{"id":"https://openalex.org/W2108770704","doi":"https://doi.org/10.1109/itre.2005.1503109","title":"Frame-based attack representation and real-time first order logic automatic reasoning","display_name":"Frame-based attack representation and real-time first order logic automatic reasoning","publication_year":2005,"publication_date":"2005-09-09","ids":{"openalex":"https://openalex.org/W2108770704","doi":"https://doi.org/10.1109/itre.2005.1503109","mag":"2108770704"},"language":"en","primary_location":{"id":"doi:10.1109/itre.2005.1503109","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itre.2005.1503109","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115621200","display_name":"Wei Yan","orcid":"https://orcid.org/0000-0002-1758-8782"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Wei Yan","raw_affiliation_strings":["ECE Department NJIT, Advanced Networking Laboratory, Newark, NJ, USA"],"affiliations":[{"raw_affiliation_string":"ECE Department NJIT, Advanced Networking Laboratory, Newark, NJ, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103138813","display_name":"E.S.H. Hou","orcid":"https://orcid.org/0009-0000-2929-1188"},"institutions":[{"id":"https://openalex.org/I118118575","display_name":"New Jersey Institute of Technology","ror":"https://ror.org/05e74xb87","country_code":"US","type":"education","lineage":["https://openalex.org/I118118575"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"E. Hou","raw_affiliation_strings":["ECE Department NJIT, Advanced Networking Laboratory, Newark, NJ, USA","Dept. of Electr. & Comput. Eng., New Jersey Inst. of Tech., Newark, NJ, USA"],"affiliations":[{"raw_affiliation_string":"ECE Department NJIT, Advanced Networking Laboratory, Newark, NJ, USA","institution_ids":[]},{"raw_affiliation_string":"Dept. of Electr. & Comput. Eng., New Jersey Inst. of Tech., Newark, NJ, USA","institution_ids":["https://openalex.org/I118118575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008864376","display_name":"Nirwan Ansari","orcid":"https://orcid.org/0000-0001-8541-3565"},"institutions":[{"id":"https://openalex.org/I118118575","display_name":"New Jersey Institute of Technology","ror":"https://ror.org/05e74xb87","country_code":"US","type":"education","lineage":["https://openalex.org/I118118575"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"N. Ansari","raw_affiliation_strings":["ECE Department NJIT, Advanced Networking Laboratory, Newark, NJ, USA","Dept. of Electr. & Comput. Eng., New Jersey Inst. of Tech., Newark, NJ, USA"],"affiliations":[{"raw_affiliation_string":"ECE Department NJIT, Advanced Networking Laboratory, Newark, NJ, USA","institution_ids":[]},{"raw_affiliation_string":"Dept. of Electr. & Comput. Eng., New Jersey Inst. of Tech., Newark, NJ, USA","institution_ids":["https://openalex.org/I118118575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5115621200"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.18948889,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"225","last_page":"229"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8281150460243225},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6878675222396851},{"id":"https://openalex.org/keywords/forward-chaining","display_name":"Forward chaining","score":0.6821542978286743},{"id":"https://openalex.org/keywords/chaining","display_name":"Chaining","score":0.5658875703811646},{"id":"https://openalex.org/keywords/frame","display_name":"Frame (networking)","score":0.5547764897346497},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.542770504951477},{"id":"https://openalex.org/keywords/backward-chaining","display_name":"Backward chaining","score":0.5233142375946045},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.5176706314086914},{"id":"https://openalex.org/keywords/attack-patterns","display_name":"Attack patterns","score":0.49113914370536804},{"id":"https://openalex.org/keywords/network-administrator","display_name":"Network administrator","score":0.4390111267566681},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4175112843513489},{"id":"https://openalex.org/keywords/inference-engine","display_name":"Inference engine","score":0.3331702947616577},{"id":"https://openalex.org/keywords/expert-system","display_name":"Expert system","score":0.25737643241882324},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.24664321541786194},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.18502160906791687}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8281150460243225},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6878675222396851},{"id":"https://openalex.org/C142614401","wikidata":"https://www.wikidata.org/wiki/Q777433","display_name":"Forward