{"id":"https://openalex.org/W3169092194","doi":"https://doi.org/10.1504/ijsnet.2021.115440","title":"CNN-based anomaly detection for packet payloads of industrial control system","display_name":"CNN-based anomaly detection for packet payloads of industrial control system","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3169092194","doi":"https://doi.org/10.1504/ijsnet.2021.115440","mag":"3169092194"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1504/ijsnet.2021.115440","pdf_url":"https://www.inderscienceonline.com/doi/pdf/10.1504/IJSNET.2021.115440","source":{"id":"https://openalex.org/S31905469","display_name":"International Journal of Sensor Networks","issn_l":"1748-1279","issn":["1748-1279","1748-1287"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://www.inderscienceonline.com/doi/pdf/10.1504/IJSNET.2021.115440","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044609490","display_name":"Joo Yeop Song","orcid":null},"institutions":[{"id":"https://openalex.org/I57664883","display_name":"Ajou University","ror":"https://ror.org/03tzb2h73","country_code":"KR","type":"funder","lineage":["https://openalex.org/I57664883"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Joo Yeop Song","raw_affiliation_strings":["Department of Software and Computer Engineering, Ajou University, 16499, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Software and Computer Engineering, Ajou University, 16499, South Korea","institution_ids":["https://openalex.org/I57664883"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086282930","display_name":"Rajib Paul","orcid":"https://orcid.org/0000-0003-0963-3667"},"institutions":[{"id":"https://openalex.org/I57664883","display_name":"Ajou University","ror":"https://ror.org/03tzb2h73","country_code":"KR","type":"funder","lineage":["https://openalex.org/I57664883"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Rajib Paul","raw_affiliation_strings":["Department of Software and Computer Engineering, Ajou University, 16499, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Software and Computer Engineering, Ajou University, 16499, South Korea","institution_ids":["https://openalex.org/I57664883"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083891894","display_name":"Jeong Han Yun","orcid":null},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"funder","lineage":["https://openalex.org/I142401562"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jeong Han Yun","raw_affiliation_strings":["The Affiliated Institute of ETRI, 34044, South Korea"],"affiliations":[{"raw_affiliation_string":"The Affiliated Institute of ETRI, 34044, South Korea","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006641224","display_name":"Hyoung\u2010Chun Kim","orcid":"https://orcid.org/0000-0003-0420-795X"},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"funder","lineage":["https://openalex.org/I142401562"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hyoung Chun Kim","raw_affiliation_strings":["The Affiliated Institute of ETRI, 34044, South Korea"],"affiliations":[{"raw_affiliation_string":"The Affiliated Institute of ETRI, 34044, South Korea","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109455528","display_name":"Young June Choi","orcid":null},"institutions":[{"id":"https://openalex.org/I57664883","display_name":"Ajou University","ror":"https://ror.org/03tzb2h73","country_code":"KR","type":"funder","lineage":["https://openalex.org/I57664883"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Young June Choi","raw_affiliation_strings":["Department of Software and Computer Engineering, Ajou University, 16499, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Software and Computer Engineering, Ajou University, 16499, South Korea","institution_ids":["https://openalex.org/I57664883"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.375,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.702663,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":92,"max":93},"biblio":{"volume":"36","issue":"1","first_page":"36","last_page":"36"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9929,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9902,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/header","display_name":"Header","score":0.8416103},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.6797999},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep Packet Inspection","score":0.60033596},{"id":"https://openalex.org/keywords/packet-analyzer","display_name":"Packet analyzer","score":0.51203686}],"concepts":[{"id":"https://openalex.org/C48105269","wikidata":"https://www.wikidata.org/wiki/Q1141160","display_name":"Header","level":2,"score":0.8416103},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8330493},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.76926124},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.6797999},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6776673},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6662591},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.60398066},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.60033596},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5643065},{"id":"https://openalex.org/C95362637","wikidata":"https://www.wikidata.org/wiki/Q54366","display_name":"Packet analyzer","level":3,"score":0.51203686},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.46946064},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24456945},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.19243291},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1504/ijsnet.2021.115440","pdf_url":"https://www.inderscienceonline.com/doi/pdf/10.1504/IJSNET.2021.115440","source":{"id":"https://openalex.org/S31905469","display_name":"International Journal of Sensor Networks","issn_l":"1748-1279","issn":["1748-1279","1748-1287"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1504/ijsnet.2021.115440","pdf_url":"https://www.inderscienceonline.com/doi/pdf/10.1504/IJSNET.2021.115440","source":{"id":"https://openalex.org/S31905469","display_name":"International Journal of Sensor Networks","issn_l":"1748-1279","issn":["1748-1279","1748-1287"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4250738563","https://openalex.org/W4235972585","https://openalex.org/W2988433590","https://openalex.org/W2941716987","https://openalex.org/W2896435359","https://openalex.org/W2143950972","https://openalex.org/W1971040605","https://openalex.org/W1560102360","https://openalex.org/W1523103140","https://openalex.org/W103257385"],"abstract_inverted_index":{"Industrial":[0],"control":[1],"systems":[2],"(ICSs)":[3],"are":[4],"more":[5],"vulnerable":[6],"to":[7,11,22,42,56,58,88],"cyber":[8],"threats":[9],"owing":[10],"their":[12],"network":[13],"connectivity.":[14],"The":[15],"intrusion":[16],"detection":[17],"system(IDS)":[18],"has":[19],"been":[20],"deployed":[21],"detect":[23,43],"sophisticated":[24],"cyber-attack":[25],"but":[26],"the":[27,31,49,90,93],"existing":[28],"IDS":[29,39,55],"uses":[30],"packet":[32,44,52,70,77],"header":[33],"information":[34],"for":[35],"traffic":[36,73],"flow":[37],"detection.":[38],"is":[40,86],"inefficient":[41],"deformation;":[45],"therefore,":[46],"we":[47],"propose":[48],"adoption":[50],"of":[51,61,80,92],"payload":[53],"in":[54],"respond":[57],"a":[59],"variety":[60],"attacks":[62],"and":[63,72,78],"high":[64],"performance.":[65],"Our":[66],"proposed":[67],"model":[68],"detects":[69],"modification":[71],"flowby":[74],"inspecting":[75],"each":[76],"sequence":[79],"packets.":[81],"For":[82],"evaluation,":[83],"cross":[84],"verification":[85],"conducted":[87],"increase":[89],"reliability":[91],"statistics.":[94]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3169092194","counts_by_year":[{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":7}],"updated_date":"2025-04-20T04:56:39.289324","created_date":"2021-06-22"}