{"id":"https://openalex.org/W2738924142","doi":"https://doi.org/10.1109/iwcmc.2017.7986317","title":"On correlating network traffic for cyber threat intelligence: A Bloom filter approach","display_name":"On correlating network traffic for cyber threat intelligence: A Bloom filter approach","publication_year":2017,"publication_date":"2017-06-01","ids":{"openalex":"https://openalex.org/W2738924142","doi":"https://doi.org/10.1109/iwcmc.2017.7986317","mag":"2738924142"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc.2017.7986317","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2017.7986317","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018957388","display_name":"Adil Atifi","orcid":"https://orcid.org/0000-0001-8712-6121"},"institutions":[{"id":"https://openalex.org/I63772739","display_name":"Florida Atlantic University","ror":"https://ror.org/05p8w6387","country_code":"US","type":"education","lineage":["https://openalex.org/I63772739"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Adil Atifi","raw_affiliation_strings":["College of Engineering & Computer Science, Florida Atlantic University, Florida, USA"],"affiliations":[{"raw_affiliation_string":"College of Engineering & Computer Science, Florida Atlantic University, Florida, USA","institution_ids":["https://openalex.org/I63772739"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039079298","display_name":"Elias Bou\u2010Harb","orcid":"https://orcid.org/0000-0001-8040-4635"},"institutions":[{"id":"https://openalex.org/I63772739","display_name":"Florida Atlantic University","ror":"https://ror.org/05p8w6387","country_code":"US","type":"education","lineage":["https://openalex.org/I63772739"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Elias Bou-Harb","raw_affiliation_strings":["College of Engineering & Computer Science, Florida Atlantic University, Florida, USA"],"affiliations":[{"raw_affiliation_string":"College of Engineering & Computer Science, Florida Atlantic University, Florida, USA","institution_ids":["https://openalex.org/I63772739"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5018957388"],"corresponding_institution_ids":["https://openalex.org/I63772739"],"apc_list":null,"apc_paid":null,"fwci":0.2072,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.55721424,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"6","issue":null,"first_page":"384","last_page":"389"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bloom-filter","display_name":"Bloom filter","score":0.9123148918151855},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6857858896255493},{"id":"https://openalex.org/keywords/bloom","display_name":"Bloom","score":0.43263566493988037},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33428993821144104},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.29647502303123474},{"id":"https://openalex.org/keywords/geology","display_name":"Geology","score":0.06760120391845703}],"concepts":[{"id":"https://openalex.org/C147224247","wikidata":"https://www.wikidata.org/wiki/Q885373","display_name":"Bloom filter","level":2,"score":0.9123148918151855},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6857858896255493},{"id":"https://openalex.org/C155567681","wikidata":"https://www.wikidata.org/wiki/Q2987425","display_name":"Bloom","level":2,"score":0.43263566493988037},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33428993821144104},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.29647502303123474},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.06760120391845703},{"id":"https://openalex.org/C111368507","wikidata":"https://www.wikidata.org/wiki/Q43518","display_name":"Oceanography","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc.2017.7986317","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2017.7986317","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7599999904632568,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W85139466","https://openalex.org/W148447563","https://openalex.org/W1516506771","https://openalex.org/W1594536929","https://openalex.org/W1972792640","https://openalex.org/W1989454965","https://openalex.org/W1993284846","https://openalex.org/W1998960172","https://openalex.org/W2005043824","https://openalex.org/W2035156323","https://openalex.org/W2040146912","https://openalex.org/W2054143615","https://openalex.org/W2062132646","https://openalex.org/W2062383334","https://openalex.org/W2065014987","https://openalex.org/W2073148641","https://openalex.org/W2112939204","https://openalex.org/W2117354552","https://openalex.org/W2119359024","https://openalex.org/W2123845384","https://openalex.org/W2155440239","https://openalex.org/W2168883902","https://openalex.org/W2170659658","https://openalex.org/W2170924378","https://openalex.org/W2343978497","https://openalex.org/W2498874063","https://openalex.org/W6603426847","https://openalex.org/W6606041630"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2086572746","https://openalex.org/W2604468458","https://openalex.org/W2157216338","https://openalex.org/W1662107788","https://openalex.org/W4293466821","https://openalex.org/W2051000928","https://openalex.org/W2785871494","https://openalex.org/W4298105090","https://openalex.org/W2789524206"],"abstract_inverted_index":{"Internet":[0],"and":[1,25,44,65,113,118,143,159,190,202,208],"organizational":[2],"network":[3,72,89,107,205],"security":[4,93,188,206],"is":[5,28,153],"still":[6],"threatened":[7],"by":[8,55,69,132,155],"devastating":[9],"malicious":[10],"activities.":[11],"Given":[12],"the":[13,56,105,126,129,175],"continuous":[14],"escalation":[15],"of":[16,21,29,58,128,139,157],"such":[17,46,49],"attacks":[18],"in":[19,186,200],"terms":[20],"their":[22],"frequency,":[23],"sophistication":[24],"stealthiness,":[26],"it":[27,135],"paramount":[30],"importance":[31],"to":[32,86,101,145,194],"generate":[33],"effective":[34,84,183],"cyber":[35,92],"threat":[36,170],"intelligence":[37,68],"that":[38,61,174,197],"aims":[39],"at":[40],"inferring,":[41],"attributing,":[42],"characterizing":[43,201],"mitigating":[45],"misdemeanors.":[47],"Nevertheless,":[48],"imperative":[50],"tasks":[51],"are":[52],"partially":[53],"impeded":[54],"lack":[57],"correlation":[59,184],"approaches":[60],"can":[62],"produce":[63],"prompt":[64],"accurate":[66],"actionable":[67],"investigating":[70],"various":[71,204],"traffic":[73,90,108,149],"sources.":[74],"To":[75],"this":[76,78],"end,":[77],"paper":[79],"proposes":[80],"a":[81,115,119],"simple":[82],"yet":[83],"approach":[85,96,131,177],"generically":[87],"correlate":[88],"for":[91],"purposes.":[94],"The":[95,151],"uniquely":[97],"exploits":[98],"Bloom":[99],"filters":[100],"infer":[102],"similarities":[103],"between":[104],"analyzed":[106],"while":[109],"eliminating":[110],"false":[111,121],"negatives":[112],"managing":[114],"very":[116],"low":[117],"measurable":[120],"positive":[122],"rate.":[123],"We":[124,172],"demonstrate":[125],"effectiveness":[127],"proposed":[130,176],"empirically":[133],"evaluating":[134],"using":[136,166],"10":[137],"GB":[138],"real":[140],"darknet":[141],"data":[142],"close":[144],"15":[146],"thousand":[147],"malware":[148],"samples.":[150],"outcome":[152],"rendered":[154],"hundreds":[156],"inferred":[158],"attributed":[160],"Internet-scale":[161],"infections,":[162],"which":[163],"we":[164],"corroborate":[165],"third-party":[167],"publicly":[168],"accessible":[169],"repositories.":[171],"envision":[173],"could":[178],"be":[179],"leveraged":[180],"as":[181],"an":[182],"component":[185],"complex":[187],"information":[189],"event":[191],"management":[192],"systems":[193],"provide":[195],"metrics":[196],"would":[198],"aid":[199],"comprehending":[203],"activities":[207],"incidents.":[209]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
