{"id":"https://openalex.org/W2288883909","doi":"https://doi.org/10.1109/pccc.2015.7410282","title":"SkipMon: A locality-aware Collaborative Intrusion Detection System","display_name":"SkipMon: A locality-aware Collaborative Intrusion Detection System","publication_year":2015,"publication_date":"2015-12-01","ids":{"openalex":"https://openalex.org/W2288883909","doi":"https://doi.org/10.1109/pccc.2015.7410282","mag":"2288883909"},"language":"en","primary_location":{"id":"doi:10.1109/pccc.2015.7410282","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pccc.2015.7410282","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083149653","display_name":"Emmanouil Vasilomanolakis","orcid":"https://orcid.org/0000-0001-5068-9158"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Emmanouil Vasilomanolakis","raw_affiliation_strings":["CASED/Telecooperation Lab, Technische Universit\u00e4t Darmstadt"],"affiliations":[{"raw_affiliation_string":"CASED/Telecooperation Lab, Technische Universit\u00e4t Darmstadt","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059975680","display_name":"Matthias Krugl","orcid":null},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Matthias Krugl","raw_affiliation_strings":["CASED/Telecooperation Lab, Technische Universit\u00e4t Darmstadt"],"affiliations":[{"raw_affiliation_string":"CASED/Telecooperation Lab, Technische Universit\u00e4t Darmstadt","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033953374","display_name":"Carlos Garc\u00eda Cordero","orcid":"https://orcid.org/0000-0002-7244-3519"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Carlos Garcia Cordero","raw_affiliation_strings":["CASED/Telecooperation Lab, Technische Universit\u00e4t Darmstadt"],"affiliations":[{"raw_affiliation_string":"CASED/Telecooperation Lab, Technische Universit\u00e4t Darmstadt","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021712397","display_name":"Max M\u00fchlh\u00e4user","orcid":"https://orcid.org/0000-0003-4713-5327"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Max Muhlhauser","raw_affiliation_strings":["CASED/Telecooperation Lab, Technische Universit\u00e4t Darmstadt"],"affiliations":[{"raw_affiliation_string":"CASED/Telecooperation Lab, Technische Universit\u00e4t Darmstadt","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033270363","display_name":"Mathias Fischer","orcid":"https://orcid.org/0000-0002-6254-8288"},"institutions":[{"id":"https://openalex.org/I1297971548","display_name":"International Computer Science Institute","ror":"https://ror.org/01ewh7m12","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I1297971548"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mathias Fischer","raw_affiliation_strings":["Networking and Security Group, International Computer Science Institute, Berkeley, USA"],"affiliations":[{"raw_affiliation_string":"Networking and Security Group, International Computer Science Institute, Berkeley, USA","institution_ids":["https://openalex.org/I1297971548"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5083149653"],"corresponding_institution_ids":["https://openalex.org/I31512782"],"apc_list":null,"apc_paid":null,"fwci":2.8028,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.91777306,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"7","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7748976349830627},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7641858458518982},{"id":"https://openalex.org/keywords/sophistication","display_name":"Sophistication","score":0.7313127517700195},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7208433151245117},{"id":"https://openalex.org/keywords/locality","display_name":"Locality","score":0.6758676171302795},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42695683240890503},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.4207427501678467},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.40835025906562805},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.1259644627571106}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7748976349830627},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7641858458518982},{"id":"https://openalex.org/C168725872","wikidata":"https://www.wikidata.org/wiki/Q991663","display_name":"Sophistication","level":2,"score":0.7313127517700195},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7208433151245117},{"id":"https://openalex.org/C2779808786","wikidata":"https://www.wikidata.org/wiki/Q6664603","display_name":"Locality","level":2,"score":0.6758676171302795},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42695683240890503},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.4207427501678467},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