{"id":"https://openalex.org/W2920441817","doi":"https://doi.org/10.1109/tencon.2018.8650225","title":"VCDeepFL: Vector Convolutional Deep Feature Learning Approach for Identification of Known and Unknown Denial of Service Attacks","display_name":"VCDeepFL: Vector Convolutional Deep Feature Learning Approach for Identification of Known and Unknown Denial of Service Attacks","publication_year":2018,"publication_date":"2018-10-01","ids":{"openalex":"https://openalex.org/W2920441817","doi":"https://doi.org/10.1109/tencon.2018.8650225","mag":"2920441817"},"language":"en","primary_location":{"id":"doi:10.1109/tencon.2018.8650225","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tencon.2018.8650225","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"TENCON 2018 - 2018 IEEE Region 10 Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108676945","display_name":"Narayanavadivoo Gopinathan Bhuvaneswari Amma","orcid":null},"institutions":[{"id":"https://openalex.org/I122964287","display_name":"National Institute of Technology Tiruchirappalli","ror":"https://ror.org/047x65e68","country_code":"IN","type":"education","lineage":["https://openalex.org/I122964287"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Narayanavadivoo Gopinathan Bhuvaneswari Amma","raw_affiliation_strings":["Department of Computer Science and Engineering, National Institute of Technology, Tiruchirappalli, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, National Institute of Technology, Tiruchirappalli, India","institution_ids":["https://openalex.org/I122964287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100638043","display_name":"S. Selvakumar","orcid":"https://orcid.org/0000-0002-4900-4745"},"institutions":[{"id":"https://openalex.org/I122964287","display_name":"National Institute of Technology Tiruchirappalli","ror":"https://ror.org/047x65e68","country_code":"IN","type":"education","lineage":["https://openalex.org/I122964287"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Selvakumar Subramanian","raw_affiliation_strings":["Department of Computer Science and Engineering, National Institute of Technology, Tiruchirappalli, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, National Institute of Technology, Tiruchirappalli, India","institution_ids":["https://openalex.org/I122964287"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5108676945"],"corresponding_institution_ids":["https://openalex.org/I122964287"],"apc_list":null,"apc_paid":null,"fwci":0.9227,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.79035184,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"0640","last_page":"0645"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8407669067382812},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7686479091644287},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6908390522003174},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.68275386095047},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5507621765136719},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.5324277281761169},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.506037175655365},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.48134645819664},{"id":"https://openalex.org/keywords/feature-vector","display_name":"Feature vector","score":0.47150081396102905},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4379878342151642},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.43063342571258545},{"id":"https://openalex.org/keywords/feature-learning","display_name":"Feature learning","score":0.42631927132606506},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4151199758052826},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.38728925585746765},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3641170859336853}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8407669067382812},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7686479091644287},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6908390522003174},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.68275386095047},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5507621765136719},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.5324277281761169},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.506037175655365},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.48134645819664},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.47150081396102905},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4379878342151642},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.43063342571258545},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.42631927132606506},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4151199758052826},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.38728925585746765},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3641170859336853},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tencon.2018.8650225","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tencon.2018.8650225","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"TENCON 2018 - 2018 IEEE Region 10 Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7200000286102295}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W259338706","https://openalex.org/W1152223117","https://openalex.org/W1966809779","https://openalex.org/W2076063813","https://openalex.org/W2076758681","https://openalex.org/W2093859880","https://openalex.org/W2140190241","https://openalex.org/W2158698691","https://openalex.org/W2176950688","https://openalex.org/W2342408547","https://openalex.org/W2346324131","https://openalex.org/W2625013748","https://openalex.org/W2755038437","https://openalex.org/W2782090217","https://openalex.org/W2783227908","https://openalex.org/W2783741806","https://openalex.org/W2787944753","https://openalex.org/W2919115771","https://openalex.org/W6744927493","https://openalex.org/W6747751339"],"related_works":["https://openalex.org/W4386482731","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W2765763546","https://openalex.org/W4256682929","https://openalex.org/W4309346246","https://openalex.org/W2786094008","https://openalex.org/W3131501806","https://openalex.org/W2799683370","https://openalex.org/W2807745940"],"abstract_inverted_index":{"Nowadays":[0],"Denial":[1],"of":[2,8,16,42,58,93,102,129,141,152,169,190],"Service":[3],"(DoS)":[4],"attack":[5,27,46,143,172],"is":[6,30,99,133,159,179,199,203,216],"one":[7],"the":[9,14,34,51,56,116,121,139,142,149,170,182,191,206,210,213,219],"threatening":[10],"cyber":[11],"attacks":[12,64],"for":[13,22,91,188,218],"users":[15],"Internet":[17],"which":[18],"denies":[19],"online":[20,35],"services":[21,36],"legitimate":[23],"users.":[24],"Therefore,":[25],"DoS":[26,63,94],"detection":[28,47,53,144,173],"mechanism":[29],"needed":[31],"to":[32],"protect":[33],"from":[37,67,154,205],"these":[38,77],"attacks.":[39,95],"A":[40],"number":[41],"machine":[43],"learning":[44],"based":[45],"mechanisms":[48,54],"exist":[49],"and":[50,61,65,70,108,124,165,175,201],"existing":[52],"face":[55],"lacuna":[57],"identifying":[59],"known":[60],"unknown":[62],"suffer":[66],"low":[68],"accuracy":[69],"high":[71,217],"false":[72],"alarm.":[73],"In":[74],"this":[75],"paper,":[76],"issues":[78],"are":[79],"addressed":[80],"by":[81,118,146],"proposing":[82],"a":[83,100,126,134],"Vector":[84,103],"Convolutional":[85,104],"Deep":[86],"Feature":[87],"Learning":[88],"(VCDeepFL)":[89],"approach":[90,98,158,184],"identification":[92],"The":[96,156],"VCDeepFL":[97],"combination":[101],"Neural":[105,111],"Network":[106,112],"(VCNN)":[107],"Fully":[109],"Connected":[110],"(FCNN).":[113],"VCNN":[114],"extracts":[115],"feature":[117],"down":[119],"sampling":[120],"input":[122,130],"vector":[123],"provides":[125],"better":[127],"representation":[128],"vector.":[131],"FCNN":[132],"multiclass":[135],"classifier":[136],"that":[137,181,209],"boosts":[138],"performance":[140],"system":[145,174],"automatically":[147],"computing":[148],"best":[150],"set":[151],"weights":[153],"training.":[155],"proposed":[157,183,220],"tested":[160],"with":[161,167],"NSL":[162],"KDD":[163],"dataset":[164],"compared":[166],"state":[168],"art":[171],"base":[176],"classifiers.":[177],"It":[178],"evident":[180],"yields":[185],"prominent":[186],"results":[187],"most":[189],"classes.":[192],"Further,":[193],"Receiver":[194],"Operating":[195],"Characteristics":[196],"(ROC)":[197],"analysis":[198],"performed":[200],"it":[202],"seen":[204],"ROC":[207],"curve":[208],"Area":[211],"Under":[212],"Curve":[214],"(AUC)":[215],"approach.":[221]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
