{"id":"https://openalex.org/W2897156262","doi":"https://doi.org/10.1109/fuzz-ieee.2018.8491574","title":"Fuzzy Logic Aided Intelligent Threat Detection in Cisco Adaptive Security Appliance 5500 Series Firewalls","display_name":"Fuzzy Logic Aided Intelligent Threat Detection in Cisco Adaptive Security Appliance 5500 Series Firewalls","publication_year":2018,"publication_date":"2018-07-01","ids":{"openalex":"https://openalex.org/W2897156262","doi":"https://doi.org/10.1109/fuzz-ieee.2018.8491574","mag":"2897156262"},"language":"en","primary_location":{"id":"doi:10.1109/fuzz-ieee.2018.8491574","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fuzz-ieee.2018.8491574","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://nrl.northumbria.ac.uk/id/eprint/35742/1/CiscoFirewall.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089628794","display_name":"Nitin Naik","orcid":"https://orcid.org/0000-0002-0659-9646"},"institutions":[{"id":"https://openalex.org/I1306956679","display_name":"Ministry of Defence","ror":"https://ror.org/01bvxzn29","country_code":"GB","type":"government","lineage":["https://openalex.org/I1306956679","https://openalex.org/I2802373619"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Nitin Naik","raw_affiliation_strings":["Defence School of Communications and Information Systems, Ministry of Defence, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Defence School of Communications and Information Systems, Ministry of Defence, United Kingdom","institution_ids":["https://openalex.org/I1306956679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064994129","display_name":"Paul Jenkins","orcid":"https://orcid.org/0000-0002-9854-9450"},"institutions":[{"id":"https://openalex.org/I1306956679","display_name":"Ministry of Defence","ror":"https://ror.org/01bvxzn29","country_code":"GB","type":"government","lineage":["https://openalex.org/I1306956679","https://openalex.org/I2802373619"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Paul Jenkins","raw_affiliation_strings":["Defence School of Communications and Information Systems, Ministry of Defence, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Defence School of Communications and Information Systems, Ministry of Defence, United Kingdom","institution_ids":["https://openalex.org/I1306956679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028462158","display_name":"Brian Kerby","orcid":null},"institutions":[{"id":"https://openalex.org/I1306956679","display_name":"Ministry of Defence","ror":"https://ror.org/01bvxzn29","country_code":"GB","type":"government","lineage":["https://openalex.org/I1306956679","https://openalex.org/I2802373619"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Brian Kerby","raw_affiliation_strings":["Defence School of Communications and Information Systems, Ministry of Defence, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Defence School of Communications and Information Systems, Ministry of Defence, United Kingdom","institution_ids":["https://openalex.org/I1306956679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090230466","display_name":"Joseph C. Sloane","orcid":null},"institutions":[{"id":"https://openalex.org/I1306956679","display_name":"Ministry of Defence","ror":"https://ror.org/01bvxzn29","country_code":"GB","type":"government","lineage":["https://openalex.org/I1306956679","https://openalex.org/I2802373619"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Joseph Sloane","raw_affiliation_strings":["Defence School of Communications and Information Systems, Ministry of Defence, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Defence School of Communications and Information Systems, Ministry of Defence, United Kingdom","institution_ids":["https://openalex.org/I1306956679"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065079117","display_name":"Longzhi Yang","orcid":"https://orcid.org/0000-0003-2115-4909"},"institutions":[{"id":"https://openalex.org/I32394136","display_name":"Northumbria University","ror":"https://ror.org/049e6bc10","country_code":"GB","type":"education","lineage":["https://openalex.org/I32394136"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Longzhi Yang","raw_affiliation_strings":["Department of Computer and Information Sciences, Northumbria University, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, Northumbria University, United Kingdom","institution_ids":["https://openalex.org/I32394136"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5089628794"],"corresponding_institution_ids":["https://openalex.org/I1306956679"],"apc_list":null,"apc_paid":null,"fwci":3.1266,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.92415392,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7727179527282715},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.7182990312576294},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.669657289981842},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.60643470287323},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5578991770744324},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.49783849716186523},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.41665107011795044},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.16412776708602905},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.14916926622390747}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7727179527282715},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.7182990312576294},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.669657289981842},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.60643470287323},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5578991770744324},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.49783849716186523},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.41665107011795044},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.16412776708602905},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.14916926622390747},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C104062141","wikidata":"https://www.wikidata.org/wiki/Q2601295","display_name":"Extremal