{"id":"https://openalex.org/W2899354255","doi":"https://doi.org/10.1109/pst.2018.8514165","title":"Peer Based Tracking using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection","display_name":"Peer Based Tracking using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection","publication_year":2018,"publication_date":"2018-08-01","ids":{"openalex":"https://openalex.org/W2899354255","doi":"https://doi.org/10.1109/pst.2018.8514165","mag":"2899354255"},"language":"en","primary_location":{"id":"doi:10.1109/pst.2018.8514165","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst.2018.8514165","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 16th Annual Conference on Privacy, Security and Trust (PST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://pureadmin.qub.ac.uk/ws/files/155632334/PST2018.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024014781","display_name":"Matthew Hagan","orcid":"https://orcid.org/0000-0001-5395-843X"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Matthew Hagan","raw_affiliation_strings":["Centre for Secure Information Systems (CSIT), Queens University Belfast, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Systems (CSIT), Queens University Belfast, United Kingdom","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007577685","display_name":"BooJoong Kang","orcid":"https://orcid.org/0000-0001-5984-9867"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"BooJoong Kang","raw_affiliation_strings":["Centre for Secure Information Systems (CSIT), Queens University Belfast, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Systems (CSIT), Queens University Belfast, United Kingdom","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110340370","display_name":"Kieran McLaughlin","orcid":null},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Kieran McLaughlin","raw_affiliation_strings":["Centre for Secure Information Systems (CSIT), Queens University Belfast, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Systems (CSIT), Queens University Belfast, United Kingdom","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103020013","display_name":"Sakir Sezer","orcid":"https://orcid.org/0000-0003-2857-616X"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Sakir Sezer","raw_affiliation_strings":["Centre for Secure Information Systems (CSIT), Queens University Belfast, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Systems (CSIT), Queens University Belfast, United Kingdom","institution_ids":["https://openalex.org/I126231945"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5024014781"],"corresponding_institution_ids":["https://openalex.org/I126231945"],"apc_list":null,"apc_paid":null,"fwci":0.78,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.76615793,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8166224956512451},{"id":"https://openalex.org/keywords/tuple","display_name":"Tuple","score":0.7004579305648804},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6654719114303589},{"id":"https://openalex.org/keywords/search-engine-indexing","display_name":"Search engine indexing","score":0.6474062204360962},{"id":"https://openalex.org/keywords/tracking","display_name":"Tracking (education)","score":0.4873286187648773},{"id":"https://openalex.org/keywords/traffic-analysis","display_name":"Traffic analysis","score":0.4823986291885376},{"id":"https://openalex.org/keywords/peer-to-peer","display_name":"Peer-to-peer","score":0.46562498807907104},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.41500788927078247},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.37755367159843445},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.27327483892440796},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24366721510887146}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8166224956512451},{"id":"https://openalex.org/C118930307","wikidata":"https://www.wikidata.org/wiki/Q600590","display_name":"Tuple","level":2,"score":0.7004579305648804},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6654719114303589},{"id":"https://openalex.org/C75165309","wikidata":"https://www.wikidata.org/wiki/Q2258979","display_name":"Search engine indexing","level":2,"score":0.6474062204360962},{"id":"https://openalex.org/C2775936607","wikidata":"https://www.wikidata.org/wiki/Q466845","display_name":"Tracking (education)","level":2,"score":0.4873286187648773},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.4823986291885376},{"id":"https://openalex.org/C534932454","wikidata":"https://www.wikidata.org/wiki/Q161410","display_name":"Peer-to-peer","level":2,"score":0.46562498807907104},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.41500788927078247},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37755367159843445},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27327483892440796},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24366721510887146},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C19417346","wikidata":"https://www.wikidata.org/wiki/Q7922","display_name":"Pedagogy","level":1,"score":0.0},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/pst.2018.8514165","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst.2018.8514165","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 16th Annual Conference on Privacy, Security and Trust (PST)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.qub.ac.uk/portal:openaire/23588367-be0e-4576-bbfe-0a2c2acd2cec","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/23588367-be0e-4576-bbfe-0a2c2acd2cec","pdf_url":"https://pureadmin.qub.ac.uk/ws/files/155632334/PST2018.pdf","source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Hagan, M, Kang, B, McLaughlin, K & Sezer, S 2018, Peer Based Tracking using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection. in 16th Annual Conference on Privacy, Security and Trust : August 