{"id":"https://openalex.org/W2099953428","doi":"https://doi.org/10.1109/icnsc.2015.7116055","title":"Entropy clustering approach for improving forecasting in DDoS attacks","display_name":"Entropy clustering approach for improving forecasting in DDoS attacks","publication_year":2015,"publication_date":"2015-04-01","ids":{"openalex":"https://openalex.org/W2099953428","doi":"https://doi.org/10.1109/icnsc.2015.7116055","mag":"2099953428"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnsc.2015.7116055","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038252737","display_name":"Abimbola Olabelurin","orcid":null},"institutions":[{"id":"https://openalex.org/I180825142","display_name":"City, University of London","ror":"https://ror.org/04489at23","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I180825142","https://openalex.org/I4401726869"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Abimbola Olabelurin","raw_affiliation_strings":["School of Mathematics, Computer Sciences, and Engineering, City University London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Mathematics, Computer Sciences, and Engineering, City University London, United Kingdom","institution_ids":["https://openalex.org/I180825142"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103585909","display_name":"Suresh Veluru","orcid":null},"institutions":[{"id":"https://openalex.org/I4210159603","display_name":"United Technologies Research Center","ror":"https://ror.org/04vxc1c96","country_code":"IE","type":"company","lineage":["https://openalex.org/I4210159603"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Suresh Veluru","raw_affiliation_strings":["United Technologies Research Centre (UTRC), Cork, Republic of Ireland"],"affiliations":[{"raw_affiliation_string":"United Technologies Research Centre (UTRC), Cork, Republic of Ireland","institution_ids":["https://openalex.org/I4210159603"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058805614","display_name":"Alex Healing","orcid":null},"institutions":[{"id":"https://openalex.org/I1332878012","display_name":"BT Group (United Kingdom)","ror":"https://ror.org/00kv9pj15","country_code":"GB","type":"company","lineage":["https://openalex.org/I1332878012"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Alex Healing","raw_affiliation_strings":["British Telecommunications (BT), Ipswich, United Kingdom"],"affiliations":[{"raw_affiliation_string":"British Telecommunications (BT), Ipswich, United Kingdom","institution_ids":["https://openalex.org/I1332878012"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059640195","display_name":"Muttukrishnan Rajarajan","orcid":"https://orcid.org/0000-0001-5814-9922"},"institutions":[{"id":"https://openalex.org/I180825142","display_name":"City, University of London","ror":"https://ror.org/04489at23","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I180825142","https://openalex.org/I4401726869"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Muttukrishnan Rajarajan","raw_affiliation_strings":["School of Mathematics, Computer Sciences, and Engineering, City University London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Mathematics, Computer Sciences, and Engineering, City University London, United Kingdom","institution_ids":["https://openalex.org/I180825142"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.348,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":17,"citation_normalized_percentile":{"value":0.85696,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":90},"biblio":{"volume":null,"issue":null,"first_page":"315","last_page":"320"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9924,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.90490043},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7791585},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.62805927},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.58573604},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.5754526},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.5753618},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5590373},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.50675446},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5047606},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.4111328},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3922193},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.23073402},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.14631748},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnsc.2015.7116055","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":32,"referenced_works":["https://openalex.org/W1546161684","https://openalex.org/W178280372","https://openalex.org/W184029579","https://openalex.org/W1995875735","https://openalex.org/W1996482171","https://openalex.org/W1998496248","https://openalex.org/W2000975802","https://openalex.org/W2011430131","https://openalex.org/W2057358937","https://openalex.org/W2067598246","https://openalex.org/W2068803497","https://openalex.org/W2076999409","https://openalex.org/W2080668808","https://openalex.org/W2097698747","https://openalex.org/W2105045879","https://openalex.org/W2105934885","https://openalex.org/W2111350651","https://openalex.org/W2117891917","https://openalex.org/W2122646361","https://openalex.org/W2123619513","https://openalex.org/W2130507939","https://openalex.org/W2139468004","https://openalex.org/W2141200504","https://openalex.org/W2143692712","https://openalex.org/W2146189323","https://openalex.org/W2157587606","https://openalex.org/W218149232","https://openalex.org/W2319310916","https://openalex.org/W2472208354","https://openalex.org/W2765459617","https://openalex.org/W3099183575","https://openalex.org/W4231518042"],"related_works":["https://openalex.org/W4286539397","https://openalex.org/W4256682929","https://openalex.org/W2958385475","https://openalex.org/W2921433547","https://openalex.org/W2898696280","https://openalex.org/W2783466926","https://openalex.org/W2383770723","https://openalex.org/W2370216173","https://openalex.org/W2360429410","https://openalex.org/W2204131204"],"abstract_inverted_index":{"Volume":[0],"anomaly":[1],"such":[2],"as":[3,138,140],"distributed":[4],"denial-of-service":[5],"(DDoS)":[6],"has":[7],"been":[8],"around":[9],"for":[10,26,46,90,135],"ages":[11],"but":[12],"with":[13,144],"advancement":[14],"in":[15,49,162],"technologies,":[16],"they":[17],"have":[18],"become":[19],"stronger,":[20],"shorter":[21],"and":[22,93,106],"weapon":[23],"of":[24,31,57,64,71,96,103,109,152,155],"choice":[25],"attackers.":[27],"Digital":[28],"forensic":[29],"analysis":[30,164],"intrusions":[32],"using":[33],"alerts":[34,65,134],"generated":[35],"by":[36],"existing":[37],"intrusion":[38],"detection":[39,95],"system":[40],"(IDS)":[41],"faces":[42],"major":[43],"challenges,":[44],"especially":[45],"IDS":[47],"deployed":[48],"large":[50],"networks.":[51],"In":[52],"this":[53,156],"paper,":[54],"the":[55,68,88,121,127,141],"concept":[56,105],"automatically":[58],"sifting":[59],"through":[60,99],"a":[61,72,100,116,145],"huge":[62],"volume":[63],"to":[66,83,131,165],"distinguish":[67,132],"different":[69],"stages":[70],"DDoS":[73,97,136,167],"attack":[74,142],"is":[75,81,129],"developed.":[76],"The":[77],"proposed":[78],"novel":[79],"framework":[80],"purpose-built":[82],"analyze":[84],"multiple":[85],"logs":[86],"from":[87,120],"network":[89,163],"proactive":[91],"forecast":[92],"timely":[94],"attacks,":[98,137],"combined":[101],"approach":[102],"Shannon-entropy":[104],"clustering":[107],"algorithm":[108],"relevant":[110],"feature":[111],"variables.":[112],"Experimental":[113],"studies":[114],"on":[115],"cyber-range":[117],"simulation":[118],"dataset":[119],"project":[122],"industrial":[123],"partners":[124],"show":[125],"that":[126],"technique":[128,157],"able":[130],"precursor":[133],"well":[139],"itself":[143],"very":[146],"low":[147],"false":[148],"positive":[149],"rate":[150],"(FPR)":[151],"22.5%.":[153],"Application":[154],"greatly":[158],"assists":[159],"security":[160],"experts":[161],"combat":[166],"attacks.":[168]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2099953428","counts_by_year":[{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":2}],"updated_date":"2024-12-09T03:43:06.030768","created_date":"2016-06-24"}