{"id":"https://openalex.org/W4394603481","doi":"https://doi.org/10.3390/jcp4020012","title":"Data-Driven Network Anomaly Detection with Cyber Attack and Defense Visualization","display_name":"Data-Driven Network Anomaly Detection with Cyber Attack and Defense Visualization","publication_year":2024,"publication_date":"2024-04-09","ids":{"openalex":"https://openalex.org/W4394603481","doi":"https://doi.org/10.3390/jcp4020012"},"language":"en","primary_location":{"id":"doi:10.3390/jcp4020012","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp4020012","pdf_url":"https://www.mdpi.com/2624-800X/4/2/12/pdf?version=1712667023","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2624-800X/4/2/12/pdf?version=1712667023","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074502523","display_name":"Eric Muhati","orcid":"https://orcid.org/0000-0002-3269-0363"},"institutions":[{"id":"https://openalex.org/I137853757","display_name":"Howard University","ror":"https://ror.org/05gt1vc06","country_code":"US","type":"education","lineage":["https://openalex.org/I137853757"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Eric Muhati","raw_affiliation_strings":["Data Science and Cybersecurity Center (DSC<sup>2</sup>), Department of Electrical Engineering and Computer Science, Howard University, Washington, DC 20059, USA","Data Science and Cybersecurity Center (DSC2), Department of Electrical Engineering and Computer Science, Howard University, Washington, DC 20059, USA"],"affiliations":[{"raw_affiliation_string":"Data Science and Cybersecurity Center (DSC<sup>2</sup>), Department of Electrical Engineering and Computer Science, Howard University, Washington, DC 20059, USA","institution_ids":["https://openalex.org/I137853757"]},{"raw_affiliation_string":"Data Science and Cybersecurity Center (DSC2), Department of Electrical Engineering and Computer Science, Howard University, Washington, DC 20059, USA","institution_ids":["https://openalex.org/I137853757"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046343080","display_name":"Danda B. Rawat","orcid":null},"institutions":[{"id":"https://openalex.org/I137853757","display_name":"Howard University","ror":"https://ror.org/05gt1vc06","country_code":"US","type":"education","lineage":["https://openalex.org/I137853757"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Danda Rawat","raw_affiliation_strings":["Data Science and Cybersecurity Center (DSC<sup>2</sup>), Department of Electrical Engineering and Computer Science, Howard University, Washington, DC 20059, USA","Data Science and Cybersecurity Center (DSC2), Department of Electrical Engineering and Computer Science, Howard University, Washington, DC 20059, USA"],"affiliations":[{"raw_affiliation_string":"Data Science and Cybersecurity Center (DSC<sup>2</sup>), Department of Electrical Engineering and Computer Science, Howard University, Washington, DC 20059, USA","institution_ids":["https://openalex.org/I137853757"]},{"raw_affiliation_string":"Data Science and Cybersecurity Center (DSC2), Department of Electrical Engineering and Computer Science, Howard University, Washington, DC 20059, USA","institution_ids":["https://openalex.org/I137853757"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5074502523"],"corresponding_institution_ids":["https://openalex.org/I137853757"],"apc_list":{"value":1000,"currency":"CHF","value_usd":1082},"apc_paid":{"value":1000,"currency":"CHF","value_usd":1082},"fwci":5.4942,"has_fulltext":true,"cited_by_count":16,"citation_normalized_percentile":{"value":0.96129628,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"4","issue":"2","first_page":"241","last_page":"263"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7328684329986572},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.636900007724762},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.6160950064659119},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.5860021114349365},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.571916937828064},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5605334043502808},{"id":"https://openalex.org/keywords/attack-patterns","display_name":"Attack patterns","score":0.50334233045578},{"id":"https://openalex.org/keywords/visual-analytics","display_name":"Visual analytics","score":0.4681098163127899},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.436138391494751},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43245869874954224},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.38701432943344116}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7328684329986572},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.636900007724762},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.6160950064659119},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.5860021114349365},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.571916937828064},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5605334043502808},{"id":"https://openalex.org/C2780741293","wikidata":"https://www.wikidata.org/wiki/Q4818019","display_name":"Attack patterns","level":3,"score":0.50334233045578},{"id":"https://openalex.org/C59732488","wikidata":"https://www.wikidata.org/wiki/Q2528440","display_name":"Visual analytics","level":3,"score":0.4681098163127899},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.436138391494751},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43245869874954224},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.38701432943344116}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/jcp4020012","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp4020012","pdf_url":"https://www.mdpi.com/2624-800X/4/2/12/pdf?version=1712667023","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:f5a940f600834cf78b4a0b241c32b945","is_oa":true,"landing_page_url":"https://doaj.org/article/f5a940f600834cf78b4a0b241c32b945","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cybersecurity