{"id":"https://openalex.org/W2998351022","doi":"https://doi.org/10.1093/jigpal/jzz060","title":"Deep packet inspection for intelligent intrusion detection in software-defined industrial networks: A proof of concept","display_name":"Deep packet inspection for intelligent intrusion detection in software-defined industrial networks: A proof of concept","publication_year":2019,"publication_date":"2019-12-16","ids":{"openalex":"https://openalex.org/W2998351022","doi":"https://doi.org/10.1093/jigpal/jzz060","mag":"2998351022"},"language":"en","primary_location":{"id":"doi:10.1093/jigpal/jzz060","is_oa":false,"landing_page_url":"https://doi.org/10.1093/jigpal/jzz060","pdf_url":null,"source":{"id":"https://openalex.org/S2734381524","display_name":"Logic Journal of IGPL","issn_l":"1367-0751","issn":["1367-0751","1368-9894"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Logic Journal of the IGPL","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://hdl.handle.net/20.500.11984/5813","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068226511","display_name":"Markel Sainz","orcid":"https://orcid.org/0000-0001-9386-549X"},"institutions":[{"id":"https://openalex.org/I162361429","display_name":"Mondragon Unibertsitatea","ror":"https://ror.org/00wvqgd19","country_code":"ES","type":"education","lineage":["https://openalex.org/I162361429"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Markel Sainz","raw_affiliation_strings":["Electronics and Computing Department, Mondragon University, Goiru 2, 20500 Arrasate-Mondrag\u00f3n, Spain"],"affiliations":[{"raw_affiliation_string":"Electronics and Computing Department, Mondragon University, Goiru 2, 20500 Arrasate-Mondrag\u00f3n, Spain","institution_ids":["https://openalex.org/I162361429"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060154154","display_name":"I\u00f1aki Garitano","orcid":"https://orcid.org/0000-0002-0387-9167"},"institutions":[{"id":"https://openalex.org/I162361429","display_name":"Mondragon Unibertsitatea","ror":"https://ror.org/00wvqgd19","country_code":"ES","type":"education","lineage":["https://openalex.org/I162361429"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"I\u00f1aki Garitano","raw_affiliation_strings":["Electronics and Computing Department, Mondragon University, Goiru 2, 20500 Arrasate-Mondrag\u00f3n, Spain"],"affiliations":[{"raw_affiliation_string":"Electronics and Computing Department, Mondragon University, Goiru 2, 20500 Arrasate-Mondrag\u00f3n, Spain","institution_ids":["https://openalex.org/I162361429"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050357792","display_name":"Mikel Iturbe","orcid":"https://orcid.org/0000-0001-9641-5646"},"institutions":[{"id":"https://openalex.org/I162361429","display_name":"Mondragon Unibertsitatea","ror":"https://ror.org/00wvqgd19","country_code":"ES","type":"education","lineage":["https://openalex.org/I162361429"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Mikel Iturbe","raw_affiliation_strings":["Electronics and Computing Department, Mondragon University, Goiru 2, 20500 Arrasate-Mondrag\u00f3n, Spain"],"affiliations":[{"raw_affiliation_string":"Electronics and Computing Department, Mondragon University, Goiru 2, 20500 Arrasate-Mondrag\u00f3n, Spain","institution_ids":["https://openalex.org/I162361429"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011342556","display_name":"Urko Zurutuza","orcid":"https://orcid.org/0000-0003-3720-6048"},"institutions":[{"id":"https://openalex.org/I162361429","display_name":"Mondragon Unibertsitatea","ror":"https://ror.org/00wvqgd19","country_code":"ES","type":"education","lineage":["https://openalex.org/I162361429"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Urko Zurutuza","raw_affiliation_strings":["Electronics and Computing Department, Mondragon University, Goiru 2, 20500 Arrasate-Mondrag\u00f3n, Spain"],"affiliations":[{"raw_affiliation_string":"Electronics and Computing Department, Mondragon University, Goiru 2, 20500 Arrasate-Mondrag\u00f3n, Spain","institution_ids":["https://openalex.org/I162361429"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5068226511"],"corresponding_institution_ids":["https://openalex.org/I162361429"],"apc_list":{"value":4151,"currency":"USD","value_usd":4151},"apc_paid":null,"fwci":1.2971,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.83116902,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"28","issue":"4","first_page":"461","last_page":"472"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.748152494430542},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7332465052604675},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep packet inspection","score":0.6188249588012695},{"id":"https://openalex.org/keywords/internet-control-message-protocol","display_name":"Internet Control Message Protocol","score":0.5935510396957397},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5920312404632568},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5892176032066345},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5725946426391602},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.5213357210159302},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5100527405738831},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.46852371096611023},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4573705494403839},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.4388497769832611},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.18523728847503662},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1526419222354889},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1268249750137329}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.748152494430542},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7332465052604675},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.6188249588012695},{"id":"https://openalex.org/C195219913","wikidata":"https://www.wikidata.org/wiki/Q13162","display_name":"Internet