{"id":"https://openalex.org/W2092607229","doi":"https://doi.org/10.1109/isi.2013.6578851","title":"Lame' curve-based signature discovery learning technique for network traffic classification","display_name":"Lame' curve-based signature discovery learning technique for network traffic classification","publication_year":2013,"publication_date":"2013-06-01","ids":{"openalex":"https://openalex.org/W2092607229","doi":"https://doi.org/10.1109/isi.2013.6578851","mag":"2092607229"},"language":"en","primary_location":{"id":"doi:10.1109/isi.2013.6578851","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2013.6578851","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE International Conference on Intelligence and Security Informatics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005607315","display_name":"Shan Suthaharan","orcid":"https://orcid.org/0000-0003-3235-9870"},"institutions":[{"id":"https://openalex.org/I169335092","display_name":"University of North Carolina at Greensboro","ror":"https://ror.org/04fnxsj42","country_code":"US","type":"education","lineage":["https://openalex.org/I169335092"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Shan Suthaharan","raw_affiliation_strings":["Department of Computer Science, University of North Carolina, Greensboro, Greensboro, NC, USA","Department of Computer Science, University of North Carolina at Greensboro, Greensboro, NC, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of North Carolina, Greensboro, Greensboro, NC, USA","institution_ids":["https://openalex.org/I169335092"]},{"raw_affiliation_string":"Department of Computer Science, University of North Carolina at Greensboro, Greensboro, NC, USA","institution_ids":["https://openalex.org/I169335092"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043760302","display_name":"Laxmi Sunkara","orcid":null},"institutions":[{"id":"https://openalex.org/I169335092","display_name":"University of North Carolina at Greensboro","ror":"https://ror.org/04fnxsj42","country_code":"US","type":"education","lineage":["https://openalex.org/I169335092"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Laxmi Sunkara","raw_affiliation_strings":["Department of Computer Science, University of North Carolina, Greensboro, Greensboro, NC, USA","Department of Computer Science, University of North Carolina at Greensboro, Greensboro, NC, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of North Carolina, Greensboro, Greensboro, NC, USA","institution_ids":["https://openalex.org/I169335092"]},{"raw_affiliation_string":"Department of Computer Science, University of North Carolina at Greensboro, Greensboro, NC, USA","institution_ids":["https://openalex.org/I169335092"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080205531","display_name":"Sweta Keshapagu","orcid":null},"institutions":[{"id":"https://openalex.org/I169335092","display_name":"University of North Carolina at Greensboro","ror":"https://ror.org/04fnxsj42","country_code":"US","type":"education","lineage":["https://openalex.org/I169335092"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sweta Keshapagu","raw_affiliation_strings":["Department of Computer Science, University of North Carolina, Greensboro, Greensboro, NC, USA","Department of Computer Science, University of North Carolina at Greensboro, Greensboro, NC, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of North Carolina, Greensboro, Greensboro, NC, USA","institution_ids":["https://openalex.org/I169335092"]},{"raw_affiliation_string":"Department of Computer Science, University of North Carolina at Greensboro, Greensboro, NC, USA","institution_ids":["https://openalex.org/I169335092"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5005607315"],"corresponding_institution_ids":["https://openalex.org/I169335092"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.10466623,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"1","issue":null,"first_page":"321","last_page":"326"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ellipse","display_name":"Ellipse","score":0.7644108533859253},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5782937407493591},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.5395739078521729},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.5149767994880676},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4862862825393677},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.47295448184013367},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.45601657032966614},{"id":"https://openalex.org/keywords/curve-fitting","display_name":"Curve