{"id":"https://openalex.org/W2907840713","doi":"https://doi.org/10.1109/ssci.2018.8628775","title":"Vigilant Dynamic Honeypot Assisted by Dynamic Fuzzy Rule Interpolation","display_name":"Vigilant Dynamic Honeypot Assisted by Dynamic Fuzzy Rule Interpolation","publication_year":2018,"publication_date":"2018-11-01","ids":{"openalex":"https://openalex.org/W2907840713","doi":"https://doi.org/10.1109/ssci.2018.8628775","mag":"2907840713"},"language":"en","primary_location":{"id":"doi:10.1109/ssci.2018.8628775","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ssci.2018.8628775","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Symposium Series on Computational Intelligence (SSCI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089628794","display_name":"Nitin Naik","orcid":"https://orcid.org/0000-0002-0659-9646"},"institutions":[{"id":"https://openalex.org/I1306956679","display_name":"Ministry of Defence","ror":"https://ror.org/01bvxzn29","country_code":"GB","type":"government","lineage":["https://openalex.org/I1306956679","https://openalex.org/I2802373619"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Nitin Naik","raw_affiliation_strings":["Defence School of Communications and Information Systems, Ministry of Defence, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Defence School of Communications and Information Systems, Ministry of Defence, United Kingdom","institution_ids":["https://openalex.org/I1306956679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039652471","display_name":"Changjing Shang","orcid":"https://orcid.org/0000-0001-6375-6276"},"institutions":[{"id":"https://openalex.org/I16038530","display_name":"Aberystwyth University","ror":"https://ror.org/015m2p889","country_code":"GB","type":"education","lineage":["https://openalex.org/I16038530"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Changjing Shang","raw_affiliation_strings":["Institute of Mathematics, Physics and Computer Science, Aberystwyth University, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Institute of Mathematics, Physics and Computer Science, Aberystwyth University, United Kingdom","institution_ids":["https://openalex.org/I16038530"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036010787","display_name":"Qiang Shen","orcid":"https://orcid.org/0000-0001-9333-4605"},"institutions":[{"id":"https://openalex.org/I16038530","display_name":"Aberystwyth University","ror":"https://ror.org/015m2p889","country_code":"GB","type":"education","lineage":["https://openalex.org/I16038530"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Qiang Shen","raw_affiliation_strings":["Institute of Mathematics, Physics and Computer Science, Aberystwyth University, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Institute of Mathematics, Physics and Computer Science, Aberystwyth University, United Kingdom","institution_ids":["https://openalex.org/I16038530"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064994129","display_name":"Paul Jenkins","orcid":"https://orcid.org/0000-0002-9854-9450"},"institutions":[{"id":"https://openalex.org/I1306956679","display_name":"Ministry of Defence","ror":"https://ror.org/01bvxzn29","country_code":"GB","type":"government","lineage":["https://openalex.org/I1306956679","https://openalex.org/I2802373619"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Paul Jenkins","raw_affiliation_strings":["Defence School of Communications and Information Systems, Ministry of Defence, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Defence School of Communications and Information Systems, Ministry of Defence, United Kingdom","institution_ids":["https://openalex.org/I1306956679"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5089628794"],"corresponding_institution_ids":["https://openalex.org/I1306956679"],"apc_list":null,"apc_paid":null,"fwci":1.8453,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.8738233,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1731","last_page":"1738"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10820","display_name":"Fuzzy Logic and Control Systems","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.9610027074813843},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.8798151612281799},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.760650634765625},{"id":"https://openalex.org/keywords/liveness","display_name":"Liveness","score":0.6325268745422363},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6277170181274414},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5626325011253357},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.530473530292511},{"id":"https://openalex.org/keywords/ip-address-spoofing","display_name":"IP address spoofing","score":0.4185871481895447},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.21543824672698975},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.16245073080062866},{"id":"https://openalex.org/keywords/network-address-translation","display_name":"Network address translation","score":0.06557542085647583}],"concepts":[{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.9610027074813843},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.8798151612281799},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.760650634765625},{"id":"https://openalex.org/C15569618","wikidata":"https://www.wikidata.org/wiki/Q3561421","display_name":"Liveness","level":2,"score":0.6325268745422363},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6277170181274414},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5626325011253357},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.530473530292511},{"id":"https://openalex.org/C111814575","wikidata":"https://www.wikidata.org/wiki/Q550893","display_name":"IP