{"id":"https://openalex.org/W2765210755","doi":"https://doi.org/10.1109/isncc.2017.8071990","title":"A real-time risk assessment model for intrusion detection systems","display_name":"A real-time risk assessment model for intrusion detection systems","publication_year":2017,"publication_date":"2017-05-01","ids":{"openalex":"https://openalex.org/W2765210755","doi":"https://doi.org/10.1109/isncc.2017.8071990","mag":"2765210755"},"language":"en","primary_location":{"id":"doi:10.1109/isncc.2017.8071990","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isncc.2017.8071990","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045372841","display_name":"El Mostapha Chakir","orcid":"https://orcid.org/0000-0001-7944-6344"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"El Mostapha Chakir","raw_affiliation_strings":["Mobility and Modeling IR2M, Laboratory of Computer Networks, Settat, Morocco"],"affiliations":[{"raw_affiliation_string":"Mobility and Modeling IR2M, Laboratory of Computer Networks, Settat, Morocco","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073432430","display_name":"Mohamed Moughit","orcid":"https://orcid.org/0000-0003-0453-351X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mohamed Moughit","raw_affiliation_strings":["Mobility and Modeling IR2M, Laboratory of Computer Networks, Settat, Morocco"],"affiliations":[{"raw_affiliation_string":"Mobility and Modeling IR2M, Laboratory of Computer Networks, Settat, Morocco","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025179075","display_name":"Youness Idrissi Khamlichi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Youness Idrissi Khamlichi","raw_affiliation_strings":["Laboratory of Renewable Energies and Intelligent Systems LERS, National School of Applied Sciences USMBA, Morocco"],"affiliations":[{"raw_affiliation_string":"Laboratory of Renewable Energies and Intelligent Systems LERS, National School of Applied Sciences USMBA, Morocco","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5045372841"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.6216,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.72913804,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.823708713054657},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8212773203849792},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.8119511008262634},{"id":"https://openalex.org/keywords/network-administrator","display_name":"Network administrator","score":0.6823383569717407},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6521860361099243},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5211025476455688},{"id":"https://openalex.org/keywords/system-administrator","display_name":"System administrator","score":0.4958983361721039},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4798988103866577},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.4661375880241394},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11949628591537476},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.07645425200462341}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.823708713054657},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8212773203849792},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.8119511008262634},{"id":"https://openalex.org/C2779173999","wikidata":"https://www.wikidata.org/wiki/Q680296","display_name":"Network administrator","level":2,"score":0.6823383569717407},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6521860361099243},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5211025476455688},{"id":"https://openalex.org/C2780814629","wikidata":"https://www.wikidata.org/wiki/Q327353","display_name":"System administrator","level":2,"score":0.4958983361721039},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4798988103866577},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.4661375880241394},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11949628591537476},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.07645425200462341},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isncc.2017.8071990","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isncc.2017.8071990","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7599999904632568,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W42722137","https://openalex.org/W1508143096","https://openalex.org/W1531809166","https://openalex.org/W1535709376","https://openalex.org/W1587595544","https://openalex.org/W1602380388","https://openalex.org/W1962980066","https://openalex.org/W1964077785","https://openalex.org/W2002907052","https://openalex.org/W2009495439","https://openalex.org/W2013627100","https://openalex.org/W2070813941","https://openalex.org/W2077388663","https://openalex.org/W2086980435","https://openalex.org/W2111313721","https://openalex.org/W2122269808","https://openalex.org/W2127991899","https://openalex.org/W2134521188","https://openalex.org/W2136225013","https://openalex.org/W2256845964","https://openalex.org/W2569399994","https://openalex.org/W3021181116","https://openalex.org/W6635359292","https://openalex.org/W6665172852"],"related_works":["https://openalex.org/W1975326709","https://openalex.org/W2398434059","https://openalex.org/W2186689279","https://openalex.org/W2468386885","https://openalex.org/W1668440855","https://openalex.org/W577721519","https://openalex.org/W2349655502","https://openalex.org/W2249479141","https://openalex.org/W2361755837","https://openalex.org/W2133389611"],"abstract_inverted_index":{"Nowadays,":[0],"Intrusion":[1,109],"Detection":[2],"Systems":[3],"become":[4],"an":[5,106,167],"important":[6],"components":[7],"of":[8,23,74,86,120,150],"network":[9,144],"security,":[10],"they":[11],"collect":[12],"and":[13,18,130,152],"check":[14],"events":[15,30],"from":[16],"networks":[17],"hosts,":[19],"looking":[20],"for":[21],"signs":[22],"security":[24,41,87],"violations.":[25],"As":[26],"soon":[27],"as":[28],"unnecessary":[29],"are":[31],"detected,":[32],"IDS":[33],"triggers":[34],"alerts":[35,78,126,136,151],"to":[36,46,69,108,116,142,156],"report":[37,134],"them,":[38],"thus,":[39],"the":[40,48,52,84,113,118,143,148],"administrator":[42,88],"take":[43],"safety":[44],"measures":[45],"stop":[47],"attack":[49],"or":[50,100],"repair":[51],"compromised":[53],"system.":[54],"Normally,":[55],"this":[56,82,163],"is":[57,115],"what":[58],"IDSs":[59,65],"should":[60],"do,":[61],"but":[62],"in":[63],"practice,":[64],"have":[66],"been":[67],"observed":[68],"generate":[70],"a":[71,98,139],"huge":[72],"number":[73],"alerts,":[75,121],"especially":[76],"false":[77,80,123],"(i.e.,":[79],"positives),":[81],"make":[83],"task":[85],"very":[89],"difficult,":[90],"he":[91],"must":[92],"analyze":[93],"each":[94],"alert":[95],"manually,":[96],"either":[97],"fake":[99],"real":[101,140],"threat.":[102],"This":[103],"paper":[104],"proposes":[105],"approach":[107],"Real-Time":[110],"Risk":[111,149],"Assessment,":[112],"objective":[114],"evaluate":[117],"severity":[119],"minimize":[122],"positives,":[124],"distinguish":[125],"with":[127,166],"low":[128],"importance":[129],"irrelevant":[131],"one,":[132],"thereby,":[133],"serious":[135],"that":[137],"present":[138],"threat":[141],"system":[145],"by":[146],"calculating":[147],"prioritizing":[153],"them":[154],"according":[155],"their":[157],"severity.":[158],"We":[159],"will":[160],"tightly":[161],"integrate":[162],"new":[164],"model":[165],"existing":[168],"framework.":[169]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
