iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.openalex.org/works/doi:10.1145/2897795.2897802
{"id":"https://openalex.org/W2330414300","doi":"https://doi.org/10.1145/2897795.2897802","title":"Xen Network Flow Analysis for Intrusion Detection","display_name":"Xen Network Flow Analysis for Intrusion Detection","publication_year":2016,"publication_date":"2016-04-05","ids":{"openalex":"https://openalex.org/W2330414300","doi":"https://doi.org/10.1145/2897795.2897802","mag":"2330414300"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/2897795.2897802","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050627084","display_name":"Reece Johnston","orcid":null},"institutions":[{"id":"https://openalex.org/I82495205","display_name":"University of Alabama in Huntsville","ror":"https://ror.org/02zsxwr40","country_code":"US","type":"education","lineage":["https://openalex.org/I82495205"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Reece Johnston","raw_affiliation_strings":["Computer Science Departments, University of Alabama in Huntsville"],"affiliations":[{"raw_affiliation_string":"Computer Science Departments, University of Alabama in Huntsville","institution_ids":["https://openalex.org/I82495205"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101622608","display_name":"Sun-il Kim","orcid":"https://orcid.org/0000-0003-0846-8620"},"institutions":[{"id":"https://openalex.org/I82495205","display_name":"University of Alabama in Huntsville","ror":"https://ror.org/02zsxwr40","country_code":"US","type":"education","lineage":["https://openalex.org/I82495205"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sun-il Kim","raw_affiliation_strings":["Electrical and Computer Engineering Departments, University of Alabama in Huntsville"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Departments, University of Alabama in Huntsville","institution_ids":["https://openalex.org/I82495205"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066425906","display_name":"D.J. Coe","orcid":"https://orcid.org/0000-0001-8071-1272"},"institutions":[{"id":"https://openalex.org/I82495205","display_name":"University of Alabama in Huntsville","ror":"https://ror.org/02zsxwr40","country_code":"US","type":"education","lineage":["https://openalex.org/I82495205"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David Coe","raw_affiliation_strings":["Electrical and Computer Engineering Departments, University of Alabama in Huntsville"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Departments, University of Alabama in Huntsville","institution_ids":["https://openalex.org/I82495205"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036609407","display_name":"Letha H. Etzkorn","orcid":"https://orcid.org/0000-0003-3203-9236"},"institutions":[{"id":"https://openalex.org/I82495205","display_name":"University of Alabama in Huntsville","ror":"https://ror.org/02zsxwr40","country_code":"US","type":"education","lineage":["https://openalex.org/I82495205"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Letha Etzkorn","raw_affiliation_strings":["Computer Science Departments, University of Alabama in Huntsville"],"affiliations":[{"raw_affiliation_string":"Computer Science Departments, University of Alabama in Huntsville","institution_ids":["https://openalex.org/I82495205"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111952859","display_name":"Jeffrey Kulick","orcid":null},"institutions":[{"id":"https://openalex.org/I82495205","display_name":"University of Alabama in Huntsville","ror":"https://ror.org/02zsxwr40","country_code":"US","type":"education","lineage":["https://openalex.org/I82495205"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jeffrey Kulick","raw_affiliation_strings":["Electrical and Computer Engineering Departments, University of Alabama in Huntsville"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Departments, University of Alabama in Huntsville","institution_ids":["https://openalex.org/I82495205"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083066313","display_name":"Aleksandar Milenkovi\u0107","orcid":"https://orcid.org/0000-0002-9359-4594"},"institutions":[{"id":"https://openalex.org/I82495205","display_name":"University of Alabama in Huntsville","ror":"https://ror.org/02zsxwr40","country_code":"US","type":"education","lineage":["https://openalex.org/I82495205"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Aleksandar Milenkovic","raw_affiliation_strings":["Electrical and Computer Engineering Departments, University of Alabama in Huntsville"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Departments, University of Alabama in Huntsville","institution_ids":["https://openalex.org/I82495205"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.48,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":2,"citation_normalized_percentile":{"value":0.65449,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":73,"max":77},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9988,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C112904061","wikidata":"https://www.wikidata.org/wiki/Q1077480","display_name":"Hypervisor","level":4,"score":0.9606519},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8127661},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6703512},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.6536634},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.6003932},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5507876},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5199003},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.472099},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.460423},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.430922},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38641834},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33525458},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.1931184},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/2897795.2897802","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320311089","funder_display_name":"National Security Agency","award_id":"H98230-15-1-0268"}],"datasets":[],"versions":[],"referenced_works_count":8,"referenced_works":["https://openalex.org/W1977367431","https://openalex.org/W1998493381","https://openalex.org/W2005182641","https://openalex.org/W2087243126","https://openalex.org/W2131726714","https://openalex.org/W2146848271","https://openalex.org/W2153572842","https://openalex.org/W433644524"],"related_works":["https://openalex.org/W2747005099","https://openalex.org/W2743348030","https://openalex.org/W2613320081","https://openalex.org/W2179519055","https://openalex.org/W2148749405","https://openalex.org/W2145292010","https://openalex.org/W2104105430","https://openalex.org/W2086039693","https://openalex.org/W1973516247","https://openalex.org/W1515917392"],"abstract_inverted_index":{"Virtualization":[0],"technology":[1],"has":[2,97],"become":[3],"ubiquitous":[4],"in":[5],"the":[6,38,93,115,135,142,150],"computing":[7],"world.":[8],"With":[9],"it,":[10],"a":[11,24,78,81,106,120,147],"number":[12],"of":[13,40,119,137],"security":[14,139],"concerns":[15],"have":[16],"been":[17],"amplified":[18],"as":[19],"users":[20],"run":[21],"adjacently":[22],"on":[23,80],"single":[25],"host.":[26],"In":[27,110],"order":[28],"to":[29,68,76,85,103,129],"prevent":[30],"attacks":[31],"from":[32],"both":[33],"internal":[34],"and":[35,145],"external":[36],"sources,":[37],"networking":[39],"such":[41],"systems":[42,49,60],"must":[43],"be":[44],"secured.":[45],"Network":[46],"intrusion":[47],"detection":[48],"(NIDSs)":[50],"are":[51],"an":[52],"important":[53],"tool":[54],"for":[55,92],"aiding":[56],"this":[57,111],"effort.":[58],"These":[59],"work":[61],"by":[62],"analyzing":[63],"flow":[64,118,144],"or":[65],"packet":[66],"information":[67],"determine":[69],"malicious":[70],"intent.":[71],"However,":[72],"it":[73,101],"is":[74,89],"difficult":[75],"implement":[77],"NIDS":[79],"virtualized":[82],"system":[83],"due":[84],"their":[86],"complexity.":[87],"This":[88],"especially":[90],"true":[91],"Xen":[94,96,122],"hypervisor:":[95],"incredible":[98],"heterogeneity":[99],"when":[100],"comes":[102],"implementation,":[104],"making":[105],"generic":[107],"solution":[108,148],"difficult.":[109],"paper,":[112],"we":[113],"analyze":[114],"network":[116],"data":[117,143],"typical":[121],"implementation":[123],"along":[124,141],"with":[125],"identifying":[126],"features":[127],"common":[128],"any":[130],"implementation.":[131],"We":[132],"then":[133],"explore":[134],"benefits":[136],"placing":[138],"checks":[140],"promote":[146],"within":[149],"hypervisor":[151],"itself.":[152]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2330414300","counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2024-12-08T11:20:10.171727","created_date":"2016-06-24"}