{"id":"https://openalex.org/W4387623905","doi":"https://doi.org/10.1109/mnet.2023.3321372","title":"FlowSpotter: Intelligent IoT Threat Detection via Imaging Network Flows","display_name":"FlowSpotter: Intelligent IoT Threat Detection via Imaging Network Flows","publication_year":2023,"publication_date":"2023-10-13","ids":{"openalex":"https://openalex.org/W4387623905","doi":"https://doi.org/10.1109/mnet.2023.3321372"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/mnet.2023.3321372","pdf_url":null,"source":{"id":"https://openalex.org/S186584794","display_name":"IEEE Network","issn_l":"0890-8044","issn":["0890-8044","1558-156X"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022611612","display_name":"Shuaishuai Tan","orcid":"https://orcid.org/0000-0002-8882-405X"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"funder","lineage":["https://openalex.org/I204983213"]},{"id":"https://openalex.org/I139024713","display_name":"Guangdong University of Technology","ror":"https://ror.org/04azbjn80","country_code":"CN","type":"funder","lineage":["https://openalex.org/I139024713"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuaishuai Tan","raw_affiliation_strings":["Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies, Shenzhen, P.R. China","Harbin Institute of Technology, Shenzhen, P.R. China","School of Computer Science and Technology, Guangdong University of Technology, Guangzhou, P.R. China"],"affiliations":[{"raw_affiliation_string":"Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies, Shenzhen, P.R. China","institution_ids":[]},{"raw_affiliation_string":"Harbin Institute of Technology, Shenzhen, P.R. China","institution_ids":["https://openalex.org/I204983213"]},{"raw_affiliation_string":"School of Computer Science and Technology, Guangdong University of Technology, Guangzhou, P.R. China","institution_ids":["https://openalex.org/I139024713"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082144617","display_name":"Daojing He","orcid":"https://orcid.org/0000-0002-3820-8128"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"funder","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Daojing He","raw_affiliation_strings":["School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, P.R. China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091879207","display_name":"Sammy Chan","orcid":"https://orcid.org/0000-0002-8524-229X"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"funder","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Sammy Chan","raw_affiliation_strings":["Department of Electrical Engineering, City University of Hong Kong, HKSAR, P.R. China"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, City University of Hong Kong, HKSAR, P.R. China","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057916222","display_name":"Mohsen Guizani","orcid":"https://orcid.org/0000-0002-8972-8094"},"institutions":[{"id":"https://openalex.org/I4210113480","display_name":"Mohamed bin Zayed University of Artificial Intelligence","ror":"https://ror.org/0258gkt32","country_code":"AE","type":"education","lineage":["https://openalex.org/I4210113480"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Mohsen Guizani","raw_affiliation_strings":["Machine Learning Department, Mohamed bin Zayed University of Artificial Intelligence (MBZUAI), Abu Dhabi, UAE"],"affiliations":[{"raw_affiliation_string":"Machine Learning Department, Mohamed bin Zayed University of Artificial Intelligence (MBZUAI), Abu Dhabi, UAE","institution_ids":["https://openalex.org/I4210113480"]}]}],"institution_assertions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.68,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.520613,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":76,"max":82},"biblio":{"volume":"38","issue":"4","first_page":"268","last_page":"274"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9961,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9903,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.5406001},{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.4594219},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.4542376},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.44345215}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.85433865},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.6271441},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.54731876},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.5406001},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.50866276},{"id":"https://openalex.org/C187713609","wikidata":"https://www.wikidata.org/wiki/Q2465461","display_name":"Default