{"id":"https://openalex.org/W3049214452","doi":"https://doi.org/10.1109/netsoft48620.2020.9165321","title":"Cloud-Native Threat Detection and Containment for Smart Manufacturing","display_name":"Cloud-Native Threat Detection and Containment for Smart Manufacturing","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3049214452","doi":"https://doi.org/10.1109/netsoft48620.2020.9165321","mag":"3049214452"},"language":"en","primary_location":{"id":"doi:10.1109/netsoft48620.2020.9165321","is_oa":false,"landing_page_url":"https://doi.org/10.1109/netsoft48620.2020.9165321","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5107230159","display_name":"Marcel M\u00fcller","orcid":"https://orcid.org/0000-0002-8974-3120"},"institutions":[{"id":"https://openalex.org/I4210128861","display_name":"Weidm\u00fcller (Germany)","ror":"https://ror.org/02stt7r85","country_code":"DE","type":"company","lineage":["https://openalex.org/I4210128861"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Marcel Muller","raw_affiliation_strings":["Weidm\u00fcller Group"],"affiliations":[{"raw_affiliation_string":"Weidm\u00fcller Group","institution_ids":["https://openalex.org/I4210128861"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003099308","display_name":"Daniel Behnke","orcid":null},"institutions":[{"id":"https://openalex.org/I4210128861","display_name":"Weidm\u00fcller (Germany)","ror":"https://ror.org/02stt7r85","country_code":"DE","type":"company","lineage":["https://openalex.org/I4210128861"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Daniel Behnke","raw_affiliation_strings":["Weidm\u00fcller Group"],"affiliations":[{"raw_affiliation_string":"Weidm\u00fcller Group","institution_ids":["https://openalex.org/I4210128861"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051603429","display_name":"Patrick-Benjamin B\u00f6k","orcid":"https://orcid.org/0009-0009-1780-8501"},"institutions":[{"id":"https://openalex.org/I4210128861","display_name":"Weidm\u00fcller (Germany)","ror":"https://ror.org/02stt7r85","country_code":"DE","type":"company","lineage":["https://openalex.org/I4210128861"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Patrick-Benjamin Bok","raw_affiliation_strings":["Weidm\u00fcller Group"],"affiliations":[{"raw_affiliation_string":"Weidm\u00fcller Group","institution_ids":["https://openalex.org/I4210128861"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062189755","display_name":"Stefan Schneider","orcid":"https://orcid.org/0000-0001-8210-4011"},"institutions":[{"id":"https://openalex.org/I206945453","display_name":"Paderborn University","ror":"https://ror.org/058kzsd48","country_code":"DE","type":"education","lineage":["https://openalex.org/I206945453"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Stefan Schneider","raw_affiliation_strings":["Paderborn University"],"affiliations":[{"raw_affiliation_string":"Paderborn University","institution_ids":["https://openalex.org/I206945453"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082709473","display_name":"Manuel Peuster","orcid":"https://orcid.org/0000-0003-3164-7635"},"institutions":[{"id":"https://openalex.org/I206945453","display_name":"Paderborn University","ror":"https://ror.org/058kzsd48","country_code":"DE","type":"education","lineage":["https://openalex.org/I206945453"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Manuel Peuster","raw_affiliation_strings":["Paderborn University"],"affiliations":[{"raw_affiliation_string":"Paderborn University","institution_ids":["https://openalex.org/I206945453"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019777818","display_name":"Holger Karl","orcid":"https://orcid.org/0000-0002-8343-6322"},"institutions":[{"id":"https://openalex.org/I206945453","display_name":"Paderborn University","ror":"https://ror.org/058kzsd48","country_code":"DE","type":"education","lineage":["https://openalex.org/I206945453"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Holger Karl","raw_affiliation_strings":["Paderborn University"],"affiliations":[{"raw_affiliation_string":"Paderborn University","institution_ids":["https://openalex.org/I206945453"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5107230159"],"corresponding_institution_ids":["https://openalex.org/I4210128861"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.12155494,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"347","last_page":"349"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7261372208595276},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.63642418384552},{"id":"https://openalex.org/keywords/control-reconfiguration","display_name":"Control