{ "labelLang" : "hun", "responseDate" : "2024-03-29 16:20", "content" : { "otype" : "BookChapter", "mtid" : 33084683, "status" : "APPROVED", "published" : true, "comment" : "IEEE Control Systems Chapter, Hungary; IEEE Hungary Section; IEEE Joint Chapter of IES and RAS, Hungary; IEEE SMC Chapter, Hungary \n Conference code: 179566 \n Export Date: 8 September 2022", "unhandledTickets" : 0, "deleted" : false, "lastRefresh" : "2023-07-07T10:32:09.220+0000", "lastModified" : "2022-09-08T09:28:02.810+0000", "created" : "2022-09-08T09:24:19.292+0000", "creator" : { "otype" : "Admin", "mtid" : 10072271, "link" : "/api/admin/10072271", "label" : "Andódy Katalin (BME admin4 - INAKTÍV)", "familyName" : "Andódy", "givenName" : "Katalin", "published" : true, "snippet" : true }, "lastDuplumSearch" : "2024-02-02T08:36:46.518+0000", "core" : false, "citation" : true, "publicationPending" : false, "type" : { "otype" : "PublicationType", "mtid" : 25, "link" : "/api/publicationtype/25", "label" : "Könyvrészlet", "code" : 25, "otypeName" : "BookChapter", "listPosition" : 2, "published" : true, "oldId" : 25, "snippet" : true }, "subType" : { "otype" : "SubType", "mtid" : 10000312, "link" : "/api/subtype/10000312", "label" : "Konferenciaközlemény (Könyvrészlet)", "name" : "Konferenciaközlemény", "nameEng" : "Conference paper", "docType" : { "otype" : "PublicationType", "mtid" : 25, "link" : "/api/publicationtype/25", "label" : "Könyvrészlet", "code" : 25, "otypeName" : "BookChapter", "listPosition" : 2, "published" : true, "oldId" : 25, "snippet" : true }, "listPosition" : 228, "published" : true, "oldId" : 10000312, "snippet" : true }, "category" : { "otype" : "Category", "mtid" : 1, "link" : "/api/category/1", "label" : "Tudományos", "published" : true, "oldId" : 1, "snippet" : true }, "languages" : [ { "otype" : "Language", "mtid" : 10002, "link" : "/api/language/10002", "label" : "Angol", "name" : "Angol", "nameEng" : "English", "published" : true, "oldId" : 2, "snippet" : true } ], "firstAuthor" : "Chovanec, M.", "authorships" : [ { "otype" : "PersonAuthorship", "mtid" : 103350667, "link" : "/api/authorship/103350667", "label" : "Chovanec, M.", "listPosition" : 1, "share" : 0.25, "first" : true, "last" : false, "corresponding" : false, "familyName" : "Chovanec", "givenName" : "M.", "authorTyped" : true, "editorTyped" : false, "otherTyped" : false, "type" : { "otype" : "AuthorshipType", "mtid" : 1, "link" : "/api/authorshiptype/1", "label" : "Szerző", "code" : 0, "published" : true, "oldId" : 0, "snippet" : true }, "published" : false, "snippet" : true }, { "otype" : "PersonAuthorship", "mtid" : 103350668, "link" : "/api/authorship/103350668", "label" : "Havrilla, M.", "listPosition" : 2, "share" : 0.25, "first" : false, "last" : false, "corresponding" : false, "familyName" : "Havrilla", "givenName" : "M.", "authorTyped" : true, "editorTyped" : false, "otherTyped" : false, "type" : { "otype" : "AuthorshipType", "mtid" : 1, "link" : "/api/authorshiptype/1", "label" : "Szerző", "code" : 0, "published" : true, "oldId" : 0, "snippet" : true }, "published" : false, "snippet" : true }, { "otype" : "PersonAuthorship", "mtid" : 103350669, "link" : "/api/authorship/103350669", "label" : "Hasin, M.", "listPosition" : 3, "share" : 0.25, "first" : false, "last" : false, "corresponding" : false, "familyName" : "Hasin", "givenName" : "M.", "authorTyped" : true, "editorTyped" : false, "otherTyped" : false, "type" : { "otype" : "AuthorshipType", "mtid" : 