{"id":"https://openalex.org/W4387623905","doi":"https://doi.org/10.1109/mnet.2023.3321372","title":"FlowSpotter: Intelligent IoT Threat Detection via Imaging Network Flows","display_name":"FlowSpotter: Intelligent IoT Threat Detection via Imaging Network Flows","publication_year":2023,"publication_date":"2023-10-13","ids":{"openalex":"https://openalex.org/W4387623905","doi":"https://doi.org/10.1109/mnet.2023.3321372"},"language":"en","primary_location":{"id":"doi:10.1109/mnet.2023.3321372","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mnet.2023.3321372","pdf_url":null,"source":{"id":"https://openalex.org/S186584794","display_name":"IEEE Network","issn_l":"0890-8044","issn":["0890-8044","1558-156X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Network","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022611612","display_name":"Shuaishuai Tan","orcid":"https://orcid.org/0000-0002-8882-405X"},"institutions":[{"id":"https://openalex.org/I139024713","display_name":"Guangdong University of Technology","ror":"https://ror.org/04azbjn80","country_code":"CN","type":"education","lineage":["https://openalex.org/I139024713"]},{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shuaishuai Tan","raw_affiliation_strings":["School of Computer Science and Technology, Guangdong University of Technology, Guangzhou, China","Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies, Shenzhen, P.R. China","Harbin Institute of Technology, Shenzhen, P.R. China","School of Computer Science and Technology, Guangdong University of Technology, Guangzhou, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Guangdong University of Technology, Guangzhou, China","institution_ids":["https://openalex.org/I139024713"]},{"raw_affiliation_string":"Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies, Shenzhen, P.R. China","institution_ids":[]},{"raw_affiliation_string":"Harbin Institute of Technology, Shenzhen, P.R. China","institution_ids":["https://openalex.org/I204983213"]},{"raw_affiliation_string":"School of Computer Science and Technology, Guangdong University of Technology, Guangzhou, P.R. China","institution_ids":["https://openalex.org/I139024713"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082144617","display_name":"Daojing He","orcid":"https://orcid.org/0000-0002-3820-8128"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Daojing He","raw_affiliation_strings":["School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, China","School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, China","institution_ids":["https://openalex.org/I204983213"]},{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, P.R. China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091879207","display_name":"Sammy Chan","orcid":"https://orcid.org/0000-0002-8524-229X"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Sammy Chan","raw_affiliation_strings":["Department of Electrical Engineering, City University of Hong Kong, HKSAR, China","Department of Electrical Engineering, City University of Hong Kong, HKSAR, P.R. China"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, City University of Hong Kong, HKSAR, China","institution_ids":["https://openalex.org/I168719708"]},{"raw_affiliation_string":"Department of Electrical Engineering, City University of Hong Kong, HKSAR, P.R. China","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057916222","display_name":"Mohsen Guizani","orcid":"https://orcid.org/0000-0002-8972-8094"},"institutions":[{"id":"https://openalex.org/I4210113480","display_name":"Mohamed bin Zayed University of Artificial Intelligence","ror":"https://ror.org/0258gkt32","country_code":"AE","type":"education","lineage":["https://openalex.org/I4210113480"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Mohsen Guizani","raw_affiliation_strings":["Machine Learning Department, Mohamed bin Zayed University of Artificial Intelligence (MBZUAI), Abu Dhabi, UAE"],"affiliations":[{"raw_affiliation_string":"Machine Learning Department, Mohamed bin Zayed University of Artificial Intelligence (MBZUAI), Abu Dhabi, UAE","institution_ids":["https://openalex.org/I4210113480"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5022611612"],"corresponding_institution_ids":["https://openalex.org/I139024713","https://openalex.org/I204983213"],"apc_list":null,"apc_paid":null,"fwci":0.5991,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.69454666,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":"38","issue":"4","first_page":"268","last_page":"274"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8543386459350586},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.6271440982818604},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5473187565803528},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.5406001210212708},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.508662760257721},{"id":"https://openalex.org/keywords/default-gateway","display_name":"Default