{"id":"https://openalex.org/W1977147338","doi":"https://doi.org/10.1155/2014/206867","title":"Packet Payload Monitoring for Internet Worm Content Detection Using Deterministic Finite Automaton with Delayed Dictionary Compression","display_name":"Packet Payload Monitoring for Internet Worm Content Detection Using Deterministic Finite Automaton with Delayed Dictionary Compression","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W1977147338","doi":"https://doi.org/10.1155/2014/206867","mag":"1977147338"},"language":"en","primary_location":{"id":"doi:10.1155/2014/206867","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2014/206867","pdf_url":"https://downloads.hindawi.com/journals/jcnc/2014/206867.pdf","source":{"id":"https://openalex.org/S2764435486","display_name":"Journal of Computer Networks and Communications","issn_l":"2090-7141","issn":["2090-7141","2090-715X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Networks and Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://downloads.hindawi.com/journals/jcnc/2014/206867.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079176741","display_name":"Selvaraj Divya","orcid":null},"institutions":[{"id":"https://openalex.org/I161045824","display_name":"Avinashilingam University","ror":"https://ror.org/05dxzqa20","country_code":"IN","type":"education","lineage":["https://openalex.org/I161045824"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Divya Selvaraj","raw_affiliation_strings":["Department of Computer Science, Avinashilingam Institute for Home Science and Higher Education for Women, Coimbatore 641043, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Avinashilingam Institute for Home Science and Higher Education for Women, Coimbatore 641043, India","institution_ids":["https://openalex.org/I161045824"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074146457","display_name":"G. Padmavathi","orcid":"https://orcid.org/0000-0002-5377-4451"},"institutions":[{"id":"https://openalex.org/I161045824","display_name":"Avinashilingam University","ror":"https://ror.org/05dxzqa20","country_code":"IN","type":"education","lineage":["https://openalex.org/I161045824"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Padmavathi Ganapathi","raw_affiliation_strings":["Department of Computer Science, Avinashilingam Institute for Home Science and Higher Education for Women, Coimbatore 641043, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Avinashilingam Institute for Home Science and Higher Education for Women, Coimbatore 641043, India","institution_ids":["https://openalex.org/I161045824"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5074146457"],"corresponding_institution_ids":["https://openalex.org/I161045824"],"apc_list":{"value":1400,"currency":"USD","value_usd":1400},"apc_paid":{"value":1400,"currency":"USD","value_usd":1400},"fwci":0.0,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.0859657,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"2014","issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8603211641311646},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep packet inspection","score":0.7907931804656982},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.7525622248649597},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.7429925203323364},{"id":"https://openalex.org/keywords/deterministic-finite-automaton","display_name":"Deterministic finite automaton","score":0.6227156519889832},{"id":"https://openalex.org/keywords/regular-expression","display_name":"Regular expression","score":0.5513935089111328},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5287045240402222},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.45767897367477417},{"id":"https://openalex.org/keywords/string-searching-algorithm","display_name":"String searching algorithm","score":0.45476654171943665},{"id":"https://openalex.org/keywords/finite-state-machine","display_name":"Finite-state machine","score":0.4037819802761078},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.32555991411209106},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.31943580508232117},{"id":"https://openalex.org/keywords/pattern-matching","display_name":"Pattern matching","score":0.26680219173431396},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.14976266026496887},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09533646702766418}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8603211641311646},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.7907931804656982},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.7525622248649597},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.7429925203323364},{"id":"https://openalex.org/C104091681","wikidata":"https://www.wikidata.org/wiki/Q837528","display_name":"Deterministic finite automaton","level":3,"score":0.6227156519889832},{"id":"https://openalex.org/C121329065","wikidata":"https://www.wikidata.org/wiki/Q185612","display_name":"Regular expression","level":2,"score":0.5513935089111328},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5287045240402222},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.45767897367477417},{"id":"https://openalex.org/C7757238","wikidata":"https://www.wikidata.org/wiki/Q374040","display_name":"String