{"id":"https://openalex.org/W2946704785","doi":"https://doi.org/10.1002/cpe.5344","title":"Toward a monitoring and threat detection system based on stream processing as a virtual network function for big data","display_name":"Toward a monitoring and threat detection system based on stream processing as a virtual network function for big data","publication_year":2019,"publication_date":"2019-05-21","ids":{"openalex":"https://openalex.org/W2946704785","doi":"https://doi.org/10.1002/cpe.5344","mag":"2946704785"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1002/cpe.5344","pdf_url":null,"source":{"id":"https://openalex.org/S11065456","display_name":"Concurrency and Computation Practice and Experience","issn_l":"1532-0626","issn":["1532-0626","1532-0634"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://hal.sorbonne-universite.fr/hal-02188745/document","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025235658","display_name":"Martin Andreoni Lopez","orcid":"https://orcid.org/0000-0002-4170-4341"},"institutions":[{"id":"https://openalex.org/I39804081","display_name":"Sorbonne Universit\u00e9","ror":"https://ror.org/02en5vm52","country_code":"FR","type":"education","lineage":["https://openalex.org/I39804081"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I122140584","display_name":"Universidade Federal do Rio de Janeiro","ror":"https://ror.org/03490as77","country_code":"BR","type":"education","lineage":["https://openalex.org/I122140584"]},{"id":"https://openalex.org/I4210159731","display_name":"Laboratoire de Recherche en Informatique de Paris 6","ror":"https://ror.org/05krcen59","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I39804081","https://openalex.org/I4210159245","https://openalex.org/I4210159731"]}],"countries":["BR","FR"],"is_corresponding":true,"raw_author_name":"Martin Andreoni Lopez","raw_affiliation_strings":["Martin Andreoni Lopez, Universidade Federal do Rio de Janeiro, GTA/COPPE/UFRJ, 21945-970 Rio de Janeiro-RJ, Brazil.","Sorbonne Universit\u00e9, CNRS Laboratoire d'Informatique de Paris 6 Paris France","Universidade Federal do Rio de Janeiro - GTA/COPPE/UFRJ, Rio de Janeiro, Brazil"],"affiliations":[{"raw_affiliation_string":"Sorbonne Universit\u00e9, CNRS Laboratoire d'Informatique de Paris 6 Paris France","institution_ids":["https://openalex.org/I39804081","https://openalex.org/I1294671590","https://openalex.org/I4210159731"]},{"raw_affiliation_string":"Martin Andreoni Lopez, Universidade Federal do Rio de Janeiro, GTA/COPPE/UFRJ, 21945-970 Rio de Janeiro-RJ, Brazil.","institution_ids":["https://openalex.org/I122140584"]},{"raw_affiliation_string":"Universidade Federal do Rio de Janeiro - GTA/COPPE/UFRJ, Rio de Janeiro, Brazil","institution_ids":["https://openalex.org/I122140584"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076412136","display_name":"Diogo M. F. Mattos","orcid":"https://orcid.org/0000-0002-1279-7366"},"institutions":[{"id":"https://openalex.org/I122140584","display_name":"Universidade Federal do Rio de Janeiro","ror":"https://ror.org/03490as77","country_code":"BR","type":"education","lineage":["https://openalex.org/I122140584"]},{"id":"https://openalex.org/I161127581","display_name":"Universidade Federal Fluminense","ror":"https://ror.org/02rjhbb08","country_code":"BR","type":"education","lineage":["https://openalex.org/I161127581"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Diogo M. F. Mattos","raw_affiliation_strings":["Universidade Federal Fluminense \u2010 TET/PPGEET/UFF Niter\u00f3i Brazil","Universidade Federal do Rio de Janeiro - GTA/COPPE/UFRJ, Rio de Janeiro, Brazil"],"affiliations":[{"raw_affiliation_string":"Universidade Federal do Rio de Janeiro - GTA/COPPE/UFRJ, Rio de Janeiro, Brazil","institution_ids":["https://openalex.org/I122140584"]},{"raw_affiliation_string":"Universidade Federal Fluminense \u2010 TET/PPGEET/UFF Niter\u00f3i Brazil","institution_ids":["https://openalex.org/I161127581"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026700596","display_name":"Otto Carlos M. B. Duarte","orcid":"https://orcid.org/0000-0002-6642-4100"},"institutions":[{"id":"https://openalex.org/I122140584","display_name":"Universidade Federal do Rio de Janeiro","ror":"https://ror.org/03490as77","country_code":"BR","type":"education","lineage":["https://openalex.org/I122140584"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Otto Carlos M. B. Duarte","raw_affiliation_strings":["Universidade Federal do Rio de Janeiro - GTA/COPPE/UFRJ, Rio de