{"id":"https://openalex.org/W2094560341","doi":"https://doi.org/10.1109/icsmc.2006.385207","title":"Anomaly Instruction Detection of Masqueraders and Threat Evaluation Using Fuzzy Logic","display_name":"Anomaly Instruction Detection of Masqueraders and Threat Evaluation Using Fuzzy Logic","publication_year":2006,"publication_date":"2006-10-01","ids":{"openalex":"https://openalex.org/W2094560341","doi":"https://doi.org/10.1109/icsmc.2006.385207","mag":"2094560341"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsmc.2006.385207","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108295993","display_name":"Yingbing Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I157417397","display_name":"Bowling Green State University","ror":"https://ror.org/00ay7va13","country_code":"US","type":"funder","lineage":["https://openalex.org/I157417397"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yingbing Yu","raw_affiliation_strings":["Dept. of Comput. Sci., Bowling Green"],"affiliations":[{"raw_affiliation_string":"Dept. of Comput. Sci., Bowling Green","institution_ids":["https://openalex.org/I157417397"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102637962","display_name":"James H. Graham","orcid":null},"institutions":[{"id":"https://openalex.org/I157417397","display_name":"Bowling Green State University","ror":"https://ror.org/00ay7va13","country_code":"US","type":"funder","lineage":["https://openalex.org/I157417397"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"James H. Graham","raw_affiliation_strings":["Dept. of Comput. Sci., Bowling Green"],"affiliations":[{"raw_affiliation_string":"Dept. of Comput. Sci., Bowling Green","institution_ids":["https://openalex.org/I157417397"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.208,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":10,"citation_normalized_percentile":{"value":0.674829,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":82,"max":83},"biblio":{"volume":null,"issue":null,"first_page":"2309","last_page":"2314"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9986,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.47612745},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.43991324},{"id":"https://openalex.org/keywords/fuzzy-inference-system","display_name":"Fuzzy inference system","score":0.43466002}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7527618},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.665921},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.66219574},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.60926944},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.5912981},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.56157434},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5311605},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.47612745},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.4633795},{"id":"https://openalex.org/C42011625","wikidata":"https://www.wikidata.org/wiki/Q1055058","display_name":"Fuzzy set","level":3,"score":0.4486046},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.43991324},{"id":"https://openalex.org/C2987376176","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy inference system","level":5,"score":0.43466002},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.41621423},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.41486204},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38364536},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.29698807},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29064888},{"id":"https://openalex.org/C195975749","wikidata":"https://www.wikidata.org/wiki/Q1475705","display_name":"Fuzzy control system","level":3,"score":0.282067},{"id":"https://openalex.org/C186108316","wikidata":"https://www.wikidata.org/wiki/Q352530","display_name":"Adaptive neuro fuzzy inference system","level":4,"score":0.21938634},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsmc.2006.385207","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","score":0.77,"id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":11,"referenced_works":["https://openalex.org/W1525451939","https://openalex.org/W1741154578","https://openalex.org/W1973704753","https://openalex.org/W2075225004","https://openalex.org/W2082600559","https://openalex.org/W2142638723","https://openalex.org/W2146196597","https://openalex.org/W2543194749","https://openalex.org/W2615155959","https://openalex.org/W3214373139","https://openalex.org/W61807067"],"related_works":["https://openalex.org/W3036013726","https://openalex.org/W3004832009","https://openalex.org/W2369534771","https://openalex.org/W2357468538","https://openalex.org/W2351051591","https://openalex.org/W2337148208","https://openalex.org/W2209997499","https://openalex.org/W1971929717","https://openalex.org/W1724519426","https://openalex.org/W1548126107"],"abstract_inverted_index":{"One":[0],"critical":[1],"threat":[2,91,116],"facing":[3],"many":[4],"organizations":[5],"is":[6,54,84,107],"the":[7,74,88,100,124,129],"inside":[8],"attacks":[9],"from":[10,39,73,99],"masqueraders,":[11],"internal":[12],"users":[13],"or":[14],"external":[15],"intruders":[16],"who":[17],"exploit":[18],"legitimate":[19],"user":[20,36],"identity":[21],"and":[22,47,148],"perform":[23],"malicious":[24],"attacks.":[25],"Anomaly":[26],"intrusion":[27],"detection":[28,144],"systems":[29],"can":[30],"be":[31,121],"deployed":[32],"to":[33,66,86],"build":[34],"a":[35,44,51,61,68,103],"behavior":[37,70],"profile":[38],"his/her":[40],"past":[41],"activities":[42],"in":[43],"computer":[45],"system":[46,106],"detect":[48],"masqueraders":[49,147],"if":[50],"large":[52],"deviation":[53],"observed.":[55],"In":[56],"this":[57],"paper,":[58],"we":[59],"use":[60],"finite":[62],"automata":[63],"based":[64],"model":[65,72],"construct":[67],"normal":[69],"reference":[71],"analysis":[75],"of":[76,90,102,146],"shell":[77],"command":[78],"sequences.":[79],"A":[80,118],"fuzzy":[81,96,104,112],"evaluation":[82],"mechanism":[83],"proposed":[85],"classify":[87],"degree":[89],"as":[92,123],"linguistic":[93,125],"terms.":[94],"The":[95],"number":[97],"calculated":[98],"output":[101],"inference":[105],"compared":[108],"with":[109,133],"predefined":[110],"generalized":[111],"numbers":[113],"representing":[114],"different":[115],"levels.":[117],"case":[119],"will":[120],"labeled":[122],"term":[126],"which":[127,152],"has":[128],"highest":[130],"similarity":[131],"value":[132],"it.":[134],"Experiments":[135],"conducted":[136],"on":[137],"two":[138],"data":[139],"sets":[140],"both":[141],"achieved":[142],"high":[143],"rates":[145],"few":[149],"false":[150],"alarms,":[151],"stand":[153],"out":[154],"other":[155],"methods.":[156]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2094560341","counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1}],"updated_date":"2025-03-19T22:08:01.351542","created_date":"2016-06-24"}