{"id":"https://openalex.org/W2972117045","doi":"https://doi.org/10.1109/access.2019.2939011","title":"Benchmark Tests for the Model-Checking-Based IDS Algorithms","display_name":"Benchmark Tests for the Model-Checking-Based IDS Algorithms","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2972117045","doi":"https://doi.org/10.1109/access.2019.2939011","mag":"2972117045"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2939011","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08822670.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08822670.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103198656","display_name":"Miaolei Deng","orcid":"https://orcid.org/0000-0002-0747-8520"},"institutions":[{"id":"https://openalex.org/I36152291","display_name":"Henan University of Technology","ror":"https://ror.org/05sbgwt55","country_code":"CN","type":"funder","lineage":["https://openalex.org/I36152291"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Miaolei Deng","raw_affiliation_strings":["College of Information Science and Engineering, Henan University of Technology, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Henan University of Technology, Zhengzhou, China","institution_ids":["https://openalex.org/I36152291"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102914088","display_name":"Heling Cao","orcid":"https://orcid.org/0000-0001-5663-6516"},"institutions":[{"id":"https://openalex.org/I36152291","display_name":"Henan University of Technology","ror":"https://ror.org/05sbgwt55","country_code":"CN","type":"funder","lineage":["https://openalex.org/I36152291"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Heling Cao","raw_affiliation_strings":["College of Information Science and Engineering, Henan University of Technology, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Henan University of Technology, Zhengzhou, China","institution_ids":["https://openalex.org/I36152291"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100696709","display_name":"Weijun Zhu","orcid":"https://orcid.org/0000-0001-9064-7833"},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"funder","lineage":["https://openalex.org/I38877650"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weijun Zhu","raw_affiliation_strings":["School of Information Engineering, Zhengzhou University, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Zhengzhou University, Zhengzhou, China","institution_ids":["https://openalex.org/I38877650"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011747432","display_name":"Huanmei Wu","orcid":"https://orcid.org/0000-0003-0346-6044"},"institutions":[{"id":"https://openalex.org/I135191193","display_name":"University of Indianapolis","ror":"https://ror.org/052133d12","country_code":"US","type":"education","lineage":["https://openalex.org/I135191193"]},{"id":"https://openalex.org/I55769427","display_name":"Indiana University \u2013 Purdue University Indianapolis","ror":"https://ror.org/05gxnyn08","country_code":"US","type":"funder","lineage":["https://openalex.org/I4407990318","https://openalex.org/I55769427","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Huanmei Wu","raw_affiliation_strings":["School of Informatics and Computing, Indiana University\u2013Purdue University Indianapolis, Indianapolis, IN, USA"],"affiliations":[{"raw_affiliation_string":"School of Informatics and Computing, Indiana University\u2013Purdue University Indianapolis, Indianapolis, IN, USA","institution_ids":["https://openalex.org/I135191193","https://openalex.org/I55769427"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052814102","display_name":"Yangyue Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I36152291","display_name":"Henan University of Technology","ror":"https://ror.org/05sbgwt55","country_code":"CN","type":"funder","lineage":["https://openalex.org/I36152291"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yangyue Zhou","raw_affiliation_strings":["College of Information Science and Engineering, Henan University of Technology, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Henan University of Technology, Zhengzhou, China","institution_ids":["https://openalex.org/I36152291"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.301,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":2,"citation_normalized_percentile":{"value":0.602428,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":69,"max":74},"biblio":{"volume":"7","issue":null,"first_page":"135479","last_page":"135498"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9986,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.8148211}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.878294},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.81665826},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.8148211},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5818575},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5726507},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.48037773},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.48009828},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.4622668},{"id":"https://openalex.org/C25016198","wikidata":"https://www.wikidata.org/wiki/Q781833","display_name":"Temporal