{"id":"https://openalex.org/W4391306140","doi":"https://doi.org/10.1109/smc53992.2023.10393988","title":"Deep and Spatio-Temporal Detection for Abnormal Traffic in Cloud Data Centers","display_name":"Deep and Spatio-Temporal Detection for Abnormal Traffic in Cloud Data Centers","publication_year":2023,"publication_date":"2023-10-01","ids":{"openalex":"https://openalex.org/W4391306140","doi":"https://doi.org/10.1109/smc53992.2023.10393988"},"language":"en","primary_location":{"id":"doi:10.1109/smc53992.2023.10393988","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/smc53992.2023.10393988","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101881295","display_name":"Haitao Yuan","orcid":"https://orcid.org/0000-0001-8475-419X"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haitao Yuan","raw_affiliation_strings":["School of Automation Science and Electrical Engineering, Beihang University,Beijing,China","School of Automation Science and Electrical Engineering, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Automation Science and Electrical Engineering, Beihang University,Beijing,China","institution_ids":["https://openalex.org/I82880672"]},{"raw_affiliation_string":"School of Automation Science and Electrical Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106406636","display_name":"Shen Wang","orcid":"https://orcid.org/0009-0001-9214-193X"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shen Wang","raw_affiliation_strings":["School of Automation Science and Electrical Engineering, Beihang University,Beijing,China","School of Automation Science and Electrical Engineering, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Automation Science and Electrical Engineering, Beihang University,Beijing,China","institution_ids":["https://openalex.org/I82880672"]},{"raw_affiliation_string":"School of Automation Science and Electrical Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057935426","display_name":"Jing Bi","orcid":"https://orcid.org/0000-0002-4610-0141"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Bi","raw_affiliation_strings":["Beijing University of Technology,Faculty of Information Technology,Beijing,China","Faculty of Information Technology, Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Technology,Faculty of Information Technology,Beijing,China","institution_ids":["https://openalex.org/I37796252"]},{"raw_affiliation_string":"Faculty of Information Technology, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100360704","display_name":"Jia Zhang","orcid":"https://orcid.org/0000-0003-2148-0923"},"institutions":[{"id":"https://openalex.org/I178169726","display_name":"Southern Methodist University","ror":"https://ror.org/042tdr378","country_code":"US","type":"education","lineage":["https://openalex.org/I178169726"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jia Zhang","raw_affiliation_strings":["School of Engineering at Southern, Methodist University,Dept. of Computer Science in Lyle,Dallas,TX,USA","Dept. of Computer Science in Lyle, School of Engineering at Southern, Methodist University, Dallas, TX, USA"],"affiliations":[{"raw_affiliation_string":"School of Engineering at Southern, Methodist University,Dept. of Computer Science in Lyle,Dallas,TX,USA","institution_ids":["https://openalex.org/I178169726"]},{"raw_affiliation_string":"Dept. of Computer Science in Lyle, School of Engineering at Southern, Methodist University, Dallas, TX, USA","institution_ids":["https://openalex.org/I178169726"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101881295"],"corresponding_institution_ids":["https://openalex.org/I82880672"],"apc_list":null,"apc_paid":null,"fwci":0.4012,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.64359426,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"4985","last_page":"4990"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11344","display_name":"Traffic Prediction and Management Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2215","display_name":"Building and Construction"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8174191117286682},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7520853281021118},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5819234251976013},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.57565838098526},{"id":"https://openalex.org/keywords/traffic-generation-model","display_name":"Traffic generation model","score":0.5590679049491882},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.5187395215034485},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.49024873971939087},{"id":"https://openalex.org/keywords/network-traffic-simulation","display_name":"Network traffic simulation","score":0.4364805817604065},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.37788140773773193},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2941662669181824},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.24861884117126465},{"id":"https://openalex.org/keywords/quality-of-service","display_name":"Quality