{"id":"https://openalex.org/W2122325692","doi":"https://doi.org/10.1145/1101908.1101911","title":"Designing and implementing a family of intrusion detection systems","display_name":"Designing and implementing a family of intrusion detection systems","publication_year":2005,"publication_date":"2005-11-07","ids":{"openalex":"https://openalex.org/W2122325692","doi":"https://doi.org/10.1145/1101908.1101911","mag":"2122325692"},"language":"en","primary_location":{"id":"doi:10.1145/1101908.1101911","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1101908.1101911","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109057758","display_name":"Richard A. Kemmerer","orcid":null},"institutions":[{"id":"https://openalex.org/I154570441","display_name":"University of California, Santa Barbara","ror":"https://ror.org/02t274463","country_code":"US","type":"education","lineage":["https://openalex.org/I154570441"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Richard A. Kemmerer","raw_affiliation_strings":["University of California, Santa Barbara","University of California,Santa Barbara,"],"affiliations":[{"raw_affiliation_string":"University of California, Santa Barbara","institution_ids":["https://openalex.org/I154570441"]},{"raw_affiliation_string":"University of California,Santa Barbara,","institution_ids":["https://openalex.org/I154570441"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5109057758"],"corresponding_institution_ids":["https://openalex.org/I154570441"],"apc_list":null,"apc_paid":null,"fwci":0.2736,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.67490144,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"3","last_page":"3"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.8238502144813538},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8094419240951538},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5209054350852966},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5203658938407898},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.5084370970726013},{"id":"https://openalex.org/keywords/host-based-intrusion-detection-system","display_name":"Host-based intrusion detection system","score":0.4566366970539093},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.44652795791625977},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2946488857269287},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1390542984008789},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.13069847226142883},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09628209471702576}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.8238502144813538},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8094419240951538},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5209054350852966},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5203658938407898},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.5084370970726013},{"id":"https://openalex.org/C90936777","wikidata":"https://www.wikidata.org/wiki/Q917189","display_name":"Host-based intrusion detection system","level":4,"score":0.4566366970539093},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.44652795791625977},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2946488857269287},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1390542984008789},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.13069847226142883},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09628209471702576},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1101908.1101911","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1101908.1101911","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"},{"id":"pmh:ADA447302","is_oa":false,"landing_page_url":"http://oai.dtic.mil/oai/oai?&amp;verb=getRecord&amp;metadataPrefix=html&amp;identifier=ADA447302","pdf_url":null,"source":{"id":"https://openalex.org/S4406923043","display_name":"Defense Technical Information Center (DTIC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"DTIC","raw_type":"Text"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6299999952316284}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W41699526","https://openalex.org/W90561696","https://openalex.org/W1486268276","https://openalex.org/W1504293456","https://openalex.org/W1504916267","https://openalex.org/W1506072753","https://openalex.org/W1548980824","https://openalex.org/W1621186777","https://openalex.org/W1674877186","https://openalex.org/W2081706040","https://openalex.org/W2099574482","https://openalex.org/W2107409339","https://openalex.org/W2116844130","https://openalex.org/W2126345423","https://openalex.org/W2166332868","https://openalex.org/W2166657964","https://openalex.org/W2288766236","https://openalex.org/W2622427009"],"related_works":["https://openalex.org/W3148526535","https://openalex.org/W2380962566","https://openalex.org/W2368379890","https://openalex.org/W2183525346","https://openalex.org/W2350859535","https://openalex.org/W2009124313","https://openalex.org/W2379417114","https://openalex.org/W2184360008","https://openalex.org/W2081159194","https://openalex.org/W2383965035"],"abstract_inverted_index":{"Intrusion":[0,38,191],"detection":[1,39,54,112,131,165],"systems":[2,40,55,81,132,166],"are":[3,31,62,200],"distributed":[4],"applications":[5],"that":[6,30,82,105,149,199],"analyze":[7],"the":[8,57,71,78,107,147,150,155,158,179,215,222,227],"events":[9],"in":[10,43,91,114,146],"a":[11,23,34,101,115,125,168,204],"networked":[12],"system":[13],"to":[14,69,84,128,134,181,194,203],"identify":[15],"malicious":[16],"behavior.":[17],"The":[18,118,141,162,186],"analysis":[19],"is":[20,144],"performed":[21],"using":[22],"number":[24,79],"of":[25,49,73,80,109,157,214,221,226],"attack":[26,59,159,175],"models":[27],"(or":[28],"signatures)":[29],"matched":[32],"against":[33],"specific":[35,74,135],"event":[36,50,139],"stream.":[37],"may":[41],"operate":[42],"heterogeneous":[44],"environments,":[45,136],"analyzing":[46],"different":[47],"types":[48],"streams.":[51,140],"Currently,":[52],"intrusion":[53,111,130,164],"and":[56,138,178,218,224],"corresponding":[58],"modeling":[60,160,176],"languages":[61],"developed":[63,100],"following":[64,124],"an":[65,190],"ad":[66],"hoc":[67],"approach":[68,89,211],"match":[70],"characteristics":[72],"target":[75],"environments.":[76],"As":[77],"have":[83],"be":[85,122],"protected":[86],"increases,":[87],"this":[88,97],"results":[90],"increased":[92],"development":[93,108],"effort.":[94],"To":[95],"overcome":[96],"limitation,":[98],"we":[99],"framework,":[102],"called":[103],"STAT,":[104],"supports":[106,212],"new":[110],"functionality":[113],"modular":[116],"fashion.":[117],"STAT":[119,142,187],"framework":[120,143,188],"can":[121],"extended":[123],"well-defined":[126],"process":[127,152],"implement":[129],"tailored":[133],"platforms,":[137],"novel":[145],"fact":[148],"extension":[151,156],"also":[153],"includes":[154],"language.":[161],"resulting":[163],"represent":[167],"software":[169],"family":[170],"whose":[171],"members":[172],"share":[173],"common":[174],"features":[177],"ability":[180],"reconfigure":[182],"their":[183],"behavior":[184],"dynamically.":[185],"allows":[189],"Detection":[192],"Administrator":[193],"express":[195],"high-level":[196],"configuration":[197],"requirements":[198],"mapped":[201],"automatically":[202],"detailed":[205],"deployment":[206],"and/or":[207],"reconfiguration":[208],"plan.":[209],"This":[210],"automation":[213],"administrator":[216],"tasks":[217],"better":[219],"assurance":[220],"effectiveness":[223],"consistency":[225],"deployed":[228],"sensing":[229],"infrastructure.":[230]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
