{"id":"https://openalex.org/W4386486774","doi":"https://doi.org/10.1145/3600061.3600080","title":"Online Detection of 1D and 2D Hierarchical Super-Spreaders in High-Speed Networks","display_name":"Online Detection of 1D and 2D Hierarchical Super-Spreaders in High-Speed Networks","publication_year":2023,"publication_date":"2023-06-29","ids":{"openalex":"https://openalex.org/W4386486774","doi":"https://doi.org/10.1145/3600061.3600080"},"language":"en","primary_location":{"id":"doi:10.1145/3600061.3600080","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3600061.3600080","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th Asia-Pacific Workshop on Networking","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103282521","display_name":"Hao Su","orcid":"https://orcid.org/0000-0002-3681-0406"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hao Su","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University of China, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University of China, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057569553","display_name":"Qingjun Xiao","orcid":"https://orcid.org/0000-0001-5353-9374"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingjun Xiao","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University of China, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University of China, China","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5103282521"],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":0.2009,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.50000899,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"109","last_page":"115"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8022588491439819},{"id":"https://openalex.org/keywords/subnet","display_name":"Subnet","score":0.6127582788467407},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5039824843406677},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4784553050994873},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.45383715629577637},{"id":"https://openalex.org/keywords/estimator","display_name":"Estimator","score":0.4498249888420105},{"id":"https://openalex.org/keywords/subnetwork","display_name":"Subnetwork","score":0.4132445156574249},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3695634603500366},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.103634774684906}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8022588491439819},{"id":"https://openalex.org/C21099817","wikidata":"https://www.wikidata.org/wiki/Q7631721","display_name":"Subnet","level":2,"score":0.6127582788467407},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5039824843406677},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4784553050994873},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.45383715629577637},{"id":"https://openalex.org/C185429906","wikidata":"https://www.wikidata.org/wiki/Q1130160","display_name":"Estimator","level":2,"score":0.4498249888420105},{"id":"https://openalex.org/C2780186347","wikidata":"https://www.wikidata.org/wiki/Q11414","display_name":"Subnetwork","level":2,"score":0.4132445156574249},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3695634603500366},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.103634774684906},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3600061.3600080","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3600061.3600080","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th Asia-Pacific Workshop on Networking","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.699999988079071,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1982945449","https://openalex.org/W2033842778","https://openalex.org/W2082092804","https://openalex.org/W2099657323","https://openalex.org/W2130873644","https://openalex.org/W2138326128","https://openalex.org/W2144982963","https://openalex.org/W2168305032","https://openalex.org/W2205557629","https://openalex.org/W2287844280","https://openalex.org/W2327315875","https://openalex.org/W2737988660","https://openalex.org/W2751952590","https://openalex.org/W2762095987","https://openalex.org/W2768562030","https://openalex.org/W2774049724","https://openalex.org/W3047429575","https://openalex.org/W3172033576","https://openalex.org/W3197219182","https://openalex.org/W3198019842","https://openalex.org/W6687564258"],"related_works":["https://openalex.org/W2102539527","https://openalex.org/W2131631951","https://openalex.org/W2060724872","https://openalex.org/W4296780664","https://openalex.org/W4386946857","https://openalex.org/W4391585494","https://openalex.org/W2168810502","https://openalex.org/W4392930641","https://openalex.org/W1911510050","https://openalex.org/W4205469791"],"abstract_inverted_index":{"Traditionally,":[0],"a":[1,43,48,62],"firewall":[2],"tracks":[3],"the":[4,39,52,78,85,105,121,143,160,188,211],"per-flow":[5],"spread":[6,185],"of":[7,47,54,67,97,156,162,191],"each":[8,68,178],"source":[9,98],"and":[10,18,124,182,219],"destination":[11],"IP":[12,27,50,86],"address":[13,147],"to":[14,76,84,119,132,146,158],"detect":[15,77],"network":[16,44,90,201],"scans":[17],"DDoS":[19],"attacks.":[20],"It":[21,150],"is":[22,151],"not":[23,127],"designed":[24],"with":[25],"hierarchical":[26,69,79,154,170,179,192],"addresses":[28],"in":[29,74],"mind.":[30],"However,":[31],"cyberattacks":[32],"nowadays":[33],"become":[34],"more":[35],"stealthy.":[36],"To":[37],"evade":[38],"detection,":[40],"they":[41],"treat":[42],"subnet":[45,87],"instead":[46],"single":[49],"as":[51],"victim":[53],"an":[55,93,152,174],"attacking":[56],"campaign.":[57],"Therefore,":[58],"we":[59,141],"focus":[60],"on":[61,199],"new":[63],"problem:":[64],"online":[65,130],"estimation":[66,161],"flow\u2019s":[70],"cardinality":[71],"(or":[72],"spread),":[73],"order":[75],"super-spreaders":[80],"(HSSs),":[81],"which":[82],"correspond":[83],"receiving":[88],"numerous":[89],"connections":[91],"from":[92],"extraordinarily":[94],"large":[95],"number":[96],"IPs.":[99],"For":[100],"detecting":[101],"such":[102],"one-dimensional":[103],"HSSs,":[104,123],"recent":[106],"work":[107],"Hierarchical":[108],"virtual":[109,189],"bitmap":[110],"estimator":[111],"(HVE)":[112],"has":[113],"been":[114],"proposed.":[115],"But":[116],"it":[117,125],"fails":[118],"handle":[120],"two-dimensional":[122],"can":[126,209],"be":[128],"queried":[129],"due":[131],"its":[133,196],"very":[134],"high":[135],"query":[136,183,212],"overhead.":[137],"In":[138],"this":[139],"paper,":[140],"propose":[142],"Hon-vHLL":[144,172,208],"sketch":[145,176],"these":[148],"limitations.":[149],"innovative":[153],"extension":[155],"On-vHLL":[157,175],"support":[159],"conditional":[163,184],"spreads":[164],"for":[165,177],"either":[166],"1D":[167],"or":[168],"2D":[169],"flows.":[171,193],"allocates":[173],"level":[180],"bucket":[181],"by":[186,214],"merging":[187],"estimators":[190],"We":[194],"evaluate":[195],"performance":[197],"based":[198],"CAIDA":[200],"traces.":[202],"The":[203],"results":[204],"show":[205],"that":[206],"our":[207],"improve":[210],"throughput":[213],"578":[215],"times":[216],"than":[217],"HVE,":[218],"also":[220],"achieve":[221],"11%":[222],"higher":[223],"HSS":[224],"detection":[225],"accuracy.":[226]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
