{"id":"https://openalex.org/W4283687502","doi":"https://doi.org/10.23919/mipro55190.2022.9803394","title":"Detecting network applications using firewall logs","display_name":"Detecting network applications using firewall logs","publication_year":2022,"publication_date":"2022-05-23","ids":{"openalex":"https://openalex.org/W4283687502","doi":"https://doi.org/10.23919/mipro55190.2022.9803394"},"language":"en","primary_location":{"id":"doi:10.23919/mipro55190.2022.9803394","is_oa":false,"landing_page_url":"https://doi.org/10.23919/mipro55190.2022.9803394","pdf_url":null,"source":{"id":"https://openalex.org/S4363605136","display_name":"2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064558200","display_name":"Adrian Komadina","orcid":"https://orcid.org/0000-0003-1243-7149"},"institutions":[{"id":"https://openalex.org/I181343428","display_name":"University of Zagreb","ror":"https://ror.org/00mv6sv71","country_code":"HR","type":"education","lineage":["https://openalex.org/I181343428"]}],"countries":["HR"],"is_corresponding":true,"raw_author_name":"Adrian Komadina","raw_affiliation_strings":["Laboratory for Information Security and Privacy Faculty of Electrical Engineering and Computing, University of Zagreb,Zagreb,Croatia","Laboratory for Information Security and Privacy Faculty of Electrical Engineering and Computing, University of Zagreb, Zagreb, Croatia"],"affiliations":[{"raw_affiliation_string":"Laboratory for Information Security and Privacy Faculty of Electrical Engineering and Computing, University of Zagreb,Zagreb,Croatia","institution_ids":["https://openalex.org/I181343428"]},{"raw_affiliation_string":"Laboratory for Information Security and Privacy Faculty of Electrical Engineering and Computing, University of Zagreb, Zagreb, Croatia","institution_ids":["https://openalex.org/I181343428"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049179137","display_name":"Mihael Marovi\u0107","orcid":"https://orcid.org/0000-0002-5854-6597"},"institutions":[{"id":"https://openalex.org/I181343428","display_name":"University of Zagreb","ror":"https://ror.org/00mv6sv71","country_code":"HR","type":"education","lineage":["https://openalex.org/I181343428"]}],"countries":["HR"],"is_corresponding":false,"raw_author_name":"Mihael Marovic","raw_affiliation_strings":["Laboratory for Information Security and Privacy Faculty of Electrical Engineering and Computing, University of Zagreb,Zagreb,Croatia","Laboratory for Information Security and Privacy Faculty of Electrical Engineering and Computing, University of Zagreb, Zagreb, Croatia"],"affiliations":[{"raw_affiliation_string":"Laboratory for Information Security and Privacy Faculty of Electrical Engineering and Computing, University of Zagreb,Zagreb,Croatia","institution_ids":["https://openalex.org/I181343428"]},{"raw_affiliation_string":"Laboratory for Information Security and Privacy Faculty of Electrical Engineering and Computing, University of Zagreb, Zagreb, Croatia","institution_ids":["https://openalex.org/I181343428"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023734196","display_name":"Stjepan Gro\u0161","orcid":"https://orcid.org/0000-0001-6619-2859"},"institutions":[{"id":"https://openalex.org/I181343428","display_name":"University of Zagreb","ror":"https://ror.org/00mv6sv71","country_code":"HR","type":"education","lineage":["https://openalex.org/I181343428"]}],"countries":["HR"],"is_corresponding":false,"raw_author_name":"Stjepan Gros","raw_affiliation_strings":["Laboratory for Information Security and Privacy Faculty of Electrical Engineering and Computing, University of Zagreb,Zagreb,Croatia","Laboratory for Information Security and Privacy Faculty of Electrical Engineering and Computing, University of Zagreb, Zagreb, Croatia"],"affiliations":[{"raw_affiliation_string":"Laboratory for Information Security and Privacy Faculty of Electrical Engineering and Computing, University of Zagreb,Zagreb,Croatia","institution_ids":["https://openalex.org/I181343428"]},{"raw_affiliation_string":"Laboratory for Information Security and Privacy Faculty of Electrical Engineering and Computing, University of Zagreb, Zagreb, Croatia","institution_ids":["https://openalex.org/I181343428"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5064558200"],"corresponding_institution_ids":["https://openalex.org/I181343428"],"apc_list":null,"apc_paid":null,"fwci":0.2162,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.27766963,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1069","last_page":"1075"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.8477251529693604},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8309222459793091},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5986133217811584},{"id":"https://openalex.org/keywords/application-firewall","display_name":"Application firewall","score":0.4295434057712555},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.426803320646286},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2735399305820465},{"id":"https://openalex.org/keywords/stateful-firewall","display_name":"Stateful