{"id":"https://openalex.org/W2140317566","doi":"https://doi.org/10.1109/icitst.2009.5402616","title":"Applying semantic web and user behavior analysis to enforce the intrusion detection system","display_name":"Applying semantic web and user behavior analysis to enforce the intrusion detection system","publication_year":2009,"publication_date":"2009-11-01","ids":{"openalex":"https://openalex.org/W2140317566","doi":"https://doi.org/10.1109/icitst.2009.5402616","mag":"2140317566"},"language":"en","primary_location":{"id":"doi:10.1109/icitst.2009.5402616","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2009.5402616","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081527878","display_name":"Yu-Wei Chan","orcid":"https://orcid.org/0000-0003-1455-7806"},"institutions":[{"id":"https://openalex.org/I70844379","display_name":"Wessex Institute of Technology","ror":"https://ror.org/01thz0w07","country_code":"GB","type":"education","lineage":["https://openalex.org/I70844379"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Y.-T.F. Chan","raw_affiliation_strings":["Wessex Institute of Technology, UK"],"affiliations":[{"raw_affiliation_string":"Wessex Institute of Technology, UK","institution_ids":["https://openalex.org/I70844379"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103357718","display_name":"Charles A. Shoniregun","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"C.A. Shoniregun","raw_affiliation_strings":["Infonomics Society, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Infonomics Society, United Kingdom","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084319604","display_name":"Galyna Akmayeva","orcid":null},"institutions":[{"id":"https://openalex.org/I145019703","display_name":"Al-Zaytoonah University of Jordan","ror":"https://ror.org/04a5b0p13","country_code":"JO","type":"education","lineage":["https://openalex.org/I145019703"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"G.A. Akmayeva","raw_affiliation_strings":["Al-Zaytoonah University, Jordan"],"affiliations":[{"raw_affiliation_string":"Al-Zaytoonah University, Jordan","institution_ids":["https://openalex.org/I145019703"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111887386","display_name":"Ali Al-Dahoud","orcid":null},"institutions":[{"id":"https://openalex.org/I145019703","display_name":"Al-Zaytoonah University of Jordan","ror":"https://ror.org/04a5b0p13","country_code":"JO","type":"education","lineage":["https://openalex.org/I145019703"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"A. Al-Dahoud","raw_affiliation_strings":["Al-Zaytoonah University, Jordan"],"affiliations":[{"raw_affiliation_string":"Al-Zaytoonah University, Jordan","institution_ids":["https://openalex.org/I145019703"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5081527878"],"corresponding_institution_ids":["https://openalex.org/I70844379"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.19398047,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12016","display_name":"Web Data Mining and Analysis","score":0.9901000261306763,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cross-site-scripting","display_name":"Cross-site scripting","score":0.8708749413490295},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8447346091270447},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6290218234062195},{"id":"https://openalex.org/keywords/web-service","display_name":"Web service","score":0.56265789270401},{"id":"https://openalex.org/keywords/scripting-language","display_name":"Scripting language","score":0.5396938323974609},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5313746333122253},{"id":"https://openalex.org/keywords/sql-injection","display_name":"SQL injection","score":0.49493759870529175},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4666447937488556},{"id":"https://openalex.org/keywords/host-based-intrusion-detection-system","display_name":"Host-based intrusion detection system","score":0.4199870824813843},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.3864072561264038},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3848744332790375},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.20863410830497742},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09728461503982544},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.08036297559738159},{"id":"https://openalex.org/keywords/search-engine","display_name":"Search