1, "link" : "/api/authorshiptype/1", "label" : "Szerző", "code" : 0, "published" : true, "oldId" : 0, "snippet" : true }, "published" : false, "snippet" : true }, { "otype" : "PersonAuthorship", "mtid" : 103350670, "link" : "/api/authorship/103350670", "label" : "Chovancova, E.", "listPosition" : 4, "share" : 0.25, "first" : false, "last" : true, "corresponding" : false, "familyName" : "Chovancova", "givenName" : "E.", "authorTyped" : true, "editorTyped" : false, "otherTyped" : false, "type" : { "otype" : "AuthorshipType", "mtid" : 1, "link" : "/api/authorshiptype/1", "label" : "Szerző", "code" : 0, "published" : true, "oldId" : 0, "snippet" : true }, "published" : false, "snippet" : true } ], "title" : "Analysis of Attacks on Mail Service Infrastructure Based on Application Logs and NetFlow Protocol", "identifiers" : [ { "otype" : "PublicationIdentifier", "mtid" : 21659300, "link" : "/api/publicationidentifier/21659300", "label" : "DOI: 10.1109/SAMI54271.2022.9780690", "source" : { "otype" : "PlainSource", "mtid" : 6, "link" : "/api/publicationsource/6", "label" : "DOI", "type" : { "otype" : "PublicationSourceType", "mtid" : 10001, "link" : "/api/publicationsourcetype/10001", "label" : "DOI", "mayHaveOa" : true, "published" : true, "snippet" : true }, "name" : "DOI", "nameEng" : "DOI", "linkPattern" : "https://doi.org/@@@", "publiclyVisible" : true, "published" : true, "oldId" : 6, "snippet" : true }, "validState" : "IDENTICAL", "idValue" : "10.1109/SAMI54271.2022.9780690", "realUrl" : "https://doi.org/10.1109/SAMI54271.2022.9780690", "published" : false, "snippet" : true }, { "otype" : "PublicationIdentifier", "mtid" : 21659299, "link" : "/api/publicationidentifier/21659299", "label" : "Scopus: 85132162276", "source" : { "otype" : "PlainSource", "mtid" : 3, "link" : "/api/publicationsource/3", "label" : "Scopus", "type" : { "otype" : "PublicationSourceType", "mtid" : 10003, "link" : "/api/publicationsourcetype/10003", "label" : "Indexelő adatbázis", "mayHaveOa" : false, "published" : true, "snippet" : true }, "name" : "Scopus", "linkPattern" : "http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-@@@", "publiclyVisible" : true, "published" : true, "oldId" : 3, "snippet" : true }, "validState" : "IDENTICAL", "idValue" : "85132162276", "realUrl" : "http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85132162276", "published" : false, "snippet" : true } ], "firstPage" : "77", "lastPage" : "82", "firstPageOrInternalIdForSort" : "77", "pageLength" : 6, "publishedYear" : 2022, "abstractText" : "This work deals with the analysis of application logs from mail servers as well as the analysis of data flows obtained using the NetFlow protocol. In the introduction the work looks into the basic theoretical background which includes basic attacks on the infrastructure of mail services. The work creates a mechanism for data collection, analysis, filtering and evaluation. The conclusion describes the results and findings based on the analyses. The work in the last chapter summarizes the findings and lists other possible steps and improvements. © 2022 IEEE.", "keywords" : [ { "otype" : "Keyword", "mtid" : 1143535, "link" : "/api/keyword/1143535", "label" : "Analysis of data", "published" : true, "oldId" : 1143535, "snippet" : true }, { "otype" : "Keyword", "mtid" : 1201229, "link" : "/api/keyword/1201229", "label" : "Data flow analysis", "published" : true, "oldId" : 1201229, "snippet" : true }, { "otype" : "Keyword", "mtid" : 