{"id":"https://openalex.org/W2921281389","doi":"https://doi.org/10.1145/3301551.3301591","title":"Characterizing Realistic Signature-based Intrusion Detection Benchmarks","display_name":"Characterizing Realistic Signature-based Intrusion Detection Benchmarks","publication_year":2018,"publication_date":"2018-12-29","ids":{"openalex":"https://openalex.org/W2921281389","doi":"https://doi.org/10.1145/3301551.3301591","mag":"2921281389"},"language":"en","primary_location":{"id":"doi:10.1145/3301551.3301591","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3301551.3301591","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 6th International Conference on Information Technology: IoT and Smart City","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028958422","display_name":"Monther Aldwairi","orcid":"https://orcid.org/0000-0003-1150-2404"},"institutions":[{"id":"https://openalex.org/I156983542","display_name":"Jordan University of Science and Technology","ror":"https://ror.org/03y8mtb59","country_code":"JO","type":"education","lineage":["https://openalex.org/I156983542"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Monther Aldwairi","raw_affiliation_strings":["Jordan University of Science and Technology, Irbid, Jordan, College of Technological Innovation, Zayed University, Abu Dhabi, UAE"],"affiliations":[{"raw_affiliation_string":"Jordan University of Science and Technology, Irbid, Jordan, College of Technological Innovation, Zayed University, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I156983542"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038435788","display_name":"Mohammad Alshboul","orcid":"https://orcid.org/0009-0008-3603-1729"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohammad A. Alshboul","raw_affiliation_strings":["Department of Electrical and Computer Engineering, North Carolina State University, Raleigh, NC USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, North Carolina State University, Raleigh, NC USA","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000888650","display_name":"Asmaa Seyam","orcid":null},"institutions":[{"id":"https://openalex.org/I91044093","display_name":"Zayed University","ror":"https://ror.org/03snqfa66","country_code":"AE","type":"education","lineage":["https://openalex.org/I91044093"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Asmaa Seyam","raw_affiliation_strings":["College of Technological Innovation, Zayed University, Abu Dhabi, UAE"],"affiliations":[{"raw_affiliation_string":"College of Technological Innovation, Zayed University, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I91044093"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5028958422"],"corresponding_institution_ids":["https://openalex.org/I156983542"],"apc_list":null,"apc_paid":null,"fwci":0.3691,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.67111806,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"97","last_page":"103"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.874087929725647},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7292289137840271},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.6617391109466553},{"id":"https://openalex.org/keywords/parsing","display_name":"Parsing","score":0.6500729322433472},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.621179461479187},{"id":"https://openalex.org/keywords/pattern-matching","display_name":"Pattern matching","score":0.6140586137771606},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.6059730052947998},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.4905070662498474},{"id":"https://openalex.org/keywords/plug-in","display_name":"Plug-in","score":0.45772820711135864},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.40296468138694763},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3378959894180298},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.32102417945861816}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.874087929725647},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7292289137840271},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6617391109466553},{"id":"https://openalex.org/C186644900","wikidata":"https://www.wikidata.org/wiki/Q194152","display_name":"Parsing","level":2,"score":0.6500729322433472},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.621179461479187},{"id":"https://openalex.org/C68859911","wikidata":"https://www.wikidata.org/wiki/Q1503724","display_name":"Pattern