","display_name":null,"funder_award_id":"2020YFB180026","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1614298861","https://openalex.org/W1757497509","https://openalex.org/W2146502635","https://openalex.org/W2187089797","https://openalex.org/W2236871065","https://openalex.org/W2250539671","https://openalex.org/W2342408547","https://openalex.org/W2402299331","https://openalex.org/W2493916176","https://openalex.org/W2518057346","https://openalex.org/W2738789353","https://openalex.org/W2745980806","https://openalex.org/W2751418808","https://openalex.org/W2771641736","https://openalex.org/W2920641228","https://openalex.org/W2924689635","https://openalex.org/W2946254251","https://openalex.org/W2947815220","https://openalex.org/W2956530858","https://openalex.org/W2986944522","https://openalex.org/W3105248300","https://openalex.org/W4255845613","https://openalex.org/W4294170691","https://openalex.org/W6636510571","https://openalex.org/W6682691769","https://openalex.org/W6713265772","https://openalex.org/W6723250868","https://openalex.org/W6760314531"],"related_works":["https://openalex.org/W2061466315","https://openalex.org/W2376886931","https://openalex.org/W1992118813","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W1495178644","https://openalex.org/W2185594426"],"abstract_inverted_index":{"Similarity":[0],"(distance)":[1],"measurement":[2],"among":[3],"network":[4,18,48,65,89],"features":[5],"(e.g.":[6],"IP":[7],"address,":[8,10],"MAC":[9],"port":[11],"number,":[12],"and":[13,32,42,110],"protocol,":[14],"etc.)":[15],"based":[16],"on":[17],"logs":[19],"is":[20,38,91],"a":[21,62,81,112],"critical":[22],"step":[23],"for":[24],"data":[25,90,108],"mining":[26],"in":[27],"intrusion":[28],"detection,":[29],"anomaly":[30],"prediction,":[31],"log":[33],"analysis.":[34],"A":[35],"practical":[36],"approach":[37],"necessarily":[39],"accurate,":[40],"fast,":[41],"incremental":[43],"due":[44],"to":[45,54,104],"the":[46,74,88,102,106,125,139],"dynamic":[47],"environment.":[49],"However,":[50],"existing":[51],"solutions":[52],"fail":[53],"satisfy":[55],"these":[56],"demands":[57],"simultaneously.":[58],"Therefore,":[59],"we":[60,100],"propose":[61],"novel":[63],"unsupervised":[64],"feature":[66],"embedding":[67],"approach:":[68],"Network":[69],"Vector":[70],"(NeVe).":[71],"It":[72],"learns":[73],"similarity":[75],"from":[76],"context":[77],"information":[78],"by":[79],"introducing":[80],"natural":[82],"language":[83],"processing":[84],"algorithm":[85,103],"GloVe.":[86],"Since":[87],"more":[92],"timeliness":[93],"with":[94,128,138],"an":[95],"almost":[96],"infinite":[97],"corpus":[98],"size,":[99],"adjust":[101],"adapt":[105],"input":[107],"format":[109],"design":[111],"fast":[113],"scalable":[114],"online":[115],"update":[116],"mechanism.":[117],"Our":[118],"evaluation":[119],"demonstrates":[120],"that":[121],"NeVe":[122],"can":[123],"achieve":[124],"highest":[126],"accuracy":[127],"minimal":[129],"time":[130],"consumption":[131],"(13":[132],"~":[133],"15":[134],"times":[135],"faster)":[136],"compared":[137],"state-of-the-art":[140],"approach.":[141]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