chaining","level":3,"score":0.6821542978286743},{"id":"https://openalex.org/C49020025","wikidata":"https://www.wikidata.org/wiki/Q1059099","display_name":"Chaining","level":2,"score":0.5658875703811646},{"id":"https://openalex.org/C126042441","wikidata":"https://www.wikidata.org/wiki/Q1324888","display_name":"Frame (networking)","level":2,"score":0.5547764897346497},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.542770504951477},{"id":"https://openalex.org/C129916263","wikidata":"https://www.wikidata.org/wiki/Q1141183","display_name":"Backward chaining","level":4,"score":0.5233142375946045},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.5176706314086914},{"id":"https://openalex.org/C2780741293","wikidata":"https://www.wikidata.org/wiki/Q4818019","display_name":"Attack patterns","level":3,"score":0.49113914370536804},{"id":"https://openalex.org/C2779173999","wikidata":"https://www.wikidata.org/wiki/Q680296","display_name":"Network administrator","level":2,"score":0.4390111267566681},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4175112843513489},{"id":"https://openalex.org/C46743427","wikidata":"https://www.wikidata.org/wiki/Q1341685","display_name":"Inference engine","level":3,"score":0.3331702947616577},{"id":"https://openalex.org/C58328972","wikidata":"https://www.wikidata.org/wiki/Q184609","display_name":"Expert system","level":2,"score":0.25737643241882324},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.24664321541786194},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.18502160906791687},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/itre.2005.1503109","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itre.2005.1503109","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6800000071525574}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W177666592","https://openalex.org/W189774353","https://openalex.org/W2120234416","https://openalex.org/W2133439872","https://openalex.org/W2141200504","https://openalex.org/W4212943651","https://openalex.org/W4231518042","https://openalex.org/W6607285251"],"related_works":["https://openalex.org/W904654316","https://openalex.org/W39770072","https://openalex.org/W1758809970","https://openalex.org/W2132414486","https://openalex.org/W2364163488","https://openalex.org/W833493212","https://openalex.org/W2105600282","https://openalex.org/W2472912427","https://openalex.org/W4238340239","https://openalex.org/W2108770704"],"abstract_inverted_index":{"Internet":[0],"has":[1],"grown":[2],"by":[3,137],"several":[4],"orders":[5],"of":[6,43,61,76],"magnitude":[7],"in":[8,63,78,96,186],"recent":[9],"years,":[10],"prompting":[11],"network":[12,79,119],"security":[13,68],"as":[14],"a":[15,40,66,73],"great":[16],"concern.":[17],"Hence,":[18],"intrusion":[19],"detection":[20],"systems":[21],"(IDSs)":[22],"are":[23,131,145,167],"used":[24,146],"to":[25,47,58,98,147,180],"timely":[26],"detect":[27],"intrusions":[28],"and":[29,51,90,105,189],"defend":[30],"against":[31],"attack":[32,88,120,151,159,184,192],"attempts.":[33],"However,":[34],"the":[35,59,100,103,111,124,149,164,172,183],"current":[36],"IDS":[37,129],"technology":[38],"generates":[39],"huge":[41],"volume":[42],"alert":[44,54,107],"events":[45],"due":[46,57],"false":[48],"alarm":[49],"alerts,":[50],"requires":[52],"costly":[53,106],"manual":[55,108],"reviewing":[56],"lack":[60],"intelligence":[62],"IDS.":[64],"As":[65],"solution,":[67],"information":[69],"management":[70],"(SIM)":[71],"is":[72],"growing":[74],"area":[75],"interest":[77],"security.":[80],"In":[81,122],"this":[82],"paper,":[83],"we":[84],"propose":[85],"FAR-FAR":[86,113,179],"(frame-based":[87],"representation":[89],"first-order":[91,141],"logic":[92,142],"automatic":[93],"reasoning)":[94],"system":[95],"SIM":[97],"relieve":[99],"administrator":[101],"from":[102,127],"time-consuming":[104],"reviewing.":[109],"With":[110],"backward-chaining,":[112],"can":[114],"make":[115],"real-time":[116],"reasoning":[117,161],"for":[118,163],"scenarios.":[121,152],"FAR-FAR,":[123],"aggregated":[125],"alerts":[126,166],"different":[128],"agents":[130],"converted":[132],"into":[133],"uniform":[134],"frame-structured":[135],"streams":[136],"case":[138],"grammar.":[139],"Afterwards,":[140],"production":[143],"rules":[144],"extract":[148],"hidden":[150],"Our":[153],"simulation":[154],"results":[155],"show":[156],"that":[157],"FAR-FAR's":[158],"scenario":[160],"rate":[162],"incoming":[165,173],"generally":[168],"far":[169],"less":[170],"than":[171],"alerts'":[174],"inter-arrival":[175],"time.":[176],"This":[177],"guarantees":[178],"automatically":[181],"reason":[182],"plans":[185],"real":[187],"time":[188],"predict":[190],"possible":[191],"attempts":[193],"at":[194],"an":[195],"early":[196],"stage.":[197]},"counts_by_year":[{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