reconfiguration","score":0.6275629997253418},{"id":"https://openalex.org/keywords/factory","display_name":"Factory (object-oriented programming)","score":0.528444766998291},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5083524584770203},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4437802731990814},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34729063510894775},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.24955081939697266},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09780237078666687}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7261372208595276},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.63642418384552},{"id":"https://openalex.org/C119701452","wikidata":"https://www.wikidata.org/wiki/Q5165881","display_name":"Control reconfiguration","level":2,"score":0.6275629997253418},{"id":"https://openalex.org/C40149104","wikidata":"https://www.wikidata.org/wiki/Q5620977","display_name":"Factory (object-oriented programming)","level":2,"score":0.528444766998291},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5083524584770203},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4437802731990814},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34729063510894775},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.24955081939697266},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09780237078666687},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/netsoft48620.2020.9165321","is_oa":false,"landing_page_url":"https://doi.org/10.1109/netsoft48620.2020.9165321","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.6200000047683716}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1491125612","https://openalex.org/W2471647275","https://openalex.org/W2742912080","https://openalex.org/W2773821462","https://openalex.org/W2888643844","https://openalex.org/W2896502468","https://openalex.org/W2911938450","https://openalex.org/W2937056472","https://openalex.org/W2952585762","https://openalex.org/W2980320344","https://openalex.org/W2994683433","https://openalex.org/W2996440654","https://openalex.org/W2997469101"],"related_works":["https://openalex.org/W1981002473","https://openalex.org/W2357657342","https://openalex.org/W2153432761","https://openalex.org/W2152623100","https://openalex.org/W4214878056","https://openalex.org/W1580144672","https://openalex.org/W2142042635","https://openalex.org/W1988127757","https://openalex.org/W4248634784","https://openalex.org/W2103296973"],"abstract_inverted_index":{"Softwarization":[0],"facilitates":[1],"the":[2,9,41,47,71,76,122,125,139,154,162,170],"introduction":[3],"of":[4,44,79,121],"smart":[5,23],"manufacturing":[6],"applications":[7],"in":[8,90,113],"industry.":[10],"Manifold":[11],"devices":[12,45],"such":[13],"as":[14],"machine":[15],"computers,":[16],"Industrial":[17],"IoT":[18],"devices,":[19,81],"tablets,":[20],"smartphones":[21],"and":[22,35,46,52,151],"glasses":[24],"are":[25],"integrated":[26,112],"into":[27,131],"factory":[28,54],"networks":[29],"to":[30,143,152],"enable":[31],"shop":[32],"floor":[33],"digitalization":[34],"big":[36],"data":[37],"analysis.":[38],"To":[39],"handle":[40],"increasing":[42,77],"number":[43,78],"resulting":[48],"traffic,":[49],"a":[50,103,119],"flexible":[51],"scalable":[53],"network":[55,116,127,135,147,155,164],"is":[56,111,129,159,167],"necessary":[57],"which":[58],"can":[59],"be":[60,88],"realized":[61],"using":[62,102],"softwarization":[63],"technologies":[64],"like":[65],"Network":[66],"Function":[67],"Virtualization":[68],"(NFV).":[69],"However,":[70],"security":[72,85],"risks":[73],"increase":[74],"with":[75],"new":[80],"so":[82],"that":[83,110,166],"cyber":[84],"must":[86],"also":[87],"considered":[89],"NFV-based":[91],"networks.":[92],"Therefore,":[93],"extending":[94],"our":[95,114,145],"previous":[96],"work,":[97],"we":[98],"showcase":[99],"threat":[100,123],"detection":[101,107],"cloud-native":[104],"NFV-driven":[105],"intrusion":[106],"system":[108],"(IDS)":[109],"industrial-specific":[115],"services.":[117],"As":[118],"result":[120],"detection,":[124],"affected":[126],"service":[128,141],"put":[130],"quarantine":[132],"via":[133],"automatic":[134,163],"reconfiguration.":[136,156],"We":[137],"use":[138],"5GTANGO":[140],"platform":[142],"deploy":[144],"developed":[146],"services":[148],"on":[149,160],"Kubernetes":[150],"initiate":[153],"Our":[157],"focus":[158],"demonstrating":[161],"reconfiguration":[165],"triggered":[168],"by":[169],"IDS.":[171]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
