{"id":"https://openalex.org/W4390322279","doi":"https://doi.org/10.1145/3617184.3630132","title":"Anomalous Traffic Detection in Campus Networks based on NetFlow and CNN","display_name":"Anomalous Traffic Detection in Campus Networks based on NetFlow and CNN","publication_year":2023,"publication_date":"2023-09-22","ids":{"openalex":"https://openalex.org/W4390322279","doi":"https://doi.org/10.1145/3617184.3630132"},"language":"en","primary_location":{"id":"doi:10.1145/3617184.3630132","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3617184.3630132","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th International Conference on Cyber Security and Information Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103232798","display_name":"Yang Yang","orcid":"https://orcid.org/0009-0001-4910-9387"},"institutions":[{"id":"https://openalex.org/I4210161087","display_name":"Hebei University of Architecture","ror":"https://ror.org/058ange06","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210161087"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yang Yang","raw_affiliation_strings":["HeBei University of Architecture, China"],"affiliations":[{"raw_affiliation_string":"HeBei University of Architecture, China","institution_ids":["https://openalex.org/I4210161087"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054119283","display_name":"Juxing Di","orcid":"https://orcid.org/0009-0008-8120-0595"},"institutions":[{"id":"https://openalex.org/I4210161087","display_name":"Hebei University of Architecture","ror":"https://ror.org/058ange06","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210161087"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Juxing Di","raw_affiliation_strings":["HeBei University of Architecture, China"],"affiliations":[{"raw_affiliation_string":"HeBei University of Architecture, China","institution_ids":["https://openalex.org/I4210161087"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028746509","display_name":"Wencheng Zhang","orcid":"https://orcid.org/0009-0006-1434-6864"},"institutions":[{"id":"https://openalex.org/I4210161087","display_name":"Hebei University of Architecture","ror":"https://ror.org/058ange06","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210161087"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wencheng Zhang","raw_affiliation_strings":["HeBei University of Architecture, China"],"affiliations":[{"raw_affiliation_string":"HeBei University of Architecture, China","institution_ids":["https://openalex.org/I4210161087"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102024709","display_name":"Fumei Yu","orcid":"https://orcid.org/0009-0009-0664-8741"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fumei Yu","raw_affiliation_strings":["Second Primary School of Taibus Banner Xilingol League, China"],"affiliations":[{"raw_affiliation_string":"Second Primary School of Taibus Banner Xilingol League, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5103232798"],"corresponding_institution_ids":["https://openalex.org/I4210161087"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18160296,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"200","last_page":"203"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/netflow","display_name":"NetFlow","score":0.9307460188865662},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7749601602554321},{"id":"https://openalex.org/keywords/campus-network","display_name":"Campus network","score":0.6576101183891296},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6226480007171631},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.5766534805297852},{"id":"https://openalex.org/keywords/convolution","display_name":"Convolution (computer science)","score":0.5306220054626465},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.5171253681182861},{"id":"https://openalex.org/keywords/traffic-generation-model","display_name":"Traffic generation model","score":0.45384281873703003},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4491090178489685},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.40898287296295166},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.398211270570755},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3449266254901886},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3050081729888916},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.07503587007522583}],"concepts":[{"id":"https://openalex.org/C188067584","wikidata":"https://www.wikidata.org/wiki/Q219363","display_name":"NetFlow","level":2,"score":0.9307460188865662},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7749601602554321},{"id":"https://openalex.org/C2780944068","wikidata":"https://www.wikidata.org/wiki/Q1093877","display_name":"Campus network","level":2,"score":0.6576101183891296},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6226480007171631},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5766534805297852},{"id":"https://openalex.org/C45347329","wikidata":"https://www.wikidata.org/wiki/Q5166604","display_name":"Convolution (computer science)","level":3,"score":0.5306220054626465},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.5171253681182861},{"id":"https://openalex.org/C176715033","wikidata":"https://www.wikidata.org/wiki/Q2080768","display_name":"Traffic generation model","level":2,"score":0.45384281873703003},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4491090178489685},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.40898287296295166},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.398211270570755},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3449266254901886},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3050081729888916},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.07503587007522583},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3617184.3630132","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3617184.3630132","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th International Conference on Cyber Security and Information Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W2743678626","https://openalex.org/W2912924201","https://openalex.org/W2919493784","https://openalex.org/W2963516518","https://openalex.org/W2976836186","https://openalex.org/W3213310772","https://openalex.org/W3214327612","https://openalex.org/W4237357939","https://openalex.org/W4245009289"],"related_works":["https://openalex.org/W2352838257","https://openalex.org/W2383094426","https://openalex.org/W4226086312","https://openalex.org/W2367195528","https://openalex.org/W2385694529","https://openalex.org/W4301398392","https://openalex.org/W2163195474","https://openalex.org/W2135445399","https://openalex.org/W2997818875","https://openalex.org/W2118983374"],"abstract_inverted_index":{"With":[0],"the":[1,47,55,67,75,92,102,111,127],"popularization":[2],"and":[3,12,27,43,53,72,109,121,129],"massive":[4],"use":[5],"of":[6,10,49,57,69,77,94,105,114,131],"Internet,":[7],"various":[8],"types":[9],"attacks":[11],"abnormal":[13,33,95],"traffic":[14,34,96,108,119],"in":[15,35,87],"campus":[16,36,106,115],"networks":[17],"are":[18],"emerging.":[19],"In":[20],"this":[21],"paper,":[22],"based":[23],"on":[24,46],"NetFlow":[25],"technology":[26],"convolutional":[28],"neural":[29,51,82],"network":[30,83,107,116],"to":[31],"analyze":[32],"network,":[37,52],"we":[38],"add":[39],"point":[40],"group":[41,58],"convolution":[42,59],"channel":[44],"randomization":[45],"basis":[48],"traditional":[50],"solve":[54],"problems":[56],"by":[60],"shuffling":[61],"different":[62],"channels,":[63],"which":[64,89,123],"greatly":[65,90],"reduces":[66],"amount":[68],"model":[70,78,84],"operations":[71],"speeds":[73],"up":[74],"speed":[76],"classification.":[79,97],"The":[80,98],"improved":[81],"achieves":[85],"93.8%.":[86],"accuracy,":[88],"improves":[91],"accuracy":[93],"method":[99],"can":[100,124],"realize":[101,110],"real-time":[103,112],"collection":[104],"monitoring":[113],"condition":[117],"through":[118],"analysis":[120],"comparison,":[122],"strongly":[125],"guarantee":[126],"security":[128],"stability":[130],"university":[132],"network.":[133]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