firewall","score":0.2507871389389038},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.1748829185962677},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.11821585893630981}],"concepts":[{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.8477251529693604},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8309222459793091},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5986133217811584},{"id":"https://openalex.org/C86444895","wikidata":"https://www.wikidata.org/wiki/Q451816","display_name":"Application firewall","level":4,"score":0.4295434057712555},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.426803320646286},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2735399305820465},{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.2507871389389038},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.1748829185962677},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.11821585893630981},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C104062141","wikidata":"https://www.wikidata.org/wiki/Q2601295","display_name":"Extremal black hole","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/mipro55190.2022.9803394","is_oa":false,"landing_page_url":"https://doi.org/10.23919/mipro55190.2022.9803394","pdf_url":null,"source":{"id":"https://openalex.org/S4363605136","display_name":"2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5400000214576721,"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320335322","display_name":"European Regional Development Fund","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W204755097","https://openalex.org/W1534121377","https://openalex.org/W1586575217","https://openalex.org/W1968969471","https://openalex.org/W2001643719","https://openalex.org/W2015553421","https://openalex.org/W2024635814","https://openalex.org/W2070739968","https://openalex.org/W2073462326","https://openalex.org/W2092834372","https://openalex.org/W2097065005","https://openalex.org/W2125283600","https://openalex.org/W2125727684","https://openalex.org/W2159302528","https://openalex.org/W2165533158","https://openalex.org/W2216946510","https://openalex.org/W2513386338","https://openalex.org/W2802696180","https://openalex.org/W2995179471","https://openalex.org/W3005833261","https://openalex.org/W3032959958","https://openalex.org/W3159725910","https://openalex.org/W3208693819","https://openalex.org/W4242487586","https://openalex.org/W4287689466","https://openalex.org/W6681750758","https://openalex.org/W6771658506","https://openalex.org/W6778656096","https://openalex.org/W6781905506"],"related_works":["https://openalex.org/W2042688990","https://openalex.org/W2389863504","https://openalex.org/W2785784743","https://openalex.org/W2916429898","https://openalex.org/W2366805216","https://openalex.org/W2327318552","https://openalex.org/W2359956462","https://openalex.org/W2373690040","https://openalex.org/W2357071520","https://openalex.org/W2373857385"],"abstract_inverted_index":{"Every":[0],"day,":[1],"many":[2],"firewall":[3,34,56],"logs":[4],"are":[5],"generated":[6],"that":[7],"contain":[8],"a":[9,46,121],"lot":[10],"of":[11,37,99,107,123,131,142,165,168,185,190],"useful":[12],"information":[13,192],"about":[14],"devices":[15],"and":[16,52,72,93,156,183],"applications":[17,29,39],"in":[18,33,188],"the":[19,50,69,73,105,118,129,139,143,146,161,166,169,181,191],"network.":[20],"In":[21,115,159],"this":[22],"paper,":[23],"we":[24,86],"try":[25],"to":[26,53,103,117],"detect":[27],"network":[28,63],"using":[30,80],"only":[31],"data":[32],"logs.":[35],"Detection":[36],"such":[38],"could":[40],"be":[41],"used":[42,110,134],"for":[43,62,113,135],"audit,":[44],"gaining":[45],"better":[47,55],"visibility":[48],"into":[49],"network,":[51],"create":[54],"policies.":[57],"Two":[58],"approaches":[59,171,176],"were":[60,89,148,154,177],"implemented":[61],"application":[64],"detection,":[65],"one":[66],"based":[67,75,90,127,179],"on":[68,76,91,128,138,180],"classification":[70],"methods":[71,85,119,147],"other":[74],"distances":[77],"between":[78],"samples":[79],"three":[81],"different":[82,108,132],"metrics.":[83],"The":[84,97,175],"experimented":[87],"with":[88],"ports":[92,100,109,133],"IP":[94],"addresses":[95],"only.":[96],"analysis":[98,164],"was":[101,125,172],"done":[102],"reduce":[104],"number":[106,130],"as":[111],"features":[112],"classification.":[114,136],"addition":[116],"implemented,":[120],"measure":[122],"certainty":[124],"developed":[126],"Based":[137],"partial":[140],"knowledge":[141],"target":[144],"environment,":[145],"continuously":[149],"improved,":[150],"from":[151],"which":[152],"conclusions":[153],"drawn":[155],"results":[157,167],"presented.":[158],"reviewing":[160],"results,":[162],"an":[163],"two":[170],"carried":[173],"out.":[174],"compared":[178],"advantages":[182],"disadvantages":[184],"each":[186],"approach":[187],"terms":[189],"they":[193],"provide.":[194]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
