{"id":"https://openalex.org/W2004798211","doi":"https://doi.org/10.1109/mass.2012.6708530","title":"Bitwise sketch for lightweight reverse IP reconstruction in network anomaly detection","display_name":"Bitwise sketch for lightweight reverse IP reconstruction in network anomaly detection","publication_year":2012,"publication_date":"2012-10-01","ids":{"openalex":"https://openalex.org/W2004798211","doi":"https://doi.org/10.1109/mass.2012.6708530","mag":"2004798211"},"language":"en","primary_location":{"id":"doi:10.1109/mass.2012.6708530","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mass.2012.6708530","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5114860307","display_name":"Fei Wang","orcid":"https://orcid.org/0000-0003-2367-756X"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fei Wang","raw_affiliation_strings":["School of Computer, National University of Defense Technology, Changsha, Hunan, China","School of Computer, National University of Defense Technology; Changsha, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer, National University of Defense Technology, Changsha, Hunan, China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"School of Computer, National University of Defense Technology; Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100333239","display_name":"Xiaofeng Wang","orcid":"https://orcid.org/0000-0002-3583-369X"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaofeng Wang","raw_affiliation_strings":["School of Computer, National University of Defense Technology, Changsha, Hunan, China","School of Computer, National University of Defense Technology; Changsha, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer, National University of Defense Technology, Changsha, Hunan, China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"School of Computer, National University of Defense Technology; Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Xiaofeng Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaofeng Hu","raw_affiliation_strings":["School of Computer, National University of Defense Technology, Changsha, Hunan, China","School of Computer, National University of Defense Technology; Changsha, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer, National University of Defense Technology, Changsha, Hunan, China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"School of Computer, National University of Defense Technology; Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055375948","display_name":"Jinshu Su","orcid":"https://orcid.org/0000-0001-9273-616X"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinshu Su","raw_affiliation_strings":["School of Computer, National University of Defense Technology, Changsha, Hunan, China","School of Computer, National University of Defense Technology; Changsha, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer, National University of Defense Technology, Changsha, Hunan, China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"School of Computer, National University of Defense Technology; Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5114860307"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.11866893,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sketch","display_name":"Sketch","score":0.8720043897628784},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.8122937679290771},{"id":"https://openalex.org/keywords/bitwise-operation","display_name":"Bitwise operation","score":0.7909830212593079},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7677316665649414},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6180206537246704},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5681498050689697},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.491060733795166},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.46658140420913696},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4297834038734436},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.39142775535583496},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.32670241594314575},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12740111351013184},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.08965128660202026}],"concepts":[{"id":"https://openalex.org/C2779231336","wikidata":"https://www.wikidata.org/wiki/Q7534724","display_name":"Sketch","level":2,"score":0.8720043897628784},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.8122937679290771},{"id":"https://openalex.org/C134765980","wikidata":"https://www.wikidata.org/wiki/Q879126","display_name":"Bitwise operation","level":2,"score":0.7909830212593079},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7677316665649414},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6180206537246704},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5681498050689697},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.491060733795166},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.46658140420913696},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4297834038734436},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.39142775535583496},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.32670241594314575},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12740111351013184},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.08965128660202026},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mass.2012.6708530","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mass.2012.6708530","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1995484833","https://openalex.org/W2080234606","https://openalex.org/W2101124613","https://openalex.org/W2150517569","https://openalex.org/W2166858086","https://openalex.org/W3161677312","https://openalex.org/W6641538317"],"related_works":["https://openalex.org/W2378994405","https://openalex.org/W2385974820","https://openalex.org/W2373478030","https://openalex.org/W2378679551","https://openalex.org/W3149739944","https://openalex.org/W2392363776","https://openalex.org/W2063051341","https://openalex.org/W2591066345","https://openalex.org/W1494563618","https://openalex.org/W2371326241"],"abstract_inverted_index":{"Sketch":[0],"is":[1,52,54],"commonly":[2],"used":[3],"in":[4,56,97,117],"network":[5],"anomaly":[6],"detection.":[7],"However,":[8],"its":[9],"irreversibility":[10],"seriously":[11],"obstacle":[12],"for":[13],"identification":[14],"of":[15,17,39,60,81,93],"origin":[16],"traffic":[18],"anomaly,":[19],"such":[20],"as":[21],"attack":[22,99],"flows.":[23],"In":[24],"this":[25],"paper,":[26],"we":[27,104],"design":[28],"a":[29,79],"novel":[30],"sketch":[31],"structure,":[32],"called":[33],"Bitwise":[34],"Sketch,":[35,53],"with":[36,84,108],"the":[37,91,94],"ability":[38],"fast":[40],"and":[41,112,120],"lightweight":[42],"reverse":[43],"deduction.":[44],"Bitwisebased":[45],"hash":[46,63],"function,":[47],"which":[48],"distributes":[49],"keys":[50,76],"(IPs)":[51],"adopted":[55],"bitwise":[57],"sketch,":[58],"instead":[59],"traditional":[61],"universal":[62],"function.":[64],"We":[65],"propose":[66],"an":[67],"IP":[68],"reconstruction":[69],"algorithm":[70],"that":[71],"can":[72],"reversely":[73],"infer":[74],"anomalous":[75,82],"(IP)":[77],"from":[78],"set":[80],"buckets,":[83],"very":[85],"low":[86],"overhead.":[87],"Simulation":[88],"result":[89],"shows":[90],"effectiveness":[92],"algorithm\u00bfs":[95],"results":[96],"filtering":[98],"traffic.":[100],"Through":[101],"theoretical":[102],"analysis,":[103],"compare":[105],"our":[106,113],"approach":[107,114],"three":[109],"resultant":[110],"approaches,":[111],"outperforms":[115],"both":[116],"memory":[118],"requirement":[119],"computational":[121],"cost.":[122]},"counts_by_year":[{"year":2022,"cited_by_count":4},{"year":2018,"cited_by_count":1}],"updated_date":"2026-04-28T14:05:53.105641","created_date":"2025-10-10T00:00:00"}