logic","level":2,"score":0.43219116},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.21659252},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2939011","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08822670.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":false,"landing_page_url":"https://doaj.org/article/27af793a3e7149e4aab6adcbb80c2d5b","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2939011","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08822670.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"U1204608"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"U1304606"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61602154"},{"funder":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China","award_id":"2016YFB0800101"},{"funder":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China","award_id":"2016YFB0800100"}],"datasets":[],"versions":[],"referenced_works_count":24,"referenced_works":["https://openalex.org/W1499438245","https://openalex.org/W1541152994","https://openalex.org/W1599249895","https://openalex.org/W1975554273","https://openalex.org/W1980153792","https://openalex.org/W2006394045","https://openalex.org/W2021917262","https://openalex.org/W2023205171","https://openalex.org/W2046359540","https://openalex.org/W2096063762","https://openalex.org/W2148845055","https://openalex.org/W2169889002","https://openalex.org/W2340735175","https://openalex.org/W2385503072","https://openalex.org/W2393134292","https://openalex.org/W2600387315","https://openalex.org/W2621376054","https://openalex.org/W268478568","https://openalex.org/W2781278435","https://openalex.org/W2785889759","https://openalex.org/W2792186710","https://openalex.org/W2887262894","https://openalex.org/W2913327014","https://openalex.org/W2920670266"],"related_works":["https://openalex.org/W3036013726","https://openalex.org/W3004832009","https://openalex.org/W2369534771","https://openalex.org/W2357468538","https://openalex.org/W2351051591","https://openalex.org/W2337148208","https://openalex.org/W2209997499","https://openalex.org/W2100313163","https://openalex.org/W1971929717","https://openalex.org/W1548126107"],"abstract_inverted_index":{"A":[0],"fundamental":[1],"concern":[2],"for":[3,38,65,85,97,157],"the":[4,10,23,35,39,74,117,126,134,146,159],"security":[5],"community":[6],"is":[7,105,114,155],"to":[8,61],"identify":[9],"comprehensive":[11],"comparable":[12],"performance":[13],"of":[14,68,109,112,119,125,150,166],"various":[15],"intrusion":[16,41,92,95,98,127,167],"detection":[17,42,99,121,128,168],"algorithms":[18,129,162],"which":[19,104],"are":[20,58,139],"based":[21,100,130],"on":[22,101,131],"Model":[24],"Checking":[25],"(MC)":[26],"techniques.":[27],"To":[28],"address":[29],"this":[30],"open":[31],"issue,":[32],"we":[33],"conduct":[34],"benchmark":[36],"tests":[37],"model-checking-based":[40],"systems":[43],"algorithms.":[44,153],"At":[45],"first,":[46],"linear":[47],"temporal":[48,51],"logic,":[49],"interval":[50],"logic":[52,57],"and":[53,78,123,148],"real-time":[54],"attack":[55],"signature":[56],"employed":[59],"respectively":[60],"establish":[62],"formula":[63],"models":[64],"twenty-four":[66],"types":[67],"attacks":[69],"selected":[70],"from":[71],"KDDCUP,":[72,113],"i.e.,":[73],"annual":[75],"data":[76],"mining":[77],"knowledge":[79],"discovery":[80],"competition":[81],"organized":[82],"by":[83],"association":[84],"computing":[86],"machinery.":[87],"And":[88],"then,":[89],"a":[90,106,110],"standard":[91],"set,":[93],"called":[94],"set":[96],"model":[102,132],"checking,":[103],"behavior":[107],"version":[108],"subset":[111],"constructed.":[115],"On":[116],"basis":[118],"it,":[120],"abilities":[122,149],"efficiency":[124,147],"checking":[133],"three":[135,152],"logics":[136],"mentioned":[137],"above":[138],"compared":[140],"exhaustively.":[141],"The":[142],"experimental":[143],"results":[144],"illustrate":[145],"these":[151],"It":[154],"beneficial":[156],"selecting":[158],"suitable":[160],"MC-based":[161],"in":[163],"actual":[164],"deployment":[165],"systems.":[169]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2972117045","counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-04-25T03:28:28.064125","created_date":"2019-09-12"}