{"id":"https://openalex.org/W2115171215","doi":"https://doi.org/10.1109/waim.2008.95","title":"ASG Automated Signature Generation for Worm-Like P2P Traffic Patterns","display_name":"ASG Automated Signature Generation for Worm-Like P2P Traffic Patterns","publication_year":2008,"publication_date":"2008-07-01","ids":{"openalex":"https://openalex.org/W2115171215","doi":"https://doi.org/10.1109/waim.2008.95","mag":"2115171215"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/waim.2008.95","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081933689","display_name":"Fengtao Xiao","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fengtao Xiao","raw_affiliation_strings":["School of Computer Science, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054424212","display_name":"Huaping Hu","orcid":"https://orcid.org/0000-0002-1651-0385"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"HuaPing Hu","raw_affiliation_strings":["Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","School of Computer Science, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"School of Computer Science, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101695540","display_name":"Xin Chen","orcid":"https://orcid.org/0000-0002-5115-6481"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Chen","raw_affiliation_strings":["School of Computer Science, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100461646","display_name":"Bo Liu","orcid":"https://orcid.org/0000-0002-3603-6617"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Liu","raw_affiliation_strings":["School of Computer Science, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.474,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":2,"citation_normalized_percentile":{"value":0.356727,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":70,"max":74},"biblio":{"volume":null,"issue":null,"first_page":"654","last_page":"660"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9979,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.77654016},{"id":"https://openalex.org/keywords/traffic-analysis","display_name":"Traffic Analysis","score":0.43345726}],"concepts":[{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.77654016},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.76166856},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.6450572},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.63355017},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.5960288},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4816924},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.43345726},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.42877102},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32417107},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.18190098},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11426586},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/waim.2008.95","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.71,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":18,"referenced_works":["https://openalex.org/W1516506771","https://openalex.org/W1521553548","https://openalex.org/W1674877186","https://openalex.org/W1710835340","https://openalex.org/W1994340575","https://openalex.org/W2031006315","https://openalex.org/W2041855183","https://openalex.org/W2052424621","https://openalex.org/W2056625091","https://openalex.org/W2092043296","https://openalex.org/W2098961351","https://openalex.org/W2113061123","https://openalex.org/W2135052565","https://openalex.org/W2147986322","https://openalex.org/W2257272968","https://openalex.org/W2350739876","https://openalex.org/W4255938980","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W4300101996","https://openalex.org/W3209204065","https://openalex.org/W2382521049","https://openalex.org/W2183246718","https://openalex.org/W2144385241","https://openalex.org/W2105707930","https://openalex.org/W2099261052","https://openalex.org/W1755711892","https://openalex.org/W1585007175","https://openalex.org/W1557094818"],"abstract_inverted_index":{"Many":[0],"P2P":[1,42,52,60,85,103,120,141,148],"software":[2,43,61,149],"have":[3],"the":[4,31,34,50,56,65,124,137,145,156,160],"similar":[5],"communication":[6,37,86,99],"patterns":[7,38],"with":[8,144],"computer":[9],"worms,":[10],"thus":[11],"they":[12],"will":[13],"bring":[14],"in":[15,94],"false":[16,161],"positives":[17],"for":[18,83,118],"behaviour":[19],"based":[20,78,122],"worm":[21,40,106],"detection.":[22],"Up":[23],"to":[24,48,80,135],"now,":[25],"little":[26],"work":[27,92],"is":[28,74],"done":[29],"on":[30,55,123],"research":[32],"of":[33,39,58,90,139],"similarities":[35,101],"between":[36,102],"and":[41,64,105,114,158],"as":[44,46],"well":[45],"how":[47],"eliminate":[49],"worm-like":[51,84,119,140],"traffic.":[53,142],"Based":[54],"analysis":[57],"popular":[59,146],"used":[62,147],"nowadays":[63],"host":[66,77,125],"process":[67,126],"information,":[68,127],"this":[69],"paper":[70],"presents":[71],"ASG,":[72],"which":[73],"a":[75],"novel":[76],"algorithm":[79],"generate":[81],"signatures":[82],"patterns.":[87],"The":[88],"contribution":[89],"our":[91],"lies":[93],"three":[95],"aspects:":[96],"a)":[97],"Analyzing":[98],"pattern":[100],"traffic":[104,107,121],"through":[108],"examples.":[109],"b)":[110],"Designing":[111],"one":[112],"practical":[113],"simple":[115],"signature":[116,138,157],"format":[117],"c)":[128],"Presenting":[129],"Automated":[130],"Signature":[131],"Generation":[132],"(ASG)":[133],"method":[134],"extract":[136,155],"Experiments":[143],"show":[150],"that":[151],"ASG":[152],"can":[153],"effectively":[154],"reduce":[159],"positives.":[162]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2115171215","counts_by_year":[],"updated_date":"2024-12-07T20:44:48.204162","created_date":"2016-06-24"}