{"id":"https://openalex.org/W2944932309","doi":"https://doi.org/10.1145/3317549.3326294","title":"A cost-effective anomaly detection system using in-DRAM working set of active flows table","display_name":"A cost-effective anomaly detection system using in-DRAM working set of active flows table","publication_year":2019,"publication_date":"2019-05-15","ids":{"openalex":"https://openalex.org/W2944932309","doi":"https://doi.org/10.1145/3317549.3326294","mag":"2944932309"},"language":"en","primary_location":{"id":"doi:10.1145/3317549.3326294","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3317549.3326294","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017780520","display_name":"Rhongho Jang","orcid":"https://orcid.org/0000-0002-3417-6851"},"institutions":[{"id":"https://openalex.org/I106165777","display_name":"University of Central Florida","ror":"https://ror.org/036nfer12","country_code":"US","type":"education","lineage":["https://openalex.org/I106165777"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Rhongho Jang","raw_affiliation_strings":["Inha University and University of Central Florida"],"affiliations":[{"raw_affiliation_string":"Inha University and University of Central Florida","institution_ids":["https://openalex.org/I106165777"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045472172","display_name":"Seongkwang Moon","orcid":null},"institutions":[{"id":"https://openalex.org/I191879574","display_name":"Inha University","ror":"https://ror.org/01easw929","country_code":"KR","type":"education","lineage":["https://openalex.org/I191879574"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Seongkwang Moon","raw_affiliation_strings":["Inha University"],"affiliations":[{"raw_affiliation_string":"Inha University","institution_ids":["https://openalex.org/I191879574"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002989711","display_name":"Youngtae Noh","orcid":"https://orcid.org/0000-0002-9173-1575"},"institutions":[{"id":"https://openalex.org/I191879574","display_name":"Inha University","ror":"https://ror.org/01easw929","country_code":"KR","type":"education","lineage":["https://openalex.org/I191879574"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Youngtae Noh","raw_affiliation_strings":["Inha University"],"affiliations":[{"raw_affiliation_string":"Inha University","institution_ids":["https://openalex.org/I191879574"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077402873","display_name":"Aziz Mohaisen","orcid":"https://orcid.org/0000-0003-3227-2505"},"institutions":[{"id":"https://openalex.org/I106165777","display_name":"University of Central Florida","ror":"https://ror.org/036nfer12","country_code":"US","type":"education","lineage":["https://openalex.org/I106165777"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Aziz Mohaisen","raw_affiliation_strings":["University of Central Florida"],"affiliations":[{"raw_affiliation_string":"University of Central Florida","institution_ids":["https://openalex.org/I106165777"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079230730","display_name":"DaeHun Nyang","orcid":"https://orcid.org/0000-0001-5183-891X"},"institutions":[{"id":"https://openalex.org/I191879574","display_name":"Inha University","ror":"https://ror.org/01easw929","country_code":"KR","type":"education","lineage":["https://openalex.org/I191879574"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"DaeHun Nyang","raw_affiliation_strings":["Inha University"],"affiliations":[{"raw_affiliation_string":"Inha University","institution_ids":["https://openalex.org/I191879574"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5017780520"],"corresponding_institution_ids":["https://openalex.org/I106165777"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.04034478,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"286","last_page":"287"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/dram","display_name":"Dram","score":0.8819553852081299},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7950770854949951},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7279542684555054},{"id":"https://openalex.org/keywords/static-random-access-memory","display_name":"Static random-access memory","score":0.7095146775245667},{"id":"https://openalex.org/keywords/working-set","display_name":"Working set","score":0.7040615677833557},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6802404522895813},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6336245536804199},{"id":"https://openalex.org/keywords/universal-memory","display_name":"Universal memory","score":0.49199649691581726},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4677721858024597},{"id":"https://openalex.org/keywords/table","display_name":"Table (database)","score":0.45917442440986633},{"id":"https://openalex.org/keywords/random-access-memory","display_name":"Random access