{"id":"https://openalex.org/W2980004293","doi":"https://doi.org/10.1109/fuzz-ieee.2019.8858999","title":"D-FRI-CiscoFirewall: Dynamic Fuzzy Rule Interpolation for Cisco ASA Firewall","display_name":"D-FRI-CiscoFirewall: Dynamic Fuzzy Rule Interpolation for Cisco ASA Firewall","publication_year":2019,"publication_date":"2019-06-01","ids":{"openalex":"https://openalex.org/W2980004293","doi":"https://doi.org/10.1109/fuzz-ieee.2019.8858999","mag":"2980004293"},"language":"en","primary_location":{"id":"doi:10.1109/fuzz-ieee.2019.8858999","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fuzz-ieee.2019.8858999","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://pure.aber.ac.uk/portal/en/publications/dfriciscofirewall(170c7729-18cb-4fb4-81fc-4e6aecfb75e6).html","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089628794","display_name":"Nitin Naik","orcid":"https://orcid.org/0000-0002-0659-9646"},"institutions":[{"id":"https://openalex.org/I1340226911","display_name":"Defence Equipment and Support","ror":"https://ror.org/00jztws02","country_code":"GB","type":"government","lineage":["https://openalex.org/I1306956679","https://openalex.org/I1340226911","https://openalex.org/I2802373619"]},{"id":"https://openalex.org/I1306956679","display_name":"Ministry of Defence","ror":"https://ror.org/01bvxzn29","country_code":"GB","type":"government","lineage":["https://openalex.org/I1306956679","https://openalex.org/I2802373619"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Nitin Naik","raw_affiliation_strings":["Defence School of Communications and Information Systems, Ministry of Defence, UK"],"affiliations":[{"raw_affiliation_string":"Defence School of Communications and Information Systems, Ministry of Defence, UK","institution_ids":["https://openalex.org/I1340226911","https://openalex.org/I1306956679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039652471","display_name":"Changjing Shang","orcid":"https://orcid.org/0000-0001-6375-6276"},"institutions":[{"id":"https://openalex.org/I16038530","display_name":"Aberystwyth University","ror":"https://ror.org/015m2p889","country_code":"GB","type":"education","lineage":["https://openalex.org/I16038530"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Changjing Shang","raw_affiliation_strings":["Dept. of Computer Science, Aberystwyth University, UK"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science, Aberystwyth University, UK","institution_ids":["https://openalex.org/I16038530"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036010787","display_name":"Qiang Shen","orcid":"https://orcid.org/0000-0001-9333-4605"},"institutions":[{"id":"https://openalex.org/I16038530","display_name":"Aberystwyth University","ror":"https://ror.org/015m2p889","country_code":"GB","type":"education","lineage":["https://openalex.org/I16038530"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Qiang Shen","raw_affiliation_strings":["Dept. of Computer Science, Aberystwyth University, UK"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science, Aberystwyth University, UK","institution_ids":["https://openalex.org/I16038530"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064994129","display_name":"Paul Jenkins","orcid":"https://orcid.org/0000-0002-9854-9450"},"institutions":[{"id":"https://openalex.org/I1340226911","display_name":"Defence Equipment and Support","ror":"https://ror.org/00jztws02","country_code":"GB","type":"government","lineage":["https://openalex.org/I1306956679","https://openalex.org/I1340226911","https://openalex.org/I2802373619"]},{"id":"https://openalex.org/I1306956679","display_name":"Ministry of Defence","ror":"https://ror.org/01bvxzn29","country_code":"GB","type":"government","lineage":["https://openalex.org/I1306956679","https://openalex.org/I2802373619"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Paul Jenkins","raw_affiliation_strings":["Defence School of Communications and Information Systems, Ministry of Defence, UK"],"affiliations":[{"raw_affiliation_string":"Defence School of Communications and Information Systems, Ministry of Defence, UK","institution_ids":["https://openalex.org/I1340226911","https://openalex.org/I1306956679"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5089628794"],"corresponding_institution_ids":["https://openalex.org/I1306956679","https://openalex.org/I1340226911"],"apc_list":null,"apc_paid":null,"fwci":0.8842,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.77187033,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.8391091227531433},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8013659715652466},{"id":"https://openalex.org/keywords/fuzzy-rule","display_name":"Fuzzy rule","score":0.5605167150497437},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5564664006233215},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.5327000617980957},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5320229530334473},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5023624897003174},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.383450984954834},{"id":"https://openalex.org/keywords/fuzzy-control-system","display_name":"Fuzzy control system","score":0.2785501182079315},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2514306306838989},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.19495025277137756}],"concepts":[{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.8391091227531433},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8013659715652466},{"id":"https://openalex.org/C2780049643","wikidata":"https://www.wikidata.org/wiki/Q5511139","display_name":"Fuzzy rule","level":4,"score":0.5605167150497437},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5564664006233215},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.5327000617980957},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5320229530334473},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5023624897003174},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.383450984954834},{"id":"https://openalex.org/C195975749","wikidata":"https://www.wikidata.org/wiki/Q1475705","display_name":"Fuzzy