{"id":"https://openalex.org/W2950109710","doi":"https://doi.org/10.1109/icc.2019.8761410","title":"BIDS: Bio-Inspired, Collaborative Intrusion Detection for Software Defined Networks","display_name":"BIDS: Bio-Inspired, Collaborative Intrusion Detection for Software Defined Networks","publication_year":2019,"publication_date":"2019-05-01","ids":{"openalex":"https://openalex.org/W2950109710","doi":"https://doi.org/10.1109/icc.2019.8761410","mag":"2950109710"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2019.8761410","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2019.8761410","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078875869","display_name":"Qianru Zhou","orcid":"https://orcid.org/0000-0003-2576-0324"},"institutions":[{"id":"https://openalex.org/I7882870","display_name":"University of Glasgow","ror":"https://ror.org/00vtgdb53","country_code":"GB","type":"education","lineage":["https://openalex.org/I7882870"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Qianru Zhou","raw_affiliation_strings":["School of Computing Science, University of Glasgow, Glasgow, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing Science, University of Glasgow, Glasgow, UK","institution_ids":["https://openalex.org/I7882870"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021350142","display_name":"Dimitrios P. Pezaros","orcid":"https://orcid.org/0000-0003-0939-378X"},"institutions":[{"id":"https://openalex.org/I7882870","display_name":"University of Glasgow","ror":"https://ror.org/00vtgdb53","country_code":"GB","type":"education","lineage":["https://openalex.org/I7882870"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Dimitrios P. Pezaros","raw_affiliation_strings":["School of Computing Science, University of Glasgow, Glasgow, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing Science, University of Glasgow, Glasgow, UK","institution_ids":["https://openalex.org/I7882870"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5078875869"],"corresponding_institution_ids":["https://openalex.org/I7882870"],"apc_list":null,"apc_paid":null,"fwci":0.7074,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.72748624,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.96670001745224,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.96670001745224,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9506000280380249,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9503999948501587,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7570717334747314},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.74629807472229},{"id":"https://openalex.org/keywords/false-positive-rate","display_name":"False positive rate","score":0.6715368032455444},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6285492181777954},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5493655800819397},{"id":"https://openalex.org/keywords/merge","display_name":"Merge (version control)","score":0.47639909386634827},{"id":"https://openalex.org/keywords/artificial-immune-system","display_name":"Artificial immune system","score":0.45298510789871216},{"id":"https://openalex.org/keywords/system-call","display_name":"System call","score":0.4488334357738495},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.43248069286346436},{"id":"https://openalex.org/keywords/anomaly-based-intrusion-detection-system","display_name":"Anomaly-based intrusion detection system","score":0.4282016456127167},{"id":"https://openalex.org/keywords/agile-software-development","display_name":"Agile software development","score":0.4105771780014038},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3898584246635437},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.34636378288269043},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3300366997718811},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.32228994369506836},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.24750149250030518},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.19274848699569702}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7570717334747314},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.74629807472229},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.6715368032455444},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6285492181777954},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5493655800819397},{"id":"https://openalex.org/C197129107","wikidata":"https://www.wikidata.org/wiki/Q1921621","display_name":"Merge (version control)","level":2,"score":0.47639909386634827},{"id":"https://openalex.org/C93768804","wikidata":"https://www.wikidata.org/wiki/Q2518735","display_name":"Artificial immune system","level":2,"score":0.45298510789871216},{"id":"https://openalex.org/C2778579508","wikidata":"https://www.wikidata.org/wiki/Q722192","display_name":"System