{"id":"https://openalex.org/W4226070516","doi":"https://doi.org/10.1109/ictas53252.2022.9744643","title":"Autonomous Threat Detection and Response for Self-Protected Networks","display_name":"Autonomous Threat Detection and Response for Self-Protected Networks","publication_year":2022,"publication_date":"2022-03-01","ids":{"openalex":"https://openalex.org/W4226070516","doi":"https://doi.org/10.1109/ictas53252.2022.9744643"},"language":"en","primary_location":{"id":"doi:10.1109/ictas53252.2022.9744643","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ictas53252.2022.9744643","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 Conference on Information Communications Technology and Society (ICTAS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088804960","display_name":"Wessel Havenga","orcid":null},"institutions":[{"id":"https://openalex.org/I869660684","display_name":"University of the Western Cape","ror":"https://ror.org/00h2vm590","country_code":"ZA","type":"education","lineage":["https://openalex.org/I869660684"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Wessel Havenga","raw_affiliation_strings":["University of the Western Cape,Computer Science Department,Cape Town,South Africa","Computer Science Department, University of the Western Cape, Cape Town, South Africa"],"affiliations":[{"raw_affiliation_string":"University of the Western Cape,Computer Science Department,Cape Town,South Africa","institution_ids":["https://openalex.org/I869660684"]},{"raw_affiliation_string":"Computer Science Department, University of the Western Cape, Cape Town, South Africa","institution_ids":["https://openalex.org/I869660684"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063116320","display_name":"Antoine Bagula","orcid":"https://orcid.org/0000-0003-0774-5251"},"institutions":[{"id":"https://openalex.org/I869660684","display_name":"University of the Western Cape","ror":"https://ror.org/00h2vm590","country_code":"ZA","type":"education","lineage":["https://openalex.org/I869660684"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Antoine Bagula","raw_affiliation_strings":["University of the Western Cape,Computer Science Department,Cape Town,South Africa","Computer Science Department, University of the Western Cape, Cape Town, South Africa"],"affiliations":[{"raw_affiliation_string":"University of the Western Cape,Computer Science Department,Cape Town,South Africa","institution_ids":["https://openalex.org/I869660684"]},{"raw_affiliation_string":"Computer Science Department, University of the Western Cape, Cape Town, South Africa","institution_ids":["https://openalex.org/I869660684"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062369632","display_name":"Olasupo Ajayi","orcid":"https://orcid.org/0000-0001-6583-3749"},"institutions":[{"id":"https://openalex.org/I869660684","display_name":"University of the Western Cape","ror":"https://ror.org/00h2vm590","country_code":"ZA","type":"education","lineage":["https://openalex.org/I869660684"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Olasupo Ajayi","raw_affiliation_strings":["University of the Western Cape,Computer Science Department,Cape Town,South Africa","Computer Science Department, University of the Western Cape, Cape Town, South Africa"],"affiliations":[{"raw_affiliation_string":"University of the Western Cape,Computer Science Department,Cape Town,South Africa","institution_ids":["https://openalex.org/I869660684"]},{"raw_affiliation_string":"Computer Science Department, University of the Western Cape, Cape Town, South Africa","institution_ids":["https://openalex.org/I869660684"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5088804960"],"corresponding_institution_ids":["https://openalex.org/I869660684"],"apc_list":null,"apc_paid":null,"fwci":0.2763,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.5416494,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7742928266525269},{"id":"https://openalex.org/keywords/queue","display_name":"Queue","score":0.5620225071907043},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5409775972366333},{"id":"https://openalex.org/keywords/scheduling","display_name":"Scheduling (production