{"id":"https://openalex.org/W3047415238","doi":"https://doi.org/10.1155/2020/8826038","title":"BLATTA: Early Exploit Detection on Network Traffic with Recurrent Neural Networks","display_name":"BLATTA: Early Exploit Detection on Network Traffic with Recurrent Neural Networks","publication_year":2020,"publication_date":"2020-08-04","ids":{"openalex":"https://openalex.org/W3047415238","doi":"https://doi.org/10.1155/2020/8826038","mag":"3047415238"},"language":"en","primary_location":{"id":"doi:10.1155/2020/8826038","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8826038","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8826038.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2020/8826038.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028417272","display_name":"Baskoro Adi Pratomo","orcid":"https://orcid.org/0000-0002-1419-7073"},"institutions":[{"id":"https://openalex.org/I79510175","display_name":"Cardiff University","ror":"https://ror.org/03kk7td41","country_code":"GB","type":"education","lineage":["https://openalex.org/I79510175"]},{"id":"https://openalex.org/I166843116","display_name":"Sepuluh Nopember Institute of Technology","ror":"https://ror.org/05kbmmt89","country_code":"ID","type":"education","lineage":["https://openalex.org/I166843116"]}],"countries":["GB","ID"],"is_corresponding":true,"raw_author_name":"Baskoro A. Pratomo","raw_affiliation_strings":["Informatics Department, Institut Teknologi Sepuluh Nopember, Surabaya, Indonesia","School of Computer Science and Informatics, Cardiff University, Cardiff, UK"],"affiliations":[{"raw_affiliation_string":"Informatics Department, Institut Teknologi Sepuluh Nopember, Surabaya, Indonesia","institution_ids":["https://openalex.org/I166843116"]},{"raw_affiliation_string":"School of Computer Science and Informatics, Cardiff University, Cardiff, UK","institution_ids":["https://openalex.org/I79510175"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090436792","display_name":"Pete Burnap","orcid":"https://orcid.org/0000-0003-0396-633X"},"institutions":[{"id":"https://openalex.org/I79510175","display_name":"Cardiff University","ror":"https://ror.org/03kk7td41","country_code":"GB","type":"education","lineage":["https://openalex.org/I79510175"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Pete Burnap","raw_affiliation_strings":["School of Computer Science and Informatics, Cardiff University, Cardiff, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Informatics, Cardiff University, Cardiff, UK","institution_ids":["https://openalex.org/I79510175"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042246090","display_name":"George Theodorakopoulos","orcid":"https://orcid.org/0000-0003-2701-7809"},"institutions":[{"id":"https://openalex.org/I79510175","display_name":"Cardiff University","ror":"https://ror.org/03kk7td41","country_code":"GB","type":"education","lineage":["https://openalex.org/I79510175"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"George Theodorakopoulos","raw_affiliation_strings":["School of Computer Science and Informatics, Cardiff University, Cardiff, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Informatics, Cardiff University, Cardiff, UK","institution_ids":["https://openalex.org/I79510175"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5028417272"],"corresponding_institution_ids":["https://openalex.org/I166843116","https://openalex.org/I79510175"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":1.696,"has_fulltext":true,"cited_by_count":13,"citation_normalized_percentile":{"value":0.85464433,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"15"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.9490214586257935},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8943755626678467},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.7075706720352173},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6047083139419556},{"id":"https://openalex.org/keywords/warning-system","display_name":"Warning system","score":0.5713338851928711},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.5057117938995361},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4783158600330353},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4561750590801239},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.44304826855659485},{"id":"https://openalex.org/keywords/recurrent-neural-network","display_name":"Recurrent neural network","score":0.42264145612716675},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.42196977138519287},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3493896424770355},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3437437415122986},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09530088305473328}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.9490214586257935},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8943755626678467},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.7075706720352173},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6047083139419556},{"id":"https://openalex.org/C29825287","wikidata":"https://www.wikidata.org/wiki/Q1427940","display_name":"Warning