and Privacy, Vol 4, Iss 2, Pp 241-263 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/jcp4020012","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp4020012","pdf_url":"https://www.mdpi.com/2624-800X/4/2/12/pdf?version=1712667023","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5600000023841858,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G2697665320","display_name":null,"funder_award_id":"DHS 2017-ST-062-000003","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3866984967","display_name":null,"funder_award_id":"HRD 1828811","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G680062990","display_name":null,"funder_award_id":"CNS 1650831","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4394603481.pdf"},"referenced_works_count":50,"referenced_works":["https://openalex.org/W1578543696","https://openalex.org/W1595449516","https://openalex.org/W1600186357","https://openalex.org/W1983498087","https://openalex.org/W1989374345","https://openalex.org/W2031006315","https://openalex.org/W2039225701","https://openalex.org/W2039377530","https://openalex.org/W2054369242","https://openalex.org/W2058302064","https://openalex.org/W2073744550","https://openalex.org/W2078344490","https://openalex.org/W2090435936","https://openalex.org/W2099940443","https://openalex.org/W2132068130","https://openalex.org/W2135534854","https://openalex.org/W2156148508","https://openalex.org/W2287408518","https://openalex.org/W2299094889","https://openalex.org/W2342408547","https://openalex.org/W2527999453","https://openalex.org/W2607638782","https://openalex.org/W2613715783","https://openalex.org/W2739440565","https://openalex.org/W2744951234","https://openalex.org/W2904539465","https://openalex.org/W2925543740","https://openalex.org/W2944759024","https://openalex.org/W2950089337","https://openalex.org/W2965128565","https://openalex.org/W2978522417","https://openalex.org/W2991507433","https://openalex.org/W3089028909","https://openalex.org/W3092450653","https://openalex.org/W3112904950","https://openalex.org/W3129166376","https://openalex.org/W3130705826","https://openalex.org/W3158696321","https://openalex.org/W3165569404","https://openalex.org/W4200470346","https://openalex.org/W4285122460","https://openalex.org/W4312629493","https://openalex.org/W4313116287","https://openalex.org/W4320005101","https://openalex.org/W4362667660","https://openalex.org/W4377081225","https://openalex.org/W4384339786","https://openalex.org/W6696151112","https://openalex.org/W6698124693","https://openalex.org/W6770850057"],"related_works":["https://openalex.org/W2061466315","https://openalex.org/W2376886931","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W1495178644","https://openalex.org/W2185594426","https://openalex.org/W2377372927"],"abstract_inverted_index":{"The":[0],"exponential":[1],"growth":[2],"in":[3,113,191,201],"data":[4,89,147],"volumes,":[5],"combined":[6],"with":[7,99],"the":[8,40,52,68,104,132],"inherent":[9],"complexity":[10],"of":[11,54,73,106,181,189],"network":[12,17,24,75,80,91,121,125,133,155],"algorithms,":[13],"has":[14],"drastically":[15],"affected":[16],"security.":[18,81],"Data":[19],"activities":[20],"are":[21,33,141],"producing":[22],"voluminous":[23],"logs":[25],"that":[26,152],"often":[27,42],"mask":[28],"critical":[29],"vulnerabilities.":[30],"Although":[31],"there":[32],"efforts":[34],"to":[35,130],"address":[36],"these":[37],"hidden":[38],"vulnerabilities,":[39],"solutions":[41],"come":[43],"at":[44],"high":[45],"costs":[46],"or":[47],"increased":[48],"complexities.":[49],"In":[50],"contrast,":[51],"potential":[53,69],"open-source":[55],"tools,":[56],"recognized":[57],"for":[58,70],"their":[59,109],"security":[60],"analysis":[61],"capabilities,":[62],"remains":[63],"under-researched.":[64],"These":[65],"tools":[66,123],"have":[67],"detailed":[71],"extraction":[72],"essential":[74],"components,":[76],"and":[77,108,124,170,183],"they":[78],"strengthen":[79],"Addressing":[82],"this":[83,202],"gap,":[84],"our":[85,192],"paper":[86],"proposes":[87],"a":[88,100,146,184,195],"analytics-driven":[90],"anomaly":[92],"detection":[93,150],"model,":[94,193],"which":[95],"is":[96],"uniquely":[97],"complemented":[98],"visualization":[101],"layer,":[102],"making":[103],"dynamics":[105],"cyberattacks":[107],"subsequent":[110],"defenses":[111],"distinctive":[112],"near":[114],"real-time.":[115],"Our":[116,174],"novel":[117],"approach,":[118],"based":[119,134],"on":[120,135],"scanning":[122],"discovery":[126],"services,":[127],"allows":[128],"us":[129],"visualize":[131],"how":[136],"many":[137],"IP-based":[138],"networking":[139],"devices":[140],"live,":[142],"then":[143,158],"we":[144],"implement":[145],"analytics-based":[148],"intrusion":[149],"system":[151],"scrutinizes":[153],"all":[154],"connections.":[156],"We":[157],"initiate":[159],"mitigation":[160],"measures,":[161],"visually":[162],"distinguishing":[163],"malicious":[164],"from":[165],"benign":[166],"connections":[167],"using":[168],"red":[169],"blue":[171],"hues,":[172],"respectively.":[173],"experimental":[175],"evaluation":[176],"shows":[177],"an":[178],"F1":[179],"score":[180],"97.9%":[182],"minimal":[185],"false":[186],"positive":[187],"rate":[188],"0.3%":[190],"demonstrating":[194],"marked":[196],"improvement":[197],"over":[198],"existing":[199],"research":[200],"domain.":[203]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":3}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
