{"id":"https://openalex.org/W1985996169","doi":"https://doi.org/10.1109/icitst.2013.6750267","title":"Reinforcing network security by converting massive data flow to continuous connections for IDS","display_name":"Reinforcing network security by converting massive data flow to continuous connections for IDS","publication_year":2013,"publication_date":"2013-12-01","ids":{"openalex":"https://openalex.org/W1985996169","doi":"https://doi.org/10.1109/icitst.2013.6750267","mag":"1985996169"},"language":"en","primary_location":{"id":"doi:10.1109/icitst.2013.6750267","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2013.6750267","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082140973","display_name":"Maher Salem","orcid":"https://orcid.org/0000-0002-6479-4335"},"institutions":[{"id":"https://openalex.org/I201850948","display_name":"Fulda University of Applied Sciences","ror":"https://ror.org/041bz9r75","country_code":"DE","type":"education","lineage":["https://openalex.org/I201850948"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Maher Salem","raw_affiliation_strings":["Group of Network and Data Security, University of Applied Sciences, Fulda, Germany"],"affiliations":[{"raw_affiliation_string":"Group of Network and Data Security, University of Applied Sciences, Fulda, Germany","institution_ids":["https://openalex.org/I201850948"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072269923","display_name":"Ulrich Buehler","orcid":null},"institutions":[{"id":"https://openalex.org/I201850948","display_name":"Fulda University of Applied Sciences","ror":"https://ror.org/041bz9r75","country_code":"DE","type":"education","lineage":["https://openalex.org/I201850948"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Ulrich Buehler","raw_affiliation_strings":["Group of Network and Data Security, University of Applied Sciences, Fulda, Germany"],"affiliations":[{"raw_affiliation_string":"Group of Network and Data Security, University of Applied Sciences, Fulda, Germany","institution_ids":["https://openalex.org/I201850948"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5082140973"],"corresponding_institution_ids":["https://openalex.org/I201850948"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.09532553,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"1","issue":null,"first_page":"570","last_page":"575"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.749010443687439},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5453053116798401},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5178130269050598},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.5020208358764648},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.48081696033477783},{"id":"https://openalex.org/keywords/flow","display_name":"Flow (mathematics)","score":0.4757213890552521},{"id":"https://openalex.org/keywords/continuous-flow","display_name":"Continuous flow","score":0.469016969203949},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09882086515426636},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.07061797380447388}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.749010443687439},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5453053116798401},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5178130269050598},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.5020208358764648},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.48081696033477783},{"id":"https://openalex.org/C38349280","wikidata":"https://www.wikidata.org/wiki/Q1434290","display_name":"Flow (mathematics)","level":2,"score":0.4757213890552521},{"id":"https://openalex.org/C2985264121","wikidata":"https://www.wikidata.org/wiki/Q216320","display_name":"Continuous