control system","level":3,"score":0.2785501182079315},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2514306306838989},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.19495025277137756},{"id":"https://openalex.org/C104062141","wikidata":"https://www.wikidata.org/wiki/Q2601295","display_name":"Extremal black hole","level":3,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/fuzz-ieee.2019.8858999","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fuzz-ieee.2019.8858999","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","raw_type":"proceedings-article"},{"id":"pmh:oai:aber.ac.uk:publications/170c7729-18cb-4fb4-81fc-4e6aecfb75e6","is_oa":true,"landing_page_url":"https://pure.aber.ac.uk/portal/en/publications/dfriciscofirewall(170c7729-18cb-4fb4-81fc-4e6aecfb75e6).html","pdf_url":null,"source":{"id":"https://openalex.org/S4306401660","display_name":"Aberystwyth Research portal (Aberystwyth University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I16038530","host_organization_name":"Aberystwyth University","host_organization_lineage":["https://openalex.org/I16038530"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":{"id":"pmh:oai:aber.ac.uk:publications/170c7729-18cb-4fb4-81fc-4e6aecfb75e6","is_oa":true,"landing_page_url":"https://pure.aber.ac.uk/portal/en/publications/dfriciscofirewall(170c7729-18cb-4fb4-81fc-4e6aecfb75e6).html","pdf_url":null,"source":{"id":"https://openalex.org/S4306401660","display_name":"Aberystwyth Research portal (Aberystwyth University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I16038530","host_organization_name":"Aberystwyth University","host_organization_lineage":["https://openalex.org/I16038530"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.41999998688697815,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W142476452","https://openalex.org/W1974030435","https://openalex.org/W1990999691","https://openalex.org/W1992176519","https://openalex.org/W1995077566","https://openalex.org/W2063943005","https://openalex.org/W2122475393","https://openalex.org/W2177837262","https://openalex.org/W2549446373","https://openalex.org/W2746282326","https://openalex.org/W2747994176","https://openalex.org/W2780698577","https://openalex.org/W2794184634","https://openalex.org/W2897156262","https://openalex.org/W2907840713","https://openalex.org/W2913412946","https://openalex.org/W4249749961","https://openalex.org/W4300014214"],"related_works":["https://openalex.org/W2515419187","https://openalex.org/W2077352188","https://openalex.org/W2507130582","https://openalex.org/W4399793156","https://openalex.org/W2009238965","https://openalex.org/W2373690040","https://openalex.org/W2357071520","https://openalex.org/W2366078844","https://openalex.org/W2373857385","https://openalex.org/W2353277512"],"abstract_inverted_index":{"Dynamic":[0],"fuzzy":[1,11,16],"rule":[2,17,32,244],"interpolation":[3,18],"(D-FRI)":[4],"enhances":[5],"the":[6,67,101,108,142,149,200,204,213,236,239],"accuracy":[7],"of":[8,90,96,103,110,120,144,187,216,241],"sparse":[9],"rule-based":[10],"reasoning":[12],"via":[13],"efficiently":[14],"exploiting":[15],"to":[19,24,58,69,124,140,172,208,223],"produce":[20],"dynamic":[21,31,243],"rules.":[22],"Owing":[23],"its":[25],"adaptive":[26,74],"nature":[27],"in":[28,185],"delivering":[29],"a":[30,94,104,117,132,161,179,183,242],"base,":[33,245],"it":[34],"is":[35,47,88,131,138,221,256],"particularly":[36],"useful":[37],"for":[38,76,147,191],"those":[39],"systems":[40],"which":[41],"experience":[42],"frequent":[43,52],"changes.":[44],"Network":[45],"security":[46,126,174,218,226],"one":[48],"such":[49],"area":[50],"where":[51],"changes":[53],"are":[54,232],"quite":[55],"likely":[56],"due":[57],"changing":[59,248],"network":[60,78,105,249],"conditions":[61,250],"and":[62,73,92,106,220,251],"traffic.":[63],"Thus,":[64],"D-FRI":[65],"has":[66],"potential":[68],"offer":[70],"an":[71,170],"optimised":[72],"approach":[75,201,237],"improving":[77],"security.":[79],"The":[80],"popular":[81],"Cisco":[82,192],"Adaptive":[83],"Security":[84],"Appliance":[85],"(ASA)":[86],"Firewall":[87],"capable":[89],"monitoring":[91],"alerting":[93,148],"range":[95],"common":[97],"threats,":[98],"by":[99,160,258],"baselining":[100],"traffic":[102,252],"analysing":[107],"statistics":[109],"dropped":[111],"packets.":[112],"An":[113],"ASA":[114,193],"process":[115,206],"yields":[116],"large":[118],"volume":[119],"statistical":[121],"information":[122,146],"relating":[123],"certain":[125],"events.":[127],"Yet,":[128],"threat":[129,189,197],"detection":[130,190,198,205],"rudimentary":[133],"function":[134],"since":[135],"additional":[136],"intelligence":[137],"required":[139],"automate":[141],"extraction":[143],"meaningful":[145],"users.":[150],"This":[151,176],"could":[152],"be":[153],"achieved":[154],"using":[155],"expensive":[156],"automated":[157,188],"tools":[158],"offered":[159],"third":[162],"party,":[163],"but":[164],"doing":[165],"so":[166],"may":[167],"unnecessarily":[168],"expose":[169],"organisation":[171],"other":[173],"threats.":[175],"paper":[177],"takes":[178],"different":[180],"approach,":[181],"presenting":[182],"DFRI-CiscoFirewall":[184],"support":[186],"Firewall.":[194],"Through":[195],"utilising":[196],"statistics,":[199],"can":[202],"customise":[203],"according":[207],"organisational":[209],"requirements.":[210],"It":[211],"performs":[212],"relative":[214],"analysis":[215],"prioritised":[217],"events":[219],"able":[222],"predict":[224],"comprehensive":[225],"situations":[227],"while":[228],"no":[229],"matching":[230],"rules":[231],"available.":[233],"In":[234],"particular,":[235],"supports":[238],"creation":[240],"derived":[246],"from":[247],"density.":[253],"Its":[254],"efficacy":[255],"demonstrated":[257],"experimental":[259],"evaluations.":[260]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
