{"id":"https://openalex.org/W3204039902","doi":"https://doi.org/10.15439/2021f114","title":"Matrix profile for DDoS attacks detection","display_name":"Matrix profile for DDoS attacks detection","publication_year":2021,"publication_date":"2021-09-26","ids":{"openalex":"https://openalex.org/W3204039902","doi":"https://doi.org/10.15439/2021f114","mag":"3204039902"},"language":"en","primary_location":{"id":"doi:10.15439/2021f114","is_oa":true,"landing_page_url":"https://doi.org/10.15439/2021f114","pdf_url":"https://annals-csis.org/proceedings/2021/drp/pdf/114.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annals of Computer Science and Information Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://annals-csis.org/proceedings/2021/drp/pdf/114.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110524629","display_name":"Faisal Alotaibi","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Faisal Alotaibi","raw_affiliation_strings":["Department of Computer Science University of Liverpool"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science University of Liverpool","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057274980","display_name":"Alexei Lisitsa","orcid":"https://orcid.org/0000-0002-3820-643X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Alexei Lisitsa","raw_affiliation_strings":["Department of Computer Science University of Liverpool"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science University of Liverpool","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5110524629"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.4744,"has_fulltext":true,"cited_by_count":9,"citation_normalized_percentile":{"value":0.89975248,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":"25","issue":null,"first_page":"357","last_page":"361"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.9596290588378906},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.7653288245201111},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7157440185546875},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.5794431567192078},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5512967705726624},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.48654595017433167},{"id":"https://openalex.org/keywords/matrix","display_name":"Matrix (chemical analysis)","score":0.48269104957580566},{"id":"https://openalex.org/keywords/empirical-research","display_name":"Empirical research","score":0.4483281373977661},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4307194948196411},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3046756982803345},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.17812702059745789},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12553685903549194},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.06883645057678223},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.060246288776397705}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.9596290588378906},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.7653288245201111},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7157440185546875},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.5794431567192078},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5512967705726624},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.48654595017433167},{"id":"https://openalex.org/C106487976","wikidata":"https://www.wikidata.org/wiki/Q685816","display_name":"Matrix (chemical analysis)","level":2,"score":0.48269104957580566},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.4483281373977661},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4307194948196411},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3046756982803345},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.17812702059745789},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12553685903549194},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.06883645057678223},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.060246288776397705},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.15439/2021f114","is_oa":true,"landing_page_url":"https://doi.org/10.15439/2021f114","pdf_url":"https://annals-csis.org/proceedings/2021/drp/pdf/114.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annals of Computer Science and Information Systems","raw_type":"proceedings-article"},{"id":"pmh:oai:doaj.org/article:b2441314c8344c03a77de51e8008fcc5","is_oa":false,"landing_page_url":"https://doaj.org/article/b2441314c8344c03a77de51e8008fcc5","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Annals of computer science and information systems, Vol 25, Pp 357-361 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.15439/2021f114","is_oa":true,"landing_page_url":"https://doi.org/10.15439/2021f114","pdf_url":"https://annals-csis.org/proceedings/2021/drp/pdf/114.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annals of Computer Science and Information Systems","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6100000143051147,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3204039902.pdf","grobid_xml":"https://content.openalex.org/works/W3204039902.grobid-xml"},"referenced_works_count":14,"referenced_works":["https://openalex.org/W1489073918","https://openalex.org/W1911304975","https://openalex.org/W1976345147","https://openalex.org/W2039838877","https://openalex.org/W2087092764","https://openalex.org/W2486980099","https://openalex.org/W2584499795","https://openalex.org/W2626502800","https://openalex.org/W2908357282","https://openalex.org/W2997424509","https://openalex.org/W3000919776","https://openalex.org/W3037176165","https://openalex.org/W3091945716","https://openalex.org/W3097548526"],"related_works":["https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W1968168724","https://openalex.org/W2204131204","https://openalex.org/W2754163055","https://openalex.org/W4256682929","https://openalex.org/W4322008378","https://openalex.org/W2383770723","https://openalex.org/W2186749541","https://openalex.org/W2360429410"],"abstract_inverted_index":{"Several":[0],"previous":[1],"studies":[2],"have":[3],"focused":[4],"on":[5,77],"Distributed":[6],"Denial":[7],"of":[8,28,92,96],"Service":[9],"(DDoS)":[10],"attacks,":[11,62],"which":[12],"are":[13,70],"a":[14,29,30,36],"crucial":[15],"problem":[16],"in":[17,56,73],"computer":[18],"network":[19],"security.":[20],"In":[21],"this":[22],"paper":[23],"we":[24],"explore":[25],"the":[26,40,51,81,93],"applicability":[27],"time":[31],"series":[32],"method":[33,54,84],"known":[34],"as":[35,63,65],"matrix":[37,52,82],"profile":[38,53,83],"to":[39,60,87],"anomaly":[41],"based":[42],"DDoS":[43,61,97],"attacks":[44],"detection.":[45],"The":[46],"study":[47],"thus":[48],"examined":[49],"how":[50],"performed":[55],"diverse":[57],"situations":[58],"related":[59],"well":[64],"identifying":[66],"those":[67],"features":[68],"that":[69],"most":[71,91],"applicable":[72],"various":[74],"scenarios.":[75],"Based":[76],"reported":[78],"empirical":[79],"evaluation":[80],"is":[85],"shown":[86],"be":[88],"efficient":[89],"against":[90],"considered":[94],"types":[95],"attacks.":[98]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2022,"cited_by_count":4}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