Control Message Protocol","level":3,"score":0.5935510396957397},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5920312404632568},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5892176032066345},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5725946426391602},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.5213357210159302},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5100527405738831},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.46852371096611023},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4573705494403839},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.4388497769832611},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.18523728847503662},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1526419222354889},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1268249750137329},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1093/jigpal/jzz060","is_oa":false,"landing_page_url":"https://doi.org/10.1093/jigpal/jzz060","pdf_url":null,"source":{"id":"https://openalex.org/S2734381524","display_name":"Logic Journal of IGPL","issn_l":"1367-0751","issn":["1367-0751","1368-9894"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Logic Journal of the IGPL","raw_type":"journal-article"},{"id":"pmh:oai:ebiltegia.mondragon.edu:20.500.11984/5813","is_oa":true,"landing_page_url":"https://hdl.handle.net/20.500.11984/5813","pdf_url":null,"source":{"id":"https://openalex.org/S4377196532","display_name":"eRepository Mondragon University (Mondragon University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I162361429","host_organization_name":"Mondragon Unibertsitatea","host_organization_lineage":["https://openalex.org/I162361429"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Logic Journal of the IGPL Vol. 28. N. 4. Pp. 461-472, 2020","raw_type":"info:eu-repo/semantics/acceptedVersion"}],"best_oa_location":{"id":"pmh:oai:ebiltegia.mondragon.edu:20.500.11984/5813","is_oa":true,"landing_page_url":"https://hdl.handle.net/20.500.11984/5813","pdf_url":null,"source":{"id":"https://openalex.org/S4377196532","display_name":"eRepository Mondragon University (Mondragon University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I162361429","host_organization_name":"Mondragon Unibertsitatea","host_organization_lineage":["https://openalex.org/I162361429"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Logic Journal of the IGPL Vol. 28. N. 4. Pp. 461-472, 2020","raw_type":"info:eu-repo/semantics/acceptedVersion"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.550000011920929,"display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G5655332477","display_name":null,"funder_award_id":"INCIBEC-2015-02495","funder_id":"https://openalex.org/F4320327970","funder_display_name":"Instituto Nacional de Ciberseguridad"}],"funders":[{"id":"https://openalex.org/F4320327970","display_name":"Instituto Nacional de Ciberseguridad","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1761369564","https://openalex.org/W1905251226","https://openalex.org/W2001819211","https://openalex.org/W2039148409","https://openalex.org/W2041008854","https://openalex.org/W2117667893","https://openalex.org/W2161630727","https://openalex.org/W2163375756","https://openalex.org/W2169036685","https://openalex.org/W2203584209","https://openalex.org/W2295564429","https://openalex.org/W2415078344","https://openalex.org/W2517020978","https://openalex.org/W2552631155","https://openalex.org/W2558796881","https://openalex.org/W2746082095","https://openalex.org/W2746495981","https://openalex.org/W2777934020","https://openalex.org/W2782735691","https://openalex.org/W3098576337","https://openalex.org/W4232485878","https://openalex.org/W6650969844","https://openalex.org/W6660841709","https://openalex.org/W6730795305","https://openalex.org/W6759532535"],"related_works":["https://openalex.org/W2392196971","https://openalex.org/W2504080848","https://openalex.org/W2354256422","https://openalex.org/W1578823772","https://openalex.org/W1971040605","https://openalex.org/W1523103140","https://openalex.org/W4293863310","https://openalex.org/W2351021960","https://openalex.org/W3160314615","https://openalex.org/W2998351022"],"abstract_inverted_index":{"Abstract":[0],"Specifically":[1],"tailored":[2],"industrial":[3,77],"control":[4],"systems":[5,23],"(ICSs)":[6],"attacks":[7],"are":[8],"becoming":[9],"increasingly":[10],"sophisticated,":[11],"accentuating":[12],"the":[13,37,50,64,70,84,106,122,126,132],"need":[14,133],"of":[15,21,52,73,89,108,125,134],"ICS":[16],"cyber":[17],"security.":[18],"The":[19,100],"nature":[20],"these":[22],"makes":[24],"traditional":[25],"IT":[26],"security":[27,34,80],"measures":[28],"not":[29],"suitable,":[30],"requiring":[31],"expressly":[32],"developed":[33],"countermeasures.":[35],"Within":[36],"past":[38],"decades,":[39],"research":[40,65],"has":[41],"been":[42],"focused":[43],"in":[44,63,76,95,105,136],"network-based":[45],"intrusion":[46,129],"detection":[47,107,130],"systems.":[48],"With":[49],"appearance":[51],"software-defined":[53],"networks":[54,78],"(SDNs),":[55],"new":[56],"opportunities":[57],"and":[58,82,87,111,131],"challenges":[59],"have":[60],"shown":[61],"up":[62,86,103],"community.":[66],"This":[67],"paper":[68],"describes":[69],"potential":[71,123],"benefits":[72],"using":[74],"SDNs":[75],"with":[79],"purposes":[81],"presents":[83],"set":[85,102],"results":[88],"a":[90,96],"pilot":[91],"experiment":[92],"carried":[93],"out":[94],"scaled":[97],"physical":[98],"implementation.":[99],"experimental":[101],"consists":[104],"ICMP":[109],"flood":[110],"packet":[112],"payload":[113],"alteration":[114],"based":[115],"on":[116],"signature":[117],"comparison.":[118],"Results":[119],"point":[120],"to":[121],"viability":[124],"technology":[127],"for":[128],"researching":[135],"architectural":[137],"scalability.":[138]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2020-01-10T00:00:00"}
