{"id":"https://openalex.org/W2156089184","doi":"https://doi.org/10.1109/icc.2009.5199341","title":"Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention","display_name":"Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention","publication_year":2009,"publication_date":"2009-06-01","ids":{"openalex":"https://openalex.org/W2156089184","doi":"https://doi.org/10.1109/icc.2009.5199341","mag":"2156089184"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2009.5199341","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2009.5199341","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025915855","display_name":"Khalid Alsubhi","orcid":"https://orcid.org/0000-0001-5617-4198"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"K. Alsubhi","raw_affiliation_strings":["David R. Cheriton School of Computer Science, University of Waterloo, Waterloo, ONT, Canada","David. R. Cheriton Sch. of Comput. Sci., Univ. of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"David R. Cheriton School of Computer Science, University of Waterloo, Waterloo, ONT, Canada","institution_ids":["https://openalex.org/I151746483"]},{"raw_affiliation_string":"David. R. Cheriton Sch. of Comput. Sci., Univ. of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068543136","display_name":"Issam Aib","orcid":null},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"I. Aib","raw_affiliation_strings":["David R. Cheriton School of Computer Science, University of Waterloo, Waterloo, ONT, Canada","David. R. Cheriton Sch. of Comput. Sci., Univ. of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"David R. Cheriton School of Computer Science, University of Waterloo, Waterloo, ONT, Canada","institution_ids":["https://openalex.org/I151746483"]},{"raw_affiliation_string":"David. R. Cheriton Sch. of Comput. Sci., Univ. of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035034365","display_name":"J\u00e9r\u00f4me Fran\u00e7ois","orcid":"https://orcid.org/0000-0002-7457-458X"},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en informatique et en automatique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1326498283"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"J. Francois","raw_affiliation_strings":["MADYNES-INRIA Lorraine, CNRS, Nancy, France"],"affiliations":[{"raw_affiliation_string":"MADYNES-INRIA Lorraine, CNRS, Nancy, France","institution_ids":["https://openalex.org/I1326498283","https://openalex.org/I1294671590"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038723583","display_name":"Raouf Boutaba","orcid":"https://orcid.org/0000-0001-7936-6862"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"R. Boutaba","raw_affiliation_strings":["David R. Cheriton School of Computer Science, University of Waterloo, Waterloo, ONT, Canada","David. R. Cheriton Sch. of Comput. Sci., Univ. of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"David R. Cheriton School of Computer Science, University of Waterloo, Waterloo, ONT, Canada","institution_ids":["https://openalex.org/I151746483"]},{"raw_affiliation_string":"David. R. Cheriton Sch. of Comput. Sci., Univ. of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5025915855"],"corresponding_institution_ids":["https://openalex.org/I151746483"],"apc_list":null,"apc_paid":null,"fwci":2.8971,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.91786294,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"19","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7498347759246826},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7303024530410767},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7258278131484985},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5601708889007568},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.5369583964347839},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.5284298062324524},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.5113720297813416},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.49211376905441284},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.4881382882595062},{"id":"https://openalex.org/keywords/adaptation","display_name":"Adaptation (eye)","score":0.46907371282577515},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.45659196376800537},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.4344669282436371},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4301048219203949},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.14449569582939148}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7498347759246826},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7303024530410767},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7258278131484985},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5601708889007568},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.5369583964347839},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.5284298062324524},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.5113720297813416},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.49211376905441284},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.4881382882595062},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.46907371282577515},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.45659196376800537},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.4344669282436371},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4301048219203949},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.14449569582939148},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/icc.2009.5199341","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2009.5199341","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE International Conference on Communications","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.210.4530","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.210.4530","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.uwaterloo.ca/research/tr/2008/CS-2008-24.pdf","raw_type":"text"},{"id":"pmh:oai:HAL:inria-00443720v1","is_oa":false,"landing_page_url":"https://inria.hal.science/inria-00443720","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"International Conference on Communciations, Jun 2009, Dresde, Germany","raw_type":"Conference papers"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.75}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W594378377","https://openalex.org/W1514368868","https://openalex.org/W1516506771","https://openalex.org/W1563242287","https://openalex.org/W1586466177","https://openalex.org/W1674877186","https://openalex.org/W1989003109","https://openalex.org/W1994212840","https://openalex.org/W1999427165","https://openalex.org/W2055788618","https://openalex.org/W2079162921","https://openalex.org/W2115149820","https://openalex.org/W2160883880","https://openalex.org/W2348102063","https://openalex.org/W2678934292","https://openalex.org/W4285719527","https://openalex.org/W6630780968","https://openalex.org/W6637096788","https://openalex.org/W6704762540","https://openalex.org/W6739612070"],"related_works":["https://openalex.org/W2061466315","https://openalex.org/W2376886931","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W3157271777","https://openalex.org/W2377372927","https://openalex.org/W1495178644"],"abstract_inverted_index":{"Intrusion":[0],"detection":[1,62,196],"and/or":[2],"prevention":[3,64],"systems":[4,51],"(IDPS)":[5],"represent":[6],"an":[7,26,105,133,165],"important":[8],"line":[9],"of":[10,15,25,45,65,81,104,127,132,144,151,161,202],"defense":[11],"against":[12],"the":[13,20,78,90,100,114,123,128,149,176,181,190,200],"variety":[14],"attacks":[16,66],"that":[17],"can":[18,31,37],"compromise":[19],"security":[21,86,96,129,145],"and":[22,36,58,63,99,102,117,125,154,157,180,193],"well":[23],"functioning":[24],"enterprise":[27,106,134],"information":[28,107,135],"system.":[29,108,136],"IDPSes":[30],"be":[32],"network":[33],"or":[34],"host-based":[35],"collaborate":[38],"in":[39],"order":[40],"to":[41,77,92],"provide":[42],"better":[43],"detections":[44],"malicious":[46],"traffic.":[47],"Although":[48],"several":[49,159],"IDPS":[50,179],"have":[52,168],"been":[53,69],"proposed,":[54],"their":[55],"appropriate":[56],"configuration":[57,124],"control":[59,126],"for":[60,116,122],"effective":[61],"has":[67],"always":[68],"far":[70],"from":[71],"trivial.":[72],"Another":[73],"concern":[74],"is":[75,87,139],"related":[76],"slowing":[79],"down":[80],"system":[82,152],"performance":[83,101],"when":[84],"maximum":[85],"applied,":[88],"hence":[89],"need":[91,115],"trade":[93],"off":[94],"between":[95,175],"enforcement":[97,130],"levels":[98,160],"usability":[103],"In":[109],"this":[110],"paper":[111],"we":[112,167],"motivate":[113],"present":[118],"a":[119,170],"policy-based":[120,172],"framework":[121],"mechanisms":[131],"The":[137],"approach":[138],"based":[140,147],"on":[141,148],"dynamic":[142,171],"adaptation":[143,173],"measures":[146],"assessment":[150],"vulnerability":[153],"threat":[155],"prediction":[156],"provides":[158],"attack":[162],"containment.":[163],"As":[164],"application,":[166],"implemented":[169],"mechanism":[174],"Snort":[177],"signature-based":[178],"light":[182],"weight":[183],"anomaly-based":[184],"FireCollaborator":[185],"IDS.":[186],"Experiments":[187],"conducted":[188],"over":[189],"DARPA":[191],"2000":[192],"1999":[194],"intrusion":[195],"evaluation":[197],"datasets":[198],"show":[199],"viability":[201],"our":[203],"framework.":[204]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":3}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