gateway","level":2,"score":0.4901},{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.4594219},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.45548597},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.4542376},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.44345215},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.43714523},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.41424498},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.39449},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36349267},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3526005},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3490524},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3473801},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.15817472},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1326218},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/mnet.2023.3321372","pdf_url":null,"source":{"id":"https://openalex.org/S186584794","display_name":"IEEE Network","issn_l":"0890-8044","issn":["0890-8044","1558-156X"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":14,"referenced_works":["https://openalex.org/W2883780447","https://openalex.org/W2953225812","https://openalex.org/W3006503311","https://openalex.org/W3012425390","https://openalex.org/W3033185093","https://openalex.org/W3037997326","https://openalex.org/W3097110752","https://openalex.org/W3111088413","https://openalex.org/W3196650078","https://openalex.org/W3206674745","https://openalex.org/W3209375340","https://openalex.org/W4210572266","https://openalex.org/W4220863835","https://openalex.org/W4360838285"],"related_works":["https://openalex.org/W4322761281","https://openalex.org/W4319161913","https://openalex.org/W4313526662","https://openalex.org/W4313463218","https://openalex.org/W4312996489","https://openalex.org/W4238233472","https://openalex.org/W4205963435","https://openalex.org/W3216099748","https://openalex.org/W3111395152","https://openalex.org/W3106131444"],"abstract_inverted_index":{"With":[0],"the":[1,9,62,100,125,136,161],"prevalence":[2],"of":[3,5,12,19,119,121],"Internet":[4],"Things":[6],"(IoT)":[7],"technologies,":[8],"huge":[10],"growth":[11],"IoT":[13,22,63,113,122],"devices":[14,60],"has":[15,40],"also":[16,159],"brought":[17],"attention":[18],"cyber":[20],"attackers.":[21],"botnets":[23],"are":[24,54],"rapidly":[25],"spreading":[26],"and":[27,35,51,89,153,171],"evolving":[28],"worldwide,":[29],"causing":[30],"serious":[31],"risks":[32],"to":[33],"users":[34],"data.":[36],"Machine":[37],"learning":[38,52],"(ML)":[39],"shown":[41],"its":[42],"effectiveness":[43],"on":[44,99,131],"threat":[45,72],"detection.":[46,177],"However,":[47],"existing":[48],"feature":[49,83],"encoding":[50],"methods":[53],"unsuitable":[55],"for":[56,134,175],"resource":[57],"constrained":[58],"edge":[59],"like":[61],"gateway.":[64],"In":[65],"this":[66],"paper,":[67],"we":[68,110],"propose":[69],"a":[70],"lightweight":[71],"detection":[73],"scheme":[74],"called":[75],"FlowSpotter.":[76],"The":[77],"flow":[78],"imaging":[79],"mechanism":[80],"requires":[81],"less":[82,167],"extraction":[84],"but":[85,158],"preserves":[86],"more":[87],"spatial":[88],"temporal":[90],"information.":[91],"A":[92],"lite":[93],"convolution":[94],"neural":[95],"network":[96],"architecture":[97],"based":[98],"state-of-the-art":[101],"efficient":[102],"building":[103],"blocks":[104],"is":[105,129],"devised.":[106],"For":[107],"performance":[108],"evaluation,":[109],"develop":[111],"an":[112],"honeypot":[114],"system":[115],"that":[116,141],"captures":[117],"hundreds":[118],"thousands":[120],"intrusions":[123],"in":[124],"wild.":[126],"Besides,":[127],"FlowSpotter":[128,142],"implemented":[130],"Raspberry":[132],"Pi":[133],"measuring":[135],"efficiency.":[137],"Experimental":[138],"results":[139],"show":[140],"not":[143],"only":[144],"outperforms":[145],"8":[146],"baseline":[147],"models":[148],"by":[149,165],"achieving":[150],"99.8%":[151],"accuracy":[152],"0.07%":[154],"false":[155],"positive":[156],"rate,":[157],"consumes":[160],"least":[162],"computing":[163],"resources":[164],"taking":[166],"than":[168],"11":[169],"ms":[170],"61":[172],"MiB":[173],"memory":[174],"each":[176]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4387623905","counts_by_year":[{"year":2024,"cited_by_count":2}],"updated_date":"2025-04-19T06:24:03.321535","created_date":"2023-10-14"}