{"id":"https://openalex.org/W2014896335","doi":"https://doi.org/10.2298/csis120908026c","title":"Two-step hierarchical scheme for detecting detoured attacks to the web server","display_name":"Two-step hierarchical scheme for detecting detoured attacks to the web server","publication_year":2013,"publication_date":"2013-01-01","ids":{"openalex":"https://openalex.org/W2014896335","doi":"https://doi.org/10.2298/csis120908026c","mag":"2014896335"},"language":"en","primary_location":{"id":"doi:10.2298/csis120908026c","is_oa":true,"landing_page_url":"https://doi.org/10.2298/csis120908026c","pdf_url":"http://www.doiserbia.nb.rs/ft.aspx?id=1820-02141300026C","source":{"id":"https://openalex.org/S206939107","display_name":"Computer Science and Information Systems","issn_l":"1820-0214","issn":["1820-0214","2406-1018"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310321031","host_organization_name":"ComSIS Consortium","host_organization_lineage":["https://openalex.org/P4310321031"],"host_organization_lineage_names":["ComSIS Consortium"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer Science and Information Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"http://www.doiserbia.nb.rs/ft.aspx?id=1820-02141300026C","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087288516","display_name":"Byungha Choi","orcid":null},"institutions":[{"id":"https://openalex.org/I89015989","display_name":"Dankook University","ror":"https://ror.org/058pdbn81","country_code":"KR","type":"education","lineage":["https://openalex.org/I89015989"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Byungha Choi","raw_affiliation_strings":["Graduate School, Dankook University Yongin, Gyeonggi, Korea"],"affiliations":[{"raw_affiliation_string":"Graduate School, Dankook University Yongin, Gyeonggi, Korea","institution_ids":["https://openalex.org/I89015989"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023206561","display_name":"Kyungsan Cho","orcid":null},"institutions":[{"id":"https://openalex.org/I89015989","display_name":"Dankook University","ror":"https://ror.org/058pdbn81","country_code":"KR","type":"education","lineage":["https://openalex.org/I89015989"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Kyungsan Cho","raw_affiliation_strings":["Dept. of Software Science, Dankook University Yongin, Gyeonggi, Korea"],"affiliations":[{"raw_affiliation_string":"Dept. of Software Science, Dankook University Yongin, Gyeonggi, Korea","institution_ids":["https://openalex.org/I89015989"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5087288516"],"corresponding_institution_ids":["https://openalex.org/I89015989"],"apc_list":null,"apc_paid":null,"fwci":1.0874,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.79733487,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"10","issue":"2","first_page":"633","last_page":"649"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.869147539138794},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6527571082115173},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.6071932911872864},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5227903723716736},{"id":"https://openalex.org/keywords/dissemination","display_name":"Dissemination","score":0.48546770215034485},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.4629415273666382},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.45221084356307983},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44659772515296936},{"id":"https://openalex.org/keywords/web-server","display_name":"Web server","score":0.4341806173324585},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.39945217967033386},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.23376497626304626},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.17383140325546265}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.869147539138794},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6527571082115173},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.6071932911872864},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5227903723716736},{"id":"https://openalex.org/C101780184","wikidata":"https://www.wikidata.org/wiki/Q840576","display_name":"Dissemination","level":2,"score":0.48546770215034485},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.4629415273666382},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.45221084356307983},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44659772515296936},{"id":"https://openalex.org/C11392498","wikidata":"https://www.wikidata.org/wiki/Q11288","display_name":"Web server","level":3,"score":0.4341806173324585},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.39945217967033386},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.23376497626304626},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.17383140325546265},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.2298/csis120908026c","is_oa":true,"landing_page_url":"https://doi.org/10.2298/csis120908026c","pdf_url":"http://www.doiserbia.nb.rs/ft.aspx?id=1820-02141300026C","source":{"id":"https://openalex.org/S206939107","display_name":"Computer