{
  "access": {
    "embargo": {
      "active": false,
      "reason": null
    },
    "files": "public",
    "record": "public",
    "status": "open"
  },
  "created": "2022-07-01T14:33:31.845039+00:00",
  "custom_fields": {
    "journal:journal": {
      "title": "MDPI Journal \"Sensors\" - Special Issue: \"Selected Papers from the IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, CAMAD 2020"
    }
  },
  "deletion_status": {
    "is_deleted": false,
    "status": "P"
  },
  "files": {
    "count": 1,
    "enabled": true,
    "entries": {
      "sensors-21-01140-v3.pdf": {
        "access": {
          "hidden": false
        },
        "checksum": "md5:07a2d9a327ce583476f402454a1f6be7",
        "ext": "pdf",
        "id": "cb0d8e4d-fadf-4967-96af-3d5e0665bc00",
        "key": "sensors-21-01140-v3.pdf",
        "links": {
          "content": "https://zenodo.org/api/records/6787351/files/sensors-21-01140-v3.pdf/content",
          "iiif_api": "https://zenodo.org/api/iiif/record:6787351:sensors-21-01140-v3.pdf/full/full/0/default.png",
          "iiif_base": "https://zenodo.org/api/iiif/record:6787351:sensors-21-01140-v3.pdf",
          "iiif_canvas": "https://zenodo.org/api/iiif/record:6787351/canvas/sensors-21-01140-v3.pdf",
          "iiif_info": "https://zenodo.org/api/iiif/record:6787351:sensors-21-01140-v3.pdf/info.json",
          "self": "https://zenodo.org/api/records/6787351/files/sensors-21-01140-v3.pdf"
        },
        "metadata": null,
        "mimetype": "application/pdf",
        "size": 2125447,
        "storage_class": "L"
      }
    },
    "order": [],
    "total_bytes": 2125447
  },
  "id": "6787351",
  "is_draft": false,
  "is_published": true,
  "links": {
    "access": "https://zenodo.org/api/records/6787351/access",
    "access_grants": "https://zenodo.org/api/records/6787351/access/grants",
    "access_links": "https://zenodo.org/api/records/6787351/access/links",
    "access_request": "https://zenodo.org/api/records/6787351/access/request",
    "access_users": "https://zenodo.org/api/records/6787351/access/users",
    "archive": "https://zenodo.org/api/records/6787351/files-archive",
    "archive_media": "https://zenodo.org/api/records/6787351/media-files-archive",
    "communities": "https://zenodo.org/api/records/6787351/communities",
    "communities-suggestions": "https://zenodo.org/api/records/6787351/communities-suggestions",
    "doi": "https://doi.org/10.5281/zenodo.6787351",
    "draft": "https://zenodo.org/api/records/6787351/draft",
    "file_modification": "https://zenodo.org/api/records/6787351/file-modification",
    "files": "https://zenodo.org/api/records/6787351/files",
    "latest": "https://zenodo.org/api/records/6787351/versions/latest",
    "latest_html": "https://zenodo.org/records/6787351/latest",
    "media_files": "https://zenodo.org/api/records/6787351/media-files",
    "parent": "https://zenodo.org/api/records/6787350",
    "parent_doi": "https://doi.org/10.5281/zenodo.6787350",
    "parent_doi_html": "https://zenodo.org/doi/10.5281/zenodo.6787350",
    "parent_html": "https://zenodo.org/records/6787350",
    "preview_html": "https://zenodo.org/records/6787351?preview=1",
    "quota_increase": "https://zenodo.org/api/records/6787351/quota-increase",
    "request_deletion": "https://zenodo.org/api/records/6787351/request-deletion",
    "requests": "https://zenodo.org/api/records/6787351/requests",
    "reserve_doi": "https://zenodo.org/api/records/6787351/draft/pids/doi",
    "self": "https://zenodo.org/api/records/6787351",
    "self_doi": "https://doi.org/10.5281/zenodo.6787351",
    "self_doi_html": "https://zenodo.org/doi/10.5281/zenodo.6787351",
    "self_html": "https://zenodo.org/records/6787351",
    "self_iiif_manifest": "https://zenodo.org/api/iiif/record:6787351/manifest",
    "self_iiif_sequence": "https://zenodo.org/api/iiif/record:6787351/sequence/default",
    "thumbnails": {
      "10": "https://zenodo.org/api/iiif/record:6787351:sensors-21-01140-v3.pdf/full/%5E10,/0/default.jpg",
