{"id":"https://openalex.org/W4313060919","doi":"https://doi.org/10.1109/tnsm.2022.3229706","title":"ARCADE: Adversarially Regularized Convolutional Autoencoder for Network Anomaly Detection","display_name":"ARCADE: Adversarially Regularized Convolutional Autoencoder for Network Anomaly Detection","publication_year":2022,"publication_date":"2022-12-16","ids":{"openalex":"https://openalex.org/W4313060919","doi":"https://doi.org/10.1109/tnsm.2022.3229706"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2022.3229706","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2205.01432","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054363087","display_name":"Willian T. Lunardi","orcid":"https://orcid.org/0000-0003-0718-0019"},"institutions":[{"id":"https://openalex.org/I4210087059","display_name":"Technology Innovation Institute","ror":"https://ror.org/001kv2y39","country_code":"AE","type":"facility","lineage":["https://openalex.org/I4210087059"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Willian Tessaro Lunardi","raw_affiliation_strings":["Secure System Research Center, Technology and Innovation Institute, Abu Dhabi, UAE"],"affiliations":[{"raw_affiliation_string":"Secure System Research Center, Technology and Innovation Institute, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I4210087059"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025235658","display_name":"Martin Andreoni Lopez","orcid":"https://orcid.org/0000-0002-4170-4341"},"institutions":[{"id":"https://openalex.org/I4210087059","display_name":"Technology Innovation Institute","ror":"https://ror.org/001kv2y39","country_code":"AE","type":"facility","lineage":["https://openalex.org/I4210087059"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Martin Andreoni Lopez","raw_affiliation_strings":["Secure System Research Center, Technology and Innovation Institute, Abu Dhabi, UAE"],"affiliations":[{"raw_affiliation_string":"Secure System Research Center, Technology and Innovation Institute, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I4210087059"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086637926","display_name":"Jean\u2010Pierre Giacalone","orcid":null},"institutions":[{"id":"https://openalex.org/I4210087059","display_name":"Technology Innovation Institute","ror":"https://ror.org/001kv2y39","country_code":"AE","type":"facility","lineage":["https://openalex.org/I4210087059"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Jean-Pierre Giacalone","raw_affiliation_strings":["Secure System Research Center, Technology and Innovation Institute, Abu Dhabi, UAE"],"affiliations":[{"raw_affiliation_string":"Secure System Research Center, Technology and Innovation Institute, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I4210087059"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.808,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.999931,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"20","issue":"2","first_page":"1305","last_page":"1318"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9989,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9964,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.94733536},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.49891877},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep Packet Inspection","score":0.41382134}],"concepts":[{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.94733536},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8386564},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.78527546},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.694569},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5484751},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5225063},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5099853},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.49891877},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.49035215},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.47801626},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.44521505},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.41382134},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.40472433},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.35769898},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.32985198},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30120125},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2022.3229706","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2205.01432","pdf