.40835025906562805},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.1259644627571106},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/pccc.2015.7410282","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pccc.2015.7410282","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC)","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.718.491","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.718.491","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://www.tk.informatik.tu-darmstadt.de/fileadmin/user_upload/Group_TK/filesDownload/Published_Papers/vasilomanolakis15skipmon.pdf","raw_type":"text"},{"id":"pmh:oai:tubiblio.ulb.tu-darmstadt.de:104146","is_oa":false,"landing_page_url":"http://tubiblio.ulb.tu-darmstadt.de/104146/","pdf_url":null,"source":{"id":"https://openalex.org/S4377196390","display_name":"TUbilio (Technical University of Darmstadt)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I31512782","host_organization_name":"Technische Universit\u00e4t Darmstadt","host_organization_lineage":["https://openalex.org/I31512782"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Konferenzver\u00f6ffentlichung"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5099999904632568,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W35835773","https://openalex.org/W174112453","https://openalex.org/W1492552531","https://openalex.org/W1516506771","https://openalex.org/W1541939527","https://openalex.org/W1595409123","https://openalex.org/W1674877186","https://openalex.org/W1772700132","https://openalex.org/W1964484213","https://openalex.org/W1965475550","https://openalex.org/W1997222770","https://openalex.org/W2013627100","https://openalex.org/W2067883080","https://openalex.org/W2070991879","https://openalex.org/W2074633331","https://openalex.org/W2112603289","https://openalex.org/W2119245106","https://openalex.org/W2121531691","https://openalex.org/W2124365372","https://openalex.org/W2137430899","https://openalex.org/W2151839674","https://openalex.org/W2158049821","https://openalex.org/W2160182303","https://openalex.org/W2163277533","https://openalex.org/W2256845964","https://openalex.org/W2275675895","https://openalex.org/W2288766236","https://openalex.org/W2293292771","https://openalex.org/W2899702797","https://openalex.org/W6629384442","https://openalex.org/W6632301646","https://openalex.org/W6637096788","https://openalex.org/W6649817035","https://openalex.org/W6683712104","https://openalex.org/W6694748896"],"related_works":["https://openalex.org/W4241263575","https://openalex.org/W2571250724","https://openalex.org/W1982914007","https://openalex.org/W2159583675","https://openalex.org/W1852113167","https://openalex.org/W1493858311","https://openalex.org/W1824242903","https://openalex.org/W2155470929","https://openalex.org/W2394465510","https://openalex.org/W2111125783"],"abstract_inverted_index":{"Due":[0],"to":[1,38,133],"the":[2,57,78,141],"increasing":[3],"quantity":[4],"and":[5,69,82,126],"sophistication":[6],"of":[7,46,56,80,88,116,140],"cyber-attacks,":[8],"Intrusion":[9],"Detection":[10],"Systems":[11],"(IDSs)":[12],"are":[13],"nowadays":[14],"considered":[15],"mandatory":[16],"security":[17],"mechanisms":[18],"for":[19,51,98],"protecting":[20],"critical":[21],"networks.":[22,41],"Research":[23],"on":[24],"cyber-security":[25],"is":[26,65,124],"moving":[27],"from":[28],"such":[29],"isolated":[30],"IDSs":[31,34],"towards":[32],"Collaborative":[33],"(CIDSs)":[35],"in":[36,62],"order":[37],"protect":[39],"large-scale":[40],"In":[42],"CIDSs,":[43],"a":[44,53,66,96,128,134],"number":[45],"IDS":[47],"sensors":[48,100],"work":[49],"together":[50],"creating":[52],"holistic":[54],"picture":[55],"monitored":[58],"network.":[59],"Our":[60,74],"contribution":[61],"this":[63],"paper":[64],"novel":[67],"distributed":[68],"scalable":[70,125],"CIDS,":[71,112],"called":[72],"SkipMon.":[73],"system":[75,136],"supports,":[76],"both,":[77],"idea":[79],"locality":[81],"privacy":[83],"preserving":[84],"communication":[85],"by":[86],"means":[87],"exchanging":[89],"compact":[90],"alert":[91],"data.":[92,144],"Furthermore,":[93],"we":[94],"propose":[95],"mechanism":[97],"interconnecting":[99],"that":[101,110,120],"experience":[102,121],"similar":[103,122],"traffic":[104],"patterns.":[105],"The":[106],"experimental":[107],"results":[108],"suggest":[109],"our":[111,114],"with":[113,137],"technique":[115],"connecting":[117],"monitoring":[118],"nodes":[119],"traffic,":[123],"offers":[127],"good":[129],"accuracy":[130],"rate":[131],"compared":[132],"centralized":[135],"full":[138],"knowledge":[139],"participating":[142],"sensors'":[143]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":4}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