      "100": "https://zenodo.org/api/iiif/record:6787351:sensors-21-01140-v3.pdf/full/%5E100,/0/default.jpg",
      "1200": "https://zenodo.org/api/iiif/record:6787351:sensors-21-01140-v3.pdf/full/%5E1200,/0/default.jpg",
      "250": "https://zenodo.org/api/iiif/record:6787351:sensors-21-01140-v3.pdf/full/%5E250,/0/default.jpg",
      "50": "https://zenodo.org/api/iiif/record:6787351:sensors-21-01140-v3.pdf/full/%5E50,/0/default.jpg",
      "750": "https://zenodo.org/api/iiif/record:6787351:sensors-21-01140-v3.pdf/full/%5E750,/0/default.jpg"
    },
    "versions": "https://zenodo.org/api/records/6787351/versions"
  },
  "media_files": {
    "count": 1,
    "enabled": true,
    "entries": {
      "sensors-21-01140-v3.pdf.ptif": {
        "access": {
          "hidden": true
        },
        "ext": "ptif",
        "id": "c5d7ca56-53b8-4cff-be73-e11c604160f8",
        "key": "sensors-21-01140-v3.pdf.ptif",
        "links": {
          "content": "https://zenodo.org/api/records/6787351/files/sensors-21-01140-v3.pdf.ptif/content",
          "self": "https://zenodo.org/api/records/6787351/files/sensors-21-01140-v3.pdf.ptif"
        },
        "metadata": null,
        "mimetype": "application/octet-stream",
        "processor": {
          "source_file_id": "cb0d8e4d-fadf-4967-96af-3d5e0665bc00",
          "status": "finished",
          "type": "image-tiles"
        },
        "size": 0,
        "storage_class": "L"
      }
    },
    "order": [],
    "total_bytes": 0
  },
  "metadata": {
    "creators": [
      {
        "affiliations": [
          {
            "name": "FORTH-ICS"
          }
        ],
        "person_or_org": {
          "family_name": "Eva Papadogiannaki",
          "name": "Eva Papadogiannaki",
          "type": "personal"
        }
      },
      {
        "affiliations": [
          {
            "name": "FORTH-ICS, School of Electrical and Computer Engineering, Technical University of Crete"
          }
        ],
        "person_or_org": {
          "family_name": "Sotiris Ioannidis",
          "name": "Sotiris Ioannidis",
          "type": "personal"
        }
      }
    ],
    "description": "<p>More than 75% of Internet traffic is now encrypted, and this percentage is constantly increasing. The majority of communications are secured using common encryption protocols such as SSL/TLS and IPsec to ensure security and protect the privacy of Internet users. However, encryption can be exploited to hide malicious activities, camouflaged into normal network traffic. Traditionally, network traffic inspection is based on techniques like deep packet inspection (DPI). Common applications for DPI include but are not limited to firewalls, intrusion detection and prevention systems, L7 filtering, and packet forwarding. With the widespread adoption of network encryption though, DPI tools that rely on packet payload content are becoming less effective, demanding the development of more sophisticated techniques in order to adapt to current network encryption trends. In this work, we present HeaderHunter, a fast signature-based intrusion detection system even for encrypted network traffic. We generate signatures using only network packet metadata extracted from packet headers. In addition, we examine the processing acceleration of the intrusion detection engine using different heterogeneous hardware architectures</p>",
    "languages": [
      {
        "id": "eng",
        "title": {
          "en": "English"
        }
      }
    ],
    "publication_date": "2021-02-01",
    "publisher": "Zenodo",
    "resource_type": {
      "id": "publication-article",
      "title": {
        "de": "Zeitschriftenartikel",
        "en": "Journal article"
      }
    },
    "rights": [
      {
        "description": {
          "en": "The Creative Commons Attribution license allows re-distribution and re-use of a licensed work on the condition that the creator is appropriately credited."
