{"id":"https://openalex.org/W3121104991","doi":"https://doi.org/10.1145/3444370.3444612","title":"REAL-GUARD","display_name":"REAL-GUARD","publication_year":2020,"publication_date":"2020-12-04","ids":{"openalex":"https://openalex.org/W3121104991","doi":"https://doi.org/10.1145/3444370.3444612","mag":"3121104991"},"language":"en","primary_location":{"id":"doi:10.1145/3444370.3444612","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3444370.3444612","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100453144","display_name":"Qi Liu","orcid":"https://orcid.org/0000-0001-5378-6404"},"institutions":[{"id":"https://openalex.org/I31637741","display_name":"Inner Mongolia University of Science and Technology","ror":"https://ror.org/044rgx723","country_code":"CN","type":"education","lineage":["https://openalex.org/I31637741"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qi Liu","raw_affiliation_strings":["College of Computer Science, Inner Mongolia University, Hohhot, Inner Mongolia, China and School of Information Engineering, Inner Mongolia University of Science &amp; Technology, Baotou, Inner Mongolia, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Inner Mongolia University, Hohhot, Inner Mongolia, China and School of Information Engineering, Inner Mongolia University of Science &amp; Technology, Baotou, Inner Mongolia, China","institution_ids":["https://openalex.org/I31637741"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003226276","display_name":"Ruan Hongwei","orcid":null},"institutions":[{"id":"https://openalex.org/I2722730","display_name":"Inner Mongolia University","ror":"https://ror.org/0106qb496","country_code":"CN","type":"education","lineage":["https://openalex.org/I2722730"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongwei Ruan","raw_affiliation_strings":["College of Computer Science, Inner Mongolia University, Hohhot, Inner Mongolia, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Inner Mongolia University, Hohhot, Inner Mongolia, China","institution_ids":["https://openalex.org/I2722730"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057105337","display_name":"Hua Li","orcid":"https://orcid.org/0000-0002-5629-2247"},"institutions":[{"id":"https://openalex.org/I2722730","display_name":"Inner Mongolia University","ror":"https://ror.org/0106qb496","country_code":"CN","type":"education","lineage":["https://openalex.org/I2722730"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hua Li","raw_affiliation_strings":["College of Computer Science, Inner Mongolia University, Hohhot, Inner Mongolia, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Inner Mongolia University, Hohhot, Inner Mongolia, China","institution_ids":["https://openalex.org/I2722730"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013068913","display_name":"Xiaodi Li","orcid":"https://orcid.org/0000-0002-9301-5265"},"institutions":[{"id":"https://openalex.org/I2722730","display_name":"Inner Mongolia University","ror":"https://ror.org/0106qb496","country_code":"CN","type":"education","lineage":["https://openalex.org/I2722730"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaodi Li","raw_affiliation_strings":["College of Computer Science, Inner Mongolia University, Hohhot, Inner Mongolia, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Inner Mongolia University, Hohhot, Inner Mongolia, China","institution_ids":["https://openalex.org/I2722730"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005553438","display_name":"Xianrong Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I2722730","display_name":"Inner Mongolia University","ror":"https://ror.org/0106qb496","country_code":"CN","type":"education","lineage":["https://openalex.org/I2722730"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xianrong Wang","raw_affiliation_strings":["College of Computer Science, Inner Mongolia University, Hohhot, Inner Mongolia, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Inner Mongolia University, Hohhot, Inner Mongolia, China","institution_ids":["https://openalex.org/I2722730"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100453144"],"corresponding_institution_ids":["https://openalex.org/I31637741"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.22347175,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"13","issue":null,"first_page":"451","last_page":"458"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/forwarding-plane","display_name":"Forwarding plane","score":0.847642183303833},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8208614587783813},{"id":"https://openalex.org/keywords/guard","display_name":"Guard (computer science)","score":0.7757551670074463},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6371408104896545},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.5895467400550842},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5761188268661499},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5662253499031067},{"id":"https://openalex.org/keywords/flooding","display_name":"Flooding (psychology)","score":0.5438675284385681},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3779289126396179},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3623107969760895},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11827567219734192}],"concepts":[{"id":"https://openalex.org/C10597312","wikidata":"https://www.wikidata.org/wiki/Q5473302","display_name":"Forwarding plane","level":3,"score":0.847642183303833},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8208614587783813},{"id":"https://openalex.org/C141141315","wikidata":"https://www.wikidata.org/wiki/Q2379942","display_name":"Guard (computer science)","level":2,"score":0.7757551670074463},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6371408104896545},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.5895467400550842},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5761188268661499},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5662253499031067},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.5438675284385681},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3779289126396179},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3623107969760895},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11827567219734192},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3444370.3444612","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3444370.3444612","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.44999998807907104,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1531996150","https://openalex.org/W2036114538","https://openalex.org/W2160824842","https://openalex.org/W2469255646","https://openalex.org/W2479651337","https://openalex.org/W2519646782","https://openalex.org/W2536380892","https://openalex.org/W2579118500","https://openalex.org/W2587151337","https://openalex.org/W2600267680","https://openalex.org/W2600835176","https://openalex.org/W2750735446","https://openalex.org/W2753652472","https://openalex.org/W2758509082","https://openalex.org/W2785708115","https://openalex.org/W2789828921","https://openalex.org/W2804817434","https://openalex.org/W2889109290","https://openalex.org/W2983337624","https://openalex.org/W4200307116"],"related_works":["https://openalex.org/W4214777079","https://openalex.org/W3122360749","https://openalex.org/W2547441564","https://openalex.org/W2051935741","https://openalex.org/W4377224402","https://openalex.org/W4243609393","https://openalex.org/W4211055425","https://openalex.org/W2926903444","https://openalex.org/W2130026698","https://openalex.org/W2292300552"],"abstract_inverted_index":{"Software":[0],"Defined":[1],"Network":[2],"(SDN)":[3],"is":[4],"a":[5,22,50],"new":[6,33],"networking":[7],"technology":[8],"with":[9,91,115],"the":[10,18],"advantages":[11],"of":[12,25,52],"separating":[13],"data":[14,63],"forwarding":[15,64],"plane":[16],"from":[17],"control":[19],"plane,":[20],"and":[21,47,68,77,86,95,110],"growing":[23],"number":[24],"traditional":[26],"network":[27,34,88],"attacks":[28,44,109,113],"are":[29],"left":[30],"to":[31,84],"this":[32,55],"architecture.":[35],"However,":[36],"current":[37],"solutions":[38],"only":[39],"concentrate":[40],"on":[41],"several":[42],"special":[43],"in":[45,62],"SDN":[46],"bring":[48],"out":[49],"variety":[51],"overhead.":[53,119],"In":[54],"paper,":[56],"we":[57],"consider":[58],"two":[59],"levels":[60],"detection":[61],"plane:":[65],"packet":[66],"level":[67],"flow":[69],"level.":[70],"We":[71],"proposed":[72],"an":[73],"efficient,":[74],"effective,":[75],"real-time":[76],"machine":[78],"learning":[79],"based":[80],"mechanism,":[81],"called":[82],"REAL-GUARD,":[83],"detect":[85,111],"defend":[87,107],"security":[89],"threats":[90],"decision":[92],"tree":[93],"methods":[94],"without":[96],"any":[97],"extra":[98],"devices.":[99],"The":[100],"experiments":[101],"prove":[102],"that":[103],"our":[104],"mechanism":[105],"can":[106],"scanning":[108],"flooding":[112],"effectively":[114],"low":[116],"additional":[117],"performance":[118]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2021-01-18T00:00:00"}
