{"id":"https://openalex.org/W2027313201","doi":"https://doi.org/10.1145/2490428.2490459","title":"Towards application classification with vulnerability signatures for IDS/IPS","display_name":"Towards application classification with vulnerability signatures for IDS/IPS","publication_year":2012,"publication_date":"2012-08-17","ids":{"openalex":"https://openalex.org/W2027313201","doi":"https://doi.org/10.1145/2490428.2490459","mag":"2027313201"},"language":"en","primary_location":{"id":"doi:10.1145/2490428.2490459","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2490428.2490459","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the First International Conference on Security of Internet of Things","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5097962812","display_name":"Dhiren","orcid":null},"institutions":[{"id":"https://openalex.org/I114173286","display_name":"Gujarat University","ror":"https://ror.org/017f2w007","country_code":"IN","type":"education","lineage":["https://openalex.org/I114173286"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Dhiren","raw_affiliation_strings":["Gujarat University","GUJARAT UNIVERSITY"],"affiliations":[{"raw_affiliation_string":"Gujarat University","institution_ids":["https://openalex.org/I114173286"]},{"raw_affiliation_string":"GUJARAT UNIVERSITY","institution_ids":["https://openalex.org/I114173286"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5097773203","display_name":"Maulik","orcid":null},"institutions":[{"id":"https://openalex.org/I114173286","display_name":"Gujarat University","ror":"https://ror.org/017f2w007","country_code":"IN","type":"education","lineage":["https://openalex.org/I114173286"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Maulik","raw_affiliation_strings":["Gujarat University","GUJARAT UNIVERSITY"],"affiliations":[{"raw_affiliation_string":"Gujarat University","institution_ids":["https://openalex.org/I114173286"]},{"raw_affiliation_string":"GUJARAT UNIVERSITY","institution_ids":["https://openalex.org/I114173286"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003254001","display_name":"Hardik Joshi","orcid":"https://orcid.org/0000-0002-5431-0173"},"institutions":[{"id":"https://openalex.org/I114173286","display_name":"Gujarat University","ror":"https://ror.org/017f2w007","country_code":"IN","type":"education","lineage":["https://openalex.org/I114173286"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Hardik Joshi","raw_affiliation_strings":["Gujarat University","GUJARAT UNIVERSITY"],"affiliations":[{"raw_affiliation_string":"Gujarat University","institution_ids":["https://openalex.org/I114173286"]},{"raw_affiliation_string":"GUJARAT UNIVERSITY","institution_ids":["https://openalex.org/I114173286"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051454107","display_name":"Bhadresh K. Patel","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bhadresh K. Patel","raw_affiliation_strings":["IPS Cyberoam, Elitecore Technology Pvt. Ltd"],"affiliations":[{"raw_affiliation_string":"IPS Cyberoam, Elitecore Technology Pvt. Ltd","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5097962812"],"corresponding_institution_ids":["https://openalex.org/I114173286"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.130782,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"216","last_page":"221"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.9492949843406677},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.8253601789474487},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7864784002304077},{"id":"https://openalex.org/keywords/vulnerability-management","display_name":"Vulnerability management","score":0.6423141360282898},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5246368050575256},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.48918941617012024},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.4753822386264801},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4661698639392853},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.42264658212661743},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3427489697933197},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.090849369764328}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.9492949843406677},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.8253601789474487},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7864784002304077},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.6423141360282898},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5246368050575256},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.48918941617012024},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.4753822386264801},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4661698639392853},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.42264658212661743},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3427489697933197},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.090849369764328},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2490428.2490459","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2490428.2490459","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the First International Conference on Security of Internet of Things","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6899999976158142,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W88694106","https://openalex.org/W1674877186","https://openalex.org/W1777160738","https://openalex.org/W1979820341","https://openalex.org/W1988918299","https://openalex.org/W2034362794","https://openalex.org/W2100583963","https://openalex.org/W2113766921","https://openalex.org/W2145722235","https://openalex.org/W2163446760","https://openalex.org/W2163762767","https://openalex.org/W2170377904","https://openalex.org/W2743634147"],"related_works":["https://openalex.org/W2393340519","https://openalex.org/W2390459954","https://openalex.org/W4220885008","https://openalex.org/W2057803998","https://openalex.org/W4298219515","https://openalex.org/W1613146948","https://openalex.org/W2021298062","https://openalex.org/W2185499427","https://openalex.org/W3118510577","https://openalex.org/W4388541873"],"abstract_inverted_index":{"In":[0,49],"today's":[1],"interconnected":[2],"networks,":[3],"Intrusion":[4],"Detection":[5],"Systems":[6],"(IDSs),":[7],"encryption":[8],"devices":[9],"and":[10,12,36,118],"firewalls":[11],"crucial":[13],"in":[14,32,165,172],"providing":[15],"a":[16,67,93,113,145],"complete":[17],"security":[18],"solution.":[19],"A":[20,60],"recent":[21],"survey":[22],"has":[23],"indicated":[24],"that":[25,122],"around":[26],"80":[27],"percent":[28,38],"of":[29,39,47,56,66,86,97,102,110,144,175],"attacks":[30,41],"originate":[31],"the":[33,40,54,84,87,98,103,108,124,142,158,185],"application":[34,163],"layer":[35],"75":[37],"use":[42],"exploits":[43,65],"to":[44],"take":[45],"advantage":[46],"vulnerability.":[48,125],"this":[50],"paper":[51],"we":[52,161],"explore":[53],"problem":[55],"creating":[57],"vulnerability":[58,61,90,111,146,159,186],"signatures.":[59],"signature":[62,147,187],"matches":[63],"all":[64,117,153],"given":[68],"vulnerability,":[69],"even":[70],"polymorphic":[71],"or":[72,100],"metamorphic":[73],"variants.":[74],"Our":[75],"work":[76],"departs":[77],"from":[78],"previous":[79],"approaches":[80],"by":[81,92],"focusing":[82],"on":[83],"semantics":[85,99,109],"program":[88],"and,":[89],"exercised":[91],"sample":[94],"exploit":[95,104,123,127],"instead":[96],"syntax":[101],"itself.":[105],"We":[106,179],"show":[107],"define":[112],"language":[114],"which":[115],"contains":[116],"only":[119,134],"those":[120],"inputs":[121],"Unlike":[126],"based":[128],"signatures":[129],"whose":[130],"error":[131],"rate":[132],"can":[133,148],"be":[135,149],"empirically":[136],"measured":[137],"for":[138,152,184,189],"known":[139],"test":[140],"cases,":[141],"quality":[143],"formally":[150],"quantified":[151],"possible":[154],"inputs.":[155],"Also":[156],"with":[157],"signatures,":[160],"perform":[162],"classification":[164,170],"our":[166],"IDPS":[167],"system.":[168],"Application":[169],"helps":[171],"better":[173],"management":[174],"an":[176],"organizational":[177],"network.":[178],"propose":[180],"new":[181],"work-flow":[182],"logic":[183],"creation":[188],"desired":[190],"results":[191]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