gateway","score":0.4900999963283539},{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.45942190289497375},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4554859697818756},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.45423761010169983},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4434521496295929},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4371452331542969},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.41424497961997986},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.39449000358581543},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3634926676750183},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3526005148887634},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.34905239939689636},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3473801016807556},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.15817472338676453},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13262179493904114}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8543386459350586},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.6271440982818604},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5473187565803528},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.5406001210212708},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.508662760257721},{"id":"https://openalex.org/C187713609","wikidata":"https://www.wikidata.org/wiki/Q2465461","display_name":"Default gateway","level":2,"score":0.4900999963283539},{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.45942190289497375},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4554859697818756},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.45423761010169983},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4434521496295929},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4371452331542969},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.41424497961997986},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.39449000358581543},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3634926676750183},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3526005148887634},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.34905239939689636},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3473801016807556},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.15817472338676453},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13262179493904114},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mnet.2023.3321372","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mnet.2023.3321372","pdf_url":null,"source":{"id":"https://openalex.org/S186584794","display_name":"IEEE Network","issn_l":"0890-8044","issn":["0890-8044","1558-156X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Network","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4399999976158142,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2883780447","https://openalex.org/W2953225812","https://openalex.org/W3006503311","https://openalex.org/W3012425390","https://openalex.org/W3033185093","https://openalex.org/W3037997326","https://openalex.org/W3097110752","https://openalex.org/W3111088413","https://openalex.org/W3196650078","https://openalex.org/W3206674745","https://openalex.org/W3209375340","https://openalex.org/W4210572266","https://openalex.org/W4220863835","https://openalex.org/W4360838285"],"related_works":["https://openalex.org/W4322761281","https://openalex.org/W4238233472","https://openalex.org/W4313463218","https://openalex.org/W4312996489","https://openalex.org/W3111395152","https://openalex.org/W4313526662","https://openalex.org/W3106131444","https://openalex.org/W3216099748","https://openalex.org/W4205963435","https://openalex.org/W4319161913"],"abstract_inverted_index":{"With":[0],"the":[1,9,62,100,125,136,161],"prevalence":[2],"of":[3,5,12,19,119,121],"Internet":[4],"Things":[6],"(IoT)":[7],"technologies,":[8],"huge":[10],"growth":[11],"IoT":[13,22,63,113,122],"devices":[14,60],"has":[15,40],"also":[16,159],"brought":[17],"attention":[18],"cyber":[20],"attackers.":[21],"botnets":[23],"are":[24,54],"rapidly":[25],"spreading":[26],"and":[27,35,51,89,153,171],"evolving":[28],"worldwide,":[29],"causing":[30],"serious":[31],"risks":[32],"to":[33],"users":[34],"data.":[36],"Machine":[37],"learning":[38,52],"(ML)":[39],"shown":[41],"its":[42],"effectiveness":[43],"on":[44,99,131],"threat":[45,72],"detection.":[46,177],"However,":[47],"existing":[48],"feature":[49,83],"encoding":[50],"methods":[53],"unsuitable":[55],"for":[56,134,175],"resource":[57],"constrained":[58],"edge":[59],"like":[61],"gateway.":[64],"In":[65],"this":[66],"paper,":[67],"we":[68,110],"propose":[69],"a":[70],"lightweight":[71],"detection":[73],"scheme":[74],"called":[75],"FlowSpotter.":[76],"The":[77],"flow":[78],"imaging":[79],"mechanism":[80],"requires":[81],"less":[82,167],"extraction":[84],"but":[85,158],"preserves":[86],"more":[87],"spatial":[88],"temporal":[90],"information.":[91],"A":[92],"lite":[93],"convolution":[94],"neural":[95],"network":[96],"architecture":[97],"based":[98],"state-of-the-art":[101],"efficient":[102],"building":[103],"blocks":[104],"is":[105,129],"devised.":[106],"For":[107],"performance":[108],"evaluation,":[109],"develop":[111],"an":[112],"honeypot":[114],"system":[115],"that":[116,141],"captures":[117],"hundreds":[118],"thousands":[120],"intrusions":[123],"in":[124],"wild.":[126],"Besides,":[127],"FlowSpotter":[128,142],"implemented":[130],"Raspberry":[132],"Pi":[133],"measuring":[135],"efficiency.":[137],"Experimental":[138],"results":[139],"show":[140],"not":[143],"only":[144],"outperforms":[145],"8":[146],"baseline":[147],"models":[148],"by":[149,165],"achieving":[150],"99.8%":[151],"accuracy":[152],"0.07%":[154],"false":[155],"positive":[156],"rate,":[157],"consumes":[160],"least":[162],"computing":[163],"resources":[164],"taking":[166],"than":[168],"11":[169],"ms":[170],"61":[172],"MiB":[173],"memory":[174],"each":[176]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
