{"id":"https://openalex.org/W4400798772","doi":"https://doi.org/10.1145/3671016.3674812","title":"CIDF:Combined Intrusion Detection Framework in Industrial Control Systems based on Packet Signature and Enhanced FSFDP","display_name":"CIDF:Combined Intrusion Detection Framework in Industrial Control Systems based on Packet Signature and Enhanced FSFDP","publication_year":2024,"publication_date":"2024-07-17","ids":{"openalex":"https://openalex.org/W4400798772","doi":"https://doi.org/10.1145/3671016.3674812"},"language":"en","primary_location":{"id":"doi:10.1145/3671016.3674812","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3671016.3674812","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th Asia-Pacific Symposium on Internetware","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016677170","display_name":"Jianwen Xiang","orcid":"https://orcid.org/0000-0001-8440-4181"},"institutions":[{"id":"https://openalex.org/I196699116","display_name":"Wuhan University of Technology","ror":"https://ror.org/03fe7t173","country_code":"CN","type":"education","lineage":["https://openalex.org/I196699116"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jianwen Xiang","raw_affiliation_strings":["School of Computer Science and Artificial Intelligence, Wuhan University of Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Artificial Intelligence, Wuhan University of Technology, China","institution_ids":["https://openalex.org/I196699116"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079070883","display_name":"Xue-min Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I196699116","display_name":"Wuhan University of Technology","ror":"https://ror.org/03fe7t173","country_code":"CN","type":"education","lineage":["https://openalex.org/I196699116"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuemin Zhang","raw_affiliation_strings":["School of Computer Science and Artificial Intelligence, Wuhan University of Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Artificial Intelligence, Wuhan University of Technology, China","institution_ids":["https://openalex.org/I196699116"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102535455","display_name":"Qianrong Zheng","orcid":"https://orcid.org/0000-0002-6398-8867"},"institutions":[{"id":"https://openalex.org/I196699116","display_name":"Wuhan University of Technology","ror":"https://ror.org/03fe7t173","country_code":"CN","type":"education","lineage":["https://openalex.org/I196699116"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qianrong Zheng","raw_affiliation_strings":["School of Computer Science and Artificial Intelligence, Wuhan University of Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Artificial Intelligence, Wuhan University of Technology, China","institution_ids":["https://openalex.org/I196699116"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068044706","display_name":"Longmin Deng","orcid":null},"institutions":[{"id":"https://openalex.org/I196699116","display_name":"Wuhan University of Technology","ror":"https://ror.org/03fe7t173","country_code":"CN","type":"education","lineage":["https://openalex.org/I196699116"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Longmin Deng","raw_affiliation_strings":["School of Computer Science and Artificial Intelligence, Wuhan University of Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Artificial Intelligence, Wuhan University of Technology, China","institution_ids":["https://openalex.org/I196699116"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101936847","display_name":"Dongdong Zhao","orcid":"https://orcid.org/0000-0002-4697-6901"},"institutions":[{"id":"https://openalex.org/I196699116","display_name":"Wuhan University of Technology","ror":"https://ror.org/03fe7t173","country_code":"CN","type":"education","lineage":["https://openalex.org/I196699116"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongdong Zhao","raw_affiliation_strings":["School of Computer Science and Artificial Intelligence, Wuhan University of Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Artificial Intelligence, Wuhan University of Technology, China","institution_ids":["https://openalex.org/I196699116"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056068917","display_name":"Junwei Zhou","orcid":"https://orcid.org/0000-0002-6094-1203"},"institutions":[{"id":"https://openalex.org/I196699116","display_name":"Wuhan University of Technology","ror":"https://ror.org/03fe7t173","country_code":"CN","type":"education","lineage":["https://openalex.org/I196699116"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junwei Zhou","raw_affiliation_strings":["School of Computer Science and Artificial Intelligence, Wuhan University of Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Artificial Intelligence, Wuhan University of