{"id":"https://openalex.org/W2946039550","doi":"https://doi.org/10.1145/3316615.3316626","title":"Privacy Preserving of IP Address through Truncation Method in Network-based Intrusion Detection System","display_name":"Privacy Preserving of IP Address through Truncation Method in Network-based Intrusion Detection System","publication_year":2019,"publication_date":"2019-02-19","ids":{"openalex":"https://openalex.org/W2946039550","doi":"https://doi.org/10.1145/3316615.3316626","mag":"2946039550"},"language":"en","primary_location":{"id":"doi:10.1145/3316615.3316626","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3316615.3316626","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000137943","display_name":"Yee Jian Chew","orcid":"https://orcid.org/0000-0002-2952-986X"},"institutions":[{"id":"https://openalex.org/I173029219","display_name":"Multimedia University","ror":"https://ror.org/04zrbnc33","country_code":"MY","type":"education","lineage":["https://openalex.org/I173029219"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Yee Jian Chew","raw_affiliation_strings":["Science and Technology, Multimedia University, Melaka, Malaysia"],"affiliations":[{"raw_affiliation_string":"Science and Technology, Multimedia University, Melaka, Malaysia","institution_ids":["https://openalex.org/I173029219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033118976","display_name":"Shih Yin Ooi","orcid":null},"institutions":[{"id":"https://openalex.org/I173029219","display_name":"Multimedia University","ror":"https://ror.org/04zrbnc33","country_code":"MY","type":"education","lineage":["https://openalex.org/I173029219"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Shih Yin Ooi","raw_affiliation_strings":["Science and Technology, Multimedia University, Melaka, Malaysia"],"affiliations":[{"raw_affiliation_string":"Science and Technology, Multimedia University, Melaka, Malaysia","institution_ids":["https://openalex.org/I173029219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059359253","display_name":"Kok\u2010Seng Wong","orcid":"https://orcid.org/0000-0002-2029-7644"},"institutions":[{"id":"https://openalex.org/I60559429","display_name":"Nazarbayev University","ror":"https://ror.org/052bx8q98","country_code":"KZ","type":"education","lineage":["https://openalex.org/I60559429"]}],"countries":["KZ"],"is_corresponding":false,"raw_author_name":"Kok-Seng Wong","raw_affiliation_strings":["Department of Computer Science, Nazarbayev University, Astana, Kazakhstan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Nazarbayev University, Astana, Kazakhstan","institution_ids":["https://openalex.org/I60559429"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5114376068","display_name":"Ying Han Pang","orcid":"https://orcid.org/0000-0002-3781-6623"},"institutions":[{"id":"https://openalex.org/I173029219","display_name":"Multimedia University","ror":"https://ror.org/04zrbnc33","country_code":"MY","type":"education","lineage":["https://openalex.org/I173029219"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Ying Han Pang","raw_affiliation_strings":["Science and Technology, Multimedia University, Melaka, Malaysia"],"affiliations":[{"raw_affiliation_string":"Science and Technology, Multimedia University, Melaka, Malaysia","institution_ids":["https://openalex.org/I173029219"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5000137943"],"corresponding_institution_ids":["https://openalex.org/I173029219"],"apc_list":null,"apc_paid":null,"fwci":0.5601,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.74240302,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"569","last_page":"573"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7764635682106018},{"id":"https://openalex.org/keywords/ip-address","display_name":"Ip address","score":0.6187320351600647},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5917697548866272},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5366835594177246},{"id":"https://openalex.org/keywords/masking","display_name":"Masking (illustration)","score":0.5326938629150391},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5009980201721191},{"id":"https://openalex.org/keywords/ignorance","display_name":"Ignorance","score":0.44446682929992676},{"id":"https://openalex.org/keywords/truncation","display_name":"Truncation (statistics)","score":0.43007349967956543},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.4055572748184204},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3250565528869629},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.14564630389213562}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7764635682106018},{"id":"https://openalex.org/C2985371682","wikidata":"https://www.wikidata.org/wiki/Q11135","display_name":"Ip address","level":2,"score":0.6187320351600647},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5917697548866272},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5366835594177246},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.5326938629150391},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5009980201721191},{"id":"https://openalex.org/C2778732403","wikidata":"https://www.wikidata.org/wiki/Q815577","display_name":"Ignorance","level":2,"score":0.44446682929992676},{"id":"https://openalex.org/C106195933","wikidata":"https://www.wikidata.org/wiki/Q7847935","display_name":"Truncation (statistics)","level":2,"score":0.43007349967956543},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.4055572748184204},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3250565528869629},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.14564630389213562},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3316615.3316626","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3316615.3316626","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7799999713897705}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1531756074","https://openalex.org/W1594076931","https://openalex.org/W1805704774","https://openalex.org/W1964783785","https://openalex.org/W1968860775","https://openalex.org/W2004261337","https://openalex.org/W2043061568","https://openalex.org/W2075563352","https://openalex.org/W2119067110","https://openalex.org/W2133803742","https://openalex.org/W2134479759","https://openalex.org/W2136114025","https://openalex.org/W2142406320","https://openalex.org/W2165102553","https://openalex.org/W2552729931","https://openalex.org/W2623703801","https://openalex.org/W2804166280","https://openalex.org/W2886249624","https://openalex.org/W2887951220","https://openalex.org/W2911978475","https://openalex.org/W4231645469","https://openalex.org/W6661189581","https://openalex.org/W6674887505","https://openalex.org/W6683256029","https://openalex.org/W7056747883"],"related_works":["https://openalex.org/W4387185014","https://openalex.org/W4387906132","https://openalex.org/W4321603833","https://openalex.org/W4321603789","https://openalex.org/W588868971","https://openalex.org/W4200350283","https://openalex.org/W4283215876","https://openalex.org/W4399826833","https://openalex.org/W4253298899","https://openalex.org/W4321603797"],"abstract_inverted_index":{"Network-based":[0],"Intrusion":[1],"Detection":[2],"System":[3],"(IDS)":[4],"is":[5,31,79,117,135],"gaining":[6],"wide":[7],"attention":[8],"from":[9,99,143],"the":[10,14,25,35,38,66,81,84,100,121,125,155],"research":[11],"community":[12],"since":[13],"past":[15],"decades.":[16],"While":[17],"having":[18],"a":[19,114],"precise":[20],"classification":[21],"model":[22],"in":[23,64,108],"separating":[24],"normal":[26],"and":[27,62,68],"malicious":[28],"network":[29,42,70,126],"traffics":[30],"still":[32],"remain":[33],"as":[34,48],"ultimate":[36],"goal,":[37],"privacy":[39,55],"protection":[40],"for":[41],"traffic":[43,127],"database":[44,54,82,128,134],"cannot":[45],"be":[46,89,105],"ignore":[47],"well.":[49],"The":[50,72,132],"impetuous":[51],"ignorance":[52],"of":[53,124,150,158],"will":[56,104],"continue":[57],"to":[58,75,91,119],"restrain":[59],"governments,":[60],"organisations":[61],"individuals":[63],"releasing":[65],"real":[67],"ontological":[69],"traces.":[71],"common":[73],"solution":[74],"tackle":[76],"this":[77,103,112],"matter":[78],"anonymising":[80],"through":[83],"statistical":[85],"approach.":[86],"Anonymising":[87],"can":[88],"referred":[90],"masking,":[92],"hiding":[93],"or":[94],"removing":[95],"certain":[96],"sensitive":[97,122],"information":[98,109,123],"database.":[101],"Thus,":[102],"subsequently":[106],"resulting":[107],"loss.":[110],"In":[111],"paper,":[113],"truncation":[115,153],"method":[116],"explored":[118],"preserve":[120],"(i.e.":[129],"IP":[130,151],"addresses).":[131],"truncated":[133],"then":[136],"tested":[137,146],"with":[138],"10":[139],"machine":[140],"learning":[141],"classifiers":[142],"Weka.":[144],"We":[145],"four":[147],"different":[148],"options":[149],"address":[152],"against":[154],"6":[156],"percent":[157],"GureKDDCup":[159],"dataset.":[160]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2019-05-29T00:00:00"}