system","level":2,"score":0.5713338851928711},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.5057117938995361},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4783158600330353},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4561750590801239},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.44304826855659485},{"id":"https://openalex.org/C147168706","wikidata":"https://www.wikidata.org/wiki/Q1457734","display_name":"Recurrent neural network","level":3,"score":0.42264145612716675},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.42196977138519287},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3493896424770355},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3437437415122986},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09530088305473328},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1155/2020/8826038","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8826038","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8826038.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:79a2d0d9ca5d4abfa786752135296fa5","is_oa":true,"landing_page_url":"https://doaj.org/article/79a2d0d9ca5d4abfa786752135296fa5","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"},{"id":"pmh:oai:https://orca.cardiff.ac.uk:132917","is_oa":false,"landing_page_url":"https://orca.cardiff.ac.uk/id/eprint/132917/7/8826038.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306401195","display_name":"ORCA Online Research @Cardiff (Cardiff University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79510175","host_organization_name":"Cardiff University","host_organization_lineage":["https://openalex.org/I79510175"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":{"id":"doi:10.1155/2020/8826038","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8826038","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8826038.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5,"id":"https://metadata.un.org/sdg/4","display_name":"Quality Education"},{"score":0.4000000059604645,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320328515","display_name":"Lembaga Pengelola Dana Pendidikan","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3047415238.pdf","grobid_xml":"https://content.openalex.org/works/W3047415238.grobid-xml"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W1965334909","https://openalex.org/W1985902740","https://openalex.org/W1999427165","https://openalex.org/W2031163547","https://openalex.org/W2035247360","https://openalex.org/W2064675550","https://openalex.org/W2066664409","https://openalex.org/W2086437504","https://openalex.org/W2092384028","https://openalex.org/W2110890874","https://openalex.org/W2121035740","https://openalex.org/W2150188172","https://openalex.org/W2276979642","https://openalex.org/W2487815886","https://openalex.org/W2501244995","https://openalex.org/W2556408062","https://openalex.org/W2768426510","https://openalex.org/W2784268691","https://openalex.org/W2840169530","https://openalex.org/W2890507837","https://openalex.org/W2941716987","https://openalex.org/W2963516518","https://openalex.org/W2981318525"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W4312814274","https://openalex.org/W4285370786","https://openalex.org/W2296488620","https://openalex.org/W2358353312","https://openalex.org/W3160314615"],"abstract_inverted_index":{"Detecting":[0],"exploits":[1,47],"is":[2,147],"crucial":[3],"since":[4],"the":[5,17,33,36,73,81,95,102,148],"effect":[6],"of":[7,38,76,120,158,177],"undetected":[8],"ones":[9],"can":[10],"be":[11],"devastating.":[12],"Identifying":[13],"their":[14,25,53],"presence":[15,54],"on":[16,63,101],"network":[18,39,115],"allows":[19],"us":[20],"to":[21,32,51,58,90,124,151],"respond":[22],"and":[23,55,134,173],"block":[24],"malicious":[26,69,126,159],"payload":[27,37],"before":[28],"they":[29,49],"cause":[30],"damage":[31],"system.":[34,103,180],"Inspecting":[35],"traffic":[40,70,127],"may":[41],"offer":[42],"better":[43],"performance":[44],"in":[45],"detecting":[46,68,164],"as":[48],"tend":[50],"hide":[52],"behave":[56],"similarly":[57],"legitimate":[59],"traffic.":[60],"Previous":[61],"works":[62],"deep":[64],"packet":[65],"inspection":[66],"for":[67],"regularly":[71],"read":[72],"full":[74],"length":[75,82],"application":[77,121,160],"layer":[78,122,161],"messages.":[79],"As":[80],"varies,":[83],"longer":[84],"messages":[85,123],"will":[86],"take":[87],"more":[88],"time":[89,94],"analyse,":[91],"during":[92],"which":[93],"attack":[96,167],"creates":[97],"a":[98,107,130,135,165,175],"disruptive":[99],"impact":[100],"Hence,":[104],"we":[105],"propose":[106],"novel":[108],"early":[109,156,178],"exploit":[110],"detection":[111,132],"mechanism":[112],"that":[113,154],"scans":[114],"traffic,":[116],"reading":[117],"only":[118],"35.21%":[119],"predict":[125],"while":[128],"retaining":[129],"97.57%":[131],"rate":[133],"1.93%":[136],"false":[137],"positive":[138],"rate.":[139],"Our":[140],"recurrent":[141],"neural":[142],"network-":[143],"(RNN-)":[144],"based":[145],"model":[146],"first":[149],"work":[150],"our":[152],"knowledge":[153],"provides":[155],"prediction":[157],"messages,":[162],"thus":[163],"potential":[166],"earlier":[168],"than":[169],"other":[170],"state-of-the-art":[171],"approaches":[172],"enabling":[174],"form":[176],"warning":[179]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2020-08-10T00:00:00"}
