{"id":"https://openalex.org/W2742891804","doi":"https://doi.org/10.1145/3098954.3106068","title":"Machine Learning Approach for Detection of nonTor Traffic","display_name":"Machine Learning Approach for Detection of nonTor Traffic","publication_year":2017,"publication_date":"2017-08-10","ids":{"openalex":"https://openalex.org/W2742891804","doi":"https://doi.org/10.1145/3098954.3106068","mag":"2742891804"},"language":"en","primary_location":{"id":"doi:10.1145/3098954.3106068","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3098954.3106068","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://rke.abertay.ac.uk/en/publications/5bd1ecef-3b4d-43ae-9b92-08280f6bc69d","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001935778","display_name":"Elike Hodo","orcid":null},"institutions":[{"id":"https://openalex.org/I181647926","display_name":"University of Strathclyde","ror":"https://ror.org/00n3w3b69","country_code":"GB","type":"education","lineage":["https://openalex.org/I181647926"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Elike Hodo","raw_affiliation_strings":["University of Strathclyde, Scotland"],"affiliations":[{"raw_affiliation_string":"University of Strathclyde, Scotland","institution_ids":["https://openalex.org/I181647926"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029196733","display_name":"Xavier Bellekens","orcid":"https://orcid.org/0000-0003-1849-5788"},"institutions":[{"id":"https://openalex.org/I877506347","display_name":"Abertay University","ror":"https://ror.org/04mwwnx67","country_code":"GB","type":"education","lineage":["https://openalex.org/I877506347"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Xavier Bellekens","raw_affiliation_strings":["University of Abertay Dundee Scotland"],"affiliations":[{"raw_affiliation_string":"University of Abertay Dundee Scotland","institution_ids":["https://openalex.org/I877506347"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103055664","display_name":"Ephraim Iorkyase","orcid":null},"institutions":[{"id":"https://openalex.org/I181647926","display_name":"University of Strathclyde","ror":"https://ror.org/00n3w3b69","country_code":"GB","type":"education","lineage":["https://openalex.org/I181647926"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Ephraim Iorkyase","raw_affiliation_strings":["University of Strathclyde, Scotland"],"affiliations":[{"raw_affiliation_string":"University of Strathclyde, Scotland","institution_ids":["https://openalex.org/I181647926"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060244703","display_name":"Andrew Hamilton","orcid":"https://orcid.org/0000-0002-8436-8325"},"institutions":[{"id":"https://openalex.org/I181647926","display_name":"University of Strathclyde","ror":"https://ror.org/00n3w3b69","country_code":"GB","type":"education","lineage":["https://openalex.org/I181647926"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Andrew Hamilton","raw_affiliation_strings":["University of Strathclyde, Scotland"],"affiliations":[{"raw_affiliation_string":"University of Strathclyde, Scotland","institution_ids":["https://openalex.org/I181647926"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043208465","display_name":"Christos Tachtatzis","orcid":"https://orcid.org/0000-0001-9150-6805"},"institutions":[{"id":"https://openalex.org/I181647926","display_name":"University of Strathclyde","ror":"https://ror.org/00n3w3b69","country_code":"GB","type":"education","lineage":["https://openalex.org/I181647926"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Christos Tachtatzis","raw_affiliation_strings":["University of Strathclyde, Scotland"],"affiliations":[{"raw_affiliation_string":"University of Strathclyde, Scotland","institution_ids":["https://openalex.org/I181647926"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005039825","display_name":"Robert Atkinson","orcid":"https://orcid.org/0000-0002-6206-2229"},"institutions":[{"id":"https://openalex.org/I181647926","display_name":"University of Strathclyde","ror":"https://ror.org/00n3w3b69","country_code":"GB","type":"education","lineage":["https://openalex.org/I181647926"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Robert Atkinson","raw_affiliation_strings":["University of Strathclyde, Scotland"],"affiliations":[{"raw_affiliation_string":"University of