{"id":"https://openalex.org/W2037696421","doi":"https://doi.org/10.1145/1509315.1509393","title":"An adaptive architecture of applying vulnerability analysis to IDS alerts","display_name":"An adaptive architecture of applying vulnerability analysis to IDS alerts","publication_year":2008,"publication_date":"2008-01-01","ids":{"openalex":"https://openalex.org/W2037696421","doi":"https://doi.org/10.1145/1509315.1509393","mag":"2037696421"},"language":"en","primary_location":{"id":"doi:10.1145/1509315.1509393","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1509315.1509393","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2008 International Conference on Advanced Infocomm Technology - ICAIT '08","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100624805","display_name":"Xuejiao Liu","orcid":"https://orcid.org/0000-0002-6532-8694"},"institutions":[{"id":"https://openalex.org/I40963666","display_name":"Central China Normal University","ror":"https://ror.org/03x1jna21","country_code":"CN","type":"education","lineage":["https://openalex.org/I40963666"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xuejiao Liu","raw_affiliation_strings":["HuaZhong Normal University, Wuhan, P.R. China","Huazhong Normal University, Wuhan, P.R. China"],"affiliations":[{"raw_affiliation_string":"HuaZhong Normal University, Wuhan, P.R. China","institution_ids":["https://openalex.org/I40963666"]},{"raw_affiliation_string":"Huazhong Normal University, Wuhan, P.R. China","institution_ids":["https://openalex.org/I40963666"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039812399","display_name":"Xin Zhuang","orcid":"https://orcid.org/0000-0002-7605-2363"},"institutions":[{"id":"https://openalex.org/I40963666","display_name":"Central China Normal University","ror":"https://ror.org/03x1jna21","country_code":"CN","type":"education","lineage":["https://openalex.org/I40963666"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Zhuang","raw_affiliation_strings":["HuaZhong Normal University, Wuhan, P.R. China","Huazhong Normal University, Wuhan, P.R. China"],"affiliations":[{"raw_affiliation_string":"HuaZhong Normal University, Wuhan, P.R. China","institution_ids":["https://openalex.org/I40963666"]},{"raw_affiliation_string":"Huazhong Normal University, Wuhan, P.R. China","institution_ids":["https://openalex.org/I40963666"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111991270","display_name":"Debao Xiao","orcid":null},"institutions":[{"id":"https://openalex.org/I40963666","display_name":"Central China Normal University","ror":"https://ror.org/03x1jna21","country_code":"CN","type":"education","lineage":["https://openalex.org/I40963666"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debao Xiao","raw_affiliation_strings":["HuaZhong Normal University, Wuhan, P.R. China","Huazhong Normal University, Wuhan, P.R. China"],"affiliations":[{"raw_affiliation_string":"HuaZhong Normal University, Wuhan, P.R. China","institution_ids":["https://openalex.org/I40963666"]},{"raw_affiliation_string":"Huazhong Normal University, Wuhan, P.R. China","institution_ids":["https://openalex.org/I40963666"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100624805"],"corresponding_institution_ids":["https://openalex.org/I40963666"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1057346,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7892173528671265},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7829985618591309},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.6981461644172668},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6656334400177002},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6487484574317932},{"id":"https://openalex.org/keywords/vulnerability-management","display_name":"Vulnerability management","score":0.63777095079422},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.6271550059318542},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5580511093139648},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.43135306239128113},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09460848569869995}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7892173528671265},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7829985618591309},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.6981461644172668},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6656334400177002},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6487484574317932},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.63777095079422},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.6271550059318542},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5580511093139648},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.43135306239128113},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09460848569869995},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C124017977","wikidata":"https://www.wikidata.org/wiki/Q11412","display_name":"Gravitation","level":2,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C115304011","wikidata":"https://www.wikidata.org/wiki/Q72755","display_name":"Schwarzschild radius","level":3,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C74650414","wikidata":"https://www.wikidata.org/wiki/Q11397","display_name":"Classical mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1509315.1509393","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1509315.1509393","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2008 International Conference on Advanced Infocomm Technology - ICAIT '08","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W180635713","https://openalex.org/W1495172800","https://openalex.org/W1495304983","https://openalex.org/W1989440310","https://openalex.org/W2008170713","https://openalex.org/W2054127354","https://openalex.org/W2066159670","https://openalex.org/W2115149820","https://openalex.org/W2152449272","https://openalex.org/W2364642770","https://openalex.org/W3105682467"],"related_works":["https://openalex.org/W2387982609","https://openalex.org/W2359453783","https://openalex.org/W2393340519","https://openalex.org/W2390459954","https://openalex.org/W4220885008","https://openalex.org/W2057803998","https://openalex.org/W2993489091","https://openalex.org/W2366522092","https://openalex.org/W4360997342","https://openalex.org/W2358649166"],"abstract_inverted_index":{"With":[0],"increasing":[1],"intrusions":[2],"and":[3,68,126,160],"attacks":[4],"on":[5],"the":[6,26,29,34,37,46,114,147,150,153],"Internet,":[7],"there":[8],"is":[9,103,156],"an":[10,86],"urgent":[11],"need":[12],"to":[13,64,76,97,144],"develop":[14],"techniques":[15],"for":[16,93,135],"network":[17,21,50,79,99],"security.":[18],"Current":[19],"standalone":[20],"security":[22,56,61],"products,":[23],"such":[24],"as":[25,105],"firewall":[27],"systems,":[28],"Intrusion":[30,130],"Detection":[31,131],"System":[32],"(IDS),":[33],"anti-virus":[35],"software,":[36],"vulnerability":[38,91,128,139],"scanning":[39],"software":[40],"are":[41,72],"not":[42],"capable":[43],"of":[44,48,89],"withstanding":[45],"onslaught":[47],"various":[49],"threats.":[51],"As":[52],"a":[53,106],"result,":[54],"new":[55],"paradigms,":[57],"which":[58],"integrate":[59],"some":[60],"devices":[62],"closely":[63],"provide":[65],"accurate":[66],"alerts":[67,115,134],"attain":[69],"enhanced":[70],"protection":[71],"emerging.":[73],"In":[74],"order":[75],"achieve":[77],"better":[78],"security,":[80],"in":[81],"this":[82],"paper":[83],"we":[84],"present":[85],"adaptive":[87],"architecture":[88,102],"applying":[90],"analysis":[92,140],"multiple":[94,124],"detection":[95,110],"sensors":[96,125],"detect":[98],"intrusions.":[100],"The":[101],"designed":[104],"layer":[107],"above":[108],"intrusion":[109],"aimed":[111],"at":[112],"classifying":[113],"overload":[116],"with":[117],"different":[118],"severity":[119],"by":[120,162],"correlating":[121],"results":[122],"from":[123],"integrating":[127],"analysis.":[129],"produces":[132],"basic":[133],"further":[136],"evaluation,":[137],"whereas":[138],"provides":[141],"important":[142],"information":[143],"help":[145],"identify":[146],"alerts.":[148],"At":[149],"same":[151],"time,":[152],"whole":[154],"process":[155],"made":[157],"more":[158],"efficient":[159],"effective":[161],"using":[163],"predicate-based":[164],"evaluation.":[165]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
