{"id":"https://openalex.org/W2081696444","doi":"https://doi.org/10.1145/1644993.1645037","title":"Design and implementation of a distributed early warning system combined with intrusion detection system and honeypot","display_name":"Design and implementation of a distributed early warning system combined with intrusion detection system and honeypot","publication_year":2009,"publication_date":"2009-08-27","ids":{"openalex":"https://openalex.org/W2081696444","doi":"https://doi.org/10.1145/1644993.1645037","mag":"2081696444"},"language":"en","primary_location":{"id":"doi:10.1145/1644993.1645037","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1644993.1645037","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2009 International Conference on Hybrid Information Technology","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053120633","display_name":"Peisheng Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I135551196","display_name":"National Kaohsiung Normal University","ror":"https://ror.org/04tsc8g87","country_code":"TW","type":"education","lineage":["https://openalex.org/I135551196"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Pei-Sheng Huang","raw_affiliation_strings":["National Kaohsiung Normal University, Taiwan","National Kaohsiung Normal University , Taiwan"],"affiliations":[{"raw_affiliation_string":"National Kaohsiung Normal University, Taiwan","institution_ids":["https://openalex.org/I135551196"]},{"raw_affiliation_string":"National Kaohsiung Normal University , Taiwan","institution_ids":["https://openalex.org/I135551196"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111998293","display_name":"Chung-Huang Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I135551196","display_name":"National Kaohsiung Normal University","ror":"https://ror.org/04tsc8g87","country_code":"TW","type":"education","lineage":["https://openalex.org/I135551196"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chung-Huang Yang","raw_affiliation_strings":["National Kaohsiung Normal University, Taiwan","National Kaohsiung Normal University , Taiwan"],"affiliations":[{"raw_affiliation_string":"National Kaohsiung Normal University, Taiwan","institution_ids":["https://openalex.org/I135551196"]},{"raw_affiliation_string":"National Kaohsiung Normal University , Taiwan","institution_ids":["https://openalex.org/I135551196"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064897986","display_name":"Tae-Nam Ahn","orcid":null},"institutions":[{"id":"https://openalex.org/I112728665","display_name":"Hannam University","ror":"https://ror.org/01cwbae71","country_code":"KR","type":"education","lineage":["https://openalex.org/I112728665"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Tae-Nam Ahn","raw_affiliation_strings":["Hannam University, Korea","Hannam University , Korea"],"affiliations":[{"raw_affiliation_string":"Hannam University, Korea","institution_ids":["https://openalex.org/I112728665"]},{"raw_affiliation_string":"Hannam University , Korea","institution_ids":["https://openalex.org/I112728665"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5053120633"],"corresponding_institution_ids":["https://openalex.org/I135551196"],"apc_list":null,"apc_paid":null,"fwci":1.0282,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.78133353,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"232","last_page":"238"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.940208911895752},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7191492915153503},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7014249563217163},{"id":"https://openalex.org/keywords/software-portability","display_name":"Software portability","score":0.620045006275177},{"id":"https://openalex.org/keywords/early-warning-system","display_name":"Early warning system","score":0.602938175201416},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.5866327285766602},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5791563391685486},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5697476863861084},{"id":"https://openalex.org/keywords/warning-system","display_name":"Warning system","score":0.5369130969047546},{"id":"https://openalex.org/keywords/host-based-intrusion-detection-system","display_name":"Host-based intrusion detection system","score":0.5224672555923462},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.44463425874710083},{"id":"https://openalex.org/keywords/ipv6","display_name":"IPv6","score":0.4282614290714264},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.38965901732444763},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3780253529548645},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.33798474073410034},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.16787004470825195},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.14935460686683655}],"concepts":[{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.940208911895752},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7191492915153503},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7014249563217163},{"id":"https://openalex.org/C63000827","wikidata":"https://www.wikidata.org/wiki/Q3080428","display_name":"Software