{"id":"https://openalex.org/W4301693540","doi":"https://doi.org/10.1109/csr54599.2022.9850304","title":"Policy-Based Profiles for Network Intrusion Response Systems","display_name":"Policy-Based Profiles for Network Intrusion Response Systems","publication_year":2022,"publication_date":"2022-07-27","ids":{"openalex":"https://openalex.org/W4301693540","doi":"https://doi.org/10.1109/csr54599.2022.9850304"},"language":"en","primary_location":{"id":"doi:10.1109/csr54599.2022.9850304","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr54599.2022.9850304","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://pureadmin.qub.ac.uk/ws/files/355774908/Policy_Based_Profiles_for_Network_Intrusion_Response_Systems.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051667196","display_name":"Kieran Hughes","orcid":"https://orcid.org/0000-0002-8265-5558"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Kieran Hughes","raw_affiliation_strings":["Queen&#x2019;s University,Centre for Secure Information Technologies,Belfast"],"affiliations":[{"raw_affiliation_string":"Queen&#x2019;s University,Centre for Secure Information Technologies,Belfast","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027789250","display_name":"Kieran McLaughlin","orcid":"https://orcid.org/0000-0002-1299-2364"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Kieran McLaughlin","raw_affiliation_strings":["Queen&#x2019;s University,Centre for Secure Information Technologies,Belfast"],"affiliations":[{"raw_affiliation_string":"Queen&#x2019;s University,Centre for Secure Information Technologies,Belfast","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103745938","display_name":"Sakir Sezer","orcid":null},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Sakir Sezer","raw_affiliation_strings":["Queen&#x2019;s University,Centre for Secure Information Technologies,Belfast"],"affiliations":[{"raw_affiliation_string":"Queen&#x2019;s University,Centre for Secure Information Technologies,Belfast","institution_ids":["https://openalex.org/I126231945"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5051667196"],"corresponding_institution_ids":["https://openalex.org/I126231945"],"apc_list":null,"apc_paid":null,"fwci":0.7119,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.72138507,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"279","last_page":"286"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.7977007031440735},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7164937257766724},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7103228569030762},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.6429886817932129},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5978108048439026},{"id":"https://openalex.org/keywords/incident-response","display_name":"Incident response","score":0.5447614192962646},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5361383557319641},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.4925597310066223},{"id":"https://openalex.org/keywords/response-time","display_name":"Response time","score":0.4815436005592346},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.24897906184196472},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17810049653053284},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10196518898010254}],"concepts":[{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.7977007031440735},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7164937257766724},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7103228569030762},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.6429886817932129},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5978108048439026},{"id":"https://openalex.org/C2985105721","wikidata":"https://www.wikidata.org/wiki/Q13479512","display_name":"Incident response","level":2,"score":0.5447614192962646},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5361383557319641},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.4925597310066223},{"id":"https://openalex.org/C19012869","wikidata":"https://www.wikidata.org/wiki/Q578372","display_name":"Response time","level":2,"score":0.4815436005592346},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.24897906184196472},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17810049653053284},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10196518898010254},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/csr54599.2022.9850304","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr54599.2022.9850304","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.qub.ac.uk/portal:openaire/129dec80-a4a5-495b-8288-568cb2c6e27d","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/129dec80-a4a5-495b-8288-568cb2c6e27d","pdf_url":"https://pureadmin.qub.ac.uk/ws/files/355774908/Policy_Based_Profiles_for_Network_Intrusion_Response_Systems.pdf","source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Hughes, K, McLaughlin, K & Sezer, S 2022, Policy-based profiles for network intrusion response systems. in Proceedings of the IEEE International Conference on Cyber Security and Resilience, IEEE CSR 2022. Institute of Electrical and Electronics Engineers Inc., 2022 IEEE International Conference on Cyber Security and Resilience, Rhodes, Greece, 