{"id":"https://openalex.org/W3198507401","doi":"https://doi.org/10.1109/lcn52139.2021.9525015","title":"Towards Generalizable Network Anomaly Detection Models","display_name":"Towards Generalizable Network Anomaly Detection Models","publication_year":2021,"publication_date":"2021-09-07","ids":{"openalex":"https://openalex.org/W3198507401","doi":"https://doi.org/10.1109/lcn52139.2021.9525015","mag":"3198507401"},"language":"en","primary_location":{"id":"doi:10.1109/lcn52139.2021.9525015","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcn52139.2021.9525015","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE 46th Conference on Local Computer Networks (LCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027584079","display_name":"Md Arifuzzaman","orcid":"https://orcid.org/0000-0003-3056-8636"},"institutions":[{"id":"https://openalex.org/I134113660","display_name":"University of Nevada, Reno","ror":"https://ror.org/01keh0577","country_code":"US","type":"education","lineage":["https://openalex.org/I134113660"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Md Arifuzzaman","raw_affiliation_strings":["Computer Science and Engineering, University of Nevada, Reno"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, University of Nevada, Reno","institution_ids":["https://openalex.org/I134113660"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078188257","display_name":"Shafkat Islam","orcid":"https://orcid.org/0000-0002-8524-2855"},"institutions":[{"id":"https://openalex.org/I134113660","display_name":"University of Nevada, Reno","ror":"https://ror.org/01keh0577","country_code":"US","type":"education","lineage":["https://openalex.org/I134113660"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shafkat Islam","raw_affiliation_strings":["Computer Science and Engineering, University of Nevada, Reno"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, University of Nevada, Reno","institution_ids":["https://openalex.org/I134113660"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019077099","display_name":"Engin Arslan","orcid":"https://orcid.org/0000-0002-2355-057X"},"institutions":[{"id":"https://openalex.org/I134113660","display_name":"University of Nevada, Reno","ror":"https://ror.org/01keh0577","country_code":"US","type":"education","lineage":["https://openalex.org/I134113660"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Engin Arslan","raw_affiliation_strings":["Computer Science and Engineering, University of Nevada, Reno"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, University of Nevada, Reno","institution_ids":["https://openalex.org/I134113660"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5027584079"],"corresponding_institution_ids":["https://openalex.org/I134113660"],"apc_list":null,"apc_paid":null,"fwci":0.4585,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.65739754,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"375","last_page":"378"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7892452478408813},{"id":"https://openalex.org/keywords/jitter","display_name":"Jitter","score":0.6492922306060791},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.635455310344696},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6064306497573853},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5726186633110046},{"id":"https://openalex.org/keywords/feature-engineering","display_name":"Feature engineering","score":0.5651471018791199},{"id":"https://openalex.org/keywords/packet-loss","display_name":"Packet loss","score":0.5585377216339111},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5500680804252625},{"id":"https://openalex.org/keywords/quality-of-service","display_name":"Quality of service","score":0.547530472278595},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5227432250976562},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.48519662022590637},{"id":"https://openalex.org/keywords/transfer-of-learning","display_name":"Transfer of learning","score":0.4791771173477173},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4708271324634552},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.4403127431869507},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.22506165504455566},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.2045080065727234},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.13317722082138062}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7892452478408813},{"id":"https://openalex.org/C134652429","wikidata":"https://www.wikidata.org/wiki/Q1052698","display_name":"Jitter","level":2,"score":0.6492922306060791},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.635455310344696},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6064306497573853},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5726186633110046},{"id":"https://openalex.org/C2778827112","wikidata":"https://www.wikidata.org/wiki/Q22245680","display_name":"Feature engineering","level":3,"score":0.5651471018791199},{"id":"https://openalex.org/C54108766","wikidata":"https://www.wikidata.org/wiki/Q391064","display_name":"Packet loss","level":3,"score":0.5585377216339111},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5500680804252625},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.547530472278595},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5227432250976562},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.48519662022590637},{"id":"https://openalex.org/C150899416","wikidata":"https://www.wikidata.org/wiki/Q1820378","display_name":"Transfer of learning","level":2,"score":0.4791771173477173},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4708271324634552},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.4403127431869507},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.22506165504455566},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.2045080065727234},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.13317722082138062},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lcn52139.2021.9525015","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcn52139.2021.9525015","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE 46th Conference on Local Computer Networks (LCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.5199999809265137}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1541446204","https://openalex.org/W2170210941","https://openalex.org/W2170505850","https://openalex.org/W2323958325","https://openalex.org/W2884400452","https://openalex.org/W2964473076","https://openalex.org/W3118755608"],"related_works":["https://openalex.org/W2121182846","https://openalex.org/W2315668284","https://openalex.org/W2155789024","https://openalex.org/W3213608175","https://openalex.org/W3117675750","https://openalex.org/W2141743053","https://openalex.org/W2109491806","https://openalex.org/W3095633856","https://openalex.org/W2058044441","https://openalex.org/W3171384686"],"abstract_inverted_index":{"Finding":[0],"the":[1,12,76,95,101,104,128],"root":[2],"causes":[3],"of":[4,14,35,103,133],"network":[5,80,91,109],"performance":[6,36,102],"anomalies":[7],"is":[8,143],"critical":[9],"to":[10,26,31,53,71,74,78,84,114,120],"satisfy":[11],"quality":[13],"service":[15],"requirements.":[16],"In":[17],"this":[18],"paper,":[19],"we":[20,46],"introduce":[21,47],"machine":[22],"learning":[23],"(ML)":[24],"models":[25,77,105,123],"process":[27],"TCP":[28],"socket":[29],"statistics":[30],"pinpoint":[32],"underlying":[33],"reasons":[34],"issues":[37],"such":[38],"as":[39],"packet":[40,59],"loss":[41],"and":[42,61],"jitter.":[43],"More":[44],"importantly,":[45],"a":[48],"novel":[49],"feature":[50,97],"engineering":[51,98],"method":[52],"transform":[54],"network-dependent":[55],"metrics":[56],"(e.g.,":[57],"total":[58],"count":[60],"round":[62],"trip":[63],"time)":[64],"in":[65,89,106,136],"training":[66],"datasets":[67],"into":[68],"network-independent":[69],"forms":[70],"be":[72],"able":[73],"transfer":[75,121],"new":[79],"settings":[81,92,110],"without":[82],"requiring":[83],"retrain":[85],"them.":[86],"Experimental":[87],"results":[88],"various":[90],"show":[93],"that":[94],"proposed":[96],"approach":[99],"improves":[100],"previously":[107],"unseen":[108],"from":[111],"around":[112],"60%":[113],"nearly":[115],"90%.":[116],"We":[117],"believe":[118],"ability":[119],"ML":[122,134],"across":[124],"networks":[125,138],"will":[126],"pave":[127],"way":[129],"for":[130],"wide":[131],"adoption":[132],"solutions":[135],"production":[137],"where":[139],"collecting":[140],"labeled":[141],"data":[142],"not":[144],"possible.":[145]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
