{"id":"https://openalex.org/W2140938170","doi":"https://doi.org/10.1109/icccn.2011.6006063","title":"Adaptive Load Balancing for Parallel IDS on Multi-Core Systems Using Prioritized Flows","display_name":"Adaptive Load Balancing for Parallel IDS on Multi-Core Systems Using Prioritized Flows","publication_year":2011,"publication_date":"2011-07-01","ids":{"openalex":"https://openalex.org/W2140938170","doi":"https://doi.org/10.1109/icccn.2011.6006063","mag":"2140938170"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn.2011.6006063","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015868383","display_name":"Tobias Limmer","orcid":"https://orcid.org/0000-0001-8904-0620"},"institutions":[{"id":"https://openalex.org/I181369854","display_name":"Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg","ror":"https://ror.org/00f7hpc57","country_code":"DE","type":"education","lineage":["https://openalex.org/I181369854"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Tobias Limmer","raw_affiliation_strings":["Department of Computer Science, University of Erlangen, Erlangen, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Erlangen, Erlangen, Germany","institution_ids":["https://openalex.org/I181369854"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042212040","display_name":"Falko Dressler","orcid":"https://orcid.org/0000-0002-1989-1750"},"institutions":[{"id":"https://openalex.org/I190249584","display_name":"Universit\u00e4t Innsbruck","ror":"https://ror.org/054pv6659","country_code":"AT","type":"education","lineage":["https://openalex.org/I190249584"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Falko Dressler","raw_affiliation_strings":["Institute of Computer Science, University of Innsbruck, Innsbruck, Austria"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Science, University of Innsbruck, Innsbruck, Austria","institution_ids":["https://openalex.org/I190249584"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.752,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":11,"citation_normalized_percentile":{"value":0.855985,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":85,"max":86},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.52145284}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8540153},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6184202},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.57033205},{"id":"https://openalex.org/C138959212","wikidata":"https://www.wikidata.org/wiki/Q1806783","display_name":"Load balancing (electrical power)","level":3,"score":0.5520261},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.52145284},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.50820994},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5062784},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.47033674},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4391347},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.13288099},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12788922},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn.2011.6006063","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":25,"referenced_works":["https://openalex.org/W117852247","https://openalex.org/W1552569371","https://openalex.org/W1763270762","https://openalex.org/W1775772884","https://openalex.org/W1964124216","https://openalex.org/W1991657916","https://openalex.org/W2017058405","https://openalex.org/W2039638209","https://openalex.org/W2084715661","https://openalex.org/W2122698306","https://openalex.org/W2124177002","https://openalex.org/W2125269465","https://openalex.org/W2125751211","https://openalex.org/W2126082439","https://openalex.org/W2129700391","https://openalex.org/W2145341711","https://openalex.org/W2153888902","https://openalex.org/W2161480401","https://openalex.org/W2167971042","https://openalex.org/W2946814613","https://openalex.org/W29748014","https://openalex.org/W3008884790","https://openalex.org/W4232580291","https://openalex.org/W4240018668","https://openalex.org/W4253072731"],"related_works":["https://openalex.org/W857189463","https://openalex.org/W4306309337","https://openalex.org/W4288094128","https://openalex.org/W3160314615","https://openalex.org/W306312984","https://openalex.org/W2979675132","https://openalex.org/W2790520092","https://openalex.org/W2312786236","https://openalex.org/W20648474","https://openalex.org/W1535080110"],"abstract_inverted_index":{"We":[0,80,120],"describe":[1],"a":[2,14,32,54,76,82,108,148,186],"load":[3,66],"balancing":[4],"system":[5,28,118,139],"for":[6,75,85,143],"parallel":[7],"intrusion":[8],"detection":[9],"on":[10,41,156],"multi-core":[11],"systems":[12],"using":[13],"novel":[15],"model":[16,84,180],"allowing":[17],"fine-grained":[18],"selection":[19,87],"of":[20,57,67,88,110,159],"the":[21,65,86,92,157,178],"network":[22,33,73,89,104,161,193],"traffic":[23],"to":[24,37,47,59,71,99,117,135],"be":[25,114,166,173],"analyzed.":[26],"The":[27],"receives":[29],"data":[30,90,112,127,145,164],"from":[31,130],"and":[34,91,181,188],"distributes":[35],"it":[36,190],"multiple":[38],"IDSs":[39,123],"running":[40],"individual":[42],"CPU":[43],"cores.":[44],"In":[45],"contrast":[46],"related":[48],"approaches,":[49],"we":[50,184],"do":[51],"not":[52],"assume":[53],"static":[55],"association":[56],"flows":[58,74],"IDS":[60,69],"processes":[61,171],"but":[62],"adaptively":[63],"determine":[64],"each":[68],"process":[70],"allocate":[72],"limited":[77],"time":[78,150],"window.":[79],"developed":[81],"priority":[83,179],"assignment":[93,182],"process.":[94],"Special":[95],"emphasis":[96],"is":[97],"given":[98],"environments":[100],"with":[101,191],"highly":[102],"dynamic":[103,160],"traffic,":[105],"where":[106],"only":[107],"fraction":[109],"all":[111],"can":[113],"analyzed":[115],"due":[116,134],"constraints.":[119],"show":[121],"that":[122],"analyzing":[124],"packet":[125,132],"payload":[126],"disproportionately":[128],"suffer":[129],"random":[131],"drops":[133],"overload.":[136],"Our":[137,152],"proposed":[138],"ensures":[140],"loss-free":[141],"analysis":[142,170],"selected":[144],"streams":[146],"in":[147],"specified":[149],"interval.":[151],"primary":[153],"focus":[154],"lies":[155],"treatment":[158],"behavior:":[162],"neither":[163],"should":[165,172],"lost":[167],"unintentionally,":[168],"nor":[169],"needlessly":[174],"idle.":[175],"To":[176],"evaluate":[177],"systems,":[183],"implemented":[185],"prototype":[187],"evaluated":[189],"real":[192],"traffic.":[194]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2140938170","counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":2}],"updated_date":"2024-12-12T12:25:38.378469","created_date":"2016-06-24"}