{"id":"https://openalex.org/W2080757432","doi":"https://doi.org/10.1109/lcn.2014.6925822","title":"Traffic Anomaly Detection in the presence of P2P traffic","display_name":"Traffic Anomaly Detection in the presence of P2P traffic","publication_year":2014,"publication_date":"2014-09-01","ids":{"openalex":"https://openalex.org/W2080757432","doi":"https://doi.org/10.1109/lcn.2014.6925822","mag":"2080757432"},"language":"en","primary_location":{"id":"doi:10.1109/lcn.2014.6925822","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcn.2014.6925822","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"39th Annual IEEE Conference on Local Computer Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111155841","display_name":"Sardar Ali","orcid":null},"institutions":[{"id":"https://openalex.org/I212119943","display_name":"University of Victoria","ror":"https://ror.org/04s5mat29","country_code":"CA","type":"education","lineage":["https://openalex.org/I212119943"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Sardar Ali","raw_affiliation_strings":["Department of Computer Science, University of Victoria, Victoria, BC, Canada","[Department of Computer Science, University of Victoria, BC, Canada]"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Victoria, Victoria, BC, Canada","institution_ids":["https://openalex.org/I212119943"]},{"raw_affiliation_string":"[Department of Computer Science, University of Victoria, BC, Canada]","institution_ids":["https://openalex.org/I212119943"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110101259","display_name":"Kui Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I212119943","display_name":"University of Victoria","ror":"https://ror.org/04s5mat29","country_code":"CA","type":"education","lineage":["https://openalex.org/I212119943"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Kui Wu","raw_affiliation_strings":["Department of Computer Science, University of Victoria, Victoria, BC, Canada","[Department of Computer Science, University of Victoria, BC, Canada]"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Victoria, Victoria, BC, Canada","institution_ids":["https://openalex.org/I212119943"]},{"raw_affiliation_string":"[Department of Computer Science, University of Victoria, BC, Canada]","institution_ids":["https://openalex.org/I212119943"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051330490","display_name":"Hassan Aqeel Khan","orcid":"https://orcid.org/0000-0002-5501-160X"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Hassan Khan","raw_affiliation_strings":["David R. Cheriton School of Computer Science, University of Waterloo, Canada","David R. Cheriton School of Computer Science, University of Waterloo Canada"],"affiliations":[{"raw_affiliation_string":"David R. Cheriton School of Computer Science, University of Waterloo, Canada","institution_ids":["https://openalex.org/I151746483"]},{"raw_affiliation_string":"David R. Cheriton School of Computer Science, University of Waterloo Canada","institution_ids":["https://openalex.org/I151746483"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5111155841"],"corresponding_institution_ids":["https://openalex.org/I212119943"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.15154966,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"2009","issue":null,"first_page":"482","last_page":"485"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.715722918510437},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7111543416976929},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.689944326877594},{"id":"https://openalex.org/keywords/constant-false-alarm-rate","display_name":"Constant false alarm rate","score":0.6674383878707886},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.5599340200424194},{"id":"https://openalex.org/keywords/alarm","display_name":"ALARM","score":0.5516218543052673},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.49963903427124023},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4814397692680359},{"id":"https://openalex.org/keywords/openflow","display_name":"OpenFlow","score":0.43631216883659363},{"id":"https://openalex.org/keywords/false-alarm","display_name":"False alarm","score":0.4260697066783905},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.37699782848358154},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.34785228967666626},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3012177050113678},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.14101633429527283},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.07439672946929932}],"concepts":[{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.715722918510437},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7111543416976929},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.689944326877594},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.6674383878707886},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.5599340200424194},{"id":"https://openalex.org/C2779119184","wikidata":"https://www.wikidata.org/wiki/Q294350","display_name":"ALARM","level":2,"score":0.5516218543052673},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.49963903427124023},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4814397692680359},{"id":"https://openalex.org/C192697461","wikidata":"https://www.wikidata.org/wiki/Q4045918","display_name":"OpenFlow","level":3,"score":0.43631216883659363},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.4260697066783905},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.37699782848358154},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.34785228967666626},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3012177050113678},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.14101633429527283},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.07439672946929932},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lcn.2014.6925822","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcn.2014.6925822","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"39th Annual IEEE Conference on Local Computer Networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10","score":0.6899999976158142}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1480655930","https://openalex.org/W1604044955","https://openalex.org/W2118443685","https://openalex.org/W2159669612","https://openalex.org/W2395731689","https://openalex.org/W6711893318"],"related_works":["https://openalex.org/W2035376224","https://openalex.org/W137677872","https://openalex.org/W2578120774","https://openalex.org/W1983393909","https://openalex.org/W2165968459","https://openalex.org/W3121346907","https://openalex.org/W4379535633","https://openalex.org/W2040150569","https://openalex.org/W2132174924","https://openalex.org/W2013909972"],"abstract_inverted_index":{"Recent":[0],"estimates":[1],"suggest":[2],"that":[3,18,123],"p2p":[4,19,62,81,93],"traffic":[5,20,55,72,82,94],"comprises":[6],"a":[7,23,45,71],"significant":[8],"fraction":[9],"of":[10,35,80],"today's":[11],"Internet":[12],"traffic.":[13,65],"Previous":[14],"work":[15],"has":[16],"shown":[17],"can":[21,58],"have":[22],"considerable":[24],"adverse":[25],"impact":[26],"on":[27,83,91,111],"the":[28,77,108],"accuracy":[29,50],"(detection":[30],"and":[31,63,96,101,105,134],"false":[32,139],"alarm":[33,140],"rates)":[34],"Anomaly":[36],"Detection":[37],"Systems":[38],"(ADSs).":[39],"In":[40],"this":[41,49],"paper,":[42],"we":[43,69],"propose":[44],"solution":[46,87,110],"to":[47],"mitigate":[48],"degradation":[51],"by":[52],"identifying":[53],"novel":[54],"features":[56],"which":[57,74],"accurately":[59],"discriminate":[60],"between":[61],"attack":[64],"Using":[66],"these":[67],"features,":[68],"develop":[70],"preprocessor":[73],"compensates":[75],"for":[76],"negative":[78],"effects":[79],"anomaly":[84],"detection.":[85],"Our":[86],"does":[88],"not":[89],"rely":[90],"any":[92],"classifier":[95],"is":[97],"thus":[98],"more":[99],"robust":[100],"efficient.":[102],"We":[103],"implement":[104],"empirically":[106],"evaluate":[107],"proposed":[109,125],"an":[112],"OpenFlow":[113],"testbed":[114],"with":[115],"four":[116],"prominent":[117],"non-proprietary":[118],"ADSs.":[119],"Experimental":[120],"results":[121],"show":[122],"our":[124],"method":[126],"provides":[127],"about":[128,135],"35%":[129],"increase":[130],"in":[131,138],"detection":[132],"rate":[133],"50%":[136],"decrease":[137],"rates.":[141]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