Strathclyde, Scotland","institution_ids":["https://openalex.org/I181647926"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5001935778"],"corresponding_institution_ids":["https://openalex.org/I181647926"],"apc_list":null,"apc_paid":null,"fwci":3.5081,"has_fulltext":true,"cited_by_count":50,"citation_normalized_percentile":{"value":0.93645259,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7707545757293701},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.690812349319458},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6493958234786987},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.6290856599807739},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5461039543151855},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4947795271873474},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4911491572856903},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.46718505024909973},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4630480110645294},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.45601844787597656},{"id":"https://openalex.org/keywords/internet-traffic","display_name":"Internet traffic","score":0.41379866003990173},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.41138195991516113},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2702805995941162}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7707545757293701},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.690812349319458},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6493958234786987},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.6290856599807739},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5461039543151855},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4947795271873474},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4911491572856903},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.46718505024909973},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4630480110645294},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.45601844787597656},{"id":"https://openalex.org/C63969886","wikidata":"https://www.wikidata.org/wiki/Q3536440","display_name":"Internet traffic","level":3,"score":0.41379866003990173},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.41138195991516113},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2702805995941162},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1145/3098954.3106068","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3098954.3106068","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},{"id":"pmh:oai:rke.abertay.ac.uk:openaire_cris_publications/5bd1ecef-3b4d-43ae-9b92-08280f6bc69d","is_oa":true,"landing_page_url":"https://rke.abertay.ac.uk/en/publications/5bd1ecef-3b4d-43ae-9b92-08280f6bc69d","pdf_url":null,"source":{"id":"https://openalex.org/S4306402526","display_name":"Abertay Research Portal (Abertay University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I877506347","host_organization_name":"Abertay University","host_organization_lineage":["https://openalex.org/I877506347"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"Hodo , E , Bellekens , X , Iorkyase , E , Hamilton , A , Tachtatzis , C &amp; Atkinson , R 2017 , ' Machine learning approach for detection of nonTor traffic ' , Journal of Cyber Security and Mobility , vol. 6 , no. 2 , 4 , pp. 171-194 . https://doi.org/10.13052/jcsm2245-1439.624","raw_type":"article"},{"id":"pmh:oai:rke.abertay.ac.uk:openaire_cris_publications/f705012d-529a-4dc6-92ea-d5fd72d6b6b3","is_oa":true,"landing_page_url":"https://rke.abertay.ac.uk/en/publications/f705012d-529a-4dc6-92ea-d5fd72d6b6b3","pdf_url":null,"source":{"id":"https://openalex.org/S4306402526","display_name":"Abertay Research Portal (Abertay University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I877506347","host_organization_name":"Abertay University","host_organization_lineage":["https://openalex.org/I877506347"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"Hodo , E , Bellekens , X , Iorkyase , E , Hamilton , A , Tachtatzis , C &amp; Atkinson , R 2017 , Machine learning approach for detection of nonTor traffic . in Proceedings of the 12th International Conference on Availability, Reliability and Security . , 85 , ACM International Conference Proceeding Series , Association for Computing Machinery (ACM) , New York , 12th International Conference on Availability, Reliability and Security , Reggio Calabria , Italy , 29/08/17 . https://doi.org/10.1145/3098954.3106068","raw_type":"contributionToPeriodical"},{"id":"pmh:oai:strathprints.strath.ac.uk:63269","is_oa":true,"landing_page_url":"https://strathprints.strath.ac.uk/view/author/925772.html>","pdf_url":"https://strathprints.strath.ac.uk/63269/1/Hodo_etal_ARES_2017_Machine_learning_approach_for_detection_of_nonTor_traffic.pdf","source":{"id":"https://openalex.org/S4306402226","display_name":"Strathprints: The University of Strathclyde