{"id":"https://openalex.org/W3097108432","doi":"https://doi.org/10.4018/ijghpc.2021010101","title":"An Ensemble Deep Neural Network Model for Onion-Routed Traffic Detection to Boost Cloud Security","display_name":"An Ensemble Deep Neural Network Model for Onion-Routed Traffic Detection to Boost Cloud Security","publication_year":2020,"publication_date":"2020-11-03","ids":{"openalex":"https://openalex.org/W3097108432","doi":"https://doi.org/10.4018/ijghpc.2021010101","mag":"3097108432"},"language":"en","primary_location":{"id":"doi:10.4018/ijghpc.2021010101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijghpc.2021010101","pdf_url":null,"source":{"id":"https://openalex.org/S43307632","display_name":"International Journal of Grid and High Performance Computing","issn_l":"1938-0259","issn":["1938-0259","1938-0267"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Grid and High Performance Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007107453","display_name":"Shamik Tiwari","orcid":"https://orcid.org/0000-0002-5987-7101"},"institutions":[{"id":"https://openalex.org/I5847235","display_name":"University of Petroleum and Energy Studies","ror":"https://ror.org/04q2jes40","country_code":"IN","type":"education","lineage":["https://openalex.org/I5847235"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Shamik Tiwari","raw_affiliation_strings":["Department of Virtualization, School of Computer Science, University of Petroleum and Energy Studies, Dehradun, India"],"affiliations":[{"raw_affiliation_string":"Department of Virtualization, School of Computer Science, University of Petroleum and Energy Studies, Dehradun, India","institution_ids":["https://openalex.org/I5847235"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5007107453"],"corresponding_institution_ids":["https://openalex.org/I5847235"],"apc_list":null,"apc_paid":null,"fwci":0.7954,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.78858207,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":96},"biblio":{"volume":"13","issue":"1","first_page":"1","last_page":"17"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7749388217926025},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6473581194877625},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5832840204238892},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5681443810462952},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5496871471405029},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.5450875759124756},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5372763276100159},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.4144653081893921},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.31668615341186523}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7749388217926025},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6473581194877625},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5832840204238892},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5681443810462952},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5496871471405029},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.5450875759124756},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5372763276100159},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.4144653081893921},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.31668615341186523},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4018/ijghpc.2021010101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijghpc.2021010101","pdf_url":null,"source":{"id":"https://openalex.org/S43307632","display_name":"International Journal of Grid and High Performance Computing","issn_l":"1938-0259","issn":["1938-0259","1938-0267"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Grid and High Performance Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8100000023841858,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1776911451","https://openalex.org/W2002106843","https://openalex.org/W2053443947","https://openalex.org/W2076063813","https://openalex.org/W2110889728","https://openalex.org/W2118023920","https://openalex.org/W2158112071","https://openalex.org/W2427312199","https://openalex.org/W2466877391","https://openalex.org/W2565516711","https://openalex.org/W2597998853","https://openalex.org/W2622135771"],"related_works":["https://openalex.org/W2993833576","https://openalex.org/W2776877297","https://openalex.org/W3125718803","https://openalex.org/W2127920220","https://openalex.org/W3119288169","https://openalex.org/W2945097178","https://openalex.org/W3124943098","https://openalex.org/W4308112567","https://openalex.org/W3162132941","https://openalex.org/W3128189270"],"abstract_inverted_index":{"Anonymous":[0],"network":[1],"communication":[2,112],"using":[3],"onion":[4,31,47],"routing":[5],"networks":[6],"such":[7],"as":[8],"Tor":[9,114],"are":[10,34,45,67,123],"used":[11,37],"to":[12,92,110,125],"guard":[13],"the":[14,23,30,51,94,127,144,147],"privacy":[15],"of":[16,29,55,61,96,146],"sender":[17],"by":[18],"encrypting":[19],"all":[20],"messages":[21],"in":[22],"overlapped":[24],"network.":[25,117],"These":[26,64],"days":[27],"most":[28],"routed":[32],"communications":[33],"not":[35],"only":[36],"for":[38,49,70,81],"decent":[39],"cause":[40],"but":[41],"also":[42,134],"cyber":[43],"offenders":[44],"ill-using":[46],"routings":[48],"scanning":[50],"ports,":[52],"hacking,":[53],"exfiltration":[54],"theft":[56],"data,":[57],"and":[58,83,115],"other":[59,137,151],"types":[60],"online":[62],"frauds.":[63],"cyber-crime":[65],"attempts":[66],"very":[68],"vulnerable":[69],"cloud":[71],"security.":[72],"Deep":[73],"learning":[74,79,97,121,139],"is":[75,88,108,133],"highly":[76],"effective":[77],"machine":[78,138],"method":[80],"prediction":[82],"classification.":[84],"Ensembling":[85],"multiple":[86],"models":[87,122],"an":[89,102],"influential":[90],"approach":[91],"increase":[93],"efficiency":[95],"models.":[98,140,152],"In":[99],"this":[100],"work,":[101],"ensemble":[103,128],"deep":[104,120],"learning-based":[105],"classification":[106],"model":[107,132,149],"proposed":[109,131,148],"detect":[111],"through":[113],"non-Tor":[116],"Three":[118],"different":[119],"combined":[124],"achieve":[126],"model.":[129],"The":[130],"compared":[135],"with":[136],"Classification":[141],"results":[142],"shows":[143],"superiority":[145],"than":[150]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
