{"id":"https://openalex.org/W3011882086","doi":"https://doi.org/10.1109/aiccsa47632.2019.9035263","title":"Fuzzy Logic Based Intrusion Detection System as a Service for Malicious Port Scanning Traffic Detection","display_name":"Fuzzy Logic Based Intrusion Detection System as a Service for Malicious Port Scanning Traffic Detection","publication_year":2019,"publication_date":"2019-11-01","ids":{"openalex":"https://openalex.org/W3011882086","doi":"https://doi.org/10.1109/aiccsa47632.2019.9035263","mag":"3011882086"},"language":"en","primary_location":{"id":"doi:10.1109/aiccsa47632.2019.9035263","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa47632.2019.9035263","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006845093","display_name":"Firas Saidi","orcid":null},"institutions":[{"id":"https://openalex.org/I83259278","display_name":"Manouba University","ror":"https://ror.org/0503ejf32","country_code":"TN","type":"education","lineage":["https://openalex.org/I83259278"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Firas Saidi","raw_affiliation_strings":["National School of Computer Sciences, RIADI Laboratory Campus of La Manouba Tunisia"],"affiliations":[{"raw_affiliation_string":"National School of Computer Sciences, RIADI Laboratory Campus of La Manouba Tunisia","institution_ids":["https://openalex.org/I83259278"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011728448","display_name":"Zouheir Trabelsi","orcid":"https://orcid.org/0000-0001-8686-8975"},"institutions":[{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Zouheir Trabelsi","raw_affiliation_strings":["College of Information Technology, UAE University"],"affiliations":[{"raw_affiliation_string":"College of Information Technology, UAE University","institution_ids":["https://openalex.org/I201726411"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008715927","display_name":"Henda Ben Ghazela","orcid":null},"institutions":[{"id":"https://openalex.org/I83259278","display_name":"Manouba University","ror":"https://ror.org/0503ejf32","country_code":"TN","type":"education","lineage":["https://openalex.org/I83259278"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Henda Ben Ghazela","raw_affiliation_strings":["National School of Computer Sciences, RIADI Laboratory Campus of La Manouba Tunisia"],"affiliations":[{"raw_affiliation_string":"National School of Computer Sciences, RIADI Laboratory Campus of La Manouba Tunisia","institution_ids":["https://openalex.org/I83259278"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5006845093"],"corresponding_institution_ids":["https://openalex.org/I83259278"],"apc_list":null,"apc_paid":null,"fwci":0.5306,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.71148163,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"99","issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7545233964920044},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7181490659713745},{"id":"https://openalex.org/keywords/port","display_name":"Port (circuit theory)","score":0.6260433197021484},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.5206372141838074},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4990408420562744},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.48381537199020386},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4254000782966614},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.42503345012664795},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1677258014678955},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.15925315022468567},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14612790942192078}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7545233964920044},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7181490659713745},{"id":"https://openalex.org/C32802771","wikidata":"https://www.wikidata.org/wiki/Q2443617","display_name":"Port (circuit theory)","level":2,"score":0.6260433197021484},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.5206372141838074},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4990408420562744},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.48381537199020386},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4254000782966614},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.42503345012664795},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1677258014678955},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15925315022468567},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14612790942192078},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/aiccsa47632.2019.9035263","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa47632.2019.9035263","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5899999737739563,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W23400448","https://openalex.org/W1674877186","https://openalex.org/W1964549039","https://openalex.org/W1964757918","https://openalex.org/W1966809779","https://openalex.org/W2030949032","https://openalex.org/W2034717363","https://openalex.org/W2036736235","https://openalex.org/W2063527411","https://openalex.org/W2121515170","https://openalex.org/W2139669429","https://openalex.org/W2153676086","https://openalex.org/W2170924378","https://openalex.org/W2491304407","https://openalex.org/W2503352773","https://openalex.org/W2746282326","https://openalex.org/W2747994176","https://openalex.org/W6637096788","https://openalex.org/W6659575672"],"related_works":["https://openalex.org/W4244478748","https://openalex.org/W2092530219","https://openalex.org/W2388464034","https://openalex.org/W4223488648","https://openalex.org/W2533125852","https://openalex.org/W2140460949","https://openalex.org/W2134969820","https://openalex.org/W2251605416","https://openalex.org/W2560439919","https://openalex.org/W4389340727"],"abstract_inverted_index":{"Port":[0,123],"scanning":[1,76,141,156],"is":[2,51,97,132],"a":[3,73,98,102],"cyber-network":[4],"attack":[5],"allows":[6],"cyber":[7,109],"terrorists":[8],"to":[9,24,31,52,112,134,159],"gather":[10],"valuable":[11],"information":[12,65],"about":[13],"target":[14],"hosts":[15],"namely":[16],"defense,":[17],"governmental":[18],"and":[19,41,55,63,89,108,136,144,161],"banks":[20],"servers":[21],"by":[22],"trying":[23],"identify":[25,138],"instantly":[26],"open":[27],"ports,":[28],"which":[29,84,104],"correspond":[30],"specific":[32],"services":[33],"on":[34,80],"the":[35,90,117,122,147,150,162],"cloud,":[36],"such":[37],"as":[38,101],"HTTP,":[39],"DNS,":[40],"email.":[42],"The":[43,94],"basic":[44],"role":[45],"of":[46,149],"Intrusion":[47],"Detection":[48],"Systems":[49],"(IDSs)":[50],"monitor":[53],"networks":[54],"systems":[56],"for":[57],"malicious":[58,139],"activities,":[59],"policy":[60],"violations":[61],"attacks":[62],"unauthorized":[64],"gathering":[66],"activities.":[67,142],"In":[68],"this":[69],"paper,":[70],"we":[71],"proposed":[72,95,151],"TCP":[74],"port":[75,140,155],"detection":[77,157],"framework,":[78],"based":[79],"fuzzy":[81,86],"logic":[82],"controller,":[83],"uses":[85],"rules":[87],"base":[88],"Mamdani":[91],"inference":[92],"method.":[93],"platform":[96],"Fuzzy":[99],"IDS":[100,164],"Service,":[103],"enables":[105],"network":[106,118],"administrators":[107],"security":[110],"specialists":[111],"follow":[113],"in":[114,153],"real":[115],"time":[116],"traffic":[119],"behavior,":[120],"i.e.,":[121],"Scanning":[124],"Criticity":[125],"Level":[126],"(PSCL).":[127],"A":[128],"SaaS":[129],"dynamic":[130],"dashboard":[131],"implemented":[133],"quickly":[135],"efficiently":[137],"Experimentations":[143],"evaluations":[145],"showed":[146],"efficiency":[148],"system":[152],"multilevel":[154],"compared":[158],"Snort":[160],"related":[163],"systems.":[165]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