1319415, "link" : "/api/keyword/1319415", "label" : "Dataflow", "published" : true, "oldId" : 1319415, "snippet" : true }, { "otype" : "Keyword", "mtid" : 1805229, "link" : "/api/keyword/1805229", "label" : "DOS", "published" : true, "snippet" : true }, { "otype" : "Keyword", "mtid" : 1805229, "link" : "/api/keyword/1805229", "label" : "DOS", "published" : true, "snippet" : true }, { "otype" : "Keyword", "mtid" : 1891994, "link" : "/api/keyword/1891994", "label" : "NetFlow", "published" : true, "snippet" : true }, { "otype" : "Keyword", "mtid" : 2298412, "link" : "/api/keyword/2298412", "label" : "NetFlows", "published" : true, "snippet" : true }, { "otype" : "Keyword", "mtid" : 2372435, "link" : "/api/keyword/2372435", "label" : "Mail servers", "published" : true, "snippet" : true }, { "otype" : "Keyword", "mtid" : 2737325, "link" : "/api/keyword/2737325", "label" : "ElasticSearch", "published" : true, "snippet" : true }, { "otype" : "Keyword", "mtid" : 2737325, "link" : "/api/keyword/2737325", "label" : "ElasticSearch", "published" : true, "snippet" : true }, { "otype" : "Keyword", "mtid" : 2737326, "link" : "/api/keyword/2737326", "label" : "Mail services", "published" : true, "snippet" : true }, { "otype" : "Keyword", "mtid" : 2737327, "link" : "/api/keyword/2737327", "label" : "Microsoft exchange", "published" : true, "snippet" : true }, { "otype" : "Keyword", "mtid" : 2737327, "link" : "/api/keyword/2737327", "label" : "Microsoft exchange", "published" : true, "snippet" : true }, { "otype" : "Keyword", "mtid" : 2737328, "link" : "/api/keyword/2737328", "label" : "Services infrastructures", "published" : true, "snippet" : true }, { "otype" : "Keyword", "mtid" : 2737329, "link" : "/api/keyword/2737329", "label" : "SMTP attack", "published" : true, "snippet" : true }, { "otype" : "Keyword", "mtid" : 2737329, "link" : "/api/keyword/2737329", "label" : "SMTP attack", "published" : true, "snippet" : true } ], "digital" : null, "printed" : null, "sourceYear" : 2022, "foreignEdition" : true, "foreignLanguage" : true, "fullPublication" : true, "conferencePublication" : true, "nationalOrigin" : false, "missingAuthor" : false, "oaType" : "NONE", "oaCheckDate" : "2023-07-07", "oaFree" : false, "citationCount" : 0, "citationCountUnpublished" : 0, "citationCountWoOther" : 0, "independentCitCountWoOther" : 0, "doiCitationCount" : 0, "wosCitationCount" : 0, "scopusCitationCount" : 0, "independentCitationCount" : 0, "unhandledCitationCount" : 0, "citingPubCount" : 0, "independentCitingPubCount" : 0, "unhandledCitingPubCount" : 0, "citedPubCount" : 2, "citedCount" : 2, "references" : [ { "otype" : "Reference", "mtid" : 33445830, "link" : "/api/reference/33445830", "label" : "1. Bass, T., Freyre, A., Gruber, D., Watt, G., E-mail bombs and countermeasures: Cyber attacks on availability and brand integrity (1998) IEEE network, 12 (2), pp. 10-17", "listPosition" : 1, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 33445831, "link" : "/api/reference/33445831", "label" : "2. Dankovicova, Z., Sovak, D., Drotar, P., Vokorokos, L., Machine learning approach to dysphonia detection (2018) Applied Sciences, 8 (10), p. 1927", "listPosition" : 2, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 33445832, "link" : "/api/reference/33445832", "label" : "3. Fette, I., Sadeh, N., Tomasic, A., Learning to detect phishing emails (2007) Proceedings of the 16th international conference on World Wide Web, pp. 649-656", "listPosition" : 3, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 33445833, "link" : "/api/reference/33445833", "label" : "4. Gnip, P., Vokorokos, L., Drotar, P., Selective oversampling approach for strongly imbalanced data (2021) PeerJ Computer Science, 7, p. e604", "listPosition" : 4, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 33445834, "link" : "/api/reference/33445834", "label" : "5. Juhar, J., Vokorokos, L., Separation of concerns and concern granularity in source code (2015) 2015 IEEE 13th international scientific conference on informatics. IEEE, pp. 139-144", "listPosition" : 5, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 33445835, "link" : "/api/reference/33445835", "label" : "6. Kumar, G., Understanding denial of service (dos) attacks using osi reference model (2014) International Journal of Education and Science Research, 1 (5)", "listPosition" : 6, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 33445836, "link" : "/api/reference/33445836", "label" : "7. Nazarii Lutsiv, J.G., Vokorokos, L., Deep semisupervised learning-based network anomaly detection in heterogeneous information systems (2022) Computers, Materials & Continua, 70 (1), pp. 413-431. , http://www.techscience.com/cmc/v70n1/44365", "listPosition" : 7, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 33445837, "link" : "/api/reference/33445837", "label" : "8. Pekar, A., Mocnej, J., Seah, W.K., Zolotova, I., Application domainbased overview of iot network traffic characteristics (2020) ACM Computing Surveys (CSUR), 53 (4), pp. 1-33", "listPosition" : 8, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 33445838, "link" : "/api/reference/33445838", "label" : "9. Rieck, K., Laskov, P., Language models for detection of unknown attacks in network traffic (2007) Journal in Computer Virology, 2 (4), pp. 243-256", "listPosition" : 9, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 33445839, "link" : "/api/reference/33445839", "label" : "10. Still, M., McCreath, E.C., Ddos protections for smtp servers (2011) International Journal of Computer Science and Security (IJCSS), 4 (6), p. 537", "listPosition" : 10, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 33445840, "link" : "/api/reference/33445840", "label" : "11. Vokorokos, L., Madoš, B., Adam, N., Balaž, A., Innovative operating memory architecture for computers using the data driven computation model (2013) Acta Polytechnica Hungarica, 10 (5), pp. 63-79", "listPosition" : 11, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 33445841, "link" : "/api/reference/33445841", "label" : "12. Vokorokos, L., Pekar, A., Adam, N., Daranyi, P., Yet another attempt in user authentication (2013) Acta Polytechnica Hungarica, 10 (3), pp. 37-50", "listPosition" : 12, "published" : false, "snippet" : true } ], "hasCitationDuplums" : false, "userChangeableUntil" : "2022-12-07T10:28:02.599+0000", "directInstitutesForSort" : "", "ownerAuthorCount" : 1, "ownerInstituteCount" : 5, "directInstituteCount" : 0, "authorCount" : 4, "contributorCount" : 0, "book" : { "otype" : "Book", "mtid" : 32596945, "link" : "/api/publication/32596945", "label" : "IEEE [szerk.]