{"id":"https://openalex.org/W2146298089","doi":"https://doi.org/10.1109/trustcom.2013.38","title":"Visual Analytics Model for Intrusion Detection in Flood Attack","display_name":"Visual Analytics Model for Intrusion Detection in Flood Attack","publication_year":2013,"publication_date":"2013-07-01","ids":{"openalex":"https://openalex.org/W2146298089","doi":"https://doi.org/10.1109/trustcom.2013.38","mag":"2146298089"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2013.38","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016032832","display_name":"Jinson Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jinson Zhang","raw_affiliation_strings":["School of Software, University of Technology Sydney, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Software, University of Technology Sydney, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077824437","display_name":"Mao Lin Huang","orcid":"https://orcid.org/0000-0002-6896-6480"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Mao Lin Huang","raw_affiliation_strings":["School of Software, University of Technology Sydney, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Software, University of Technology Sydney, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.144,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":7,"citation_normalized_percentile":{"value":0.622004,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":83,"max":84},"biblio":{"volume":"1","issue":null,"first_page":"277","last_page":"284"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Intrusion Detection and Defense Mechanisms","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Intrusion Detection and Defense Mechanisms","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Machine Learning for Internet Traffic Classification","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection in High-Dimensional Data","score":0.9964,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection","display_name":"Intrusion Detection","score":0.608561},{"id":"https://openalex.org/keywords/ddos-attacks","display_name":"DDoS Attacks","score":0.581446},{"id":"https://openalex.org/keywords/botnet-detection","display_name":"Botnet Detection","score":0.544406},{"id":"https://openalex.org/keywords/traffic-analysis","display_name":"Traffic Analysis","score":0.539388}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.81955683},{"id":"https://openalex.org/C74256435","wikidata":"https://www.wikidata.org/wiki/Q134052","display_name":"Flood myth","level":2,"score":0.78098875},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7653533},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7068094},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6083523},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.55287707},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4824158},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.41114065},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.32758996},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.1092965},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10522589},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.08221719},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2013.38","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Sustainable cities and communities","score":0.56,"id":"https://metadata.un.org/sdg/11"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":35,"referenced_works":["https://openalex.org/W1498281698","https://openalex.org/W1572876171","https://openalex.org/W1987997495","https://openalex.org/W2000089542","https://openalex.org/W2005811057","https://openalex.org/W2010787569","https://openalex.org/W2015009114","https://openalex.org/W2029330339","https://openalex.org/W2031163547","https://openalex.org/W2045414949","https://openalex.org/W2055801681","https://openalex.org/W2068803497","https://openalex.org/W2073043478","https://openalex.org/W2074017502","https://openalex.org/W2078001686","https://openalex.org/W2084896955","https://openalex.org/W2095730698","https://openalex.org/W2098353976","https://openalex.org/W2104524537","https://openalex.org/W2104692292","https://openalex.org/W2119120810","https://openalex.org/W2119227347","https://openalex.org/W2125513999","https://openalex.org/W2129543445","https://openalex.org/W2134511994","https://openalex.org/W2134643497","https://openalex.org/W2152930880","https://openalex.org/W2153847490","https://openalex.org/W2157157130","https://openalex.org/W2162293229","https://openalex.org/W2164686665","https://openalex.org/W2168361212","https://openalex.org/W2169731158","https://openalex.org/W2170771030","https://openalex.org/W2236547258"],"related_works":["https://openalex.org/W4390188535","https://openalex.org/W4386482731","https://openalex.org/W4385302085","https://openalex.org/W4256682929","https://openalex.org/W335511927","https://openalex.org/W2765763546","https://openalex.org/W2471811227","https://openalex.org/W2360429410","https://openalex.org/W2217591390","https://openalex.org/W2157496457"],"abstract_inverted_index":{"Flood":[0],"attacks":[1,49,149,160],"are":[2,34,133],"common":[3],"forms":[4],"of":[5,40,68,87,111,144,147,155,158],"Distributed":[6],"Denial-of-Service":[7],"(DDoS)":[8],"attack":[9,101,114],"threats":[10],"on":[11,161],"internet":[12],"in":[13,50,98],"nature.":[14],"This":[15],"has":[16],"necessitated":[17],"the":[18,38,66,74,85,95,104,108,112,126,142,145,156],"need":[19],"for":[20,52],"visual":[21,119],"analysis":[22],"within":[23],"an":[24],"intrusion":[25],"detection":[26,41,146],"system":[27,75,91,96],"to":[28,36,44,106,124,135],"identify":[29],"these":[30],"attacks.":[31,129],"The":[32,130],"challenges":[33],"how":[35,43],"increase":[37],"accuracy":[39,143],"and":[42,46,102,150],"visualize":[45],"present":[47],"flood":[48,69,79,88,100,113,128,159],"networks":[51],"early":[53],"detection.":[54],"In":[55],"this":[56],"paper,":[57],"we":[58],"introduce":[59],"three":[60],"coefficients,":[61],"which":[62,93],"not":[63],"only":[64],"classify":[65,107],"behaviors":[67],"attacks,":[70],"but":[71],"also":[72],"measure":[73],"performance":[76],"under":[77],"those":[78],"attacks:":[80],"a)":[81],"attack-density":[82],"that":[83],"patterns":[84],"characters":[86],"attack,":[89],"b)":[90],"workload":[92],"represents":[94],"capability":[97],"handling":[99],"c)":[103],"scalability":[105],"impact":[109],"level":[110],"at":[115],"victim":[116],"site.":[117],"A":[118],"clustered":[120],"method":[121],"is":[122],"used":[123],"display":[125],"DDoS":[127,148],"experimentation":[131],"results":[132],"presented":[134],"demonstrate":[136],"our":[137],"new":[138],"model":[139],"significantly":[140],"improves":[141],"provides":[151],"a":[152],"better":[153],"understanding":[154],"nature":[157],"networks.":[162]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2146298089","counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":3}],"updated_date":"2024-11-22T18:57:29.379475","created_date":"2016-06-24"}