{"id":"https://openalex.org/W3004298022","doi":"https://doi.org/10.1109/indin41052.2019.8972055","title":"A Multi-Agent Approach for Hybrid Intrusion Detection in Industrial Networks: Design and Implementation","display_name":"A Multi-Agent Approach for Hybrid Intrusion Detection in Industrial Networks: Design and Implementation","publication_year":2019,"publication_date":"2019-07-01","ids":{"openalex":"https://openalex.org/W3004298022","doi":"https://doi.org/10.1109/indin41052.2019.8972055","mag":"3004298022"},"language":"en","primary_location":{"id":"doi:10.1109/indin41052.2019.8972055","is_oa":false,"landing_page_url":"https://doi.org/10.1109/indin41052.2019.8972055","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 17th International Conference on Industrial Informatics (INDIN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087988782","display_name":"Cyntia Vargas Mart\u00ednez","orcid":"https://orcid.org/0000-0002-4809-4304"},"institutions":[{"id":"https://openalex.org/I889804353","display_name":"Robert Bosch (Germany)","ror":"https://ror.org/01fe0jt45","country_code":"DE","type":"company","lineage":["https://openalex.org/I889804353"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Cyntia Vargas Martinez","raw_affiliation_strings":["Bosch Rexroth AG,Lohr am Main,Germany,97816","Bosch Rexroth AG, Lohr am Main, Germany"],"affiliations":[{"raw_affiliation_string":"Bosch Rexroth AG,Lohr am Main,Germany,97816","institution_ids":["https://openalex.org/I889804353"]},{"raw_affiliation_string":"Bosch Rexroth AG, Lohr am Main, Germany","institution_ids":["https://openalex.org/I889804353"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078556090","display_name":"Michael Sollfrank","orcid":"https://orcid.org/0000-0002-6416-7569"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]},{"id":"https://openalex.org/I4210157642","display_name":"Institute of Automation","ror":"https://ror.org/056qj1t15","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210157642","https://openalex.org/I78650965"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Michael Sollfrank","raw_affiliation_strings":["Technical University of Munich,Institute of Automation and Information Systems,Germany","Institute of Automation and Information Systems, Technical University of Munich, Germany"],"affiliations":[{"raw_affiliation_string":"Technical University of Munich,Institute of Automation and Information Systems,Germany","institution_ids":["https://openalex.org/I4210157642","https://openalex.org/I62916508"]},{"raw_affiliation_string":"Institute of Automation and Information Systems, Technical University of Munich, Germany","institution_ids":["https://openalex.org/I4210157642","https://openalex.org/I62916508"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071323487","display_name":"Birgit Vogel\u2010Heuser","orcid":"https://orcid.org/0000-0003-2785-8819"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]},{"id":"https://openalex.org/I4210157642","display_name":"Institute of Automation","ror":"https://ror.org/056qj1t15","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210157642","https://openalex.org/I78650965"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Birgit Vogel-Heuser","raw_affiliation_strings":["Technical University of Munich,Institute of Automation and Information Systems,Germany","Institute of Automation and Information Systems, Technical University of Munich, Germany"],"affiliations":[{"raw_affiliation_string":"Technical University of Munich,Institute of Automation and Information Systems,Germany","institution_ids":["https://openalex.org/I4210157642","https://openalex.org/I62916508"]},{"raw_affiliation_string":"Institute of Automation and Information Systems, Technical University of Munich, Germany","institution_ids":["https://openalex.org/I4210157642","https://openalex.org/I62916508"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5087988782"],"corresponding_institution_ids":["https://openalex.org/I889804353"],"apc_list":null,"apc_paid":null,"fwci":0.7074,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.74839783,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"351","last_page":"357"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7033748030662537},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6884103417396545},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.44577646255493164},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.22865313291549683}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7033748030662537},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6884103417396545},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.44577646255493164},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.22865313291549683}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/indin41052.2019.8972055","is_oa":false,"landing_page_url":"https://doi.org/10.1109/indin41052.2019.8972055","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 