address spoofing","level":5,"score":0.4185871481895447},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.21543824672698975},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.16245073080062866},{"id":"https://openalex.org/C147873670","wikidata":"https://www.wikidata.org/wiki/Q11182","display_name":"Network address translation","level":4,"score":0.06557542085647583},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C35341882","wikidata":"https://www.wikidata.org/wiki/Q8795","display_name":"Internet Protocol","level":3,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ssci.2018.8628775","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ssci.2018.8628775","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Symposium Series on Computational Intelligence (SSCI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4699999988079071,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W332844675","https://openalex.org/W1517527854","https://openalex.org/W1590810061","https://openalex.org/W1974030435","https://openalex.org/W1990999691","https://openalex.org/W1992176519","https://openalex.org/W1995077566","https://openalex.org/W2000223767","https://openalex.org/W2063943005","https://openalex.org/W2068445696","https://openalex.org/W2110519293","https://openalex.org/W2122475393","https://openalex.org/W2169503979","https://openalex.org/W2177837262","https://openalex.org/W2209736539","https://openalex.org/W2245617957","https://openalex.org/W2468072172","https://openalex.org/W2486899041","https://openalex.org/W2515459547","https://openalex.org/W2528880615","https://openalex.org/W2549446373","https://openalex.org/W2556507683","https://openalex.org/W2587798408","https://openalex.org/W2588381212","https://openalex.org/W2603099166","https://openalex.org/W2705431144","https://openalex.org/W2746282326","https://openalex.org/W2747994176","https://openalex.org/W2780698577","https://openalex.org/W2794184634","https://openalex.org/W2891168291","https://openalex.org/W2897156262","https://openalex.org/W2897846265","https://openalex.org/W2902669569","https://openalex.org/W2912055266","https://openalex.org/W2913412946","https://openalex.org/W4236684970","https://openalex.org/W4249749961","https://openalex.org/W4255813280","https://openalex.org/W4300014214","https://openalex.org/W6684855241"],"related_works":["https://openalex.org/W2533239677","https://openalex.org/W2140593870","https://openalex.org/W4389545061","https://openalex.org/W3126377002","https://openalex.org/W2903861076","https://openalex.org/W2604576816","https://openalex.org/W2729608596","https://openalex.org/W2913345013","https://openalex.org/W2900020547","https://openalex.org/W2891168291"],"abstract_inverted_index":{"Dynamic":[0],"Fuzzy":[1],"Rule":[2],"Interpolation":[3],"(D-FRI)":[4],"offers":[5],"a":[6,28,49,76,99,116,140,163,177,198],"dynamic":[7,118,167,199],"rule":[8,200],"base":[9,201],"for":[10,17,58,80,125,142,202],"fuzzy":[11],"systems":[12,18],"which":[13,102],"is":[14,48,98,180,192],"especially":[15],"useful":[16],"with":[19,68,210],"changing":[20,214],"requirements":[21],"and":[22,61,129,174,196],"limited":[23],"prior":[24],"knowledge.":[25],"This":[26,113],"suggests":[27],"possible":[29],"application":[30],"of":[31,36,43,55,131,150,186,194,206,217],"D-FRI":[32,123,164],"in":[33,52,82,127,183],"the":[34,41,44,53,108,122,135,148,155,158,170,184,213,218],"area":[35],"network":[37,56,83],"security":[38,57,78,93],"due":[39],"to":[40,91,107,161,172,212],"volatility":[42],"traffic.":[45],"A":[46],"honeypot":[47,119,171],"valuable":[50],"tool":[51,79],"field":[54],"baiting":[59],"attackers":[60],"collecting":[62],"their":[63],"information.":[64],"However,":[65],"typically":[66],"designed":[67],"fewer":[69],"resources":[70],"they":[71],"are":[72],"not":[73],"considered":[74],"as":[75],"primary":[77],"use":[81,126],"security.":[84],"Consequently,":[85],"such":[86,96],"honeypots":[87],"can":[88,103],"be":[89],"vulnerable":[90],"many":[92],"attacks.":[94],"One":[95],"attack":[97,101,144,152,179],"spoofing":[100,132,143,178,208],"cause":[104],"severe":[105],"damage":[106],"honeypot,":[109,168],"making":[110],"it":[111,138],"inefficient.":[112],"paper":[114,156],"presents":[115],"vigilant":[117,166],"based":[120,146,165],"on":[121,134,147],"approach":[124],"predicting":[128],"alerting":[130],"attacks":[133,209],"honeypot.":[136],"First,":[137],"proposes":[139],"technique":[141,160],"identification":[145,159,205],"analysis":[149],"simulated":[151],"data.":[153],"Then,":[154],"employs":[157],"develop":[162],"allowing":[169],"predict":[173],"alert":[175],"that":[176],"taking":[181],"place":[182],"absence":[185],"matching":[187],"rules.":[188],"The":[189],"resulting":[190],"system":[191],"capable":[193],"learning":[195],"maintaining":[197],"more":[203],"accurate":[204],"potential":[207],"respect":[211],"traffic":[215],"conditions":[216],"network.":[219]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-25T21:42:39.735039","created_date":"2025-10-10T00:00:00"}