Janeiro, Brazil"],"affiliations":[{"raw_affiliation_string":"Universidade Federal do Rio de Janeiro - GTA/COPPE/UFRJ, Rio de Janeiro, Brazil","institution_ids":["https://openalex.org/I122140584"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5104962716","display_name":"Guy Pujolle","orcid":"https://orcid.org/0000-0003-4147-7270"},"institutions":[{"id":"https://openalex.org/I39804081","display_name":"Sorbonne Universit\u00e9","ror":"https://ror.org/02en5vm52","country_code":"FR","type":"education","lineage":["https://openalex.org/I39804081"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I4210159731","display_name":"Laboratoire de Recherche en Informatique de Paris 6","ror":"https://ror.org/05krcen59","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I39804081","https://openalex.org/I4210159245","https://openalex.org/I4210159731"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Guy Pujolle","raw_affiliation_strings":["Sorbonne Universit\u00e9, CNRS Laboratoire d'Informatique de Paris 6 Paris France"],"affiliations":[{"raw_affiliation_string":"Sorbonne Universit\u00e9, CNRS Laboratoire d'Informatique de Paris 6 Paris France","institution_ids":["https://openalex.org/I39804081","https://openalex.org/I1294671590","https://openalex.org/I4210159731"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5025235658"],"corresponding_institution_ids":["https://openalex.org/I39804081","https://openalex.org/I1294671590","https://openalex.org/I122140584","https://openalex.org/I4210159731"],"apc_list":{"value":4740,"currency":"USD","value_usd":4740,"provenance":"doaj"},"apc_paid":null,"fwci":3.597,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":30,"citation_normalized_percentile":{"value":0.999951,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":95},"biblio":{"volume":"31","issue":"20","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9986,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.9978,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spark","display_name":"SPARK (programming language)","score":0.55953026},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability","score":0.4814536},{"id":"https://openalex.org/keywords/network-monitoring","display_name":"Network monitoring","score":0.47661796},{"id":"https://openalex.org/keywords/virtual-network","display_name":"Virtual network","score":0.4585438}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7399177},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6132768},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.60456353},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.57296216},{"id":"https://openalex.org/C2781215313","wikidata":"https://www.wikidata.org/wiki/Q3493345","display_name":"SPARK (programming language)","level":2,"score":0.55953026},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4814536},{"id":"https://openalex.org/C81877898","wikidata":"https://www.wikidata.org/wiki/Q1965787","display_name":"Network monitoring","level":2,"score":0.47661796},{"id":"https://openalex.org/C2776874963","wikidata":"https://www.wikidata.org/wiki/Q4112081","display_name":"Virtual network","level":2,"score":0.4585438},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.44278592},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4396853},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4273337},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.42301923},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.42212796},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.30171174},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.20621994},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.17909253},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1002/cpe.5344","pdf_url":null,"source":{"id":"https://openalex.org/S11065456","display_name":"Concurrency and Computation Practice and Experience","issn_l":"1532-0626","issn":["1532-0626","1532-0634"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://hal.sorbonne-universite.fr/hal-02188745","pdf_url":"https://hal.sorbonne-universite.fr/hal-02188745/document","source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":["Centre National de la Recherche Scientifique"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://hal.sorbonne-universite.fr/hal-02188745/file/Lopez%20et%20al.%20-%20Toward%20a%20monitoring%20and%20threat%20detection%20system%20ba.pdf","pdf_url":"https://hal.sorbonne-universite.fr/hal-02188745/file/Lopez%20et%20al.