{"id":"https://openalex.org/W4394898235","doi":"https://doi.org/10.1145/3650400.3650650","title":"Research on intrusion detection based on Boyer-Moore pattern matching algorithm","display_name":"Research on intrusion detection based on Boyer-Moore pattern matching algorithm","publication_year":2023,"publication_date":"2023-10-20","ids":{"openalex":"https://openalex.org/W4394898235","doi":"https://doi.org/10.1145/3650400.3650650"},"language":"en","primary_location":{"id":"doi:10.1145/3650400.3650650","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3650400.3650650","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060180162","display_name":"Yulong Li","orcid":"https://orcid.org/0009-0004-7893-306X"},"institutions":[{"id":"https://openalex.org/I49232843","display_name":"Changchun University","ror":"https://ror.org/02an57k10","country_code":"CN","type":"education","lineage":["https://openalex.org/I49232843"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yulong Li","raw_affiliation_strings":["Cybersecurity Academy, Changchun University, China"],"raw_orcid":"https://orcid.org/0009-0004-7893-306X","affiliations":[{"raw_affiliation_string":"Cybersecurity Academy, Changchun University, China","institution_ids":["https://openalex.org/I49232843"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021767543","display_name":"C. H. Li","orcid":"https://orcid.org/0009-0004-9202-6685"},"institutions":[{"id":"https://openalex.org/I49232843","display_name":"Changchun University","ror":"https://ror.org/02an57k10","country_code":"CN","type":"education","lineage":["https://openalex.org/I49232843"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chenhao Li","raw_affiliation_strings":["Cybersecurity Academy, Changchun University, China"],"raw_orcid":"https://orcid.org/0009-0004-9202-6685","affiliations":[{"raw_affiliation_string":"Cybersecurity Academy, Changchun University, China","institution_ids":["https://openalex.org/I49232843"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070522921","display_name":"Yang Jiao","orcid":"https://orcid.org/0009-0003-4283-0088"},"institutions":[{"id":"https://openalex.org/I4210140623","display_name":"Sixth Hospital of Changchun City","ror":"https://ror.org/034npc439","country_code":"CN","type":"healthcare","lineage":["https://openalex.org/I4210140623"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Jiao","raw_affiliation_strings":["Changchun sixth middle school, China"],"raw_orcid":"https://orcid.org/0009-0003-4283-0088","affiliations":[{"raw_affiliation_string":"Changchun sixth middle school, China","institution_ids":["https://openalex.org/I4210140623"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075788820","display_name":"Guogang Zhao","orcid":"https://orcid.org/0009-0009-7703-0076"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Guogang Zhao","raw_affiliation_strings":["Jilin provincial transport scientific research instiina, China"],"raw_orcid":"https://orcid.org/0009-0009-7703-0076","affiliations":[{"raw_affiliation_string":"Jilin provincial transport scientific research instiina, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012425298","display_name":"Yang Liu","orcid":"https://orcid.org/0009-0006-9048-8178"},"institutions":[{"id":"https://openalex.org/I4210126577","display_name":"Shanghai Public Security Bureau","ror":"https://ror.org/03cfv5b91","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210126577"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Liu","raw_affiliation_strings":["Chongqing Public Security Bureau, China"],"raw_orcid":"https://orcid.org/0009-0006-9048-8178","affiliations":[{"raw_affiliation_string":"Chongqing Public Security Bureau, China","institution_ids":["https://openalex.org/I4210126577"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010281272","display_name":"Tian Zhang","orcid":"https://orcid.org/0009-0007-9111-2612"},"institutions":[{"id":"https://openalex.org/I4210126577","display_name":"Shanghai Public Security Bureau","ror":"https://ror.org/03cfv5b91","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210126577"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tian Zhang","raw_affiliation_strings":["Chongqing Public Security Bureau, China"],"raw_orcid":"https://orcid.org/0009-0007-9111-2612","affiliations":[{"raw_affiliation_string":"Chongqing Public Security Bureau, China","institution_ids":["https://openalex.org/I4210126577"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5060180162"],"corresponding_institution_ids":["https://openalex.org/I49232843"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.2692808,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1490","last_page":"1494"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8219658136367798},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.8077897429466248},{"id":"https://openalex.org/keywords/cross-site-scripting","display_name":"Cross-site scripting","score":0.6479580998420715},{"id":"https://openalex.org/keywords/sql-injection","display_name":"SQL injection","score":0.5499647259712219},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4874122440814972},{"id":"https://openalex.org/keywords/pattern-matching","display_name":"Pattern matching","score":0.4394001066684723},{"id":"https://openalex.org/keywords/internet-security","display_name":"Internet security","score":0.4307451844215393},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.42603427171707153},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.42296475172042847},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3980519771575928},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.3549458384513855},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3500092625617981},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3057507872581482},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.30545592308044434},{"id":"https://openalex.org/keywords/web-page","display_name":"Web