        },
        "icon": "cc-by-icon",
        "id": "cc-by-4.0",
        "props": {
          "scheme": "spdx",
          "url": "https://creativecommons.org/licenses/by/4.0/legalcode"
        },
        "title": {
          "en": "Creative Commons Attribution 4.0 International"
        }
      }
    ],
    "subjects": [
      {
        "subject": "network intrusion detection"
      },
      {
        "subject": "encrypted network traffic"
      },
      {
        "subject": "encrypted network traffic inspection"
      },
      {
        "subject": "network packet metadata"
      },
      {
        "subject": "GPGPUs"
      },
      {
        "subject": "integrated GPU"
      },
      {
        "subject": "OpenCL"
      }
    ],
    "title": "Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware"
  },
  "parent": {
    "access": {
      "owned_by": {
        "user": "368574"
      }
    },
    "communities": {
      "default": "62fd7212-8ef9-45f8-bb3c-73428889cb40",
      "entries": [
        {
          "access": {
            "member_policy": "open",
            "members_visibility": "public",
            "record_submission_policy": "open",
            "review_policy": "open",
            "visibility": "public"
          },
          "children": {
            "allow": false
          },
          "created": "2021-01-06T12:42:15.226756+00:00",
          "custom_fields": {},
          "deletion_status": {
            "is_deleted": false,
            "status": "P"
          },
          "id": "62fd7212-8ef9-45f8-bb3c-73428889cb40",
          "links": {},
          "metadata": {
            "curation_policy": "",
            "page": "<p>The <strong>C4IIoT</strong>&nbsp;project is funded by the European Union&rsquo;s Horizon 2020 research and innovation programme under grant agreement No 833828.</p>\r\n\r\n<p><strong>C4IIoT </strong>will build and demonstrate a novel and unified IIoT cybersecurity framework for malicious and anomalous behavior anticipation, detection, mitigation, and end-user informing. The framework provides a holistic and disruptive security-enabling solution for minimizing attack surfaces in IIoT systems, by exploiting i) emerging security software and hardware protection mechanisms; ii) state of the art machine and deep learning and privacy-aware analytics; iii) novel encrypted network flow analysis; iv) secure-by-design IIoT device fabrication; and v) blockchain technologies, to provide a viable scheme for enabling security and accountability, preserving privacy, enabling reliability and assuring trustworthiness within IIoT applications. The <strong>C4IIoT </strong>framework will be demonstrated and validated on two carefully selected use cases in real world environments, namely Enabling security IIoT in i) Inbound Logistics and ii) a Smart Factory</p>\r\n\r\n<p>&nbsp;</p>\r\n\r\n<p>https://www.c4iiot.eu</p>",
            "title": "H2020 C4IIoT project - Cyber security 4.0: protecting the Industrial Internet Of Things"
          },
          "revision_id": 0,
          "slug": "c4iiot",
          "updated": "2022-06-01T09:38:32.320080+00:00"
        }
      ],
      "ids": [
        "62fd7212-8ef9-45f8-bb3c-73428889cb40"
      ]
    },
    "id": "6787350",
    "pids": {
      "doi": {
        "client": "datacite",
        "identifier": "10.5281/zenodo.6787350",
        "provider": "datacite"
      }
    }
  },
  "pids": {
    "doi": {
      "client": "datacite",
      "identifier": "10.5281/zenodo.6787351",
      "provider": "datacite"
    },
    "oai": {
      "identifier": "oai:zenodo.org:6787351",
      "provider": "oai"
    }
  },
  "revision_id": 7,
  "stats": {
    "all_versions": {
      "data_volume": 310315262.0,
      "downloads": 146,
      "unique_downloads": 146,
      "unique_views": 161,
      "views": 168
    },
    "this_version": {
      "data_volume": 310315262.0,
      "downloads": 146,
      "unique_downloads": 146,
      "unique_views": 161,
      "views": 168
    }
  },
  "status": "published",
  "swh": {},
  "updated": "2024-07-16T12:24:27.236912+00:00",
  "versions": {
    "index": 1,
    "is_latest": true
  }
}