{"id":"https://openalex.org/W2129139910","doi":"https://doi.org/10.1145/2345396.2345484","title":"An effective unsupervised network anomaly detection method","display_name":"An effective unsupervised network anomaly detection method","publication_year":2012,"publication_date":"2012-08-03","ids":{"openalex":"https://openalex.org/W2129139910","doi":"https://doi.org/10.1145/2345396.2345484","mag":"2129139910"},"language":"en","primary_location":{"id":"doi:10.1145/2345396.2345484","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2345396.2345484","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Advances in Computing, Communications and Informatics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044933320","display_name":"Monowar Bhuyan","orcid":"https://orcid.org/0000-0002-9842-7840"},"institutions":[{"id":"https://openalex.org/I126601174","display_name":"Tezpur University","ror":"https://ror.org/005x56091","country_code":"IN","type":"education","lineage":["https://openalex.org/I126601174"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Monowar H. Bhuyan","raw_affiliation_strings":["Tezpur University Tezpur, Assam","Tezpur University Tezpur, Assam#TAB#"],"affiliations":[{"raw_affiliation_string":"Tezpur University Tezpur, Assam","institution_ids":["https://openalex.org/I126601174"]},{"raw_affiliation_string":"Tezpur University Tezpur, Assam#TAB#","institution_ids":["https://openalex.org/I126601174"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071372272","display_name":"Dhruba K. Bhattacharyya","orcid":"https://orcid.org/0000-0002-9506-7640"},"institutions":[{"id":"https://openalex.org/I126601174","display_name":"Tezpur University","ror":"https://ror.org/005x56091","country_code":"IN","type":"education","lineage":["https://openalex.org/I126601174"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"D. K. Bhattacharyya","raw_affiliation_strings":["Tezpur University Tezpur, Assam, India","[Tezpur University Tezpur, Assam, India]"],"affiliations":[{"raw_affiliation_string":"Tezpur University Tezpur, Assam, India","institution_ids":["https://openalex.org/I126601174"]},{"raw_affiliation_string":"[Tezpur University Tezpur, Assam, India]","institution_ids":["https://openalex.org/I126601174"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049180880","display_name":"Jugal Kalita","orcid":"https://orcid.org/0000-0002-8765-7018"},"institutions":[{"id":"https://openalex.org/I888729015","display_name":"University of Colorado Colorado Springs","ror":"https://ror.org/054spjc55","country_code":"US","type":"education","lineage":["https://openalex.org/I888729015"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"J. K. Kalita","raw_affiliation_strings":["University of Colorado at Colorado Springs CO","University of Colorado at Colorado Springs, CO"],"affiliations":[{"raw_affiliation_string":"University of Colorado at Colorado Springs CO","institution_ids":["https://openalex.org/I888729015"]},{"raw_affiliation_string":"University of Colorado at Colorado Springs, CO","institution_ids":["https://openalex.org/I888729015"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5044933320"],"corresponding_institution_ids":["https://openalex.org/I126601174"],"apc_list":null,"apc_paid":null,"fwci":4.9643,"has_fulltext":false,"cited_by_count":45,"citation_normalized_percentile":{"value":0.95620017,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"533","last_page":"539"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7879953980445862},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.6743177771568298},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.642421305179596},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6363023519515991},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6275741457939148},{"id":"https://openalex.org/keywords/subspace-topology","display_name":"Subspace topology","score":0.5789557695388794},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5363003611564636},{"id":"https://openalex.org/keywords/stability","display_name":"Stability (learning theory)","score":0.5256998538970947},{"id":"https://openalex.org/keywords/cluster","display_name":"Cluster (spacecraft)","score":0.5094509720802307},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.49756959080696106},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4720897376537323},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4228418469429016},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.41021764278411865},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3683735430240631}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7879953980445862},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.6743177771568298},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.642421305179596},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6363023519515991},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6275741457939148},{"id":"https://openalex.org/C32834561","wikidata":"https://www.wikidata.org/wiki/Q660730","display_name":"Subspace topology","level":2,"score":0.5789557695388794},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5363003611564636},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.5256998538970947},{"id":"https://openalex.org/C164866538","wikidata":"https://www.wikidata.org/wiki/Q367351","display_name":"Cluster (spacecraft)","level":2,"score":0.5094509720802307},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.49756959080696106},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4720897376537323},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4228418469429016},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.41021764278411865},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3683735430240631},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2345396.2345484","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2345396.2345484","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Advances in Computing, Communications and Informatics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1928121903","display_name":null,"funder_award_id":"CNS-095876CNS-0851783","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1556024794","https://openalex.org/W1963678392","https://openalex.org/W1971585691","https://openalex.org/W1974603499","https://openalex.org/W1975415766","https://openalex.org/W1987971958","https://openalex.org/W1996747841","https://openalex.org/W2007087405","https://openalex.org/W2017380649","https://openalex.org/W2029064186","https://openalex.org/W2029979651","https://openalex.org/W2032620230","https://openalex.org/W2045012776","https://openalex.org/W2051224630","https://openalex.org/W2071897576","https://openalex.org/W2076384720","https://openalex.org/W2082860616","https://openalex.org/W2103414007","https://openalex.org/W2103806672","https://openalex.org/W2116219421","https://openalex.org/W2122646361","https://openalex.org/W2129066856","https://openalex.org/W2157665255","https://openalex.org/W2185136587","https://openalex.org/W2219151637","https://openalex.org/W3120740533","https://openalex.org/W6686151440"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W4312814274","https://openalex.org/W4285370786","https://openalex.org/W2296488620","https://openalex.org/W2122022187","https://openalex.org/W2115529843"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,43],"present":[4],"an":[5,52,78],"effective":[6,53],"tree":[7],"based":[8,62],"subspace":[9],"clustering":[10],"technique":[11,56,75],"(TreeCLUS)":[12],"for":[13,21,81],"finding":[14,39],"clusters":[15,86],"in":[16,38,99],"network":[17],"intrusion":[18,105],"data":[19],"and":[20,97,111],"detecting":[22],"unknown":[23,109],"attacks":[24,110],"without":[25],"using":[26],"any":[27],"labelled":[28,60],"traffic":[29],"or":[30,32],"signatures":[31],"training.":[33],"To":[34],"establish":[35],"its":[36],"effectiveness":[37],"all":[40],"possible":[41],"clusters,":[42],"perform":[44],"a":[45,73],"cluster":[46,54,66],"stability":[47,82],"analysis.":[48],"We":[49,90],"also":[50],"introduce":[51],"labelling":[55],"(CLUSLab)":[57],"to":[58,107],"generate":[59],"dataset":[61],"on":[63],"the":[64,85,92,116],"stable":[65],"set":[67],"generated":[68,87],"by":[69,88],"TreeCLUS.":[70,89],"CLUSLab":[71,98],"is":[72],"multi-objective":[74],"that":[76,113],"exploits":[77],"ensemble":[79],"approach":[80],"analysis":[83],"of":[84,94,101],"evaluate":[91],"performance":[93],"both":[95,114],"TreeCLUS":[96],"terms":[100],"several":[102],"real":[103],"world":[104],"datasets":[106],"identify":[108],"find":[112],"outperform":[115],"competing":[117],"algorithms.":[118]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":7},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