engine","score":0.07889437675476074}],"concepts":[{"id":"https://openalex.org/C39569185","wikidata":"https://www.wikidata.org/wiki/Q371199","display_name":"Cross-site scripting","level":5,"score":0.8708749413490295},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8447346091270447},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6290218234062195},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.56265789270401},{"id":"https://openalex.org/C61423126","wikidata":"https://www.wikidata.org/wiki/Q187432","display_name":"Scripting language","level":2,"score":0.5396938323974609},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5313746333122253},{"id":"https://openalex.org/C150451098","wikidata":"https://www.wikidata.org/wiki/Q506059","display_name":"SQL injection","level":5,"score":0.49493759870529175},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4666447937488556},{"id":"https://openalex.org/C90936777","wikidata":"https://www.wikidata.org/wiki/Q917189","display_name":"Host-based intrusion detection system","level":4,"score":0.4199870824813843},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.3864072561264038},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3848744332790375},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.20863410830497742},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09728461503982544},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.08036297559738159},{"id":"https://openalex.org/C97854310","wikidata":"https://www.wikidata.org/wiki/Q19541","display_name":"Search engine","level":2,"score":0.07889437675476074},{"id":"https://openalex.org/C194222762","wikidata":"https://www.wikidata.org/wiki/Q114486","display_name":"Query by Example","level":4,"score":0.0},{"id":"https://openalex.org/C164120249","wikidata":"https://www.wikidata.org/wiki/Q995982","display_name":"Web search query","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icitst.2009.5402616","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2009.5402616","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1508855726","https://openalex.org/W1548778571","https://openalex.org/W1996869586","https://openalex.org/W2138853912","https://openalex.org/W2162285343"],"related_works":["https://openalex.org/W2955734438","https://openalex.org/W2167752994","https://openalex.org/W2775081089","https://openalex.org/W2504194819","https://openalex.org/W2407701912","https://openalex.org/W4256450364","https://openalex.org/W4238821156","https://openalex.org/W1982746004","https://openalex.org/W4245700610","https://openalex.org/W2791970934"],"abstract_inverted_index":{"The":[0,86],"Web":[1,170],"Service":[2],"has":[3],"been":[4],"extended":[5],"to":[6,30,67,75,84,95,104,167],"the":[7,27,43,49,61,65,68,78,92,99,106,112,116,143,158],"back-end":[8],"database.":[9],"In":[10,115,134,157],"this":[11,132],"paper,":[12],"we":[13,161],"propose":[14],"a":[15,55,121],"novel":[16],"method":[17],"of":[18],"user":[19,34,39,56,155,164],"behavior":[20,35,40,165],"analysis":[21],"in":[22,102,131],"semantic":[23],"network.":[24],"We":[25],"use":[26,163],"weight":[28],"value":[29],"analyze":[31],"and":[32,36,81,97,124,148],"record":[33,41,57,66],"then":[37,82],"check":[38],"with":[42,59],"signatures":[44],"which":[45],"are":[46],"generated":[47],"by":[48],"Intrusion":[50,72],"Detection":[51],"System":[52],"(IDS).":[53],"If":[54],"matches":[58],"signatures,":[60],"system":[62,93],"will":[63],"pass":[64],"Analysis":[69],"Console":[70],"for":[71],"Database":[73],"(ACID)":[74],"do":[76],"more":[77],"further":[79],"processing":[80],"response":[83],"user.":[85],"ACID":[87],"does":[88],"not":[89,139],"only":[90,140],"help":[91],"administrator":[94],"maintain":[96],"protect":[98],"web":[100],"service":[101],"order":[103],"prevent":[105],"intruders'":[107],"attacking":[108],"but":[109,152],"also":[110,153],"show":[111],"security":[113],"information.":[114],"current":[117],"Internet,":[118],"it":[119,137],"is":[120],"very":[122],"complex":[123],"insecure":[125],"environment.":[126,133],"Everything":[127],"can":[128,138,162],"be":[129],"happened":[130],"our":[135],"solution,":[136],"successfully":[141],"solve":[142],"Cross-Site":[144],"Scripting":[145],"(XSS)":[146],"attack":[147,151],"SQL":[149],"Injection":[150],"understand":[154],"behavior.":[156],"future":[159],"work,":[160],"information":[166],"design":[168],"securer":[169],"service.":[171]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