institutional repository (University of Strathclyde)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I181647926","host_organization_name":"University of Strathclyde","host_organization_lineage":["https://openalex.org/I181647926"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"NonPeerReviewed"}],"best_oa_location":{"id":"pmh:oai:rke.abertay.ac.uk:openaire_cris_publications/5bd1ecef-3b4d-43ae-9b92-08280f6bc69d","is_oa":true,"landing_page_url":"https://rke.abertay.ac.uk/en/publications/5bd1ecef-3b4d-43ae-9b92-08280f6bc69d","pdf_url":null,"source":{"id":"https://openalex.org/S4306402526","display_name":"Abertay Research Portal (Abertay University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I877506347","host_organization_name":"Abertay University","host_organization_lineage":["https://openalex.org/I877506347"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"Hodo , E , Bellekens , X , Iorkyase , E , Hamilton , A , Tachtatzis , C &amp; Atkinson , R 2017 , ' Machine learning approach for detection of nonTor traffic ' , Journal of Cyber Security and Mobility , vol. 6 , no. 2 , 4 , pp. 171-194 . https://doi.org/10.13052/jcsm2245-1439.624","raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W6091113","https://openalex.org/W1495061682","https://openalex.org/W1503398984","https://openalex.org/W1578988526","https://openalex.org/W1621730125","https://openalex.org/W1655958391","https://openalex.org/W1674877186","https://openalex.org/W2093331366","https://openalex.org/W2093788687","https://openalex.org/W2094691798","https://openalex.org/W2096118443","https://openalex.org/W2096915403","https://openalex.org/W2128569883","https://openalex.org/W2139212933","https://openalex.org/W2140950853","https://openalex.org/W2156186849","https://openalex.org/W2314121694","https://openalex.org/W2498690138","https://openalex.org/W2508613954","https://openalex.org/W2576897537","https://openalex.org/W2591476802","https://openalex.org/W2591712613","https://openalex.org/W3098631962","https://openalex.org/W3100857292","https://openalex.org/W3104092367","https://openalex.org/W3150719513","https://openalex.org/W3193477162"],"related_works":["https://openalex.org/W2387580700","https://openalex.org/W2899285606","https://openalex.org/W2746581472","https://openalex.org/W60934498","https://openalex.org/W2061466315","https://openalex.org/W2376886931","https://openalex.org/W1992118813","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539"],"abstract_inverted_index":{"Intrusion":[0],"detection":[1,28,138],"has":[2],"attracted":[3],"a":[4,67,167],"considerable":[5],"interest":[6],"from":[7],"researchers":[8],"and":[9,25,53,71,82,104,110,140],"industries.":[10],"After":[11],"many":[12],"years":[13],"of":[14,22,32,36,62,69,79,96,106,144],"research":[15],"the":[16,20,60,77,87,94,102,135,145,159],"community":[17],"still":[18],"faces":[19],"problem":[21],"building":[23],"reliable":[24],"efficient":[26],"intrusion":[27],"systems":[29],"(IDS)":[30],"capable":[31],"handling":[33],"large":[34],"quantities":[35],"data":[37],"with":[38],"changing":[39],"patterns":[40],"in":[41,50,114,118,126,158,172,176],"real":[42],"time":[43],"situations.":[44],"The":[45,129],"Tor":[46,80,90,120,178],"network":[47,165],"is":[48,124],"popular":[49],"providing":[51],"privacy":[52],"security":[54],"to":[55,85,100],"end":[56],"user":[57],"by":[58],"anonymising":[59],"identity":[61],"internet":[63],"users":[64],"connecting":[65],"through":[66],"series":[68],"tunnels":[70],"nodes.":[72],"This":[73],"work":[74],"focuses":[75],"on":[76,134],"classification":[78],"traffic":[81,84,91,117,157,175],"nonTor":[83,116,156,174],"expose":[86],"activities":[88],"within":[89],"that":[92,151],"minimizes":[93],"protection":[95],"users.":[97],"A":[98,161],"study":[99],"compare":[101],"reliability":[103],"efficiency":[105],"Artificial":[107,163],"Neural":[108],"Network":[109,121,179],"Support":[111],"vector":[112],"machine":[113],"detecting":[115,173],"UNB-CIC":[119,177],"Traffic":[122,180],"dataset":[123],"presented":[125],"this":[127],"paper.":[128],"results":[130,149],"are":[131],"analysed":[132],"based":[133],"overall":[136],"accuracy,":[137],"rate":[139,143],"false":[141],"positive":[142],"two":[146],"algorithms.":[147],"Experimental":[148],"show":[150],"both":[152],"algorithms":[153],"could":[154],"detect":[155],"dataset.":[160,181],"hybrid":[162],"neural":[164],"proved":[166],"better":[168],"classifier":[169],"than":[170],"SVM":[171]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":12},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":4}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