searching algorithm","level":3,"score":0.45476654171943665},{"id":"https://openalex.org/C167822520","wikidata":"https://www.wikidata.org/wiki/Q176452","display_name":"Finite-state machine","level":2,"score":0.4037819802761078},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32555991411209106},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.31943580508232117},{"id":"https://openalex.org/C68859911","wikidata":"https://www.wikidata.org/wiki/Q1503724","display_name":"Pattern matching","level":2,"score":0.26680219173431396},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14976266026496887},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09533646702766418}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2014/206867","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2014/206867","pdf_url":"https://downloads.hindawi.com/journals/jcnc/2014/206867.pdf","source":{"id":"https://openalex.org/S2764435486","display_name":"Journal of Computer Networks and Communications","issn_l":"2090-7141","issn":["2090-7141","2090-715X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Networks and Communications","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:25c23c54e0114b68b49af73e10416822","is_oa":true,"landing_page_url":"https://doaj.org/article/25c23c54e0114b68b49af73e10416822","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Computer Networks and Communications, Vol 2014 (2014)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2014/206867","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2014/206867","pdf_url":"https://downloads.hindawi.com/journals/jcnc/2014/206867.pdf","source":{"id":"https://openalex.org/S2764435486","display_name":"Journal of Computer Networks and Communications","issn_l":"2090-7141","issn":["2090-7141","2090-715X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Networks and Communications","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1977147338.pdf","grobid_xml":"https://content.openalex.org/works/W1977147338.grobid-xml"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W1507645144","https://openalex.org/W1891233321","https://openalex.org/W1911613893","https://openalex.org/W1963876301","https://openalex.org/W1970433198","https://openalex.org/W1976273563","https://openalex.org/W1984525527","https://openalex.org/W2004067489","https://openalex.org/W2007967176","https://openalex.org/W2033874249","https://openalex.org/W2039390926","https://openalex.org/W2057300905","https://openalex.org/W2060144397","https://openalex.org/W2064652733","https://openalex.org/W2089135085","https://openalex.org/W2095646789","https://openalex.org/W2107510910","https://openalex.org/W2108962885","https://openalex.org/W2111571136","https://openalex.org/W2116065364","https://openalex.org/W2124423813","https://openalex.org/W2146910660","https://openalex.org/W2147799253","https://openalex.org/W2153122359","https://openalex.org/W2159438919","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W1999162684","https://openalex.org/W2113425091","https://openalex.org/W2146605784","https://openalex.org/W2159281873","https://openalex.org/W2015535429","https://openalex.org/W2022407883","https://openalex.org/W4242309756","https://openalex.org/W1969792688","https://openalex.org/W2900276985","https://openalex.org/W2356789226"],"abstract_inverted_index":{"Packet":[0],"content":[1],"scanning":[2],"is":[3,25,86,118,124],"one":[4],"of":[5,20,30,140,162],"the":[6,28,56,62,79,131,144,150],"crucial":[7],"threats":[8],"to":[9,34,54,112],"network":[10,13,24,44],"security":[11],"and":[12,40,47,157],"monitoring":[14,17],"applications.":[15],"In":[16,59,110],"applications,":[18],"payload":[19,141],"packets":[21,49,142],"in":[22,32,52,75,130,143],"a":[23],"matched":[26],"against":[27],"set":[29],"patterns":[31,69],"order":[33,111],"detect":[35],"attacks":[36],"like":[37],"worms,":[38],"viruses,":[39],"protocol":[41],"definitions.":[42],"During":[43],"transfer,":[45],"incoming":[46],"outgoing":[48],"are":[50,66,70],"monitored":[51],"depth":[53],"inspect":[55],"packet":[57,73],"payload.":[58],"this":[60],"paper,":[61],"regular":[63,83,99],"expressions":[64],"that":[65,149],"basically":[67],"string":[68],"analyzed":[71],"for":[72,82,107,126],"payloads":[74],"detecting":[76],"worms.":[77],"Then":[78],"grouping":[80],"scheme":[81],"expression":[84,100],"matching":[85],"rewritten":[87],"using":[88],"Deterministic":[89],"Finite":[90],"Automaton":[91],"(DFA).":[92],"DFA":[93,102],"achieves":[94,135],"better":[95,128,154],"processing":[96],"speed":[97],"during":[98,138,160],"matching.":[101],"requires":[103],"more":[104],"memory":[105,114,158],"space":[106],"each":[108],"state.":[109],"reduce":[113],"utilization,":[115],"decompression":[116],"technique":[117],"used.":[119],"Delayed":[120],"Dictionary":[121],"Compression":[122],"(DDC)":[123],"applied":[125],"achieving":[127],"speeds":[129],"communication":[132],"links.":[133],"DDC":[134],"decoding":[136],"latency":[137],"compression":[139],"network.":[145],"Experimental":[146],"results":[147],"show":[148],"proposed":[151],"approach":[152],"provides":[153],"time":[155],"consumption":[156],"utilization":[159],"detection":[161],"Internet":[163],"worm":[164],"attacks.":[165]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
