{"id":"https://openalex.org/W4403937800","doi":"https://doi.org/10.1109/iscc61673.2024.10733669","title":"On Detecting Anomalous TLS Connections with Artificial Intelligence Models","display_name":"On Detecting Anomalous TLS Connections with Artificial Intelligence Models","publication_year":2024,"publication_date":"2024-06-26","ids":{"openalex":"https://openalex.org/W4403937800","doi":"https://doi.org/10.1109/iscc61673.2024.10733669"},"language":"en","primary_location":{"id":"doi:10.1109/iscc61673.2024.10733669","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc61673.2024.10733669","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015963162","display_name":"Diana Berbecaru","orcid":"https://orcid.org/0000-0003-1930-9473"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Diana Gratiela Berbecaru","raw_affiliation_strings":["Politecnico di Torino,Department of Control and Computer Engineering,Italy"],"affiliations":[{"raw_affiliation_string":"Politecnico di Torino,Department of Control and Computer Engineering,Italy","institution_ids":["https://openalex.org/I177477856"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5092706450","display_name":"Stefano Giannuzzi","orcid":null},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Stefano Giannuzzi","raw_affiliation_strings":["Politecnico di Torino, Italy,Torino,Italy,10129"],"affiliations":[{"raw_affiliation_string":"Politecnico di Torino, Italy,Torino,Italy,10129","institution_ids":["https://openalex.org/I177477856"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5015963162"],"corresponding_institution_ids":["https://openalex.org/I177477856"],"apc_list":null,"apc_paid":null,"fwci":0.3755,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.63557674,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9735000133514404,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9735000133514404,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9610000252723694,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9602000117301941,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7280611395835876},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4278068542480469}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7280611395835876},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4278068542480469}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscc61673.2024.10733669","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc61673.2024.10733669","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1483650506","https://openalex.org/W1809974132","https://openalex.org/W2112736324","https://openalex.org/W2561521908","https://openalex.org/W2587728833","https://openalex.org/W2915352631","https://openalex.org/W3035311645","https://openalex.org/W3041452304","https://openalex.org/W3174500793","https://openalex.org/W3181232393","https://openalex.org/W3202064970","https://openalex.org/W4214933777","https://openalex.org/W4298051233","https://openalex.org/W4327778747","https://openalex.org/W4376602827","https://openalex.org/W4386214590","https://openalex.org/W4386214654","https://openalex.org/W4393140931","https://openalex.org/W6640036494","https://openalex.org/W6867029041"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"In":[0,48],"recent":[1],"years,":[2],"anomaly-based":[3,25],"intrusion":[4,26],"detection":[5,27],"systems":[6],"using":[7],"machine":[8],"learning":[9,13],"(ML)":[10],"and":[11,39,110,131],"deep":[12],"techniques":[14],"have":[15],"started":[16],"to":[17,20,58,93],"be":[18],"developed":[19],"mitigate":[21],"cybersecurity":[22],"attacks.":[23],"An":[24],"system":[28],"performs":[29],"traffic":[30,137],"analysis":[31],"by":[32,75],"exploiting":[33],"supervised":[34],"or":[35,90],"unsupervised":[36],"ML":[37],"algorithms":[38],"raises":[40],"alerts":[41],"if":[42],"a":[43,62,111],"suspicious":[44],"pattern":[45],"is":[46],"encountered.":[47],"this":[49],"paper,":[50],"we":[51,105],"exploit":[52],"the":[53,80,95,107,121,128,135,141],"Autoencoder":[54],"neural":[55],"network":[56],"model":[57,119],"detect":[59],"variants":[60,126],"of":[61,127,140],"very":[63],"famous":[64],"attack":[65,72,130],"discovered":[66],"in":[67,79,85,138],"2014,":[68],"namely":[69],"Heartbleed.":[70],"The":[71,117],"was":[73],"caused":[74],"an":[76],"implementation":[77],"flaw":[78],"OpenSSL":[81],"library,":[82],"widely":[83],"used":[84],"web":[86],"servers,":[87],"database":[88],"systems,":[89],"e-mail":[91],"servers":[92],"support":[94],"Transport":[96],"Layer":[97],"Security":[98],"(TLS)":[99],"protocol.":[100],"To":[101],"evaluate":[102],"our":[103],"model,":[104],"exploited":[106],"CIC-IDS2017":[108],"dataset":[109],"custom":[112],"one":[113],"created":[114],"on":[115],"purpose.":[116],"proposed":[118],"recognized":[120],"anomalous":[122],"TLS":[123],"connections":[124],"containing":[125],"Heartbleed":[129],"distinguished":[132],"them":[133],"from":[134],"benign":[136],"85%":[139],"cases.":[142]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