page","score":0.2362375259399414},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.21832090616226196},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.21631258726119995},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.20739826560020447},{"id":"https://openalex.org/keywords/search-engine","display_name":"Search engine","score":0.095916748046875},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.0957963764667511},{"id":"https://openalex.org/keywords/web-search-query","display_name":"Web search query","score":0.07685711979866028},{"id":"https://openalex.org/keywords/query-by-example","display_name":"Query by Example","score":0.07441002130508423}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8219658136367798},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.8077897429466248},{"id":"https://openalex.org/C39569185","wikidata":"https://www.wikidata.org/wiki/Q371199","display_name":"Cross-site scripting","level":5,"score":0.6479580998420715},{"id":"https://openalex.org/C150451098","wikidata":"https://www.wikidata.org/wiki/Q506059","display_name":"SQL injection","level":5,"score":0.5499647259712219},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4874122440814972},{"id":"https://openalex.org/C68859911","wikidata":"https://www.wikidata.org/wiki/Q1503724","display_name":"Pattern matching","level":2,"score":0.4394001066684723},{"id":"https://openalex.org/C22111027","wikidata":"https://www.wikidata.org/wiki/Q1070427","display_name":"Internet security","level":4,"score":0.4307451844215393},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.42603427171707153},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.42296475172042847},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3980519771575928},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.3549458384513855},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3500092625617981},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3057507872581482},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.30545592308044434},{"id":"https://openalex.org/C21959979","wikidata":"https://www.wikidata.org/wiki/Q36774","display_name":"Web page","level":2,"score":0.2362375259399414},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.21832090616226196},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.21631258726119995},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.20739826560020447},{"id":"https://openalex.org/C97854310","wikidata":"https://www.wikidata.org/wiki/Q19541","display_name":"Search engine","level":2,"score":0.095916748046875},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.0957963764667511},{"id":"https://openalex.org/C164120249","wikidata":"https://www.wikidata.org/wiki/Q995982","display_name":"Web search query","level":3,"score":0.07685711979866028},{"id":"https://openalex.org/C194222762","wikidata":"https://www.wikidata.org/wiki/Q114486","display_name":"Query by Example","level":4,"score":0.07441002130508423},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3650400.3650650","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3650400.3650650","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6100000143051147}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W2790282371","https://openalex.org/W4283515566","https://openalex.org/W4283724685"],"related_works":["https://openalex.org/W2955734438","https://openalex.org/W2167752994","https://openalex.org/W2775081089","https://openalex.org/W2504194819","https://openalex.org/W4256450364","https://openalex.org/W2407701912","https://openalex.org/W4238821156","https://openalex.org/W1982746004","https://openalex.org/W4245700610","https://openalex.org/W2791970934"],"abstract_inverted_index":{"The":[0,125],"security":[1,48,123,147],"of":[2,15,34,49,132],"WEB":[3,22,36,50,150],"applications":[4],"has":[5,102],"always":[6],"been":[7],"an":[8,58,100],"important":[9],"research":[10],"direction":[11],"in":[12],"the":[13,31,35,47,64,79,106,110,121,128,133],"field":[14],"network":[16],"security.":[17],"Intrusion":[18],"detection":[19,27,60,87,107,135],"based":[20,62,77,137],"on":[21,63,78,138],"logs":[23,33],"is":[24,76],"a":[25,113],"common":[26],"method.":[28],"It":[29,84],"analyzes":[30],"access":[32],"server":[37],"to":[38,67,89,97,109,116],"detect":[39],"malicious":[40],"requests":[41],"and":[42,71,104,130],"attack":[43,101],"behaviors,":[44],"thereby":[45],"protecting":[46],"applications.":[51,151],"In":[52],"this":[53],"article,":[54],"we":[55],"will":[56],"discuss":[57],"intrusion":[59,134],"method":[61,75],"Boyer-Moore":[65,139],"algorithm":[66,82],"prevent":[68],"SQL":[69],"injection":[70],"XSS":[72],"attacks.":[73],"This":[74],"pattern":[80,140],"matching":[81,141],"Boyer-Moore.":[83],"uses":[85],"misuse":[86],"technology":[88],"compare":[90],"log":[91],"information":[92],"with":[93],"known":[94],"feature":[95],"values":[96],"determine":[98],"whether":[99],"occurred,":[103],"displays":[105],"results":[108],"user":[111],"through":[112],"visual":[114],"interface":[115],"help":[117],"users":[118],"Better":[119],"understand":[120],"current":[122],"landscape.":[124],"experiment":[126],"verified":[127],"effectiveness":[129],"feasibility":[131],"system":[136],"algorithm,":[142],"which":[143],"can":[144],"provide":[145],"strong":[146],"guarantee":[148],"for":[149]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