portability","level":2,"score":0.620045006275177},{"id":"https://openalex.org/C2779296788","wikidata":"https://www.wikidata.org/wiki/Q5326904","display_name":"Early warning system","level":3,"score":0.602938175201416},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.5866327285766602},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5791563391685486},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5697476863861084},{"id":"https://openalex.org/C29825287","wikidata":"https://www.wikidata.org/wiki/Q1427940","display_name":"Warning system","level":2,"score":0.5369130969047546},{"id":"https://openalex.org/C90936777","wikidata":"https://www.wikidata.org/wiki/Q917189","display_name":"Host-based intrusion detection system","level":4,"score":0.5224672555923462},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.44463425874710083},{"id":"https://openalex.org/C84555802","wikidata":"https://www.wikidata.org/wiki/Q2551624","display_name":"IPv6","level":3,"score":0.4282614290714264},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.38965901732444763},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3780253529548645},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.33798474073410034},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.16787004470825195},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.14935460686683655},{"id":"https://openalex.org/C115304011","wikidata":"https://www.wikidata.org/wiki/Q72755","display_name":"Schwarzschild radius","level":3,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C124017977","wikidata":"https://www.wikidata.org/wiki/Q11412","display_name":"Gravitation","level":2,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C74650414","wikidata":"https://www.wikidata.org/wiki/Q11397","display_name":"Classical mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1644993.1645037","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1644993.1645037","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2009 International Conference on Hybrid Information Technology","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W179074789","https://openalex.org/W1538412636","https://openalex.org/W1968519345","https://openalex.org/W2015181775","https://openalex.org/W2034065435","https://openalex.org/W2163277533","https://openalex.org/W2294667916","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2387934347","https://openalex.org/W2044073281","https://openalex.org/W2185536772","https://openalex.org/W2774213453","https://openalex.org/W2111780221","https://openalex.org/W2126363842","https://openalex.org/W2391043948","https://openalex.org/W2373691277","https://openalex.org/W2387982609","https://openalex.org/W2390157899"],"abstract_inverted_index":{"Network":[0,114],"attack":[1,59,66],"and":[2,20,26,43,73,99,149,159],"defense":[3],"is":[4],"a":[5,45,54,70],"never-ending":[6],"war.":[7],"Along":[8],"with":[9,90,97,109,156],"the":[10,14,78,121,130,133,143,146],"rapid":[11,34],"development":[12],"of":[13,23,57,85,106,135],"Internet,":[15],"network":[16,58,79,123],"attacks":[17],"have":[18],"increased":[19],"diversified.":[21],"Use":[22],"traditional":[24],"firewall":[25],"intrusion":[27,87],"detection":[28,88],"technologies":[29],"cannot":[30],"match":[31],"to":[32,38,69,77],"this":[33,39],"change.":[35],"In":[36],"response":[37],"trend,":[40],"we":[41,140],"designed":[42],"implemented":[44,142],"distributed":[46,136],"early":[47,137],"warning":[48,75,118,138],"system":[49,83,89,144,151],"where":[50],"several":[51],"clients":[52],"collected":[53],"wide":[55],"range":[56],"activities,":[60],"such":[61],"as":[62],"malicious":[63],"codes,":[64],"sent":[65],"activities":[67],"back":[68],"central":[71],"server,":[72],"provided":[74],"messages":[76],"administrator.":[80],"The":[81],"proposed":[82],"consists":[84],"Snort":[86],"Nepenthes/Sebek":[91],"honeypot":[92],"software.":[93],"This":[94],"combination":[95],"comes":[96],"client":[98],"server":[100],"architecture":[101],"so":[102],"that":[103],"various":[104],"aspects":[105],"attack-oriented":[107],"records":[108],"analytical":[110],"capabilities":[111],"are":[112],"provided.":[113],"administrators":[115],"will":[116],"receive":[117],"notices":[119],"when":[120],"entire":[122],"under":[124],"monitoring":[125],"was":[126],"attacking.":[127],"To":[128],"reduce":[129],"burden":[131],"on":[132,145],"deployment":[134],"system,":[139],"also":[141],"live":[147],"USB":[148],"our":[150],"can":[152],"be":[153],"easily":[154],"installed":[155],"high":[157],"portability":[158],"plug-and-play":[160],"features.":[161]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
