{"id":"https://openalex.org/W2946707419","doi":"https://doi.org/10.1145/3317549.3326308","title":"Deep learning approach to detect malicious attacks at system level","display_name":"Deep learning approach to detect malicious attacks at system level","publication_year":2019,"publication_date":"2019-05-15","ids":{"openalex":"https://openalex.org/W2946707419","doi":"https://doi.org/10.1145/3317549.3326308","mag":"2946707419"},"language":"en","primary_location":{"id":"doi:10.1145/3317549.3326308","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3317549.3326308","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051888670","display_name":"Jayesh Soni","orcid":"https://orcid.org/0000-0002-5740-4597"},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jayesh Soni","raw_affiliation_strings":["Florida International University"],"affiliations":[{"raw_affiliation_string":"Florida International University","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078708364","display_name":"Nagarajan Prabakar","orcid":"https://orcid.org/0009-0009-5865-588X"},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nagarajan Prabakar","raw_affiliation_strings":["Florida International University"],"affiliations":[{"raw_affiliation_string":"Florida International University","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018871446","display_name":"Himanshu Upadhyay","orcid":"https://orcid.org/0000-0002-2958-0526"},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Himanshu Upadhyay","raw_affiliation_strings":["Florida International University"],"affiliations":[{"raw_affiliation_string":"Florida International University","institution_ids":["https://openalex.org/I19700959"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5051888670"],"corresponding_institution_ids":["https://openalex.org/I19700959"],"apc_list":null,"apc_paid":null,"fwci":0.8842,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.76137071,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"314","last_page":"315"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8080606460571289},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7724699974060059},{"id":"https://openalex.org/keywords/system-call","display_name":"System call","score":0.7409836649894714},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7362213730812073},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6896384358406067},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.515447199344635},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.513398289680481},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.511590301990509},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.4410412013530731},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4005361795425415},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3537577986717224},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2933529019355774},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1173388659954071}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8080606460571289},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7724699974060059},{"id":"https://openalex.org/C2778579508","wikidata":"https://www.wikidata.org/wiki/Q722192","display_name":"System call","level":2,"score":0.7409836649894714},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7362213730812073},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6896384358406067},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.515447199344635},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.513398289680481},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.511590301990509},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.4410412013530731},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4005361795425415},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3537577986717224},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2933529019355774},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1173388659954071},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3317549.3326308","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3317549.3326308","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306078","display_name":"U.S. Department of Defense","ror":"https://ror.org/0447fe631"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W2064675550","https://openalex.org/W2115701093","https://openalex.org/W2559655401"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W11100131","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2667207928","https://openalex.org/W1969635302","https://openalex.org/W2912112202"],"abstract_inverted_index":{"Host":[0],"based":[1],"intrusion":[2],"detection":[3],"systems":[4],"monitor":[5],"operations":[6],"for":[7,78],"significant":[8],"deviations":[9],"from":[10],"normal":[11,27],"and":[12,68],"healthy":[13],"behavior.":[14,28,46],"Anomalies":[15],"are":[16],"patterns":[17],"in":[18,93],"data":[19],"that":[20,52],"do":[21],"not":[22],"conform":[23],"to":[24,40],"the":[25,37,44,57,94],"expected":[26],"System":[29],"call":[30,59],"analysis":[31],"has":[32],"been":[33],"conclusively":[34],"established":[35],"as":[36],"best":[38],"method":[39],"reveal":[41],"details":[42],"about":[43],"program":[45],"Therefore,":[47],"attackers":[48],"create":[49],"new":[50],"exploits":[51],"makes":[53],"major":[54],"impact":[55],"at":[56],"system":[58,85,95],"level.":[60],"In":[61],"this":[62],"research,":[63],"we":[64],"developed":[65],"an":[66],"enhanced":[67],"optimized":[69],"deep":[70],"learning":[71],"LSTM":[72],"(Long":[73],"Short":[74],"Term":[75],"Memory)":[76],"network,":[77],"anomaly":[79],"detection,":[80],"trained":[81],"on":[82],"sequences":[83],"of":[84],"calls.":[86],"Our":[87],"model":[88],"detects":[89],"any":[90],"anomalous":[91],"behavior":[92],"calls":[96],"with":[97],"80%":[98],"accuracy.":[99]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