Technology, China","institution_ids":["https://openalex.org/I196699116"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5016677170"],"corresponding_institution_ids":["https://openalex.org/I196699116"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.11193249,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"417","last_page":"426"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7493502497673035},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.689841091632843},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.6415405869483948},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5723288059234619},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.5083164572715759},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.439449667930603},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4135195016860962},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.38803064823150635},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34404194355010986},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.32376837730407715},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.18636590242385864}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7493502497673035},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.689841091632843},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.6415405869483948},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5723288059234619},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.5083164572715759},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.439449667930603},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4135195016860962},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.38803064823150635},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34404194355010986},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.32376837730407715},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.18636590242385864},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3671016.3674812","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3671016.3674812","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th Asia-Pacific Symposium on Internetware","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1571403844","https://openalex.org/W1640811473","https://openalex.org/W1998016948","https://openalex.org/W2023585250","https://openalex.org/W2042459928","https://openalex.org/W2061243822","https://openalex.org/W2089944128","https://openalex.org/W2161630727","https://openalex.org/W2293378006","https://openalex.org/W2295637543","https://openalex.org/W2330650066","https://openalex.org/W2437244913","https://openalex.org/W2622127425","https://openalex.org/W2753352458","https://openalex.org/W2958285686","https://openalex.org/W2980035252","https://openalex.org/W3119687955","https://openalex.org/W3119781401","https://openalex.org/W3161403725","https://openalex.org/W3191984229","https://openalex.org/W4304587309","https://openalex.org/W4317603593","https://openalex.org/W4381744228","https://openalex.org/W4388141109"],"related_works":["https://openalex.org/W2357468538","https://openalex.org/W2149234266","https://openalex.org/W2390942931","https://openalex.org/W3084463301","https://openalex.org/W1932157736","https://openalex.org/W1981680180","https://openalex.org/W2033963098","https://openalex.org/W1601957798","https://openalex.org/W2125461068","https://openalex.org/W2728426605"],"abstract_inverted_index":{"Industrial":[0],"Control":[1],"System":[2,18],"(ICS)":[3],"is":[4,70],"vital":[5],"to":[6,43,52,121],"critical":[7],"infrastructures,":[8],"yet":[9],"it":[10,41],"faces":[11],"increasing":[12],"security":[13],"threats.":[14,54],"Current":[15],"Intrusion":[16,63],"Detection":[17,64],"(IDS)":[19],"designed":[20],"for":[21,111],"ICS":[22,112],"often":[23],"overlooks":[24],"the":[25,81,86,115],"unbalanced":[26],"resource":[27,107],"distribution":[28],"among":[29],"devices":[30,98],"at":[31,99],"different":[32,100],"layers":[33],"and":[34,50,85,90,108,113,126,137,152,157,160],"primarily":[35],"focus":[36],"on":[37,46,72,97],"known":[38,125],"attacks,":[39],"rendering":[40],"difficult":[42],"be":[44],"deployed":[45],"all":[47],"key":[48],"nodes":[49],"vulnerable":[51],"unknown":[53,127],"To":[55,102],"address":[56],"above":[57],"issues,":[58],"we":[59],"propose":[60],"a":[61,132,138],"Combined":[62],"Framework":[65],"(CIDF).":[66],"This":[67],"innovative":[68],"approach":[69,143],"based":[71],"strategy":[73],"of":[74,92,106,117,154],"\u201cmulti-level":[75],"layered":[76],"deployment,":[77],"combined":[78],"detection\u201d,":[79],"deploying":[80],"Packet":[82],"Signature":[83],"model":[84,96],"Enhanced":[87],"Fast":[88],"Search":[89],"Find":[91],"Density":[93],"Peaks":[94],"(EFSFDP)":[95],"layers.":[101],"achieve":[103],"optimal":[104],"use":[105],"full":[109],"protection":[110],"combining":[114],"advantages":[116],"multiple":[118],"detection":[119,164],"methods":[120],"effective":[122],"detect":[123],"both":[124],"attacks.":[128],"The":[129],"Evaluation":[130],"using":[131],"public":[133],"gas":[134],"pipeline":[135],"dataset":[136,140],"private":[139],"shows":[141],"our":[142],"outperforms":[144],"existing":[145],"methods,":[146],"achieving":[147],"an":[148],"average":[149],"Accuracy,":[150],"Precision,":[151],"Recall":[153],"94%,":[155],"95.5%,":[156],"86.5%":[158],"respectively,":[159],"along":[161],"with":[162],"superior":[163],"speed.":[165]},"counts_by_year":[],"updated_date":"2025-12-22T23:10:17.713674","created_date":"2025-10-10T00:00:00"}