black hole","level":3,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/fuzz-ieee.2018.8491574","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fuzz-ieee.2018.8491574","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","raw_type":"proceedings-article"},{"id":"pmh:oai:nrl.northumbria.ac.uk:35742","is_oa":true,"landing_page_url":null,"pdf_url":"http://nrl.northumbria.ac.uk/id/eprint/35742/1/CiscoFirewall.pdf","source":{"id":"https://openalex.org/S4306401884","display_name":"Northumbria Research Link (Northumbria University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I32394136","host_organization_name":"Northumbria University","host_organization_lineage":["https://openalex.org/I32394136"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Book Section"}],"best_oa_location":{"id":"pmh:oai:nrl.northumbria.ac.uk:35742","is_oa":true,"landing_page_url":null,"pdf_url":"http://nrl.northumbria.ac.uk/id/eprint/35742/1/CiscoFirewall.pdf","source":{"id":"https://openalex.org/S4306401884","display_name":"Northumbria Research Link (Northumbria University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I32394136","host_organization_name":"Northumbria University","host_organization_lineage":["https://openalex.org/I32394136"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Book Section"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5699999928474426}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2897156262.pdf"},"referenced_works_count":25,"referenced_works":["https://openalex.org/W142476452","https://openalex.org/W332844675","https://openalex.org/W1974030435","https://openalex.org/W1990999691","https://openalex.org/W1992176519","https://openalex.org/W1995077566","https://openalex.org/W2038683228","https://openalex.org/W2126120381","https://openalex.org/W2177837262","https://openalex.org/W2209736539","https://openalex.org/W2468072172","https://openalex.org/W2528880615","https://openalex.org/W2549446373","https://openalex.org/W2556507683","https://openalex.org/W2587798408","https://openalex.org/W2746282326","https://openalex.org/W2747994176","https://openalex.org/W2748447594","https://openalex.org/W2750004798","https://openalex.org/W2780698577","https://openalex.org/W2912565176","https://openalex.org/W4211007335","https://openalex.org/W4249749961","https://openalex.org/W6611383363","https://openalex.org/W6747366460"],"related_works":["https://openalex.org/W2387982609","https://openalex.org/W2359453783","https://openalex.org/W2357071520","https://openalex.org/W2376886931","https://openalex.org/W2061466315","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105"],"abstract_inverted_index":{"Cisco":[0],"Adaptive":[1],"Security":[2],"Appliance":[3],"(ASA)":[4],"5500":[5],"Series":[6],"Firewall":[7],"is":[8,28,34,92,139,173],"amongst":[9],"the":[10,40,104,108,133,137,144,183,199,224],"most":[11,25],"popular":[12],"and":[13,20,56,69,96,102,125,177,181,203,218,234,264],"technically":[14],"advanced":[15,258],"for":[16,62,187,212,216,232],"securing":[17],"organisational":[18,156],"networks":[19],"systems.":[21],"One":[22],"of":[23,39,46,82,107,146,214,227],"its":[24,29],"valuable":[26],"features":[27],"threat":[30,71,169,184,200,240,256,259,262,268],"detection":[31,51,170,185,201],"function":[32],"which":[33,172],"available":[35,116],"on":[36,74,198],"every":[37],"version":[38,45],"firewall":[41],"running":[42],"a":[43,60,79,128,147,151,164,174,193,207,228],"software":[44],"8.0(2)":[47],"or":[48,141,150],"higher.":[49],"Threat":[50],"operates":[52],"at":[53,158],"layers":[54],"3":[55],"4":[57],"to":[58,86,94,117,247],"determine":[59],"baseline":[61],"network":[63,138],"traffic,":[64],"analysing":[65],"packet":[66],"drop":[67],"statistics":[68],"generating":[70],"reports":[72],"based":[73,197,267],"traffic":[75],"patterns.":[76],"Despite":[77],"producing":[78],"large":[80],"volume":[81],"statistical":[83],"information":[84,101,134],"relating":[85],"several":[87,112],"security":[88,105,157,236],"events,":[89],"further":[90,222],"effort":[91],"required":[93],"mine":[95],"visually":[97],"report":[98],"more":[99,249],"significant":[100],"conclude":[103],"status":[106],"network.":[109],"There":[110],"are":[111,123],"commercial":[113],"off-the-shelf":[114],"tools":[115],"undertake":[118],"this":[119,161],"task,":[120],"however,":[121],"they":[122],"expensive":[124],"may":[126,154],"require":[127],"cloud":[129],"subscription.":[130],"Furthermore,":[131],"if":[132],"transmitted":[135],"over":[136],"sensitive":[140],"requires":[142],"confidentiality,":[143],"involvement":[145],"third":[148],"party":[149],"third-party":[152],"tool":[153],"place":[155],"risk.":[159],"Therefore,":[160],"paper":[162,221],"presents":[163,204],"fuzzy":[165,194,229],"logic":[166],"aided":[167],"intelligent":[168],"solution,":[171,179],"cost-free,":[175],"intuitive":[176],"comprehensible":[178],"enhancing":[180],"simplifying":[182],"process":[186],"all.":[188],"In":[189],"particular,":[190],"it":[191,243],"employs":[192],"reasoning":[195,230],"system":[196,231],"statistics,":[202],"results/threats":[205],"through":[206],"developed":[208],"dashboard":[209],"user":[210],"interface,":[211],"ease":[213],"understanding":[215],"administrators":[217],"users.":[219],"The":[220],"demonstrates":[223],"successful":[225],"utilisation":[226],"selected":[233],"prioritised":[235],"events":[237],"in":[238],"basic":[239,255],"detection,":[241,257,260,263],"although":[242],"can":[244],"be":[245],"extended":[246],"encompass":[248],"complex":[250],"situations,":[251],"such":[252],"as":[253],"complete":[254],"scanning":[261],"customised":[265],"feature":[266],"detection.":[269]},"counts_by_year":[{"year":2023,"cited_by_count":4},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":8},{"year":2018,"cited_by_count":6}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