flow","level":2,"score":0.469016969203949},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09882086515426636},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.07061797380447388},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C183696295","wikidata":"https://www.wikidata.org/wiki/Q2487696","display_name":"Biochemical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icitst.2013.6750267","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2013.6750267","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":52,"referenced_works":["https://openalex.org/W28747464","https://openalex.org/W1502787543","https://openalex.org/W1587574739","https://openalex.org/W1674877186","https://openalex.org/W1972448982","https://openalex.org/W1980931819","https://openalex.org/W1985506951","https://openalex.org/W1985771751","https://openalex.org/W1988918299","https://openalex.org/W1993948826","https://openalex.org/W2000231083","https://openalex.org/W2008224380","https://openalex.org/W2010429444","https://openalex.org/W2017203676","https://openalex.org/W2022906038","https://openalex.org/W2062863481","https://openalex.org/W2070002283","https://openalex.org/W2087576051","https://openalex.org/W2099940443","https://openalex.org/W2101134713","https://openalex.org/W2108710747","https://openalex.org/W2113777721","https://openalex.org/W2117584562","https://openalex.org/W2117593668","https://openalex.org/W2119415938","https://openalex.org/W2120480096","https://openalex.org/W2121863839","https://openalex.org/W2122473047","https://openalex.org/W2125470616","https://openalex.org/W2131090456","https://openalex.org/W2137123670","https://openalex.org/W2140889560","https://openalex.org/W2141521172","https://openalex.org/W2142889610","https://openalex.org/W2147331788","https://openalex.org/W2147890514","https://openalex.org/W2160169104","https://openalex.org/W2168595508","https://openalex.org/W2186449981","https://openalex.org/W2491916842","https://openalex.org/W2537742203","https://openalex.org/W2543951827","https://openalex.org/W2951382195","https://openalex.org/W4240467878","https://openalex.org/W6601192393","https://openalex.org/W6637096788","https://openalex.org/W6677378455","https://openalex.org/W6677528903","https://openalex.org/W6677992386","https://openalex.org/W6679335134","https://openalex.org/W6686346745","https://openalex.org/W6723188797"],"related_works":["https://openalex.org/W2111375262","https://openalex.org/W2317728013","https://openalex.org/W1991205173","https://openalex.org/W2109048960","https://openalex.org/W2741481635","https://openalex.org/W2338537463","https://openalex.org/W2183644707","https://openalex.org/W1595657826","https://openalex.org/W1985526270","https://openalex.org/W2419194643"],"abstract_inverted_index":{"Processing":[0],"massive":[1,47],"data":[2,25,48,109],"flow":[3,49,110],"in":[4,30,88,103,112,145,160],"intrusion":[5],"detection":[6],"systems":[7],"(IDS)":[8],"become":[9],"a":[10,17,38,62,116],"serious":[11],"challenge.":[12],"It":[13,69],"is":[14,156],"considered":[15],"as":[16,162],"major":[18],"deficiency":[19],"while":[20],"handling":[21],"heterogeneous":[22],"and":[23,73,77,111,139,175],"non-stationary":[24],"stream":[26],"to":[27,90,135,158],"uncover":[28],"anomaly":[29],"the":[31,46,86,101,120,132,137,142,153],"online":[32,40,113,164],"operational":[33],"mode.":[34],"This":[35],"paper":[36],"proposes":[37],"novel":[39],"method":[41,56,102,144,155],"that":[42],"constructs":[43],"connections":[44,134,169],"from":[45],"for":[50,173],"evaluating":[51,176],"IDS":[52,129,146,177],"models.":[53,178],"The":[54,148],"proposed":[55,143,154],"overcomes":[57],"this":[58],"challenge":[59],"by":[60],"using":[61,106,115,131],"queuing":[63],"concept":[64],"of":[65,141],"dynamic":[66],"window":[67],"size.":[68],"captures":[70],"network":[71,118],"traffic":[72],"hosts":[74],"events":[75],"constantly":[76],"handles":[78],"them":[79],"synchronously":[80],"within":[81],"time":[82],"slot":[83],"windows":[84],"inside":[85],"queue":[87],"order":[89],"construct":[91],"connection":[92],"vectors":[93],"based":[94],"on":[95],"certain":[96],"features.":[97],"We":[98],"have":[99,126],"evaluated":[100,127],"offline":[104,161],"mode":[105,114],"DARPA":[107],"dump":[108],"simulated":[117],"at":[119],"university":[121],"campus.":[122],"In":[123],"addition,":[124],"we":[125],"our":[128],"model":[130],"constructed":[133,168],"proof":[136],"feasibility":[138],"plausibility":[140],"area.":[147],"performance":[149],"evaluation":[150],"confirms":[151],"that,":[152],"able":[157],"operate":[159],"well":[163],"modes":[165],"efficiently.":[166],"Moreover,":[167],"are":[170],"very":[171],"adequate":[172],"training":[174]},"counts_by_year":[{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
