{"id":"https://openalex.org/W2811344749","doi":"https://doi.org/10.1504/ijsn.2018.10014317","title":"A cloud/edge computing streaming system for network traffic monitoring and threat detection","display_name":"A cloud/edge computing streaming system for network traffic monitoring and threat detection","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2811344749","doi":"https://doi.org/10.1504/ijsn.2018.10014317","mag":"2811344749"},"language":"en","primary_location":{"id":"doi:10.1504/ijsn.2018.10014317","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijsn.2018.10014317","pdf_url":null,"source":{"id":"https://openalex.org/S146340630","display_name":"International Journal of Security and Networks","issn_l":"1747-8405","issn":["1747-8405","1747-8413"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Security and Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027642652","display_name":"William G. Hatcher","orcid":"https://orcid.org/0000-0001-9811-1304"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"William Grant Hatcher","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002139930","display_name":"Wei Yu","orcid":"https://orcid.org/0000-0003-4522-7340"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wei Yu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052607523","display_name":"James Nguyen","orcid":"https://orcid.org/0000-0001-9624-1308"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"James H. Nguyen","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081103903","display_name":"Sixiao Wei","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sixiao Wei","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5061514941","display_name":"Zhijiang Chen","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhijiang Chen","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5027642652"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.8453,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.86853792,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"13","issue":"3","first_page":"169","last_page":"169"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8556344509124756},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.730290412902832},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5770422220230103},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.4875328242778778},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4171977639198303},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37861165404319763},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3784160315990448},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13361510634422302},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1269572675228119}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8556344509124756},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.730290412902832},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5770422220230103},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.4875328242778778},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4171977639198303},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37861165404319763},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3784160315990448},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13361510634422302},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1269572675228119}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1504/ijsn.2018.10014317","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijsn.2018.10014317","pdf_url":null,"source":{"id":"https://openalex.org/S146340630","display_name":"International Journal of Security and Networks","issn_l":"1747-8405","issn":["1747-8405","1747-8413"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Security and Networks","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W54019231","https://openalex.org/W1499549173","https://openalex.org/W1505837402","https://openalex.org/W1546137167","https://openalex.org/W1576547788","https://openalex.org/W1926306387","https://openalex.org/W1976878954","https://openalex.org/W1989374345","https://openalex.org/W1995057273","https://openalex.org/W1995450389","https://openalex.org/W2002306196","https://openalex.org/W2035203720","https://openalex.org/W2043098576","https://openalex.org/W2054655187","https://openalex.org/W2072641892","https://openalex.org/W2095754749","https://openalex.org/W2100033648","https://openalex.org/W2106267320","https://openalex.org/W2106722434","https://openalex.org/W2114623221","https://openalex.org/W2121233699","https://openalex.org/W2136238137","https://openalex.org/W2147780605","https://openalex.org/W2150941206","https://openalex.org/W2159925876","https://openalex.org/W2161160262","https://openalex.org/W2161753600","https://openalex.org/W2165802774","https://openalex.org/W2286942194","https://openalex.org/W2336362980","https://openalex.org/W2344594340","https://openalex.org/W2394115245","https://openalex.org/W2396819354","https://openalex.org/W2398416149","https://openalex.org/W2416799949","https://openalex.org/W2468897320","https://openalex.org/W2479077554","https://openalex.org/W2489358085","https://openalex.org/W2527484278","https://openalex.org/W2551730448","https://openalex.org/W2551959053","https://openalex.org/W2562619077","https://openalex.org/W2596636257","https://openalex.org/W2597776218","https://openalex.org/W2625133029","https://openalex.org/W2762776925","https://openalex.org/W2763164452","https://openalex.org/W2766827306","https://openalex.org/W2768475350","https://openalex.org/W2808782519","https://openalex.org/W3100789280"],"related_works":["https://openalex.org/W2942586735","https://openalex.org/W2534668683","https://openalex.org/W3211931762","https://openalex.org/W2956163139","https://openalex.org/W4225757241","https://openalex.org/W3126507566","https://openalex.org/W3159722749","https://openalex.org/W4321606826","https://openalex.org/W3013363822","https://openalex.org/W3193936498"],"abstract_inverted_index":{"The":[0,71],"unyielding":[1],"trend":[2],"of":[3,80,110,146],"increasing":[4],"cyber":[5,9],"threats":[6],"has":[7],"made":[8],"security":[10],"paramount":[11],"in":[12,38,60,113],"protecting":[13],"personal":[14],"and":[15,83,93,118,130],"private":[16],"intellectual":[17],"property.":[18],"To":[19],"provide":[20,90],"a":[21,46,86,107,114],"highly":[22,55],"secured":[23],"network":[24,26,57,69,91],"environment,":[25],"threat":[27,48],"detection":[28,49,116],"systems":[29],"must":[30],"handle":[31],"real-time":[32],"big":[33],"data":[34,59,77,112],"from":[35],"varied":[36],"places":[37],"enterprise":[39],"networks.":[40],"In":[41],"this":[42],"paper,":[43],"we":[44],"introduce":[45],"streaming-based":[47,63],"system":[50,73,103,120,126],"that":[51,100],"can":[52,104],"rapidly":[53],"analyse":[54],"intensive":[56],"traffic":[58],"real-time,":[61],"utilising":[62],"clustering":[64],"algorithms":[65],"to":[66,89,142],"detect":[67],"abnormal":[68],"activities.":[70],"developed":[72,102],"integrates":[74],"the":[75,101,144],"high-performance":[76],"analysis":[78],"capabilities":[79],"Flume,":[81],"Spark":[82],"Hadoop":[84],"into":[85],"cloud-computing":[87],"environment":[88],"monitoring":[92],"intrusion":[94],"detection.":[95],"Our":[96],"performance":[97],"evaluation":[98],"validates":[99],"cope":[105],"with":[106],"significant":[108],"volume":[109],"streaming":[111],"high":[115],"accuracy":[117],"good":[119],"performance.":[121],"We":[122],"further":[123],"extend":[124],"our":[125,147],"for":[127],"edge":[128],"computing":[129],"discuss":[131],"some":[132,138],"key":[133],"challenges,":[134],"as":[135,137],"well":[136],"potential":[139],"solutions,":[140],"aiming":[141],"improve":[143],"scalability":[145],"system.":[148]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":7},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