processes)","score":0.5345536470413208},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4473348557949066},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.32491636276245117},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3242899477481842},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.18321099877357483},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1319654881954193}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7742928266525269},{"id":"https://openalex.org/C160403385","wikidata":"https://www.wikidata.org/wiki/Q220543","display_name":"Queue","level":2,"score":0.5620225071907043},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5409775972366333},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.5345536470413208},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4473348557949066},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32491636276245117},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3242899477481842},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.18321099877357483},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1319654881954193},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ictas53252.2022.9744643","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ictas53252.2022.9744643","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 Conference on Information Communications Technology and Society (ICTAS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.47999998927116394,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1542658387","https://openalex.org/W2096118443","https://openalex.org/W2101222264","https://openalex.org/W2188999256","https://openalex.org/W2336616775","https://openalex.org/W2555926745","https://openalex.org/W2898712354","https://openalex.org/W3005728198","https://openalex.org/W3006277669","https://openalex.org/W3016591438","https://openalex.org/W3093696244","https://openalex.org/W4245173761","https://openalex.org/W6632646753","https://openalex.org/W6687099872","https://openalex.org/W6703032305","https://openalex.org/W6773826747","https://openalex.org/W6773851987","https://openalex.org/W6775975325"],"related_works":["https://openalex.org/W2357468538","https://openalex.org/W1577110157","https://openalex.org/W2355007334","https://openalex.org/W2390009783","https://openalex.org/W4254602698","https://openalex.org/W2394461323","https://openalex.org/W2349441905","https://openalex.org/W2361044160","https://openalex.org/W1483130311","https://openalex.org/W3120792425"],"abstract_inverted_index":{"Cyber":[0],"security":[1],"defence":[2,37,56,75],"tools":[3],"and":[4,71,81,95,106,148],"methodologies":[5],"constantly":[6],"contend":[7],"with":[8,119,154,174],"ever":[9],"evolving,":[10],"highly":[11],"intelligent":[12,120],"new":[13],"generation":[14],"of":[15,66,73,84,131,163],"threats.":[16,47,129],"The":[17,69,161],"main":[18],"challenges":[19],"posed":[20],"by":[21],"these":[22,45],"modern":[23],"digital":[24],"multi-vector":[25],"attacks":[26],"is":[27,50],"their":[28],"ability":[29],"to":[30,40,62,128,157,165],"adapt.":[31],"Research":[32],"shows":[33],"that":[34,58,135],"many":[35],"existing":[36,74],"systems":[38],"fail":[39],"provide":[41],"adequate":[42],"protection":[43],"against":[44],"latest":[46],"Hence,":[48],"there":[49],"an":[51,102,124],"ever-growing":[52],"need":[53],"for":[54,115,123],"self-learning":[55],"technologies":[57],"can":[59,137],"autonomously":[60],"adjust":[61],"the":[63,79,158,167],"behavioural":[64],"patterns":[65],"malicious":[67,151],"actors.":[68],"accuracy":[70],"effectiveness":[72],"mechanisms":[76],"depend":[77],"on":[78,146],"decisions":[80],"manual":[82],"input":[83],"human":[85],"expert.":[86],"This":[87,99],"dependence":[88],"results":[89],"in":[90,142,178],"administrative":[91],"overheads,":[92],"inconsistencies,":[93],"errors,":[94],"delayed":[96],"response":[97],"time.":[98],"paper":[100],"proposes":[101],"Autonomous":[103],"Threat":[104],"Detection":[105],"Response":[107],"(ATDR)":[108],"system":[109],"which":[110],"combines":[111],"unsupervised":[112],"machine":[113],"learning,":[114],"autonomous":[116],"threat":[117],"detection,":[118],"queue":[121],"management":[122],"effective":[125],"self-organized":[126],"responses":[127],"Results":[130],"conducted":[132],"experiments":[133],"show":[134],"ATDR":[136],"accurately":[138],"classify":[139],"network":[140],"traffic":[141,152,159],"real":[143],"time":[144],"based":[145],"pattern":[147],"effectively":[149],"isolate":[150],"flow":[153],"minimal":[155],"delay":[156],"flow.":[160],"use":[162],"round-robin":[164],"manage":[166],"scheduling":[168],"helps":[169],"reduce":[170],"wait":[171],"time,":[172],"but":[173],"a":[175],"marginal":[176],"increase":[177],"re-scheduling":[179],"frequency.":[180]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