%20-%20Toward%20a%20monitoring%20and%20threat%20detection%20system%20ba.pdf","source":null,"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://hal.sorbonne-universite.fr/hal-02188745","pdf_url":"https://hal.sorbonne-universite.fr/hal-02188745/document","source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":["Centre National de la Recherche Scientifique"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[{"score":0.64,"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16"}],"grants":[{"funder":"https://openalex.org/F4320320997","funder_display_name":"Funda\u00e7\u00e3o de Amparo \u00e0 Pesquisa do Estado de S\u00e3o Paulo","award_id":null},{"funder":"https://openalex.org/F4320321091","funder_display_name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior","award_id":null},{"funder":"https://openalex.org/F4320322025","funder_display_name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","award_id":null},{"funder":"https://openalex.org/F4320322749","funder_display_name":"Funda\u00e7\u00e3o Carlos Chagas Filho de Amparo \u00e0 Pesquisa do Estado do Rio de Janeiro","award_id":null}],"datasets":[],"versions":[],"referenced_works_count":27,"referenced_works":["https://openalex.org/W1533945010","https://openalex.org/W1578389446","https://openalex.org/W1975188201","https://openalex.org/W1985987493","https://openalex.org/W1990396441","https://openalex.org/W1991076541","https://openalex.org/W2012568697","https://openalex.org/W2042737253","https://openalex.org/W2096971655","https://openalex.org/W2099940443","https://openalex.org/W2148143831","https://openalex.org/W2155317309","https://openalex.org/W2206700814","https://openalex.org/W2213647654","https://openalex.org/W2291943985","https://openalex.org/W2327688014","https://openalex.org/W2532764181","https://openalex.org/W2586025740","https://openalex.org/W2605253252","https://openalex.org/W2735446156","https://openalex.org/W2782220218","https://openalex.org/W2791514401","https://openalex.org/W2794609069","https://openalex.org/W2866681005","https://openalex.org/W2887492447","https://openalex.org/W2913854892","https://openalex.org/W4298082496"],"related_works":["https://openalex.org/W4386482731","https://openalex.org/W4385302085","https://openalex.org/W4256682929","https://openalex.org/W2765763546","https://openalex.org/W2391366589","https://openalex.org/W2362801139","https://openalex.org/W2360429410","https://openalex.org/W2358660853","https://openalex.org/W2061862347","https://openalex.org/W1909231387"],"abstract_inverted_index":{"Summary":[0],"The":[1,87],"late":[2],"detection":[3,139],"of":[4,14,98,117,144],"security":[5],"threats":[6],"causes":[7],"a":[8,27,52,62,90],"significant":[9],"increase":[10],"in":[11,106],"the":[12,73,99,102,107],"risk":[13],"irreparable":[15],"damages":[16],"and":[17,35,47,68,101,121],"restricts":[18],"any":[19],"defense":[20],"attempt.":[21],"In":[22],"this":[23],"paper,":[24],"we":[25],"propose":[26],"s":[28],"CA":[29],"lable":[30],"TR":[31],"Affic":[32],"C":[33],"lassifier":[34],"A":[36],"nalyzer":[37],"(CATRACA).":[38],"CATRACA":[39,56,132],"works":[40],"as":[41,51],"an":[42,82],"efficient":[43],"online":[44],"Intrusion":[45],"Detection":[46],"Prevention":[48],"System":[49],"implemented":[50],"Virtualized":[53],"Network":[54,77],"Function.":[55],"is":[57,70],"based":[58],"on":[59],"Apache":[60],"Spark,":[61],"Big":[63],"Data":[64],"Streaming":[65],"processing":[66],"system,":[67],"it":[69],"deployed":[71],"over":[72,124],"Open":[74],"Platform":[75],"for":[76],"Functions":[78],"Virtualization":[79],"(OPNFV),":[80],"providing":[81],"accurate":[83],"real\u2010time":[84,96],"threat\u2010detection":[85],"service.":[86],"system":[88],"presents":[89],"friendly":[91],"graphical":[92],"interface":[93],"that":[94,104],"provides":[95],"visualization":[97],"traffic":[100,114],"attacks":[103,120],"occur":[105],"network.":[108],"Our":[109],"prototype":[110],"can":[111],"differentiate":[112],"normal":[113],"from":[115],"denial":[116],"service":[118],"(DoS)":[119],"vulnerability":[122],"probes":[123],"95%":[125],"accuracy":[126],"under":[127,136],"three":[128],"different":[129],"datasets.":[130],"Moreover,":[131],"handles":[133],"streaming":[134],"data":[135],"concept":[137],"drift":[138],"with":[140],"more":[141],"than":[142],"85%":[143],"accuracy.":[145]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2946704785","counts_by_year":[{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":1}],"updated_date":"2024-12-10T15:55:09.640138","created_date":"2019-05-29"}