{"id":"https://openalex.org/W2886540402","doi":"https://doi.org/10.1145/3234200.3234204","title":"Testing IDS using GENESIDS","display_name":"Testing IDS using GENESIDS","publication_year":2018,"publication_date":"2018-08-07","ids":{"openalex":"https://openalex.org/W2886540402","doi":"https://doi.org/10.1145/3234200.3234204","mag":"2886540402"},"language":"en","primary_location":{"id":"doi:10.1145/3234200.3234204","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3234200.3234204","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3234200.3234204","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM SIGCOMM 2018 Conference on Posters and Demos","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3234200.3234204","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041626893","display_name":"Felix Erlacher","orcid":"https://orcid.org/0000-0001-5169-3060"},"institutions":[{"id":"https://openalex.org/I4210152224","display_name":"Heinz Nixdorf Stiftung","ror":"https://ror.org/04j2tkk21","country_code":"DE","type":"nonprofit","lineage":["https://openalex.org/I4210152224"]},{"id":"https://openalex.org/I206945453","display_name":"Paderborn University","ror":"https://ror.org/058kzsd48","country_code":"DE","type":"education","lineage":["https://openalex.org/I206945453"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Felix Erlacher","raw_affiliation_strings":["Heinz Nixdorf Institute and Dept. of Computer Science, Paderborn University, Germany"],"affiliations":[{"raw_affiliation_string":"Heinz Nixdorf Institute and Dept. of Computer Science, Paderborn University, Germany","institution_ids":["https://openalex.org/I4210152224","https://openalex.org/I206945453"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042212040","display_name":"Falko Dressler","orcid":"https://orcid.org/0000-0002-1989-1750"},"institutions":[{"id":"https://openalex.org/I206945453","display_name":"Paderborn University","ror":"https://ror.org/058kzsd48","country_code":"DE","type":"education","lineage":["https://openalex.org/I206945453"]},{"id":"https://openalex.org/I4210152224","display_name":"Heinz Nixdorf Stiftung","ror":"https://ror.org/04j2tkk21","country_code":"DE","type":"nonprofit","lineage":["https://openalex.org/I4210152224"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Falko Dressler","raw_affiliation_strings":["Heinz Nixdorf Institute and Dept. of Computer Science, Paderborn University, Germany"],"affiliations":[{"raw_affiliation_string":"Heinz Nixdorf Institute and Dept. of Computer Science, Paderborn University, Germany","institution_ids":["https://openalex.org/I4210152224","https://openalex.org/I206945453"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5041626893"],"corresponding_institution_ids":["https://openalex.org/I206945453","https://openalex.org/I4210152224"],"apc_list":null,"apc_paid":null,"fwci":1.2917,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.82480063,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"153","last_page":"155"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6192253232002258},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32520949840545654}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6192253232002258},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32520949840545654}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3234200.3234204","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3234200.3234204","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3234200.3234204","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM SIGCOMM 2018 Conference on Posters and Demos","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3234200.3234204","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3234200.3234204","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3234200.3234204","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM SIGCOMM 2018 Conference on Posters and Demos","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2886540402.pdf","grobid_xml":"https://content.openalex.org/works/W2886540402.grobid-xml"},"referenced_works_count":10,"referenced_works":["https://openalex.org/W1988918299","https://openalex.org/W1994212840","https://openalex.org/W2040333627","https://openalex.org/W2125194875","https://openalex.org/W2322704764","https://openalex.org/W2334853001","https://openalex.org/W2789828921","https://openalex.org/W2820900234","https://openalex.org/W2885770268","https://openalex.org/W3028818932"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W4391913857","https://openalex.org/W2350741829","https://openalex.org/W2530322880"],"abstract_inverted_index":{"Evaluating":[0],"signature-based":[1],"Network":[2],"Intrusion":[3],"Detection":[4],"Systems":[5],"(NIDS)":[6],"is":[7,21,27],"a":[8,53,66,74,95,108],"necessary":[9],"but":[10],"in":[11],"general":[12],"difficult":[13],"task.":[14],"Often,":[15],"live":[16],"or":[17],"recorded":[18],"real-world":[19,24],"traffic":[20,26,77,83,89,104],"used.":[22],"However,":[23],"network":[25],"often":[28],"hard":[29],"to":[30,63],"come":[31],"by":[32,72],"at":[33],"larger":[34],"scale":[35],"and":[36],"the":[37,91,100],"few":[38],"available":[39],"traces":[40,50],"usually":[41],"do":[42],"not":[43,61],"contain":[44,52],"application":[45],"layer":[46],"payload.":[47],"Furthermore,":[48],"these":[49],"only":[51],"small":[54],"amount":[55],"of":[56,93,111],"malicious":[57,87],"traffic,":[58],"which":[59],"does":[60],"suffice":[62],"thoroughly":[64],"test":[65],"NIDS.":[67,96],"We":[68],"solve":[69],"this":[70],"problem":[71],"proposing":[73],"complete":[75],"stateful":[76],"generation":[78],"system":[79],"that":[80],"mixes":[81],"realistic":[82,112],"with":[84,90],"user":[85],"definable":[86],"HTTP":[88],"purpose":[92],"evaluating":[94],"By":[97],"relying":[98],"on":[99],"Snort":[101],"syntax":[102],"for":[103],"definition,":[105],"we":[106],"guarantee":[107],"large":[109],"dataset":[110],"up-to-date":[113],"attack":[114],"patterns.":[115]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
