{"id":"https://openalex.org/W2746282326","doi":"https://doi.org/10.1109/fuzz-ieee.2017.8015461","title":"D-FRI-WinFirewall: Dynamic fuzzy rule interpolation for Windows Firewall","display_name":"D-FRI-WinFirewall: Dynamic fuzzy rule interpolation for Windows Firewall","publication_year":2017,"publication_date":"2017-07-01","ids":{"openalex":"https://openalex.org/W2746282326","doi":"https://doi.org/10.1109/fuzz-ieee.2017.8015461","mag":"2746282326"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/fuzz-ieee.2017.8015461","pdf_url":null,"source":{"id":"https://openalex.org/S4363608205","display_name":"2022 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ewh.ieee.org/conf/fuzz/fuzz-2017.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089628794","display_name":"Nitin Naik","orcid":"https://orcid.org/0000-0002-0659-9646"},"institutions":[{"id":"https://openalex.org/I1340226911","display_name":"Defence Equipment and Support","ror":"https://ror.org/00jztws02","country_code":"GB","type":"government","lineage":["https://openalex.org/I1306956679","https://openalex.org/I1340226911","https://openalex.org/I2802373619"]},{"id":"https://openalex.org/I1306956679","display_name":"Ministry of Defence","ror":"https://ror.org/01bvxzn29","country_code":"GB","type":"government","lineage":["https://openalex.org/I1306956679","https://openalex.org/I2802373619"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Nitin Naik","raw_affiliation_strings":["Ministry of Defence, Defence School of Communications and Information Systems, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Ministry of Defence, Defence School of Communications and Information Systems, United Kingdom","institution_ids":["https://openalex.org/I1340226911","https://openalex.org/I1306956679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110155797","display_name":"Ren Diao","orcid":null},"institutions":[],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Ren Diao","raw_affiliation_strings":["Wandera Ltd., United Kingdom"],"affiliations":[{"raw_affiliation_string":"Wandera Ltd., United Kingdom","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039652471","display_name":"Changjing Shang","orcid":"https://orcid.org/0000-0001-6375-6276"},"institutions":[{"id":"https://openalex.org/I16038530","display_name":"Aberystwyth University","ror":"https://ror.org/015m2p889","country_code":"GB","type":"funder","lineage":["https://openalex.org/I16038530"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Changjing Shang","raw_affiliation_strings":["Physics and Computer Science, Aberystwyth University, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Physics and Computer Science, Aberystwyth University, United Kingdom","institution_ids":["https://openalex.org/I16038530"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036010787","display_name":"Qiang Shen","orcid":"https://orcid.org/0000-0001-9333-4605"},"institutions":[{"id":"https://openalex.org/I16038530","display_name":"Aberystwyth University","ror":"https://ror.org/015m2p889","country_code":"GB","type":"funder","lineage":["https://openalex.org/I16038530"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Qiang Shen","raw_affiliation_strings":["Physics and Computer Science, Aberystwyth University, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Physics and Computer Science, Aberystwyth University, United Kingdom","institution_ids":["https://openalex.org/I16038530"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064994129","display_name":"Paul Jenkins","orcid":"https://orcid.org/0000-0002-9854-9450"},"institutions":[{"id":"https://openalex.org/I1340226911","display_name":"Defence Equipment and Support","ror":"https://ror.org/00jztws02","country_code":"GB","type":"government","lineage":["https://openalex.org/I1306956679","https://openalex.org/I1340226911","https://openalex.org/I2802373619"]},{"id":"https://openalex.org/I1306956679","display_name":"Ministry of Defence","ror":"https://ror.org/01bvxzn29","country_code":"GB","type":"government","lineage":["https://openalex.org/I1306956679","https://openalex.org/I2802373619"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Paul Jenkins","raw_affiliation_strings":["Ministry of Defence, Defence School of Communications and Information Systems, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Ministry of Defence, Defence School of Communications and Information Systems, United Kingdom","institution_ids":["https://openalex.org/I1340226911","https://openalex.org/I1306956679"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.985,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":18,"citation_normalized_percentile":{"value":0.718927,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":90},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.998,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9943,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.8736222}],"concepts":[{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.8736222},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7683588},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7024567},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.62989736},{"id":"https://openalex.org/C86444895","wikidata":"https://www.wikidata.org/wiki/Q451816","display_name":"Application