28-30, 2018, Belfast, Northern Ireland, United Kingdom. Institute of Electrical and Electronics Engineers Inc., Privacy, Security and Trust 2018, Belfast, United Kingdom, 28/08/2018. https://doi.org/10.1109/PST.2018.8514165","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":{"id":"pmh:oai:pure.qub.ac.uk/portal:openaire/23588367-be0e-4576-bbfe-0a2c2acd2cec","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/23588367-be0e-4576-bbfe-0a2c2acd2cec","pdf_url":"https://pureadmin.qub.ac.uk/ws/files/155632334/PST2018.pdf","source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Hagan, M, Kang, B, McLaughlin, K & Sezer, S 2018, Peer Based Tracking using Multi-Tuple Indexing for Network Traffic Analysis and Malware Detection. in 16th Annual Conference on Privacy, Security and Trust : August 28-30, 2018, Belfast, Northern Ireland, United Kingdom. Institute of Electrical and Electronics Engineers Inc., Privacy, Security and Trust 2018, Belfast, United Kingdom, 28/08/2018. https://doi.org/10.1109/PST.2018.8514165","raw_type":"info:eu-repo/semantics/conferenceObject"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2241406505","display_name":null,"funder_award_id":"EP/R007187/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G5445011987","display_name":null,"funder_award_id":"EP/K004379/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G6577499357","display_name":null,"funder_award_id":"EP/N508664/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2899354255.pdf","grobid_xml":"https://content.openalex.org/works/W2899354255.grobid-xml"},"referenced_works_count":15,"referenced_works":["https://openalex.org/W191098608","https://openalex.org/W1583098994","https://openalex.org/W1977141583","https://openalex.org/W2007152733","https://openalex.org/W2059001009","https://openalex.org/W2061455058","https://openalex.org/W2108217512","https://openalex.org/W2127563425","https://openalex.org/W2586277768","https://openalex.org/W2755326359","https://openalex.org/W3101263800","https://openalex.org/W4248708867","https://openalex.org/W6607784307","https://openalex.org/W6634779276","https://openalex.org/W6678695848"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W4245395944","https://openalex.org/W2753240997","https://openalex.org/W2143551613","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2138823233","https://openalex.org/W1979740464","https://openalex.org/W2359215675","https://openalex.org/W4242181317"],"abstract_inverted_index":{"Traditional":[0],"firewalls,":[1],"Intrusion":[2],"Detection":[3],"Systems(IDS)":[4],"and":[5,21,25,30,45,69,78,80,114,128,159,188,267,272,289],"network":[6,33,87,134,197,296],"analytics":[7,273],"tools":[8],"extensively":[9],"use":[10,154],"the":[11,99,102,124,133,153,211,226,257],"`flow'":[12],"connection":[13],"concept,":[14],"consisting":[15],"of":[16,19,32,52,101,126,155,185,207,213,228,274],"five":[17],"`tuples'":[18],"source":[20],"destination":[22],"IP,":[23],"ports":[24],"protocol":[26],"type,":[27],"for":[28,285],"classification":[29],"management":[31],"activities.":[34],"By":[35],"analysing":[36],"flows,":[37],"information":[38,294],"can":[39],"be":[40,139],"obtained":[41],"from":[42,73,295],"TCP/IP":[43],"fields":[44],"packet":[46],"content":[47],"to":[48,65,110,120,131,164,174,195,224,244,281,291],"give":[49],"an":[50,216],"understanding":[51],"what":[53,196],"is":[54,108,118,259],"being":[55],"transferred":[56],"within":[57],"a":[58,97,143,191,204,229],"single":[59,144,160],"connection.":[60,145],"As":[61,96],"networks":[62],"have":[63,85,92,199],"evolved":[64],"incorporate":[66],"more":[67],"connections":[68,187,238],"greater":[70],"bandwidth,":[71],"particularly":[72],"\u201calways":[74],"on\u201d":[75],"IoT":[76],"devices":[77],"video":[79],"data":[81,129],"streaming,":[82],"so":[83],"too":[84],"malicious":[86,115],"threats,":[88],"whose":[89],"communication":[90],"methods":[91,290],"increased":[93],"in":[94,106,253,265],"sophistication.":[95],"result,":[98],"concept":[100],"5":[103,167,249],"tuple":[104,158,161,168,250],"flow":[105,162,251],"isolation":[107],"unable":[109],"detect":[111,225],"such":[112,122],"threats":[113],"behaviours.":[116],"This":[117,179,278],"due":[119],"factors":[121],"as":[123,194,256],"length":[125],"time":[127],"required":[130],"understand":[132],"traffic":[135],"behaviour,":[136],"which":[137,233],"cannot":[138],"accomplished":[140],"by":[141,235],"observing":[142,248],"To":[146,209],"alleviate":[147],"this":[148,150,214,262],"issue,":[149],"paper":[151,279],"proposes":[152],"additional,":[156],"two":[157],"types":[163,252],"associate":[165],"multiple":[166,237,240],"communications,":[169],"with":[170,239],"generated":[171],"metadata":[172],"used":[173],"profile":[175],"individual":[176],"connnection":[177],"behaviour.":[178],"proposed":[180],"approach":[181],"enables":[182],"advanced":[183],"linking":[184],"different":[186],"behaviours,":[189],"developing":[190],"clearer":[192],"picture":[193],"activities":[198],"been":[200,222],"taking":[201],"place":[202],"over":[203],"prolonged":[205],"period":[206],"time.":[208],"demonstrate":[210,282],"capability":[212],"approach,":[215],"expert":[217],"system":[218],"rule":[219,260],"set":[220],"has":[221],"developed":[223],"presence":[227],"multi-peered":[230],"ZeuS":[231],"botnet,":[232],"communicates":[234],"making":[236],"hosts,":[241],"thus":[242],"undetectable":[243],"standard":[245],"IDS":[246],"systems":[247],"isolation.":[254],"Finally,":[255],"solution":[258],"based,":[261],"implementation":[263],"operates":[264],"realtime":[266],"does":[268],"not":[269],"require":[270],"post-processing":[271],"other":[275],"research":[276],"solutions.":[277],"aims":[280],"possible":[283],"applications":[284],"next":[286],"generation":[287],"firewalls":[288],"acquire":[292],"additional":[293],"traffic.":[297]},"counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