of service","score":0.23175936937332153},{"id":"https://openalex.org/keywords/network-traffic-control","display_name":"Network traffic control","score":0.221937894821167}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8174191117286682},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7520853281021118},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5819234251976013},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.57565838098526},{"id":"https://openalex.org/C176715033","wikidata":"https://www.wikidata.org/wiki/Q2080768","display_name":"Traffic generation model","level":2,"score":0.5590679049491882},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.5187395215034485},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.49024873971939087},{"id":"https://openalex.org/C94168897","wikidata":"https://www.wikidata.org/wiki/Q574324","display_name":"Network traffic simulation","level":4,"score":0.4364805817604065},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.37788140773773193},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2941662669181824},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.24861884117126465},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.23175936937332153},{"id":"https://openalex.org/C201100257","wikidata":"https://www.wikidata.org/wiki/Q393287","display_name":"Network traffic control","level":3,"score":0.221937894821167},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smc53992.2023.10393988","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/smc53992.2023.10393988","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1677182931","https://openalex.org/W2796013264","https://openalex.org/W2887342164","https://openalex.org/W2971307413","https://openalex.org/W2980060569","https://openalex.org/W3005641848","https://openalex.org/W3016179334","https://openalex.org/W3024379980","https://openalex.org/W3118432735","https://openalex.org/W3138161023","https://openalex.org/W3165322078","https://openalex.org/W3205214822","https://openalex.org/W3205355686","https://openalex.org/W3205717647","https://openalex.org/W3205832376","https://openalex.org/W3206551498","https://openalex.org/W3213645633","https://openalex.org/W3217244108","https://openalex.org/W4225634858","https://openalex.org/W4285102389","https://openalex.org/W4287850204","https://openalex.org/W4328008005"],"related_works":["https://openalex.org/W2374980776","https://openalex.org/W4301398392","https://openalex.org/W2393595964","https://openalex.org/W4379534844","https://openalex.org/W2924962435","https://openalex.org/W2997818875","https://openalex.org/W266939152","https://openalex.org/W2745966507","https://openalex.org/W2768498136","https://openalex.org/W3174245262"],"abstract_inverted_index":{"Current":[0],"interactions":[1],"of":[2,14,23,51,60,144,151],"network":[3,15,24,36,45,52,61,108,136],"traffic":[4,25,53,63,112,137,146,153],"through":[5],"cloud":[6,115],"data":[7,116],"centers":[8],"have":[9,73],"become":[10,64],"an":[11,125],"important":[12],"process":[13],"services.":[16],"Precise":[17],"and":[18,21,34,43,49,93,128,148,154],"real-time":[19],"detection":[20,113,163],"prediction":[22],"can":[26],"assist":[27],"system":[28],"operators":[29],"in":[30,79,114],"effectively":[31],"allocating":[32],"resources,":[33],"assessing":[35],"performance":[37],"based":[38],"on":[39],"actual":[40],"service":[41],"requirements,":[42],"analyzing":[44],"health.":[46],"However,":[47],"sources":[48],"distribution":[50],"are":[54],"different,":[55],"which":[56,118],"makes":[57],"accurate":[58],"warnings":[59],"attack":[62],"a":[65,103,120,129,168],"difficult":[66],"problem.":[67],"In":[68],"recent":[69],"years,":[70],"neural":[71],"networks":[72,88],"been":[74],"proven":[75],"to":[76,133,167],"be":[77],"effective":[78],"predicting":[80],"time":[81],"series":[82],"data,":[83],"particularly":[84],"long":[85],"short-term":[86],"memory":[87],"for":[89,96,110],"capturing":[90,97],"temporal":[91,122],"features":[92],"convolutional":[94,123],"methods":[95,164],"spatial":[98],"features.":[99,140],"This":[100],"work":[101],"proposes":[102],"Deep":[104],"Hybrid":[105],"Spatio-Temporal":[106],"(DHST)":[107],"method":[109,132],"abnormal":[111,145,155],"centers,":[117],"combines":[119],"cooperative":[121],"network,":[124],"attention":[126],"mechanism":[127],"random":[130],"inactivation":[131],"capture":[134],"the":[135],"data's":[138],"spatio-temporal":[139],"It":[141,157],"improves":[142],"accuracy":[143,160],"detection,":[147],"realizes":[149],"classification":[150],"normal":[152],"one.":[156],"achieves":[158],"higher":[159],"than":[161],"typical":[162],"when":[165],"applied":[166],"real-life":[169],"dataset":[170],"collected":[171],"from":[172],"Yahoo":[173],"Webscope":[174],"S5.":[175]},"counts_by_year":[{"year":2024,"cited_by_count":2}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