firewall","level":4,"score":0.5923479},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.50389975},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44598827},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.4341452},{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.31635135},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.29324713},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1928018},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.16969642},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.10642579},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C104062141","wikidata":"https://www.wikidata.org/wiki/Q2601295","display_name":"Extremal black hole","level":3,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/fuzz-ieee.2017.8015461","pdf_url":null,"source":{"id":"https://openalex.org/S4363608205","display_name":"2022 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://pure.aber.ac.uk/portal/en/publications/dfriwinfirewall-dynamic-fuzzy-rule-interpolation-for-windows-firewall(81585a88-79e7-47d3-bce0-9b8f64278a55).html","pdf_url":"https://ewh.ieee.org/conf/fuzz/fuzz-2017.pdf","source":{"id":"https://openalex.org/S4306401660","display_name":"Aberystwyth Research portal (Aberystwyth University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I16038530","host_organization_name":"Aberystwyth University","host_organization_lineage":["https://openalex.org/I16038530"],"host_organization_lineage_names":["Aberystwyth University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://pure.aber.ac.uk/portal/en/publications/dfriwinfirewall-dynamic-fuzzy-rule-interpolation-for-windows-firewall(81585a88-79e7-47d3-bce0-9b8f64278a55).html","pdf_url":"https://ewh.ieee.org/conf/fuzz/fuzz-2017.pdf","source":{"id":"https://openalex.org/S4306401660","display_name":"Aberystwyth Research portal (Aberystwyth University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I16038530","host_organization_name":"Aberystwyth University","host_organization_lineage":["https://openalex.org/I16038530"],"host_organization_lineage_names":["Aberystwyth University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[{"score":0.57,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":22,"referenced_works":["https://openalex.org/W1974030435","https://openalex.org/W1990999691","https://openalex.org/W1992176519","https://openalex.org/W1995077566","https://openalex.org/W2063943005","https://openalex.org/W2084896955","https://openalex.org/W2122475393","https://openalex.org/W2126120381","https://openalex.org/W2156715830","https://openalex.org/W2177837262","https://openalex.org/W2209736539","https://openalex.org/W2225783731","https://openalex.org/W2289429767","https://openalex.org/W2296443825","https://openalex.org/W2468072172","https://openalex.org/W2528880615","https://openalex.org/W2549446373","https://openalex.org/W2556507683","https://openalex.org/W4205373109","https://openalex.org/W4249749961","https://openalex.org/W4251212860","https://openalex.org/W4300014214"],"related_works":["https://openalex.org/W8359669","https://openalex.org/W4363647490","https://openalex.org/W4234975731","https://openalex.org/W40377838","https://openalex.org/W2916429898","https://openalex.org/W2583381754","https://openalex.org/W2495628081","https://openalex.org/W2361515550","https://openalex.org/W2057573940","https://openalex.org/W2009238965"],"abstract_inverted_index":{"Dynamic":[0],"fuzzy":[1,9,17,26,39],"rule":[2,10,18],"interpolation":[3,11],"(D-FRI)":[4],"consists":[5],"of":[6,8,15,45,56,122,127,142,144,180],"functionalities":[7],"and":[12,92,140,166,175,186,197],"dynamically":[13,106],"refinement":[14],"the":[16,31,46,54,70,119,125,138,154,191],"base.":[19],"It":[20],"can":[21],"be":[22],"integrated":[23],"with":[24,170],"any":[25],"intelligent":[27],"system":[28,115],"to":[29,36,53,78,105,173,194,204],"extend":[30],"system's":[32],"capabilities":[33],"in":[34,69,112],"addition":[35],"its":[37],"normal":[38],"reasoning.":[40],"Systems":[41],"security":[42,66,84],"is":[43,130,149],"one":[44],"areas":[47],"that":[48],"require":[49],"dynamic":[50],"monitoring":[51,139],"due":[52],"nature":[55],"possible":[57,76,151],"threats;":[58],"static":[59],"rule-based":[60],"systems":[61],"cannot":[62],"cover":[63],"all":[64],"reoriented":[65],"threats":[67],"accurately":[68],"long":[71],"run.":[72],"D-FRI":[73,104],"provides":[74],"a":[75,98,113],"solution":[77],"such":[79],"problems,":[80],"potentially":[81],"making":[82],"various":[83],"tools":[85],"(e.g.,":[86],"those":[87],"for":[88],"firewall,":[89],"intrusion":[90],"detection":[91],"traffic":[93],"analysis)":[94],"more":[95],"effective.":[96],"As":[97],"particular":[99],"application,":[100],"this":[101,128],"paper":[102],"exploits":[103],"support":[107],"Microsoft":[108],"Windows":[109,123,156,192],"Firewall,":[110,124],"resulting":[111],"robust":[114],"named":[116],"D-FRI-WinFirewall.":[117],"Given":[118],"general":[120],"utility":[121],"impact":[126],"work":[129,133],"far-reaching.":[131],"The":[132],"reported":[134],"here":[135],"focusses":[136],"on":[137],"prevention":[141],"denial":[143],"service":[145],"(DoS)":[146],"attacks,":[147],"which":[148,200],"not":[150],"by":[152],"utilising":[153],"standard":[155],"Firewall":[157,193],"alone.":[158],"In":[159],"particular,":[160],"two":[161,177],"sub-systems":[162],"are":[163,201],"designed,":[164],"implemented":[165],"tested":[167],"within":[168],"D-FRI-WinFirewall,":[169],"an":[171],"effort":[172],"detect":[174],"prevent":[176],"serious":[178],"types":[179],"DoS":[181,184,188,206],"attack:":[182],"ICMP":[183],"attack":[185],"UDP":[187],"attack,":[189],"leading":[190],"outperform":[195],"popular":[196],"expensive":[198],"firewalls,":[199],"yet":[202],"unable":[203],"handle":[205],"attacks.":[207]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2746282326","counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":7}],"updated_date":"2025-04-16T06:39:38.312759","created_date":"2017-08-31"}