{"id":"https://openalex.org/W2163302438","doi":"https://doi.org/10.1109/iscst.2005.1553297","title":"NIDS architecture for clusters","display_name":"NIDS architecture for clusters","publication_year":2005,"publication_date":"2005-01-01","ids":{"openalex":"https://openalex.org/W2163302438","doi":"https://doi.org/10.1109/iscst.2005.1553297","mag":"2163302438"},"language":"en","primary_location":{"id":"doi:10.1109/iscst.2005.1553297","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscst.2005.1553297","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005.","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080433875","display_name":"Fabrice Gadaud","orcid":null},"institutions":[{"id":"https://openalex.org/I4387153997","display_name":"Laboratoire d'Informatique Fondamentale d'Orl\u00e9ans","ror":"https://ror.org/01nr3td38","country_code":null,"type":"facility","lineage":["https://openalex.org/I12449238","https://openalex.org/I4210143826","https://openalex.org/I4387153997"]},{"id":"https://openalex.org/I2738703131","display_name":"Commissariat \u00e0 l'\u00c9nergie Atomique et aux \u00c9nergies Alternatives","ror":"https://ror.org/00jjx8s55","country_code":"FR","type":"government","lineage":["https://openalex.org/I2738703131"]},{"id":"https://openalex.org/I4210121459","display_name":"P\u00f4le L\u00e9onard de Vinci","ror":"https://ror.org/02setav13","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210121459"]},{"id":"https://openalex.org/I4210101455","display_name":"CEA DAM \u00cele-de-France","ror":"https://ror.org/00kn4eb29","country_code":"FR","type":"government","lineage":["https://openalex.org/I4210101455"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"F. Gadaud","raw_affiliation_strings":["Rue L\u00e9onard de Vinci, Bat IIIA, Orleans, France","DAM/DIF - DAM \u00cele-de-France (CEA Bruy\u00e8res-le-Ch\u00e2tel 91297 Arpajon cedex - France)","LIFO - Laboratoire d'Informatique Fondamentale d'Orl\u00e9ans (Batiment IIIA 6 Rue L\u00e9onard de Vinci - BP 6759 45067 ORLEANS CEDEX 2 - France)"],"affiliations":[{"raw_affiliation_string":"Rue L\u00e9onard de Vinci, Bat IIIA, Orleans, France","institution_ids":["https://openalex.org/I4210121459"]},{"raw_affiliation_string":"DAM/DIF - DAM \u00cele-de-France (CEA Bruy\u00e8res-le-Ch\u00e2tel 91297 Arpajon cedex - France)","institution_ids":["https://openalex.org/I2738703131","https://openalex.org/I4210101455"]},{"raw_affiliation_string":"LIFO - Laboratoire d'Informatique Fondamentale d'Orl\u00e9ans (Batiment IIIA 6 Rue L\u00e9onard de Vinci - BP 6759 45067 ORLEANS CEDEX 2 - France)","institution_ids":["https://openalex.org/I4387153997"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5080433875"],"corresponding_institution_ids":["https://openalex.org/I2738703131","https://openalex.org/I4210101455","https://openalex.org/I4210121459","https://openalex.org/I4387153997"],"apc_list":null,"apc_paid":null,"fwci":0.5561,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.75981554,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"15","issue":null,"first_page":"78","last_page":"83"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8498932123184204},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.663383424282074},{"id":"https://openalex.org/keywords/dimensioning","display_name":"Dimensioning","score":0.6079814434051514},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5964652895927429},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5891680121421814},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5582806468009949},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.5166902542114258},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5161991715431213},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5024826526641846},{"id":"https://openalex.org/keywords/cluster","display_name":"Cluster (spacecraft)","score":0.4972439110279083},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.435799777507782},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.41984933614730835},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4178573489189148},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.41405871510505676},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.232439786195755},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13657402992248535},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.1103176474571228},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10024046897888184}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8498932123184204},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.663383424282074},{"id":"https://openalex.org/C89714869","wikidata":"https://www.wikidata.org/wiki/Q2280470","display_name":"Dimensioning","level":2,"score":0.6079814434051514},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5964652895927429},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5891680121421814},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5582806468009949},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.5166902542114258},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5161991715431213},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5024826526641846},{"id":"https://openalex.org/C164866538","wikidata":"https://www.wikidata.org/wiki/Q367351","display_name":"Cluster (spacecraft)","level":2,"score":0.4972439110279083},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.435799777507782},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.41984933614730835},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4178573489189148},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.41405871510505676},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.232439786195755},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13657402992248535},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.1103176474571228},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10024046897888184},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/iscst.2005.1553297","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscst.2005.1553297","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005.","raw_type":"proceedings-article"},{"id":"pmh:oai:HAL:hal-00461167v1","is_oa":false,"landing_page_url":"https://hal.science/hal-00461167","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"CTS 2005, May 2005, Saint Louis, United States. pp.78-83, &#x27E8;10.1109/ISCST.2005.1553297&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.5600000023841858,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W203122272","https://openalex.org/W1480554382","https://openalex.org/W1488532897","https://openalex.org/W1495905905","https://openalex.org/W1516506771","https://openalex.org/W1545060479","https://openalex.org/W1555759054","https://openalex.org/W1571097638","https://openalex.org/W1577117059","https://openalex.org/W1595191049","https://openalex.org/W1603652346","https://openalex.org/W1674877186","https://openalex.org/W1684452600","https://openalex.org/W2103265820","https://openalex.org/W2114818286","https://openalex.org/W2137559158","https://openalex.org/W2152408640","https://openalex.org/W2169937827","https://openalex.org/W4282975758","https://openalex.org/W6629175646","https://openalex.org/W6629433156","https://openalex.org/W6632519848","https://openalex.org/W6633008706","https://openalex.org/W6637096788","https://openalex.org/W6637311464"],"related_works":["https://openalex.org/W1562131159","https://openalex.org/W2367248359","https://openalex.org/W2379979386","https://openalex.org/W2980301606","https://openalex.org/W2363010132","https://openalex.org/W582258172","https://openalex.org/W1998726547","https://openalex.org/W2372259569","https://openalex.org/W4234886592","https://openalex.org/W4232555700"],"abstract_inverted_index":{"Intrusion":[0],"detection":[1],"is":[2,79],"a":[3,63,72],"security":[4,59],"concept":[5],"implemented":[6],"on":[7,19,32,81,87,117],"networks":[8,25],"in":[9],"various":[10],"academic":[11],"and":[12,76,99,126],"commercial":[13],"solutions.":[14],"Most":[15],"of":[16,35,51,110,120],"them":[17],"rely":[18,30],"sensors":[20],"dedicated":[21],"to":[22,41,48,56,97],"local":[23],"area":[24],"or":[26],"Internet.":[27],"However":[28],"clusters":[29],"heavily":[31],"networks.":[33],"Because":[34],"their":[36],"uniformity,":[37],"they":[38],"are":[39,114],"sensible":[40],"attacks:":[42],"one":[43],"compromised":[44],"node":[45],"can":[46],"lead":[47],"the":[49,68,82,88,118],"control":[50],"whole":[52],"cluster.":[53],"In":[54],"order":[55],"solve":[57],"such":[58],"issues,":[60],"we":[61,123],"purpose":[62],"NIDS":[64],"architecture":[65],"which":[66],"addresses":[67],"same":[69],"constraints":[70],"as":[71],"cluster:":[73],"efficiency,":[74],"scalability":[75],"reliability.":[77],"It":[78],"based":[80],"cluster":[83],"paradigm.":[84],"We":[85],"stress":[86],"facts":[89],"that":[90],"network":[91],"packets":[92],"must":[93,101],"be":[94,102],"dispatched":[95],"according":[96],"streams":[98],"analysis":[100,113],"load-balanced":[103],"at":[104],"process":[105],"level.":[106],"Moreover":[107],"two":[108],"types":[109],"practical":[111],"parallel":[112],"presented,":[115],"depending":[116],"type":[119],"flows.":[121],"Finally,":[122],"discuss":[124],"implementations":[125],"dimensioning":[127],"issues":[128]},"counts_by_year":[{"year":2016,"cited_by_count":1}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
