{"id":"https://openalex.org/W2794360330","doi":"https://doi.org/10.1145/3170521.3170522","title":"Analyzing attack strategies against rule-based intrusion detection systems","display_name":"Analyzing attack strategies against rule-based intrusion detection systems","publication_year":2018,"publication_date":"2018-01-04","ids":{"openalex":"https://openalex.org/W2794360330","doi":"https://doi.org/10.1145/3170521.3170522","mag":"2794360330"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3170521.3170522","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062682950","display_name":"Pooja Parameshwarappa","orcid":"https://orcid.org/0000-0002-1469-2090"},"institutions":[{"id":"https://openalex.org/I79272384","display_name":"University of Maryland, Baltimore County","ror":"https://ror.org/02qskvh78","country_code":"US","type":"funder","lineage":["https://openalex.org/I79272384"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Pooja Parameshwarappa","raw_affiliation_strings":["University of Maryland, Baltimore County"],"affiliations":[{"raw_affiliation_string":"University of Maryland, Baltimore County","institution_ids":["https://openalex.org/I79272384"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100438515","display_name":"Zhiyuan Chen","orcid":"https://orcid.org/0000-0002-6984-7248"},"institutions":[{"id":"https://openalex.org/I79272384","display_name":"University of Maryland, Baltimore County","ror":"https://ror.org/02qskvh78","country_code":"US","type":"funder","lineage":["https://openalex.org/I79272384"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhiyuan Chen","raw_affiliation_strings":["University of Maryland, Baltimore County"],"affiliations":[{"raw_affiliation_string":"University of Maryland, Baltimore County","institution_ids":["https://openalex.org/I79272384"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051208435","display_name":"Aryya Gangopadhyay","orcid":"https://orcid.org/0000-0002-7553-7932"},"institutions":[{"id":"https://openalex.org/I79272384","display_name":"University of Maryland, Baltimore County","ror":"https://ror.org/02qskvh78","country_code":"US","type":"funder","lineage":["https://openalex.org/I79272384"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Aryya Gangopadhyay","raw_affiliation_strings":["University of Maryland, Baltimore County"],"affiliations":[{"raw_affiliation_string":"University of Maryland, Baltimore County","institution_ids":["https://openalex.org/I79272384"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.733,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":11,"citation_normalized_percentile":{"value":0.854555,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":85,"max":86},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9984,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9978,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.47179383}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.8772463},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.79108834},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.62182736},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.48756593},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.47179383},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.4706368},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44854045},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.43291286},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4068629},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.23919469},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3170521.3170522","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions","score":0.43}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":18,"referenced_works":["https://openalex.org/W1490787220","https://openalex.org/W1965052658","https://openalex.org/W1970026646","https://openalex.org/W2002830978","https://openalex.org/W2016728268","https://openalex.org/W2019562064","https://openalex.org/W2035055162","https://openalex.org/W207267598","https://openalex.org/W2151298633","https://openalex.org/W2157665255","https://openalex.org/W2161630727","https://openalex.org/W2162275200","https://openalex.org/W2180612164","https://openalex.org/W2296452361","https://openalex.org/W2535159308","https://openalex.org/W2582743722","https://openalex.org/W4206227380","https://openalex.org/W433644524"],"related_works":["https://openalex.org/W4300599821","https://openalex.org/W3194491325","https://openalex.org/W2383127772","https://openalex.org/W2374614522","https://openalex.org/W2362800560","https://openalex.org/W2357468538","https://openalex.org/W2355007334","https://openalex.org/W2348767155","https://openalex.org/W1937493481","https://openalex.org/W1496376327"],"abstract_inverted_index":{"Intrusion":[0],"Detection":[1],"Systems":[2,14],"(IDS)":[3],"have":[4],"been":[5],"widely":[6,42],"used":[7,43],"to":[8,24,61],"detect":[9],"cyber":[10],"attacks":[11],"in":[12],"Cyber-Physical":[13],"(CPS).":[15],"However,":[16],"attackers":[17],"can":[18],"often":[19],"adapt":[20],"their":[21],"attacking":[22,38],"strategies":[23,39],"evade":[25],"detection.":[26],"Many":[27],"commercial":[28],"IDS":[29],"are":[30],"rule-based":[31,44],"systems.":[32],"This":[33],"paper":[34],"analyzes":[35],"the":[36],"possible":[37],"against":[40],"a":[41],"IDS,":[45],"Snort,":[46],"using":[47],"hyper":[48],"graph":[49],"model":[50],"and":[51,57],"clustering.":[52],"We":[53],"present":[54],"initial":[55],"results":[56],"discuss":[58],"some":[59],"techniques":[60],"prevent":[62],"such":[63],"attacks.":[64]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2794360330","counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-04-04T19:32:08.673373","created_date":"2018-03-29"}