{"id":"https://openalex.org/W2051627118","doi":"https://doi.org/10.1109/cicsyn.2013.9","title":"HA-CIDS: A Hierarchical and Autonomous IDS for Cloud Systems","display_name":"HA-CIDS: A Hierarchical and Autonomous IDS for Cloud Systems","publication_year":2013,"publication_date":"2013-06-01","ids":{"openalex":"https://openalex.org/W2051627118","doi":"https://doi.org/10.1109/cicsyn.2013.9","mag":"2051627118"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/cicsyn.2013.9","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079318114","display_name":"Hisham A. Kholidy","orcid":"https://orcid.org/0000-0002-7673-5850"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Hisham A. Kholidy","raw_affiliation_strings":["Department of Computer science and Engineering, Qatar University, Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Department of Computer science and Engineering, Qatar University, Doha, Qatar","institution_ids":["https://openalex.org/I60342839"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057643629","display_name":"Abdelkarim Erradi","orcid":"https://orcid.org/0000-0002-8333-3454"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Abdelkarim Erradi","raw_affiliation_strings":["Department of Computer science and Engineering, Qatar University, Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Department of Computer science and Engineering, Qatar University, Doha, Qatar","institution_ids":["https://openalex.org/I60342839"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029272797","display_name":"Sherif Abdelwahed","orcid":"https://orcid.org/0000-0002-6355-4671"},"institutions":[{"id":"https://openalex.org/I99041443","display_name":"Mississippi State University","ror":"https://ror.org/0432jq872","country_code":"US","type":"education","lineage":["https://openalex.org/I4210141039","https://openalex.org/I99041443"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sherif Abdelwahed","raw_affiliation_strings":["Electr. & Comput. Eng., Mississippi State Univ., Starkville, MS, USA"],"affiliations":[{"raw_affiliation_string":"Electr. & Comput. Eng., Mississippi State Univ., Starkville, MS, USA","institution_ids":["https://openalex.org/I99041443"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048647728","display_name":"Fabrizio Baiardi","orcid":"https://orcid.org/0000-0001-9797-2380"},"institutions":[{"id":"https://openalex.org/I108290504","display_name":"University of Pisa","ror":"https://ror.org/03ad39j10","country_code":"IT","type":"education","lineage":["https://openalex.org/I108290504"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Fabrizio Baiardi","raw_affiliation_strings":["Dipt. di Inf., Univ. di Pisa, Pisa, Italy"],"affiliations":[{"raw_affiliation_string":"Dipt. di Inf., Univ. di Pisa, Pisa, Italy","institution_ids":["https://openalex.org/I108290504"]}]}],"institution_assertions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.595,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":12,"citation_normalized_percentile":{"value":0.783593,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":86,"max":87},"biblio":{"volume":null,"issue":null,"first_page":"179","last_page":"184"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9992,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.8064256},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience","score":0.57354987}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.84689057},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.8064256},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7830522},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.713578},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6388883},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.6376502},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.57810533},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.57354987},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.41650876},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37210184},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.31464913},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12227517},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/cicsyn.2013.9","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":13,"referenced_works":["https://openalex.org/W1574164692","https://openalex.org/W1967024415","https://openalex.org/W1984922480","https://openalex.org/W2108295909","https://openalex.org/W2124563017","https://openalex.org/W2130195610","https://openalex.org/W2132354547","https://openalex.org/W2159272484","https://openalex.org/W2166351297","https://openalex.org/W2256845964","https://openalex.org/W2331042348","https://openalex.org/W2622610444","https://openalex.org/W3137092842"],"related_works":["https://openalex.org/W4300361016","https://openalex.org/W4285390114","https://openalex.org/W3152278044","https://openalex.org/W2979874898","https://openalex.org/W2792485783","https://openalex.org/W2578526276","https://openalex.org/W2267601986","https://openalex.org/W2062664863","https://openalex.org/W2039209448","https://openalex.org/W1493121295"],"abstract_inverted_index":{"Cloud":[0],"computing":[1,12],"is":[2],"an":[3],"attractive":[4],"model":[5],"that":[6],"provides":[7],"the":[8,15,63,76,80,86,124,129],"delivery":[9],"of":[10,128,136],"on-demand":[11],"resources":[13],"over":[14],"Internet":[16],"and":[17,45,57,61,65,78,115,126,134],"on":[18],"a":[19,43,120],"pay-for-use":[20],"basis.":[21],"However,":[22],"while":[23],"intruders":[24],"may":[25],"exploit":[26],"clouds":[27],"for":[28,37],"their":[29],"advantage,":[30],"most":[31,81],"IDS":[32],"solutions":[33],"are":[34,138],"not":[35],"suitable":[36],"cloud":[38,47,87],"environments.":[39],"This":[40],"paper":[41],"presents":[42],"hierarchical":[44],"autonomous":[46,69,102,110],"based":[48],"intrusion":[49],"detection":[50],"system,":[51],"HA-CIDS.":[52],"The":[53,131],"framework":[54,77],"continuously":[55],"monitors":[56],"analyzes":[58],"system":[59],"events":[60],"computes":[62],"security":[64,72],"risk":[66],"parameters.":[67],"An":[68],"controller":[70],"receives":[71],"parameters":[73],"computed":[74],"by":[75],"selects":[79],"appropriate":[82],"response":[83,103],"to":[84,104,112,122],"protect":[85],"against":[88],"detected":[89,105],"attacks,":[90,106],"as":[91,93],"well":[92],"recover":[94],"any":[95],"corrupted":[96],"data":[97],"or":[98],"affected":[99],"services.":[100],"Beside":[101],"HA-CIDS":[107],"has":[108],"several":[109],"capabilities":[111],"provide":[113],"self-resilience":[114],"fault":[116],"tolerance.":[117],"We":[118],"developed":[119],"testbed":[121],"evaluate":[123],"performance":[125],"accuracy":[127],"framework.":[130],"architecture,":[132],"design,":[133],"deployment":[135],"HACIDS":[137],"given":[139],"in":[140],"this":[141],"paper.":[142]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2051627118","counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":5}],"updated_date":"2025-01-06T09:59:00.567308","created_date":"2016-06-24"}