memory","score":0.4561360478401184},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4373074173927307},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3918733298778534},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.35780173540115356},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.3057973384857178},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.2848381996154785},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.26013684272766113},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2020120620727539},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1803693175315857},{"id":"https://openalex.org/keywords/overlay","display_name":"Overlay","score":0.1445319950580597}],"concepts":[{"id":"https://openalex.org/C7366592","wikidata":"https://www.wikidata.org/wiki/Q1255620","display_name":"Dram","level":2,"score":0.8819553852081299},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7950770854949951},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7279542684555054},{"id":"https://openalex.org/C68043766","wikidata":"https://www.wikidata.org/wiki/Q267416","display_name":"Static random-access memory","level":2,"score":0.7095146775245667},{"id":"https://openalex.org/C88196245","wikidata":"https://www.wikidata.org/wiki/Q8034984","display_name":"Working set","level":2,"score":0.7040615677833557},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6802404522895813},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6336245536804199},{"id":"https://openalex.org/C195053848","wikidata":"https://www.wikidata.org/wiki/Q7894141","display_name":"Universal memory","level":5,"score":0.49199649691581726},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4677721858024597},{"id":"https://openalex.org/C45235069","wikidata":"https://www.wikidata.org/wiki/Q278425","display_name":"Table (database)","level":2,"score":0.45917442440986633},{"id":"https://openalex.org/C2994168587","wikidata":"https://www.wikidata.org/wiki/Q5295","display_name":"Random access memory","level":2,"score":0.4561360478401184},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4373074173927307},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3918733298778534},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.35780173540115356},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.3057973384857178},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.2848381996154785},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.26013684272766113},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2020120620727539},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1803693175315857},{"id":"https://openalex.org/C136085584","wikidata":"https://www.wikidata.org/wiki/Q910289","display_name":"Overlay","level":2,"score":0.1445319950580597},{"id":"https://openalex.org/C63511323","wikidata":"https://www.wikidata.org/wiki/Q908936","display_name":"Interleaved memory","level":4,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3317549.3326294","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3317549.3326294","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W2344234954","https://openalex.org/W2735666352","https://openalex.org/W2743723076"],"related_works":["https://openalex.org/W2516517078","https://openalex.org/W2150909864","https://openalex.org/W4382618825","https://openalex.org/W2161286015","https://openalex.org/W2900372418","https://openalex.org/W2094308961","https://openalex.org/W4386903460","https://openalex.org/W2533585248","https://openalex.org/W2125880695","https://openalex.org/W2080843961"],"abstract_inverted_index":{"In":[0],"the":[1,11,18,76,89],"zettabyte":[2],"era,":[3],"per-flow":[4],"measurement":[5,130],"becomes":[6,28],"more":[7],"challenging":[8],"owing":[9],"to":[10,80,96,114,126],"growth":[12],"of":[13,20,24,26,41,48,78,92,112],"both":[14],"traffic":[15],"volumes":[16,47],"and":[17,32,74,102],"number":[19,77],"flows.":[21],"Also,":[22],"swiftness":[23],"detection":[25],"anomalies":[27],"paramount.":[29],"For":[30],"fast":[31,65],"accurate":[33,38],"anomaly":[34],"detection,":[35],"managing":[36],"an":[37],"working":[39],"set":[40],"active":[42],"flows":[43],"(WSAF)":[44],"from":[45],"massive":[46,124],"packet":[49],"influxes":[50,125],"at":[51],"line":[52],"rates":[53],"is":[54,59,83],"a":[55,63,104,137],"key":[56,144],"challenge.":[57],"WSAF":[58,99,113,127],"usually":[60],"located":[61],"in":[62,110,136],"very":[64],"but":[66],"expensive":[67],"memory,":[68],"such":[69],"as":[70],"TCAM":[71],"or":[72],"SRAM,":[73],"thus":[75],"entries":[79],"be":[81],"stored":[82],"quite":[84],"limited.":[85],"To":[86],"cope":[87],"with":[88,100,150],"scalability":[90],"issue":[91],"WSAF,":[93],"we":[94],"propose":[95],"use":[97],"In-DRAM":[98],"scales,":[101],"put":[103],"compact":[105],"data":[106],"structure":[107],"called":[108],"FlowRegulator":[109,146],"front":[111],"compensate":[115],"for":[116],"DRAM's":[117],"slow":[118],"access":[119],"time":[120],"by":[121],"substantially":[122],"reducing":[123],"without":[128],"compromising":[129],"accuracy.":[131,152],"We":[132],"evaluated":[133],"our":[134],"system":[135],"large":[138],"scale":[139],"real-world":[140],"experiment.":[141],"As":[142],"one":[143],"application,":[145],"detected":[147],"heavy":[148],"hitters":[149],"99.8%":[151]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