_url":"https://arxiv.org/pdf/2205.01432","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2205.01432","pdf_url":"https://arxiv.org/pdf/2205.01432","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[{"score":0.65,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":36,"referenced_works":["https://openalex.org/W1522301498","https://openalex.org/W2031163547","https://openalex.org/W2108598243","https://openalex.org/W2132870739","https://openalex.org/W2133665775","https://openalex.org/W2296719434","https://openalex.org/W2398119937","https://openalex.org/W2599354622","https://openalex.org/W2606697812","https://openalex.org/W2739748921","https://openalex.org/W2743678626","https://openalex.org/W2768211408","https://openalex.org/W2772303842","https://openalex.org/W2772317693","https://openalex.org/W2787947370","https://openalex.org/W2801118360","https://openalex.org/W2809705434","https://openalex.org/W2912386632","https://openalex.org/W2963045681","https://openalex.org/W2963516518","https://openalex.org/W2963684088","https://openalex.org/W2987228832","https://openalex.org/W3005641848","https://openalex.org/W3013379031","https://openalex.org/W3091848104","https://openalex.org/W3093410479","https://openalex.org/W3102091066","https://openalex.org/W3118895125","https://openalex.org/W3135550350","https://openalex.org/W3162295108","https://openalex.org/W3175716777","https://openalex.org/W4213328526","https://openalex.org/W4282546337","https://openalex.org/W4295521014","https://openalex.org/W4320013936","https://openalex.org/W433644524"],"related_works":["https://openalex.org/W3157271777","https://openalex.org/W2384741105","https://openalex.org/W2376886931","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W2171331105","https://openalex.org/W2061466315","https://openalex.org/W2010561419","https://openalex.org/W1992118813","https://openalex.org/W1977863481"],"abstract_inverted_index":{"As":[0],"the":[1,13,78,112,131],"number":[2],"of":[3,21,77,84,87,92,170],"heterogenous":[4],"IP-connected":[5],"devices":[6],"and":[7,28,100,129,180,196],"traffic":[8,80],"volume":[9],"increase,":[10],"so":[11,95],"does":[12],"potential":[14,97],"for":[15,62,159],"security":[16],"breaches.":[17],"The":[18,148],"undetected":[19],"exploitation":[20],"these":[22],"breaches":[23],"can":[24,102,175],"bring":[25],"severe":[26],"cybersecurity":[27],"privacy":[29],"risks.":[30],"Anomaly-based":[31],"Intrusion":[32],"Detection":[33],"Systems":[34],"(IDSs)":[35],"play":[36],"an":[37],"essential":[38],"role":[39],"in":[40],"network":[41,64,93,98,136,160,172,181],"security.":[42],"In":[43],"this":[44],"paper,":[45],"we":[46],"present":[47],"a":[48,68,75,82,88,171],"practical":[49],"unsupervised":[50,63],"anomaly-based":[51],"deep":[52,156],"learning":[53,157],"detection":[54,146,194],"system":[55],"called":[56],"ARCADE":[57,72,114,174,183],"(Adversarially":[58],"Regularized":[59],"Convolutional":[60],"Autoencoder":[61,70],"anomaly":[65,145,161],"DEtection).":[66],"With":[67],"convolutional":[69],"(AE),":[71],"automatically":[73],"builds":[74],"profile":[76],"normal":[79,119],"using":[81],"subset":[83],"raw":[85],"bytes":[86],"few":[89],"initial":[90,168],"packets":[91,169],"flows":[94,137],"that":[96,138],"anomalies":[99],"intrusions":[101],"be":[103],"efficiently":[104],"detected":[105],"before":[106],"they":[107],"cause":[108],"more":[109,152],"damage":[110],"to":[111,127,134],"network.":[113],"is":[115,125,151],"trained":[116],"exclusively":[117],"on":[118],"traffic.":[120],"An":[121],"adversarial":[122],"training":[123],"strategy":[124],"proposed":[126,149],"regularize":[128],"decrease":[130],"AE's":[132],"capabilities":[133],"reconstruct":[135],"are":[139],"out-of-the-normal":[140],"distribution,":[141],"thereby":[142],"improving":[143],"its":[144],"capabilities.":[147],"approach":[150],"effective":[153],"than":[154,189],"state-of-the-art":[155],"approaches":[158],"detection.":[162],"Even":[163],"when":[164],"examining":[165],"only":[166],"two":[167],"flow,":[173],"effectively":[176],"detect":[177],"malware":[178],"infection":[179],"attacks.":[182],"presents":[184],"20":[185],"times":[186],"fewer":[187],"parameters":[188],"baselines,":[190],"achieving":[191],"significantly":[192],"faster":[193],"speed":[195],"reaction":[197],"time.":[198]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4313060919","counts_by_year":[{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":4}],"updated_date":"2024-12-30T02:04:01.834616","created_date":"2023-01-06"}