call","level":2,"score":0.4488334357738495},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.43248069286346436},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.4282016456127167},{"id":"https://openalex.org/C14185376","wikidata":"https://www.wikidata.org/wiki/Q30232","display_name":"Agile software development","level":2,"score":0.4105771780014038},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3898584246635437},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.34636378288269043},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3300366997718811},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.32228994369506836},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.24750149250030518},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.19274848699569702},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.0},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icc.2019.8761410","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2019.8761410","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},{"id":"pmh:oai:eprints.gla.ac.uk:179728","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4210235606","display_name":"ENLIGHTEN (Jurnal Bimbingan dan Konseling Islam)","issn_l":"2622-8912","issn":["2622-8912","2622-8920"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Conference Proceedings"}],"best_oa_location":{"id":"pmh:oai:eprints.gla.ac.uk:179728","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4210235606","display_name":"ENLIGHTEN (Jurnal Bimbingan dan Konseling Islam)","issn_l":"2622-8912","issn":["2622-8912","2622-8920"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Conference Proceedings"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1708471004","display_name":null,"funder_award_id":"EP/N033957/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G5147957557","display_name":null,"funder_award_id":"EP/P004024/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1487207002","https://openalex.org/W1533021960","https://openalex.org/W1583113493","https://openalex.org/W1591480890","https://openalex.org/W2017524370","https://openalex.org/W2058657545","https://openalex.org/W2129624205","https://openalex.org/W2147118406","https://openalex.org/W2290372765","https://openalex.org/W2560162835","https://openalex.org/W2810011736","https://openalex.org/W6629167580","https://openalex.org/W6631743486"],"related_works":["https://openalex.org/W1969635302","https://openalex.org/W2183313954","https://openalex.org/W1832277845","https://openalex.org/W2371941708","https://openalex.org/W840508162","https://openalex.org/W11100131","https://openalex.org/W2484420874","https://openalex.org/W2492588343","https://openalex.org/W2362369752","https://openalex.org/W2019242650"],"abstract_inverted_index":{"With":[0],"network":[1],"attacks":[2,33],"becoming":[3],"more":[4],"sophisticated":[5],"and":[6,11,23,41,71,100,111,131],"unpredictable,":[7],"detecting":[8],"their":[9,13],"onset":[10],"mitigating":[12],"effects":[14],"in":[15,35,75,95,107],"an":[16,92],"automated":[17],"manner":[18],"become":[19],"increasingly":[20],"challenging.":[21],"Lightweight":[22],"agile":[24],"detection":[25,53,78],"mechanisms":[26],"that":[27,126],"are":[28,34,45,164],"able":[29],"to":[30,67,98],"detect":[31],"zero-day":[32],"great":[36],"need.":[37],"High":[38],"true-negative":[39,69,132],"rate":[40,44,70,74,130,133],"low":[42],"false-positive":[43,73,129],"the":[46,60,82,89,96,102,108,113,128,138],"most":[47],"important":[48],"indicators":[49],"for":[50],"a":[51,76],"intrusion":[52,77,115],"system.":[54],"In":[55],"this":[56],"paper,":[57],"we":[58],"exploit":[59],"logically-centralised":[61],"view":[62],"of":[63,91,140],"Software-Defined":[64],"Networking":[65],"(SDN)":[66],"increase":[68],"lower":[72],"system":[79],"based":[80],"on":[81],"Artificial":[83],"Immune":[84],"System":[85],"(AIS).":[86],"We":[87],"propose":[88],"use":[90],"antibody":[93,104,142,159],"fuser":[94],"controller":[97],"merge":[99],"fuse":[101],"mature":[103],"sets":[105,143,160],"trained":[106],"individual":[109],"switches":[110,163],"turn":[112],"real":[114],"records":[116],"each":[117],"switch":[118],"has":[119],"seen":[120],"into":[121,166],"antibodies.":[122],"Our":[123],"results":[124],"show":[125],"both":[127],"experience":[134],"significant":[135],"improvement":[136,153],"with":[137],"number":[139],"local":[141],"fused":[144],"grows,":[145],"consuming":[146],"less":[147],"cpu":[148],"usage":[149],"overhead.":[150],"A":[151],"peak":[152],"can":[154],"reach":[155],"over":[156],"80%":[157],"when":[158],"from":[161],"all":[162],"taken":[165],"consideration.":[167]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3}],"updated_date":"2025-11-25T21:42:39.735039","created_date":"2025-10-10T00:00:00"}