. IEEE 20th Jubilee World Symposium on Applied Machine Intelligence and Informatics SAMI (2022): Proceedings. (2022) ISBN:9781665497046; 9781665497039", "core" : true, "citation" : false, "publicationPending" : false, "type" : { "otype" : "PublicationType", "mtid" : 23, "link" : "/api/publicationtype/23", "label" : "Könyv", "code" : 23, "otypeName" : "Book", "listPosition" : 3, "published" : true, "oldId" : 23, "snippet" : true }, "subType" : { "otype" : "SubType", "mtid" : 10000144, "link" : "/api/subtype/10000144", "label" : "Konferenciakötet (Könyv)", "name" : "Konferenciakötet", "nameEng" : "Conference proceedings", "docType" : { "otype" : "PublicationType", "mtid" : 23, "link" : "/api/publicationtype/23", "label" : "Könyv", "code" : 23, "otypeName" : "Book", "listPosition" : 3, "published" : true, "oldId" : 23, "snippet" : true }, "listPosition" : 345, "published" : true, "oldId" : 10000144, "snippet" : true }, "category" : { "otype" : "Category", "mtid" : 1, "link" : "/api/category/1", "label" : "Tudományos", "published" : true, "oldId" : 1, "snippet" : true }, "languages" : [ { "otype" : "Language", "mtid" : 10002, "link" : "/api/language/10002", "label" : "Angol", "name" : "Angol", "nameEng" : "English", "published" : true, "oldId" : 2, "snippet" : true } ], "title" : "IEEE 20th Jubilee World Symposium on Applied Machine Intelligence and Informatics SAMI (2022)", "identifiers" : [ { "otype" : "PublicationIdentifier", "mtid" : 20708495, "link" : "/api/publicationidentifier/20708495", "label" : "ISBN: 9781665497046", "source" : { "otype" : "PlainSource", "mtid" : 122, "link" : "/api/publicationsource/122", "label" : "ISBN", "type" : { "otype" : "PublicationSourceType", "mtid" : 10002, "link" : "/api/publicationsourcetype/10002", "label" : "Egyéb", "mayHaveOa" : false, "published" : true, "snippet" : true }, "name" : "ISBN", "nameEng" : "ISBN", "linkPattern" : "https://www.worldcat.org/search?q=isbn%3A@@@", "publiclyVisible" : true, "published" : true, "oldId" : 122, "snippet" : true }, "idValue" : "9781665497046", "realUrl" : "https://www.worldcat.org/search?q=isbn%3A9781665497046", "published" : false, "snippet" : true }, { "otype" : "PublicationIdentifier", "mtid" : 20708496, "link" : "/api/publicationidentifier/20708496", "label" : "ISBN: 9781665497039", "source" : { "otype" : "PlainSource", "mtid" : 122, "link" : "/api/publicationsource/122", "label" : "ISBN", "type" : { "otype" : "PublicationSourceType", "mtid" : 10002, "link" : "/api/publicationsourcetype/10002", "label" : "Egyéb", "mayHaveOa" : false, "published" : true, "snippet" : true }, "name" : "ISBN", "nameEng" : "ISBN", "linkPattern" : "https://www.worldcat.org/search?q=isbn%3A@@@", "publiclyVisible" : true, "published" : true, "oldId" : 122, "snippet" : true }, "idValue" : "9781665497039", "realUrl" : "https://www.worldcat.org/search?q=isbn%3A9781665497039", "published" : false, "snippet" : true } ], "publishedAt" : [ { "otype" : "City", "mtid" : 10824, "link" : "/api/city/10824", "label" : "Poprad, Szlovákia", "partOf" : { "otype" : "Country", "mtid" : 10028, "link" : "/api/country/10028", "label" : "Szlovákia", "published" : true, "oldId" : 2144988, "snippet" : true }, "published" : true, "oldId" : 1367111, "snippet" : true } ], "pageLength" : 507, "publishedYear" : 2022, "foreignEdition" : true, "foreignLanguage" : true, "fullPublication" : false, "conferencePublication" : true, "nationalOrigin" : true, "published" : true, "snippet" : true }, "hasQualityFactor" : false, "link" : "/api/publication/33084683", "label" : "Chovanec M. et al. Analysis of Attacks on Mail Service Infrastructure Based on Application Logs and NetFlow Protocol. (2022) Megjelent: IEEE 20th Jubilee World Symposium on Applied Machine Intelligence and Informatics SAMI (2022) pp. 77-82", "template" : "