{"id":"https://openalex.org/W2746282326","doi":"https://doi.org/10.1109/fuzz-ieee.2017.8015461","title":"D-FRI-WinFirewall: Dynamic fuzzy rule interpolation for Windows Firewall","display_name":"D-FRI-WinFirewall: Dynamic fuzzy rule interpolation for Windows Firewall","publication_year":2017,"publication_date":"2017-07-01","ids":{"openalex":"https://openalex.org/W2746282326","doi":"https://doi.org/10.1109/fuzz-ieee.2017.8015461","mag":"2746282326"},"language":"en","primary_location":{"id":"doi:10.1109/fuzz-ieee.2017.8015461","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fuzz-ieee.2017.8015461","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089628794","display_name":"Nitin Naik","orcid":"https://orcid.org/0000-0002-0659-9646"},"institutions":[{"id":"https://openalex.org/I1340226911","display_name":"Defence Equipment and Support","ror":"https://ror.org/00jztws02","country_code":"GB","type":"government","lineage":["https://openalex.org/I1306956679","https://openalex.org/I1340226911","https://openalex.org/I2802373619"]},{"id":"https://openalex.org/I1306956679","display_name":"Ministry of Defence","ror":"https://ror.org/01bvxzn29","country_code":"GB","type":"government","lineage":["https://openalex.org/I1306956679","https://openalex.org/I2802373619"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Nitin Naik","raw_affiliation_strings":["Ministry of Defence, Defence School of Communications and Information Systems, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Ministry of Defence, Defence School of Communications and Information Systems, United Kingdom","institution_ids":["https://openalex.org/I1340226911","https://openalex.org/I1306956679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110155797","display_name":"Ren Diao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ren Diao","raw_affiliation_strings":["Wandera Ltd., United Kingdom"],"affiliations":[{"raw_affiliation_string":"Wandera Ltd., United Kingdom","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039652471","display_name":"Changjing Shang","orcid":"https://orcid.org/0000-0001-6375-6276"},"institutions":[{"id":"https://openalex.org/I16038530","display_name":"Aberystwyth University","ror":"https://ror.org/015m2p889","country_code":"GB","type":"education","lineage":["https://openalex.org/I16038530"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Changjing Shang","raw_affiliation_strings":["Physics and Computer Science, Aberystwyth University, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Physics and Computer Science, Aberystwyth University, United Kingdom","institution_ids":["https://openalex.org/I16038530"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036010787","display_name":"Qiang Shen","orcid":"https://orcid.org/0000-0001-9333-4605"},"institutions":[{"id":"https://openalex.org/I16038530","display_name":"Aberystwyth University","ror":"https://ror.org/015m2p889","country_code":"GB","type":"education","lineage":["https://openalex.org/I16038530"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Qiang Shen","raw_affiliation_strings":["Physics and Computer Science, Aberystwyth University, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Physics and Computer Science, Aberystwyth University, United Kingdom","institution_ids":["https://openalex.org/I16038530"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064994129","display_name":"Paul Jenkins","orcid":"https://orcid.org/0000-0002-9854-9450"},"institutions":[{"id":"https://openalex.org/I1306956679","display_name":"Ministry of Defence","ror":"https://ror.org/01bvxzn29","country_code":"GB","type":"government","lineage":["https://openalex.org/I1306956679","https://openalex.org/I2802373619"]},{"id":"https://openalex.org/I1340226911","display_name":"Defence Equipment and Support","ror":"https://ror.org/00jztws02","country_code":"GB","type":"government","lineage":["https://openalex.org/I1306956679","https://openalex.org/I1340226911","https://openalex.org/I2802373619"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Paul Jenkins","raw_affiliation_strings":["Ministry of Defence, Defence School of Communications and Information Systems, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Ministry of Defence, Defence School of Communications and Information Systems, United Kingdom","institution_ids":["https://openalex.org/I1340226911","https://openalex.org/I1306956679"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5089628794"],"corresponding_institution_ids":["https://openalex.org/I1306956679","https://openalex.org/I1340226911"],"apc_list":null,"apc_paid":null,"fwci":3.3152,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.93308869,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.8736221790313721},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7683588266372681},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7024567127227783},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6298973560333252},{"id":"https://openalex.org/keywords/application-firewall","display_name":"Application firewall","score":0.5923479199409485},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5038997530937195},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.445988267660141},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.4341452121734619},{"id":"https://openalex.org/keywords/stateful-firewall","display_name":"Stateful