{"id":"https://openalex.org/W2576111084","doi":"https://doi.org/10.3233/978-1-61499-672-9-1132","title":"Learning Invariant Representation for Malicious Network Traffic Detection","display_name":"Learning Invariant Representation for Malicious Network Traffic Detection","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2576111084","doi":"https://doi.org/10.3233/978-1-61499-672-9-1132","mag":"2576111084"},"language":"en","primary_location":{"id":"doi:10.3233/978-1-61499-672-9-1132","is_oa":false,"landing_page_url":"https://doi.org/10.3233/978-1-61499-672-9-1132","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054307499","display_name":"Karel Barto\u0161","orcid":null},"institutions":[{"id":"https://openalex.org/I151281966","display_name":"Cisco Systems (China)","ror":"https://ror.org/02qy75381","country_code":"CN","type":"company","lineage":["https://openalex.org/I135428043","https://openalex.org/I151281966"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bartos Karel","raw_affiliation_strings":["Cisco Systems (China), Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Cisco Systems (China), Hong Kong, China","institution_ids":["https://openalex.org/I151281966"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076952204","display_name":"Michal Sofka","orcid":"https://orcid.org/0000-0003-1684-5895"},"institutions":[{"id":"https://openalex.org/I44504214","display_name":"Czech Technical University in Prague","ror":"https://ror.org/03kqpb082","country_code":"CZ","type":"education","lineage":["https://openalex.org/I44504214"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Sofka Michal","raw_affiliation_strings":["Czech Technical University in Prague, Prague, Czechia"],"affiliations":[{"raw_affiliation_string":"Czech Technical University in Prague, Prague, Czechia","institution_ids":["https://openalex.org/I44504214"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055011124","display_name":"Vojt\u011bch Franc","orcid":"https://orcid.org/0000-0001-7189-1224"},"institutions":[{"id":"https://openalex.org/I44504214","display_name":"Czech Technical University in Prague","ror":"https://ror.org/03kqpb082","country_code":"CZ","type":"education","lineage":["https://openalex.org/I44504214"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Franc Vojtech","raw_affiliation_strings":["Czech Technical University in Prague, Prague, Czechia"],"affiliations":[{"raw_affiliation_string":"Czech Technical University in Prague, Prague, Czechia","institution_ids":["https://openalex.org/I44504214"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5054307499"],"corresponding_institution_ids":["https://openalex.org/I151281966"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.33218717,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1132","last_page":"1139"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9758999943733215,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/invariant","display_name":"Invariant (physics)","score":0.5770408511161804},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5327126383781433},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.5163094401359558},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.36953458189964294},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3418278992176056},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3364822268486023},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.20840713381767273},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.12752389907836914},{"id":"https://openalex.org/keywords/mathematical-physics","display_name":"Mathematical physics","score":0.0699998140335083}],"concepts":[{"id":"https://openalex.org/C190470478","wikidata":"https://www.wikidata.org/wiki/Q2370229","display_name":"Invariant (physics)","level":2,"score":0.5770408511161804},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5327126383781433},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.5163094401359558},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.36953458189964294},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3418278992176056},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3364822268486023},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.20840713381767273},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.12752389907836914},{"id":"https://openalex.org/C37914503","wikidata":"https://www.wikidata.org/wiki/Q156495","display_name":"Mathematical physics","level":1,"score":0.0699998140335083},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3233/978-1-61499-672-9-1132","is_oa":false,"landing_page_url":"https://doi.org/10.3233/978-1-61499-672-9-1132","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},{"id":"mag:2576111084","is_oa":false,"landing_page_url":"http://dblp.uni-trier.de/db/conf/ecai/ecai2016.html#BartosSF16","pdf_url":null,"source":{"id":"https://openalex.org/S4306418308","display_name":"European Conference on Artificial Intelligence","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"European Conference on Artificial Intelligence","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2062195135","https://openalex.org/W2795079307","https://openalex.org/W2793058541","https://openalex.org/W1983629434","https://openalex.org/W2055929693","https://openalex.org/W4324271173","https://openalex.org/W1967645776","https://openalex.org/W2352227742","https://openalex.org/W4390679071","https://openalex.org/W3006966347"],"abstract_inverted_index":{"Statistical":[0],"learning":[1],"theory":[2],"relies":[3],"on":[4,182],"an":[5,63],"assumption":[6,25],"that":[7,42,164],"the":[8,16,69,103,108,117,138,141,149,160,165],"joint":[9],"distributions":[10],"of":[11,38,50,71,86,102,116,148,173,184],"observations":[12],"and":[13,20,92,100,110,113,135,143,179],"labels":[14],"are":[15,156],"same":[17],"in":[18,28],"training":[19,35,142,170],"testing":[21,144],"data.":[22,145],"However,":[23],"this":[24,59,77],"is":[26,82,93,121,167],"violated":[27],"many":[29],"real":[30],"world":[31],"problems,":[32],"such":[33,151],"as":[34,47,152],"a":[36,48,171],"detector":[37,172],"malicious":[39,174],"network":[40,89],"traffic":[41,90],"can":[43],"change":[44],"over":[45],"time":[46],"result":[49],"attacker's":[51],"detection":[52],"evasion":[53],"efforts.":[54],"We":[55,162],"propose":[56],"to":[57,95],"address":[58],"problem":[60],"by":[61,123],"creating":[62],"optimized":[64],"representation,":[65,150],"which":[66],"significantly":[67,136],"increases":[68],"robustness":[70],"detectors":[72],"or":[73],"classifiers":[74],"trained":[75],"under":[76,98,111],"distributional":[78],"shift.":[79],"The":[80,119,146],"representation":[81,166],"created":[83],"from":[84,107],"bags":[85],"samples":[87,183],"(e.g.":[88],"logs)":[91],"designed":[94],"be":[96],"invariant":[97],"shifting":[99],"scaling":[101],"feature":[104,125,128],"values":[105],"extracted":[106],"logs":[109],"permutation":[112],"size":[114],"changes":[115],"bags.":[118],"invariance":[120],"achieved":[122],"combining":[124],"histograms":[126],"with":[127,159],"self-similarity":[129],"matrices":[130],"computed":[131],"for":[132,169],"each":[133],"bag":[134],"reduces":[137],"difference":[139],"between":[140],"parameters":[147],"histogram":[153],"bin":[154],"boundaries,":[155],"learned":[157],"jointly":[158],"classifier.":[161],"show":[163],"effective":[168],"traffic,":[175],"achieving":[176],"90%":[177],"precision":[178],"67%":[180],"recall":[181],"previously":[185],"unseen":[186],"malware":[187],"variants.":[188]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2017-01-26T00:00:00"}
