{"id":"https://openalex.org/W2086980435","doi":"https://doi.org/10.1002/sec.261","title":"Network specific false alarm reduction in intrusion detection system","display_name":"Network specific false alarm reduction in intrusion detection system","publication_year":2010,"publication_date":"2010-12-07","ids":{"openalex":"https://openalex.org/W2086980435","doi":"https://doi.org/10.1002/sec.261","mag":"2086980435"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1002/sec.261","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028480555","display_name":"Neminath Hubballi","orcid":"https://orcid.org/0000-0001-9669-9773"},"institutions":[{"id":"https://openalex.org/I1317621060","display_name":"Indian Institute of Technology Guwahati","ror":"https://ror.org/0022nd079","country_code":"IN","type":"education","lineage":["https://openalex.org/I1317621060"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Neminath Hubballi","raw_affiliation_strings":["Department of Computer Science, and Engineering, Indian Institute of Technology Guwahati, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, and Engineering, Indian Institute of Technology Guwahati, India","institution_ids":["https://openalex.org/I1317621060"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052215348","display_name":"Santosh Biswas","orcid":"https://orcid.org/0000-0003-3020-4154"},"institutions":[{"id":"https://openalex.org/I1317621060","display_name":"Indian Institute of Technology Guwahati","ror":"https://ror.org/0022nd079","country_code":"IN","type":"education","lineage":["https://openalex.org/I1317621060"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Santosh Biswas","raw_affiliation_strings":["Department of Computer Science, and Engineering, Indian Institute of Technology Guwahati, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, and Engineering, Indian Institute of Technology Guwahati, India","institution_ids":["https://openalex.org/I1317621060"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053883070","display_name":"Sukumar Nandi","orcid":"https://orcid.org/0000-0002-5869-1057"},"institutions":[{"id":"https://openalex.org/I1317621060","display_name":"Indian Institute of Technology Guwahati","ror":"https://ror.org/0022nd079","country_code":"IN","type":"education","lineage":["https://openalex.org/I1317621060"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sukumar Nandi","raw_affiliation_strings":["Department of Computer Science, and Engineering, Indian Institute of Technology Guwahati, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, and Engineering, Indian Institute of Technology Guwahati, India","institution_ids":["https://openalex.org/I1317621060"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":2100,"currency":"USD","value_usd":2100,"provenance":"doaj"},"apc_paid":null,"fwci":2.181,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":25,"citation_normalized_percentile":{"value":0.924946,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":91},"biblio":{"volume":"4","issue":"11","first_page":"1339","last_page":"1349"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9989,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/false-alarm","display_name":"False alarm","score":0.7289635},{"id":"https://openalex.org/keywords/false-positive-rate","display_name":"False positive rate","score":0.629691}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.86907274},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.7797719},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7342176},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.7289635},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.629691},{"id":"https://openalex.org/C2779119184","wikidata":"https://www.wikidata.org/wiki/Q294350","display_name":"ALARM","level":2,"score":0.6055845},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.5758077},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5238421},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.48332998},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4755045},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4024561},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.37369746},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1002/sec.261","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0122","issn":["1939-0122","1939-0114"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.8}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":14,"referenced_works":["https://openalex.org/W1684452600","https://openalex.org/W195086812","https://openalex.org/W1981276685","https://openalex.org/W1983717508","https://openalex.org/W2006508099","https://openalex.org/W2075798740","https://openalex.org/W2096545519","https://openalex.org/W2133218851","https://openalex.org/W2133287384","https://openalex.org/W2133668575","https://openalex.org/W2144378013","https://openalex.org/W2146196597","https://openalex.org/W2152449272","https://openalex.org/W4238236643"],"related_works":["https://openalex.org/W4379535633","https://openalex.org/W3121346907","https://openalex.org/W2993555267","https://openalex.org/W2189092700","https://openalex.org/W2165968459","https://openalex.org/W2132174924","https://openalex.org/W2040150569","https://openalex.org/W2013909972","https://openalex.org/W1983393909","https://openalex.org/W1911540634"],"abstract_inverted_index":{"ABSTRACT":[0],"Intrusion":[1],"Detection":[2,109],"Systems":[3],"(IDSs)":[4],"are":[5,47,81],"used":[6],"to":[7],"find":[8],"the":[9,33,73,98,108],"security":[10],"violations":[11],"in":[12,43,65,88],"computer":[13],"networks.":[14],"Usually":[15],"IDSs":[16,46],"produce":[17],"a":[18,25,57,89,102],"vast":[19],"number":[20],"of":[21,28,32,52,72,97,104],"alarms":[22,80,100],"that":[23],"include":[24],"large":[26],"percentage":[27],"false":[29,38,62,99],"alarms.":[30],"One":[31],"main":[34],"reason":[35],"for":[36,59,101],"such":[37],"alarm":[39,63],"generation":[40],"is":[41,67,75],"that,":[42],"most":[44,96],"cases":[45],"run":[48],"with":[49],"default":[50],"set":[51],"signatures.":[53],"In":[54],"this":[55],"paper,":[56],"scheme":[58],"network":[60,74],"specific":[61],"reduction":[64],"IDS":[66,78],"proposed.":[68],"A":[69],"threat":[70],"profile":[71],"created":[76],"and":[77],"generated":[79],"correlated":[82],"using":[83],"neural":[84],"network.":[85],"Experiments":[86],"conducted":[87],"test":[90],"bed":[91],"have":[92],"successfully":[93],"filtered":[94],"out":[95],"range":[103],"attacks":[105],"yet":[106],"maintaining":[107],"Rate":[110],".":[111],"Copyright":[112],"\u00a9":[113],"2010":[114],"John":[115],"Wiley":[116],"&":[117],"Sons,":[118],"Ltd.":[119]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2086980435","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":5},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":5},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":4}],"updated_date":"2024-12-17T03:27:33.756166","created_date":"2016-06-24"}