matching","level":2,"score":0.6140586137771606},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.6059730052947998},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4905070662498474},{"id":"https://openalex.org/C4924752","wikidata":"https://www.wikidata.org/wiki/Q184148","display_name":"Plug-in","level":2,"score":0.45772820711135864},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.40296468138694763},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3378959894180298},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.32102417945861816},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3301551.3301591","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3301551.3301591","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 6th International Conference on Information Technology: IoT and Smart City","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G180505017","display_name":null,"funder_award_id":"Research Cluster Award #17079","funder_id":"https://openalex.org/F4320325295","funder_display_name":"Zayed University"},{"id":"https://openalex.org/G7612922404","display_name":null,"funder_award_id":"Sabbatical Leave Grant Number 2016/280","funder_id":"https://openalex.org/F4320322303","funder_display_name":"Jordan University of Science and Technology"}],"funders":[{"id":"https://openalex.org/F4320322303","display_name":"Jordan University of Science and Technology","ror":"https://ror.org/03y8mtb59"},{"id":"https://openalex.org/F4320325295","display_name":"Zayed University","ror":"https://ror.org/03snqfa66"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W91323781","https://openalex.org/W124244495","https://openalex.org/W1202984889","https://openalex.org/W1674877186","https://openalex.org/W1983876536","https://openalex.org/W1985108724","https://openalex.org/W2008224380","https://openalex.org/W2021132518","https://openalex.org/W2031163547","https://openalex.org/W2063109203","https://openalex.org/W2099940443","https://openalex.org/W2099964107","https://openalex.org/W2134826720","https://openalex.org/W2145791740","https://openalex.org/W2165574575","https://openalex.org/W2166864323","https://openalex.org/W2498461899","https://openalex.org/W2502169949","https://openalex.org/W2544098645","https://openalex.org/W2615290700","https://openalex.org/W2620825407","https://openalex.org/W2744071776","https://openalex.org/W2912320841","https://openalex.org/W4235968347","https://openalex.org/W4244075691","https://openalex.org/W4251400443","https://openalex.org/W6674887505","https://openalex.org/W6723895597"],"related_works":["https://openalex.org/W47352601","https://openalex.org/W2981957539","https://openalex.org/W4287378204","https://openalex.org/W2545422590","https://openalex.org/W4240705470","https://openalex.org/W2945311252","https://openalex.org/W2377397587","https://openalex.org/W2386564085","https://openalex.org/W2365153488","https://openalex.org/W2065828532"],"abstract_inverted_index":{"Speeding":[0],"up":[1],"pattern":[2,34,86,177],"matching":[3,35,87,178],"for":[4,88],"intrusion":[5,89,157],"detection":[6,158],"systems":[7,159],"has":[8,16],"been":[9,17],"a":[10,18,45,114,150,167],"growing":[11],"field":[12],"of":[13,20,61,85,117,154],"research.":[14],"There":[15],"flux":[19],"new":[21,176],"algorithms,":[22],"modifications":[23],"to":[24,41,55,65,78,110,143,173,182],"existing":[25,183],"algorithms":[26,140,179,184],"and":[27,53,67,74,95,108,134,162,180],"even":[28],"hardware":[29],"architectures":[30],"aimed":[31],"at":[32],"improving":[33],"performance.":[36],"Establishing":[37],"an":[38],"accurate":[39],"comparison":[40],"related":[42],"work":[43,81],"is":[44,64],"real":[46],"challenge":[47],"because":[48],"researchers":[49,113,172],"use":[50],"different":[51,156],"datasets":[52,104,122],"metrics":[54,77],"evaluate":[56],"their":[57,118,128,175],"work.":[58],"The":[59,103,120],"purpose":[60],"this":[62],"paper":[63],"characterize":[66],"identify":[68],"realistic":[69],"workloads,":[70],"propose":[71],"standard":[72],"benchmarks,":[73],"establish":[75],"common":[76],"better":[79,115],"compare":[80,181],"in":[82],"the":[83,112,144,186],"area":[84],"detection.":[90],"We":[91],"collect":[92],"traffic":[93],"traces":[94],"attack":[96,164],"signatures":[97],"from":[98],"popular":[99],"open":[100],"source":[101],"platforms.":[102],"are":[105,141],"processed,":[106],"cleansed":[107],"studied,":[109],"give":[111],"understanding":[116],"characteristics.":[119],"final":[121],"along":[123],"with":[124],"detailed":[125],"information":[126],"about":[127],"origins,":[129],"contents,":[130],"features,":[131],"statistical":[132],"analysis":[133],"performance":[135],"evaluation":[136],"using":[137,185],"well-known":[138],"pattern-matching":[139,168],"available":[142],"public.":[145],"In":[146],"addition,":[147],"we":[148],"provide":[149],"generic":[151],"parser":[152],"capable":[153],"parsing":[155],"rule":[160],"formats":[161],"extract":[163],"signatures.":[165],"Finally,":[166],"engine":[169],"that":[170],"enables":[171],"plug-and-play":[174],"predefined":[187],"metrics.":[188]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2019,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
