{"id":"https://openalex.org/W2101148573","doi":"https://doi.org/10.1109/noms.2008.4575234","title":"Intrusion detection through artificial neural networks","display_name":"Intrusion detection through artificial neural networks","publication_year":2008,"publication_date":"2008-01-01","ids":{"openalex":"https://openalex.org/W2101148573","doi":"https://doi.org/10.1109/noms.2008.4575234","mag":"2101148573"},"language":"en","primary_location":{"id":"doi:10.1109/noms.2008.4575234","is_oa":false,"landing_page_url":"https://doi.org/10.1109/noms.2008.4575234","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102143056","display_name":"Igor Vinicius Mussoi de Lima","orcid":null},"institutions":[{"id":"https://openalex.org/I4104125","display_name":"Universidade Federal de Santa Catarina","ror":"https://ror.org/041akq887","country_code":"BR","type":"education","lineage":["https://openalex.org/I4104125"]}],"countries":["BR"],"is_corresponding":true,"raw_author_name":"Igor Vinicius Mussoi de Lima","raw_affiliation_strings":["Federal Univesity of Santa Catarina, Computer Science Program, Florian\u00f3polis, SC, Brazil","Comput. Sci. Program, Fed. Univ. of Santa Catarina, Florianopolis"],"affiliations":[{"raw_affiliation_string":"Federal Univesity of Santa Catarina, Computer Science Program, Florian\u00f3polis, SC, Brazil","institution_ids":["https://openalex.org/I4104125"]},{"raw_affiliation_string":"Comput. Sci. Program, Fed. Univ. of Santa Catarina, Florianopolis","institution_ids":["https://openalex.org/I4104125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5098416512","display_name":"Joelson Alencar Degaspari","orcid":null},"institutions":[{"id":"https://openalex.org/I4104125","display_name":"Universidade Federal de Santa Catarina","ror":"https://ror.org/041akq887","country_code":"BR","type":"education","lineage":["https://openalex.org/I4104125"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Joelson Alencar Degaspari","raw_affiliation_strings":["Federal Univesity of Santa Catarina, Computer Science Program, Florian\u00f3polis, SC, Brazil","Comput. Sci. Program, Fed. Univ. of Santa Catarina, Florianopolis"],"affiliations":[{"raw_affiliation_string":"Federal Univesity of Santa Catarina, Computer Science Program, Florian\u00f3polis, SC, Brazil","institution_ids":["https://openalex.org/I4104125"]},{"raw_affiliation_string":"Comput. Sci. Program, Fed. Univ. of Santa Catarina, Florianopolis","institution_ids":["https://openalex.org/I4104125"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080708691","display_name":"Jo\u00e3o Bosco Mangueira Sobral","orcid":"https://orcid.org/0000-0002-8714-5434"},"institutions":[{"id":"https://openalex.org/I4104125","display_name":"Universidade Federal de Santa Catarina","ror":"https://ror.org/041akq887","country_code":"BR","type":"education","lineage":["https://openalex.org/I4104125"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Joao Bosco Mangueira Sobral","raw_affiliation_strings":["Federal Univesity of Santa Catarina, Computer Science Program, Florian\u00f3polis, SC, Brazil","Comput. Sci. Program, Fed. Univ. of Santa Catarina, Florianopolis"],"affiliations":[{"raw_affiliation_string":"Federal Univesity of Santa Catarina, Computer Science Program, Florian\u00f3polis, SC, Brazil","institution_ids":["https://openalex.org/I4104125"]},{"raw_affiliation_string":"Comput. Sci. Program, Fed. Univ. of Santa Catarina, Florianopolis","institution_ids":["https://openalex.org/I4104125"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102143056"],"corresponding_institution_ids":["https://openalex.org/I4104125"],"apc_list":null,"apc_paid":null,"fwci":1.0998,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.80694186,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"867","last_page":"870"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9904000163078308,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9372000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.9139214754104614},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7838122248649597},{"id":"https://openalex.org/keywords/anomaly-based-intrusion-detection-system","display_name":"Anomaly-based intrusion detection system","score":0.7478760480880737},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.7286840081214905},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5822168588638306},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.540289580821991},{"id":"https://openalex.org/keywords/knowledge-base","display_name":"Knowledge base","score":0.5050864815711975},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5017623901367188},{"id":"https://openalex.org/keywords/relation","display_name":"Relation (database)","score":0.48786282539367676},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.45213547348976135},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.45151403546333313},{"id":"https://openalex.org/keywords/misuse-detection","display_name":"Misuse detection","score":0.41834622621536255},{"id":"https://openalex.org/keywords/base","display_name":"Base (topology)","score":0.4162371754646301},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.05957040190696716},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.05401316285133362}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.9139214754104614},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7838122248649597},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.7478760480880737},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.7286840081214905},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5822168588638306},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.540289580821991},{"id":"https://openalex.org/C4554734","wikidata":"https://www.wikidata.org/wiki/Q593744","display_name":"Knowledge base","level":2,"score":0.5050864815711975},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5017623901367188},{"id":"https://openalex.org/C25343380","wikidata":"https://www.wikidata.org/wiki/Q277521","display_name":"Relation (database)","level":2,"score":0.48786282539367676},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.45213547348976135},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.45151403546333313},{"id":"https://openalex.org/C2776973144","wikidata":"https://www.wikidata.org/wiki/Q6880649","display_name":"Misuse detection","level":4,"score":0.41834622621536255},{"id":"https://openalex.org/C42058472","wikidata":"https://www.wikidata.org/wiki/Q810214","display_name":"Base (topology)","level":2,"score":0.4162371754646301},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.05957040190696716},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.05401316285133362},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/noms.2008.4575234","is_oa":false,"landing_page_url":"https://doi.org/10.1109/noms.2008.4575234","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6700000166893005}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W84779513","https://openalex.org/W85881369","https://openalex.org/W1642161394","https://openalex.org/W1952056635","https://openalex.org/W2002011878","https://openalex.org/W2002154183","https://openalex.org/W2096048180","https://openalex.org/W2123433324","https://openalex.org/W2124776405","https://openalex.org/W2138381338","https://openalex.org/W2146196597","https://openalex.org/W2168371457","https://openalex.org/W2807209929","https://openalex.org/W6636895364","https://openalex.org/W6680653849"],"related_works":["https://openalex.org/W2106474518","https://openalex.org/W2369534771","https://openalex.org/W3036013726","https://openalex.org/W2337148208","https://openalex.org/W2107592864","https://openalex.org/W1724519426","https://openalex.org/W1563027355","https://openalex.org/W2128351071","https://openalex.org/W2385236352","https://openalex.org/W2001107211"],"abstract_inverted_index":{"The":[0,87],"main":[1],"problem":[2],"with":[3],"rule-based":[4],"intrusion":[5,54,105,115],"detection":[6,32,55,65,92,116],"systems":[7,117],"is":[8,162],"the":[9,18,30,46,68,79,91,102,125,134,142,149,152,156,160],"update":[10],"discrepancy":[11],"in":[12,16,155],"their":[13],"knowledge":[14,80,130],"base,":[15],"relation":[17],"continuous":[19],"differentiated":[20],"forms":[21],"of":[22,48,82,93,97,99,127,145,151],"intrusion.":[23],"Those":[24],"IDSs":[25,89],"basically":[26],"work":[27],"based":[28,119],"on":[29,120],"misuse":[31],"method,":[33],"which":[34,74],"monitors":[35],"network":[36,53,62,69,157,161],"and":[37,71,132,137],"computers":[38],"for":[39,51],"known":[40,104],"attack":[41],"patterns.":[42],"This":[43,107],"article":[44],"shows":[45],"build":[47],"a":[49,52,64],"prototype":[50],"system,":[56],"that":[57],"uses":[58],"an":[59,76,94,128],"artificial":[60],"neural":[61],"as":[63],"mechanism.":[66],"In":[67],"training":[70],"learning":[72],"phases,":[73],"are":[75],"adaptive":[77],"process,":[78],"base":[81,131],"IDS":[83],"Snort":[84],"was":[85],"applied.":[86],"built":[88],"allow":[90],"acceptable":[95],"proportion":[96],"variants":[98],"intrusion,":[100],"beyond":[101],"already":[103],"forms.":[106],"last":[108],"characteristic":[109],"presents":[110],"expressive":[111],"advantages":[112],"comparing":[113],"to":[114],"purely":[118],"rules,":[121],"because":[122],"it":[123],"dismisses":[124],"use":[126],"extensive":[129],"solves":[133],"false":[135,138],"negative":[136],"positive":[139],"problems,":[140],"through":[141],"fine":[143],"adjustment":[144],"weights,":[146],"given":[147],"by":[148],"variation":[150],"acceptation":[153],"rate":[154],"output,":[158],"when":[159],"trained.":[163]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