17th International Conference on Industrial Informatics (INDIN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5600000023841858,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W19687119","https://openalex.org/W129397930","https://openalex.org/W1202984889","https://openalex.org/W1498729421","https://openalex.org/W1500851093","https://openalex.org/W1516506771","https://openalex.org/W1575376224","https://openalex.org/W1863648891","https://openalex.org/W1903683453","https://openalex.org/W1964839117","https://openalex.org/W1975348168","https://openalex.org/W1989613337","https://openalex.org/W2002639138","https://openalex.org/W2012169431","https://openalex.org/W2012446724","https://openalex.org/W2013627100","https://openalex.org/W2016142693","https://openalex.org/W2024094925","https://openalex.org/W2048382412","https://openalex.org/W2051947635","https://openalex.org/W2052364291","https://openalex.org/W2060479059","https://openalex.org/W2096178388","https://openalex.org/W2119996128","https://openalex.org/W2120838110","https://openalex.org/W2122410182","https://openalex.org/W2160048449","https://openalex.org/W2160841769","https://openalex.org/W2161630727","https://openalex.org/W2278186031","https://openalex.org/W2288292231","https://openalex.org/W2342408547","https://openalex.org/W2344573374","https://openalex.org/W2394912556","https://openalex.org/W2532424365","https://openalex.org/W2536536058","https://openalex.org/W2613480438","https://openalex.org/W2774988683","https://openalex.org/W2964316856","https://openalex.org/W3123632726","https://openalex.org/W6605171766"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W4391913857","https://openalex.org/W2350741829","https://openalex.org/W2530322880"],"abstract_inverted_index":{"The":[0,81,197],"integration":[1],"of":[2,16,83,156,168,185,199],"Network":[3],"Intrusion":[4],"Detection":[5],"Systems":[6,124,187],"(Network":[7],"IDS)":[8],"in":[9,27,182],"industrial":[10],"networks":[11],"has":[12],"improved":[13],"the":[14,92,149,183],"security":[15],"these":[17,84],"systems":[18],"due":[19],"to":[20,23,29,41,51,66,77,91,102,110,119,165,188],"their":[21,35,68,113],"ability":[22],"analyze":[24],"network":[25,43],"traffic":[26],"order":[28],"detect":[30,52],"potential":[31],"system":[32,57,79],"intrusions.":[33],"Unfortunately,":[34],"detection":[36,69,94,144,161],"scope":[37,70],"is":[38,64,98,107,118,154,202],"often":[39],"limited":[40],"strategical":[42],"locations":[44,58],"and":[45,116,192],"may":[46],"therefore":[47],"not":[48,99],"be":[49,120],"capable":[50],"intrusions":[53],"occurring":[54],"at":[55],"other":[56,78],"(e.g.,":[59],"specific":[60],"devices).":[61],"Hence,":[62],"it":[63,97,106],"necessary":[65,101],"increase":[67],"by":[71],"further":[72],"analyzing":[73],"additional":[74],"information":[75,86],"pertaining":[76],"components.":[80],"introduction":[82],"new":[85],"sources":[87],"adds":[88],"more":[89],"complexity":[90],"intrusion":[93,143,160],"problem,":[95],"as":[96],"only":[100],"identify":[103],"them,":[104],"but":[105],"also":[108,176],"required":[109],"define":[111],"how":[112],"authentication,":[114],"capture":[115],"analysis":[117],"carried":[121],"out.":[122],"Multi-Agent":[123,186],"are":[125],"an":[126],"architectural":[127],"paradigm":[128],"that":[129,145],"can":[130],"deal":[131],"with":[132],"such":[133],"complexity.":[134],"This":[135,152],"paper":[136],"presents":[137],"a":[138,157,166,205],"multi-agent":[139,158],"approach":[140,153,201],"for":[141],"hybrid":[142,159],"takes":[146,177],"into":[147,178],"consideration":[148,179],"aforementioned":[150],"challenges.":[151],"comprised":[155],"architecture":[162],"designed":[163],"according":[164],"set":[167],"properties.":[169],"These":[170],"properties":[171],"consider":[172],"IDS-specific":[173],"requirements.":[174],"It":[175],"current":[180],"trends":[181],"field":[184],"provide":[189],"security,":[190],"scalability":[191],"adaptability":[193],"across":[194],"multiple":[195],"systems.":[196],"feasibility":[198],"this":[200],"validated":[203],"through":[204],"prototypical":[206],"implementation.":[207]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