Science and Information Systems","issn_l":"1820-0214","issn":["1820-0214","2406-1018"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310321031","host_organization_name":"ComSIS Consortium","host_organization_lineage":["https://openalex.org/P4310321031"],"host_organization_lineage_names":["ComSIS Consortium"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer Science and Information Systems","raw_type":"journal-article"},{"id":"pmh:oai:doiserbia:1820-02141300026C","is_oa":false,"landing_page_url":"http://doi.org/10.2298/CSIS120908026C","pdf_url":null,"source":{"id":"https://openalex.org/S4306400515","display_name":"Digital Object Identifier (DOI) Repository Serbia (National Library of Serbia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210142455","host_organization_name":"National Library of Serbia","host_organization_lineage":["https://openalex.org/I4210142455"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":". (00) 26-26"}],"best_oa_location":{"id":"doi:10.2298/csis120908026c","is_oa":true,"landing_page_url":"https://doi.org/10.2298/csis120908026c","pdf_url":"http://www.doiserbia.nb.rs/ft.aspx?id=1820-02141300026C","source":{"id":"https://openalex.org/S206939107","display_name":"Computer Science and Information Systems","issn_l":"1820-0214","issn":["1820-0214","2406-1018"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310321031","host_organization_name":"ComSIS Consortium","host_organization_lineage":["https://openalex.org/P4310321031"],"host_organization_lineage_names":["ComSIS Consortium"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer Science and Information Systems","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6499999761581421,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321209","display_name":"Dankook University","ror":"https://ror.org/058pdbn81"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2014896335.pdf","grobid_xml":"https://content.openalex.org/works/W2014896335.grobid-xml"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W33933511","https://openalex.org/W46332219","https://openalex.org/W194043388","https://openalex.org/W1504662986","https://openalex.org/W1525563108","https://openalex.org/W1966744246","https://openalex.org/W1988248152","https://openalex.org/W2017420094","https://openalex.org/W2025350963","https://openalex.org/W2064853811","https://openalex.org/W2091140700","https://openalex.org/W2092756033","https://openalex.org/W2125727422","https://openalex.org/W2125838338","https://openalex.org/W2139740492","https://openalex.org/W2144584907","https://openalex.org/W2150115633","https://openalex.org/W2156128446","https://openalex.org/W2158332544","https://openalex.org/W2164732286","https://openalex.org/W2593514282","https://openalex.org/W2617787249","https://openalex.org/W4249961056","https://openalex.org/W4253573210","https://openalex.org/W4288079856","https://openalex.org/W6614473250"],"related_works":["https://openalex.org/W2902725125","https://openalex.org/W3184656183","https://openalex.org/W2161406213","https://openalex.org/W2095726404","https://openalex.org/W185677139","https://openalex.org/W2904429565","https://openalex.org/W3175764924","https://openalex.org/W2009772755","https://openalex.org/W3148886087","https://openalex.org/W2014896335"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,107],"propose":[4],"an":[5,74],"improved":[6],"detection":[7,36,119],"scheme":[8,30,112],"to":[9,40,125],"protect":[10],"a":[11,32,47,126],"Web":[12,68,104,127],"server":[13,105],"from":[14,66],"detoured":[15,123],"attacks,":[16],"which":[17,77],"disclose":[18],"confidential/":[19],"private":[20],"information":[21,64],"or":[22],"disseminate":[23],"malware":[24],"codes":[25],"through":[26],"outbound":[27,95],"traffic.":[28],"Our":[29],"has":[31],"two-step":[33],"hierarchy,":[34],"whose":[35],"methods":[37],"are":[38],"complementary":[39],"each":[41],"other.":[42],"The":[43,70],"first":[44],"step":[45,72],"is":[46,73],"signature-based":[48],"detector":[49,76],"that":[50,109],"uses":[51],"Snort":[52],"and":[53,63,91,118],"detects":[54,78],"the":[55,67,82,98,102,114],"marks":[56],"of":[57,94],"disseminating":[58],"malware,":[59],"XSS,":[60],"URL":[61],"Spoofing":[62],"leakage":[65],"server.":[69,128],"second":[71],"anomaly-based":[75],"attacks":[79,124],"by":[80,88],"using":[81],"probability":[83],"evaluation":[84],"in":[85],"HMM,":[86],"driven":[87],"both":[89],"payload":[90],"traffic":[92],"characteristics":[93],"packets.":[96],"Through":[97],"verification":[99],"analysis":[100],"under":[101],"attacked":[103],"environment,":[106],"show":[108],"our":[110],"proposed":[111],"improves":[113],"False":[115],"Positive":[116],"rate":[117],"efficiency":[120],"for":[121],"detecting":[122]},"counts_by_year":[{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
