{"id":"https://openalex.org/W2603295249","doi":"https://doi.org/10.1109/iccnc.2017.7876150","title":"Entropy-based network anomaly Detection","display_name":"Entropy-based network anomaly Detection","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2603295249","doi":"https://doi.org/10.1109/iccnc.2017.7876150","mag":"2603295249"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccnc.2017.7876150","pdf_url":null,"source":{"id":"https://openalex.org/S4306498049","display_name":"2016 International Conference on Computing, Networking and Communications (ICNC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079097534","display_name":"Christian Callegari","orcid":"https://orcid.org/0000-0001-7323-8069"},"institutions":[{"id":"https://openalex.org/I108290504","display_name":"University of Pisa","ror":"https://ror.org/03ad39j10","country_code":"IT","type":"education","lineage":["https://openalex.org/I108290504"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Christian Callegari","raw_affiliation_strings":["Dept. of Information Engineering, University of Pisa, Italy","RaSS National Laboratory - CNIT, Pisa, Italy"],"affiliations":[{"raw_affiliation_string":"RaSS National Laboratory - CNIT, Pisa, Italy","institution_ids":[]},{"raw_affiliation_string":"Dept. of Information Engineering, University of Pisa, Italy","institution_ids":["https://openalex.org/I108290504"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021026284","display_name":"Stefano Giordano","orcid":"https://orcid.org/0000-0002-1408-7528"},"institutions":[{"id":"https://openalex.org/I108290504","display_name":"University of Pisa","ror":"https://ror.org/03ad39j10","country_code":"IT","type":"education","lineage":["https://openalex.org/I108290504"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Stefano Giordano","raw_affiliation_strings":["Dept. of Information Engineering, University of Pisa, Italy"],"affiliations":[{"raw_affiliation_string":"Dept. of Information Engineering, University of Pisa, Italy","institution_ids":["https://openalex.org/I108290504"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065635344","display_name":"Michele Pagano","orcid":"https://orcid.org/0000-0003-1706-4994"},"institutions":[{"id":"https://openalex.org/I108290504","display_name":"University of Pisa","ror":"https://ror.org/03ad39j10","country_code":"IT","type":"education","lineage":["https://openalex.org/I108290504"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Michele Pagano","raw_affiliation_strings":["Dept. of Information Engineering, University of Pisa, Italy"],"affiliations":[{"raw_affiliation_string":"Dept. of Information Engineering, University of Pisa, Italy","institution_ids":["https://openalex.org/I108290504"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.624,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":27,"citation_normalized_percentile":{"value":0.999865,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":92,"max":93},"biblio":{"volume":null,"issue":null,"first_page":"334","last_page":"340"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9981,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7672112},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7462349},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7203598},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.6507658},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.61063576},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.57477635},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.42370206},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.35082918},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2224729},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccnc.2017.7876150","pdf_url":null,"source":{"id":"https://openalex.org/S4306498049","display_name":"2016 International Conference on Computing, Networking and Communications (ICNC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.42,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":24,"referenced_works":["https://openalex.org/W1542497361","https://openalex.org/W1964762119","https://openalex.org/W1965555277","https://openalex.org/W1983874169","https://openalex.org/W1995484833","https://openalex.org/W2015148578","https://openalex.org/W2026784425","https://openalex.org/W2096847629","https://openalex.org/W2101399851","https://openalex.org/W2102481563","https://openalex.org/W2113061123","https://openalex.org/W2128165614","https://openalex.org/W2141115475","https://openalex.org/W2141910941","https://openalex.org/W2146950091","https://openalex.org/W2147283369","https://openalex.org/W2150517569","https://openalex.org/W2157578436","https://openalex.org/W2210878869","https://openalex.org/W2549079146","https://openalex.org/W2914155474","https://openalex.org/W2963879636","https://openalex.org/W2993383518","https://openalex.org/W40890042"],"related_works":["https://openalex.org/W2384741105","https://openalex.org/W2376886931","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W2185594426","https://openalex.org/W2061466315","https://openalex.org/W2010561419","https://openalex.org/W1992118813","https://openalex.org/W1977863481","https://openalex.org/W1495178644"],"abstract_inverted_index":{"Anomaly-based":[0],"Intrusion":[1],"Detection":[2],"is":[3,54,75],"a":[4,28],"key":[5],"research":[6],"topic":[7],"in":[8,41],"network":[9,47],"security":[10,21],"due":[11],"to":[12,15,45],"its":[13],"ability":[14],"face":[16],"unknown":[17],"attacks":[18],"and":[19,67,94],"new":[20],"threats.":[22],"In":[23],"this":[24,50],"paper":[25],"we":[26],"propose":[27],"novel":[29],"intrusion":[30],"detection":[31,36],"system":[32,93],"that":[33],"performs":[34],"anomaly":[35],"by":[37,57,77],"studying":[38],"the":[39,42,46,52,69,88,92,96],"variation":[40],"entropy":[43,70],"associated":[44],"traffic.":[48],"To":[49],"aim,":[51],"traffic":[53,73],"first":[55],"aggregated":[56],"means":[58],"of":[59,71,81,98],"random":[60],"data":[61],"structures":[62],"(namely":[63],"three-dimension":[64],"reversible":[65],"sketches)":[66],"then":[68],"different":[72],"descriptors":[74],"computed":[76],"using":[78],"several":[79],"definitions":[80],"entropy.":[82],"The":[83],"experimental":[84],"results":[85],"obtained":[86],"over":[87],"MAWILab":[89],"dataset":[90],"validate":[91],"demonstrate":[95],"effectiveness":[97],"our":[99],"proposal.":[100]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2603295249","counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":3}],"updated_date":"2025-01-14T10:35:42.869314","created_date":"2017-04-07"}