27/07/2022. https://doi.org/10.1109/CSR54599.2022.9850304","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":{"id":"pmh:oai:pure.qub.ac.uk/portal:openaire/129dec80-a4a5-495b-8288-568cb2c6e27d","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/129dec80-a4a5-495b-8288-568cb2c6e27d","pdf_url":"https://pureadmin.qub.ac.uk/ws/files/355774908/Policy_Based_Profiles_for_Network_Intrusion_Response_Systems.pdf","source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Hughes, K, McLaughlin, K & Sezer, S 2022, Policy-based profiles for network intrusion response systems. in Proceedings of the IEEE International Conference on Cyber Security and Resilience, IEEE CSR 2022. Institute of Electrical and Electronics Engineers Inc., 2022 IEEE International Conference on Cyber Security and Resilience, Rhodes, Greece, 27/07/2022. https://doi.org/10.1109/CSR54599.2022.9850304","raw_type":"info:eu-repo/semantics/conferenceObject"},"sustainable_development_goals":[{"score":0.5099999904632568,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G2241406505","display_name":null,"funder_award_id":"EP/R007187/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G5334834590","display_name":null,"funder_award_id":"EP/H049606/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G5445011987","display_name":null,"funder_award_id":"EP/K004379/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G6577499357","display_name":null,"funder_award_id":"EP/N508664/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G745166385","display_name":null,"funder_award_id":"EP/G034303/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4301693540.pdf","grobid_xml":"https://content.openalex.org/works/W4301693540.grobid-xml"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W41554520","https://openalex.org/W2010001505","https://openalex.org/W2120839938","https://openalex.org/W2460941602","https://openalex.org/W2617200927","https://openalex.org/W2736601468","https://openalex.org/W3012637289","https://openalex.org/W3047809460","https://openalex.org/W3049277169","https://openalex.org/W3083463474","https://openalex.org/W3093410479","https://openalex.org/W4220955296","https://openalex.org/W4236939702","https://openalex.org/W6677916085","https://openalex.org/W6741002519","https://openalex.org/W6781722284"],"related_works":["https://openalex.org/W2133389611","https://openalex.org/W2038889839","https://openalex.org/W2030818986","https://openalex.org/W2021573540","https://openalex.org/W2401796238","https://openalex.org/W1973858469","https://openalex.org/W4214609031","https://openalex.org/W2053064295","https://openalex.org/W2383981325","https://openalex.org/W2788860176"],"abstract_inverted_index":{"Attacks":[0],"on":[1,51,105,222],"computer":[2],"networks":[3,196],"are":[4,21,69,87],"increasingly":[5],"common,":[6],"often":[7,44,93],"leading":[8],"to":[9,15,30,33,46,63,71,90,116,140,155,171,220,225],"severe":[10],"economical":[11],"and":[12,54,61,79,192,200],"reputational":[13],"damage":[14],"organisations.":[16],"Subsequently,":[17],"Intrusion":[18,37,41],"Response":[19,42,74,120,169,176,233],"Systems":[20,43],"recently":[22],"an":[23],"active":[24],"area":[25,195],"of":[26,98,113,159,168,179,190,215],"research":[27],"which":[28,76,162],"seek":[29,45],"automatically":[31],"respond":[32],"alerts":[34],"generated":[35],"by":[36,95],"Detection":[38],"Systems.":[39],"Current":[40],"find":[47],"optimal":[48],"responses":[49],"based":[50],"a":[52,114,125,128,134,142,150,185,203,216],"general":[53],"balanced":[55],"policy":[56,137],"such":[57],"as":[58],"the":[59,64,91,96,102,157,166,180,213],"cost":[60],"benefit":[62],"network":[65,115],"overall.":[66],"However,":[67],"organisations":[68],"encouraged":[70],"prepare":[72],"Incident":[73,119,175],"Policies,":[75,121],"outline":[77],"prioritisations":[78],"performance":[80],"measures":[81],"for":[82,110,122],"their":[83,232],"response.":[84],"These":[85],"policies":[86],"highly":[88],"individualised":[89],"organisation,":[92],"influenced":[94],"type":[97],"data":[99],"present":[100],"within":[101],"network.":[103],"Building":[104],"this":[106,146],"it":[107],"is":[108,182],"possible":[109],"several":[111],"subsections":[112],"have":[117,133],"differing":[118,174],"example":[123],"in":[124,138,163,184,209,229],"Cyber-Physical":[126,186],"network,":[127],"Control":[129],"Area":[130],"Network":[131],"may":[132],"much":[135],"stricter":[136],"order":[139],"preserve":[141],"physical":[143],"process.":[144],"In":[145],"work":[147],"we":[148],"utilise":[149],"Deep":[151],"Reinforcement":[152,217],"Learning":[153,218],"approach":[154],"allow":[156],"customisation":[158],"Reward":[160],"Functions":[161],"turn":[164],"facilitates":[165],"creation":[167],"Profiles":[170,181],"align":[172],"with":[173,202,231],"Policies.":[177],"Evaluation":[178],"performed":[183],"System":[187],"testbed":[188],"consisting":[189],"Web":[191],"Business":[193],"local":[194],"configured":[197],"using":[198],"Mininet":[199],"integrated":[201],"Tennessee":[204],"Eastman":[205],"Process":[206],"plant":[207],"running":[208],"Matlab.":[210],"Experimentation":[211],"demonstrates":[212],"ability":[214],"Agent":[219],"converge":[221],"near-optimal":[223],"response":[224],"multi-stage":[226],"attack":[227],"scenarios":[228],"accordance":[230],"Profile.":[234]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3}],"updated_date":"2026-03-16T09:10:04.655348","created_date":"2025-10-10T00:00:00"}
