{"id":"https://openalex.org/W4312855084","doi":"https://doi.org/10.1145/3557738.3557849","title":"Malicious traffic analysis using Markov chain","display_name":"Malicious traffic analysis using Markov chain","publication_year":2022,"publication_date":"2022-09-21","ids":{"openalex":"https://openalex.org/W4312855084","doi":"https://doi.org/10.1145/3557738.3557849"},"language":"en","primary_location":{"id":"doi:10.1145/3557738.3557849","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3557738.3557849","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Engineering and Information Technology for Sustainable Industry","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072450894","display_name":"Ryandy Djap","orcid":null},"institutions":[{"id":"https://openalex.org/I100406981","display_name":"Swiss German University","ror":"https://ror.org/047rtk203","country_code":"ID","type":"education","lineage":["https://openalex.org/I100406981"]}],"countries":["ID"],"is_corresponding":true,"raw_author_name":"Ryandy Djap","raw_affiliation_strings":["Swiss German University, Indonesia"],"affiliations":[{"raw_affiliation_string":"Swiss German University, Indonesia","institution_ids":["https://openalex.org/I100406981"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101588651","display_name":"Charles Lim","orcid":null},"institutions":[{"id":"https://openalex.org/I100406981","display_name":"Swiss German University","ror":"https://ror.org/047rtk203","country_code":"ID","type":"education","lineage":["https://openalex.org/I100406981"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Charles Lim","raw_affiliation_strings":["Swiss German University, Indonesia"],"affiliations":[{"raw_affiliation_string":"Swiss German University, Indonesia","institution_ids":["https://openalex.org/I100406981"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030238087","display_name":"Kalpin Erlangga Silaen","orcid":"https://orcid.org/0009-0007-9977-6018"},"institutions":[{"id":"https://openalex.org/I100406981","display_name":"Swiss German University","ror":"https://ror.org/047rtk203","country_code":"ID","type":"education","lineage":["https://openalex.org/I100406981"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Kalpin Erlangga Silaen","raw_affiliation_strings":["Swiss German University, Indonesia"],"affiliations":[{"raw_affiliation_string":"Swiss German University, Indonesia","institution_ids":["https://openalex.org/I100406981"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5072450894"],"corresponding_institution_ids":["https://openalex.org/I100406981"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.174079,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.806226909160614},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6984256505966187},{"id":"https://openalex.org/keywords/markov-chain","display_name":"Markov chain","score":0.6538149118423462},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6534295082092285},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.4858679175376892},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.47390687465667725},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2201956808567047},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.21435555815696716},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.17598363757133484},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1301887333393097},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.08433398604393005}],"concepts":[{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.806226909160614},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6984256505966187},{"id":"https://openalex.org/C98763669","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov chain","level":2,"score":0.6538149118423462},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6534295082092285},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.4858679175376892},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.47390687465667725},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2201956808567047},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.21435555815696716},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.17598363757133484},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1301887333393097},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.08433398604393005},{"id":"https://openalex.org/C115304011","wikidata":"https://www.wikidata.org/wiki/Q72755","display_name":"Schwarzschild radius","level":3,"score":0.0},{"id":"https://openalex.org/C2776401274","wikidata":"https://www.wikidata.org/wiki/Q3756855","display_name":"Accretion (finance)","level":2,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3557738.3557849","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3557738.3557849","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Engineering and Information Technology for Sustainable Industry","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/3","display_name":"Good health and well-being","score":0.8600000143051147}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W16074836","https://openalex.org/W1418477825","https://openalex.org/W1856750239","https://openalex.org/W2001643719","https://openalex.org/W2062277720","https://openalex.org/W2066664409","https://openalex.org/W2095881341","https://openalex.org/W2134801739","https://openalex.org/W2162240407","https://openalex.org/W2333394450","https://openalex.org/W2517718267","https://openalex.org/W2617787249","https://openalex.org/W2678934292","https://openalex.org/W2885391676","https://openalex.org/W3032927984","https://openalex.org/W3091890513","https://openalex.org/W3094576738","https://openalex.org/W3107170288","https://openalex.org/W3197786100","https://openalex.org/W4205537960"],"related_works":["https://openalex.org/W3159690896","https://openalex.org/W4230824443","https://openalex.org/W2945572725","https://openalex.org/W1989286518","https://openalex.org/W2921012173","https://openalex.org/W2758517546","https://openalex.org/W3134680667","https://openalex.org/W2804396347","https://openalex.org/W2185943007","https://openalex.org/W4220912467"],"abstract_inverted_index":{"A":[0,26],"massive":[1],"increase":[2],"in":[3],"cyber":[4],"attacks":[5,38],"during":[6],"pandemics":[7],"has":[8,28],"made":[9],"enterprise":[10,41],"organizations":[11],"around":[12],"the":[13,40,58],"world":[14],"strive":[15],"to":[16,20,47],"find":[17],"new":[18],"ways":[19],"comprehend":[21],"and":[22],"detect":[23],"unknown":[24],"threats.":[25],"firewall":[27,53],"been":[29],"devised":[30],"specifically":[31],"for":[32],"these":[33,49],"tasks,":[34],"warding":[35],"off":[36],"external":[37],"on":[39,57],"perimeter":[42],"network.":[43],"Our":[44],"research":[45,65],"aims":[46],"identify":[48],"possible":[50],"intrusions":[51],"through":[52],"traffic":[54,75],"analysis":[55],"based":[56],"Markov":[59],"chain":[60],"state":[61],"transition":[62],"graph.":[63],"The":[64],"results":[66],"show":[67],"that":[68],"our":[69],"methods":[70],"can":[71],"clearly":[72],"distinguish":[73],"malicious":[74],"from":[76],"anomaly":[77],"traffic.":[78]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