firewall","score":0.31635135412216187},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.29324713349342346},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1928018033504486},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.16969642043113708},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.10642579197883606}],"concepts":[{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.8736221790313721},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7683588266372681},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7024567127227783},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6298973560333252},{"id":"https://openalex.org/C86444895","wikidata":"https://www.wikidata.org/wiki/Q451816","display_name":"Application firewall","level":4,"score":0.5923479199409485},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5038997530937195},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.445988267660141},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.4341452121734619},{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.31635135412216187},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.29324713349342346},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1928018033504486},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.16969642043113708},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.10642579197883606},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C104062141","wikidata":"https://www.wikidata.org/wiki/Q2601295","display_name":"Extremal black hole","level":3,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fuzz-ieee.2017.8015461","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fuzz-ieee.2017.8015461","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5699999928474426,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1974030435","https://openalex.org/W1990999691","https://openalex.org/W1992176519","https://openalex.org/W1995077566","https://openalex.org/W2063943005","https://openalex.org/W2084896955","https://openalex.org/W2122475393","https://openalex.org/W2126120381","https://openalex.org/W2156715830","https://openalex.org/W2177837262","https://openalex.org/W2209736539","https://openalex.org/W2225783731","https://openalex.org/W2289429767","https://openalex.org/W2296443825","https://openalex.org/W2468072172","https://openalex.org/W2528880615","https://openalex.org/W2549446373","https://openalex.org/W2556507683","https://openalex.org/W4205373109","https://openalex.org/W4249749961","https://openalex.org/W4251212860","https://openalex.org/W4300014214"],"related_works":["https://openalex.org/W2009238965","https://openalex.org/W2361515550","https://openalex.org/W2916429898","https://openalex.org/W8359669","https://openalex.org/W2057573940","https://openalex.org/W4363647490","https://openalex.org/W2495628081","https://openalex.org/W2583381754","https://openalex.org/W4234975731","https://openalex.org/W40377838"],"abstract_inverted_index":{"Dynamic":[0],"fuzzy":[1,9,17,26,39],"rule":[2,10,18],"interpolation":[3,11],"(D-FRI)":[4],"consists":[5],"of":[6,8,15,45,56,122,127,142,144,180],"functionalities":[7],"and":[12,92,140,166,175,186,197],"dynamically":[13,106],"refinement":[14],"the":[16,31,46,54,70,119,125,138,154,191],"base.":[19],"It":[20],"can":[21],"be":[22],"integrated":[23],"with":[24,170],"any":[25],"intelligent":[27],"system":[28,115],"to":[29,36,53,78,105,173,194,204],"extend":[30],"system's":[32],"capabilities":[33],"in":[34,69,112],"addition":[35],"its":[37],"normal":[38],"reasoning.":[40],"Systems":[41],"security":[42,66,84],"is":[43,130,149],"one":[44],"areas":[47],"that":[48],"require":[49],"dynamic":[50],"monitoring":[51,139],"due":[52],"nature":[55],"possible":[57,76,151],"threats;":[58],"static":[59],"rule-based":[60],"systems":[61],"cannot":[62],"cover":[63],"all":[64],"reoriented":[65],"threats":[67],"accurately":[68],"long":[71],"run.":[72],"D-FRI":[73,104],"provides":[74],"a":[75,98,113],"solution":[77],"such":[79],"problems,":[80],"potentially":[81],"making":[82],"various":[83],"tools":[85],"(e.g.,":[86],"those":[87],"for":[88],"firewall,":[89],"intrusion":[90],"detection":[91],"traffic":[93],"analysis)":[94],"more":[95],"effective.":[96],"As":[97],"particular":[99],"application,":[100],"this":[101,128],"paper":[102],"exploits":[103],"support":[107],"Microsoft":[108],"Windows":[109,123,156,192],"Firewall,":[110,124],"resulting":[111],"robust":[114],"named":[116],"D-FRI-WinFirewall.":[117],"Given":[118],"general":[120],"utility":[121],"impact":[126],"work":[129,133],"far-reaching.":[131],"The":[132],"reported":[134],"here":[135],"focusses":[136],"on":[137],"prevention":[141],"denial":[143],"service":[145],"(DoS)":[146],"attacks,":[147],"which":[148,200],"not":[150],"by":[152],"utilising":[153],"standard":[155],"Firewall":[157,193],"alone.":[158],"In":[159],"particular,":[160],"two":[161,177],"sub-systems":[162],"are":[163,201],"designed,":[164],"implemented":[165],"tested":[167],"within":[168],"D-FRI-WinFirewall,":[169],"an":[171],"effort":[172],"detect":[174],"prevent":[176],"serious":[178],"types":[179],"DoS":[181,184,188,206],"attack:":[182],"ICMP":[183],"attack":[185],"UDP":[187],"attack,":[189],"leading":[190],"outperform":[195],"popular":[196],"expensive":[198],"firewalls,":[199],"yet":[202],"unable":[203],"handle":[205],"attacks.":[207]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":7}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