fitting","score":0.4379206895828247},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3968917429447174},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.39651286602020264},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.33040115237236023},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.2516482472419739},{"id":"https://openalex.org/keywords/geometry","display_name":"Geometry","score":0.16514047980308533}],"concepts":[{"id":"https://openalex.org/C74261601","wikidata":"https://www.wikidata.org/wiki/Q40112","display_name":"Ellipse","level":2,"score":0.7644108533859253},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5782937407493591},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.5395739078521729},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.5149767994880676},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4862862825393677},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.47295448184013367},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.45601657032966614},{"id":"https://openalex.org/C184389593","wikidata":"https://www.wikidata.org/wiki/Q603159","display_name":"Curve fitting","level":2,"score":0.4379206895828247},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3968917429447174},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.39651286602020264},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.33040115237236023},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2516482472419739},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.16514047980308533},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isi.2013.6578851","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2013.6578851","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE International Conference on Intelligence and Security Informatics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W21782756","https://openalex.org/W1483650506","https://openalex.org/W1579863784","https://openalex.org/W1973668864","https://openalex.org/W2130949063","https://openalex.org/W2149600645","https://openalex.org/W2165313080","https://openalex.org/W2171033594","https://openalex.org/W2262045390","https://openalex.org/W6628933252","https://openalex.org/W6634851302","https://openalex.org/W6692777677"],"related_works":["https://openalex.org/W2371136327","https://openalex.org/W4293234107","https://openalex.org/W2370549269","https://openalex.org/W2386824811","https://openalex.org/W2354618530","https://openalex.org/W2081226903","https://openalex.org/W1505675695","https://openalex.org/W2158428930","https://openalex.org/W2378074024","https://openalex.org/W2070631722"],"abstract_inverted_index":{"Most":[0],"recent":[1],"research":[2],"shows":[3],"that":[4,124,145,155,187],"network":[5,17,47,112,134,203],"intrusion":[6,89,131],"traffic":[7,93,113,132,168,192],"types":[8,45,201],"can":[9,24,32,39,52,125],"be":[10,25,33,40,53],"represented":[11,26],"by":[12,27,170],"concentric":[13,142],"unit":[14],"circles":[15],"while":[16],"protocols":[18],"such":[19],"as":[20],"http":[21],"and":[22,71,82,85,91,97,110,133,137,150,174,194],"https":[23],"rectangles.":[28],"These":[29],"geometric":[30,172],"properties":[31],"used":[34],"to":[35,42,95,181],"develop":[36],"signatures":[37,51,66,128],"which":[38,64],"applied":[41],"classify":[43],"different":[44,200],"of":[46,199,202],"traffic.":[48,204],"Discovering":[49],"these":[50],"done":[54],"using":[55,67],"representation":[56,153,184],"learning":[57,104,185],"techniques.":[58],"This":[59,177],"paper":[60],"proposes":[61],"an":[62],"approach":[63],"constructs":[65],"a":[68,102,106,151,182],"Lame'":[69,75,119,162],"curve":[70,76,120,163],"its":[72],"parameters.":[73],"A":[74],"is":[77,188],"useful":[78],"for":[79,117,129,190],"defining":[80],"hypo-":[81],"hyper-":[83],"ellipses,":[84],"therefore":[86],"helps":[87,165,195],"approximate":[88],"patterns":[90,94],"http/https":[92],"circular":[96,148],"rectangular":[98,152,158],"models":[99],"respectively.":[100],"Using":[101],"supervised":[103],"approach,":[105],"p-fold":[107],"cross-validation":[108],"technique,":[109],"labeled":[111],"datasets,":[114],"suitable":[115,189],"values":[116],"the":[118,141,160,167],"parameters":[121],"are":[122],"learned":[123],"robustly":[126],"create":[127],"both":[130],"protocol":[135],"(http":[136],"https)":[138],"types.":[139],"Unlike":[140],"unit-circle":[143],"algorithm":[144,154],"defines":[146,156],"perfect":[147],"patterns,":[149,159],"fine":[157],"proposed":[161],"technique":[164,186],"represent":[166],"data":[169,193],"approximated":[171],"(circles":[173],"rectangles)":[175],"shapes.":[176],"signature":[178],"property":[179],"leads":[180],"robust":[183,197],"discrete-value":[191],"achieve":[196],"classification":[198]},"counts_by_year":[{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
