{"id":"https://openalex.org/W4313307747","doi":"https://doi.org/10.1109/commnet56067.2022.9993965","title":"Multi-step Attack Detection and Mitigation Enhancing In-Network Flow Classification","display_name":"Multi-step Attack Detection and Mitigation Enhancing In-Network Flow Classification","publication_year":2022,"publication_date":"2022-12-12","ids":{"openalex":"https://openalex.org/W4313307747","doi":"https://doi.org/10.1109/commnet56067.2022.9993965"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/commnet56067.2022.9993965","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007226831","display_name":"Christoph Hardegen","orcid":"https://orcid.org/0000-0003-4002-6160"},"institutions":[{"id":"https://openalex.org/I201850948","display_name":"Fulda University of Applied Sciences","ror":"https://ror.org/041bz9r75","country_code":"DE","type":"education","lineage":["https://openalex.org/I201850948"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Christoph Hardegen","raw_affiliation_strings":["Department of Applied Computer Science, Fulda University of Applied Sciences, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Applied Computer Science, Fulda University of Applied Sciences, Germany","institution_ids":["https://openalex.org/I201850948"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057029027","display_name":"Sebastian Rieger","orcid":"https://orcid.org/0000-0003-3597-6284"},"institutions":[{"id":"https://openalex.org/I201850948","display_name":"Fulda University of Applied Sciences","ror":"https://ror.org/041bz9r75","country_code":"DE","type":"education","lineage":["https://openalex.org/I201850948"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Sebastian Rieger","raw_affiliation_strings":["Department of Applied Computer Science, Fulda University of Applied Sciences, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Applied Computer Science, Fulda University of Applied Sciences, Germany","institution_ids":["https://openalex.org/I201850948"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008263429","display_name":"Timo Geier","orcid":null},"institutions":[{"id":"https://openalex.org/I201850948","display_name":"Fulda University of Applied Sciences","ror":"https://ror.org/041bz9r75","country_code":"DE","type":"education","lineage":["https://openalex.org/I201850948"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Timo Geier","raw_affiliation_strings":["Department of Applied Computer Science, Fulda University of Applied Sciences, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Applied Computer Science, Fulda University of Applied Sciences, Germany","institution_ids":["https://openalex.org/I201850948"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.486,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.418212,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":76,"max":80},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9974,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/forwarding-plane","display_name":"Forwarding plane","score":0.5323793}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8751873},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7299738},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5597352},{"id":"https://openalex.org/C10597312","wikidata":"https://www.wikidata.org/wiki/Q5473302","display_name":"Forwarding plane","level":3,"score":0.5323793},{"id":"https://openalex.org/C93518851","wikidata":"https://www.wikidata.org/wiki/Q180160","display_name":"Metadata","level":2,"score":0.52274513},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.459731},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.4488712},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.44606864},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3550214},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3532781},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.23341563},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11986607},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/commnet56067.2022.9993965","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":13,"referenced_works":["https://openalex.org/W2789828921","https://openalex.org/W2925381967","https://openalex.org/W2958959164","https://openalex.org/W2964212624","https://openalex.org/W3010002476","https://openalex.org/W3100529623","https://openalex.org/W3113980009","https://openalex.org/W3125704518","https://openalex.org/W3127353117","https://openalex.org/W3153512259","https://openalex.org/W4210984003","https://openalex.org/W4211109677","https://openalex.org/W4295023660"],"related_works":["https://openalex.org/W2784246983","https://openalex.org/W2501188010","https://openalex.org/W2393741509","https://openalex.org/W2392768766","https://openalex.org/W2382021449","https://openalex.org/W2114103190","https://openalex.org/W2106424170","https://openalex.org/W2104269053","https://openalex.org/W2095118173","https://openalex.org/W2058118494"],"abstract_inverted_index":{"Recent":[0],"in-network":[1,158],"flow":[2,153,180,193],"classification":[3,154,220],"methods":[4],"are":[5,30],"able":[6],"to":[7,33,70,91,112,184,198,236,245],"run":[8,92],"within":[9],"the":[10,67,86,104,134,145,202,214],"data":[11,38,83,107,131,135],"plane":[12,39,84,136],"of":[13,44,53,66,106,127,206],"network":[14,87],"switches":[15,68],"allowing":[16],"intrusion":[17],"detection":[18],"at":[19,63,133],"linerate.":[20],"Although":[21],"this":[22,118],"enables":[23],"fine-grained,":[24],"scalable":[25,114],"and":[26,41,47,100,130,141,179,187,195,204,230],"timely":[27,229],"analysis,":[28],"outcomes":[29],"still":[31],"subject":[32],"uncertainty,":[34],"aggravated":[35],"by":[36,58,169],"limited":[37,102],"resources":[40],"language":[42],"constraints":[43],"respective":[45],"programs,":[46],"hence":[48],"associated":[49,96],"with":[50,97,137,164],"higher":[51,138],"risk":[52],"misclassification.":[54],"Countering":[55],"these":[56],"deficiencies":[57],"leveraging":[59],"increased":[60],"computational":[61,139],"capabilities":[62],"CPU":[64],"level":[65],"helps":[69],"obtain":[71],"more":[72],"sophisticated":[73],"analysis":[74,94,142,174],"decisions.":[75,232],"However,":[76],"exporting":[77],"metadata":[78,163],"for":[79,223],"packet":[80,208],"streams":[81],"from":[82],"into":[85],"operating":[88,146],"system":[89,147],"space":[90],"downstream":[93],"is":[95,148,182],"additional":[98],"delay":[99],"also":[101],"regarding":[103],"amount":[105],"that":[108,123],"can":[109],"be":[110],"shared":[111],"ensure":[113],"processing.":[115],"To":[116],"address":[117],"trade-off,":[119],"a":[120,151,170,192],"certainty-based":[121],"approach":[122],"selectively":[124],"combines":[125],"advantages":[126],"lower":[128],"latency":[129],"locality":[132],"power":[140],"complexity":[143],"in":[144,200],"proposed.":[149],"Therefore,":[150],"two-tier":[152],"method":[155],"integrates":[156],"initial":[157],"inference":[159],"on":[160,249],"early":[161],"subflow":[162],"advanced":[165],"decision":[166],"support":[167],"provided":[168],"subsequent":[171],"machine":[172],"learning-based":[173],"step.":[175],"In":[176],"addition,":[177],"load":[178],"monitoring":[181],"employed":[183],"track":[185],"long-term":[186],"voluminous":[188],"heavy":[189,240],"hitters,":[190],"supporting":[191],"detour":[194],"throttling":[196],"mechanism":[197],"assist":[199],"controlling":[201],"volume":[203],"velocity":[205],"suspicious":[207],"streams.":[209],"Evaluations":[210],"show":[211],"that,":[212],"first,":[213],"cooperative":[215],"behavior":[216],"using":[217],"both":[218],"traffic":[219,243],"steps":[221,235],"allows":[222],"improved":[224],"accuracies":[225],"while":[226],"providing":[227],"scalable,":[228],"certain":[231],"Second,":[233],"considered":[234],"handle":[237],"potentially":[238],"malicious":[239],"hitters":[241],"allow":[242],"control":[244],"reduce":[246],"negative":[247],"impacts":[248],"benign":[250],"flows.":[251]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4313307747","counts_by_year":[{"year":2023,"cited_by_count":3}],"updated_date":"2024-12-12T20:01:24.796595","created_date":"2023-01-06"}