{"id":"https://openalex.org/W2767140787","doi":"https://doi.org/10.1155/2017/2301970","title":"Study of Immune-Based Intrusion Detection Technology in Virtual Machines for Cloud Computing Environment","display_name":"Study of Immune-Based Intrusion Detection Technology in Virtual Machines for Cloud Computing Environment","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2767140787","doi":"https://doi.org/10.1155/2017/2301970","mag":"2767140787"},"language":"en","primary_location":{"id":"doi:10.1155/2017/2301970","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2017/2301970","pdf_url":"http://downloads.hindawi.com/journals/misy/2017/2301970.pdf","source":{"id":"https://openalex.org/S152111507","display_name":"Mobile Information Systems","issn_l":"1574-017X","issn":["1574-017X","1875-905X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Mobile Information Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"http://downloads.hindawi.com/journals/misy/2017/2301970.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100441988","display_name":"Ruirui Zhang","orcid":"https://orcid.org/0000-0003-1898-1487"},"institutions":[{"id":"https://openalex.org/I37574244","display_name":"Sichuan Agricultural University","ror":"https://ror.org/0388c3403","country_code":"CN","type":"education","lineage":["https://openalex.org/I37574244"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ruirui Zhang","raw_affiliation_strings":["School of Business, Sichuan Agricultural University, Chengdu 610000, China"],"affiliations":[{"raw_affiliation_string":"School of Business, Sichuan Agricultural University, Chengdu 610000, China","institution_ids":["https://openalex.org/I37574244"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056063525","display_name":"Xin Xiao","orcid":"https://orcid.org/0000-0001-6232-8886"},"institutions":[{"id":"https://openalex.org/I6645349","display_name":"Southwest Minzu University","ror":"https://ror.org/04gaexw88","country_code":"CN","type":"education","lineage":["https://openalex.org/I6645349"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Xiao","raw_affiliation_strings":["School of Computer Science, Southwest Minzu University, Chengdu 610000, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Southwest Minzu University, Chengdu 610000, China","institution_ids":["https://openalex.org/I6645349"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100441988"],"corresponding_institution_ids":["https://openalex.org/I37574244"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.4144,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.67061212,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"2017","issue":null,"first_page":"1","last_page":"15"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8908378481864929},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.8432971239089966},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8250659108161926},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6144165992736816},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5610431432723999},{"id":"https://openalex.org/keywords/temporal-isolation-among-virtual-machines","display_name":"Temporal isolation among virtual machines","score":0.4607985317707062},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4408690929412842},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4119693338871002},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4070267677307129},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.28291305899620056},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2374289631843567}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8908378481864929},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.8432971239089966},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8250659108161926},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6144165992736816},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5610431432723999},{"id":"https://openalex.org/C142355369","wikidata":"https://www.wikidata.org/wiki/Q7698919","display_name":"Temporal isolation among virtual machines","level":4,"score":0.4607985317707062},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4408690929412842},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4119693338871002},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4070267677307129},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.28291305899620056},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2374289631843567}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2017/2301970","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2017/2301970","pdf_url":"http://downloads.hindawi.com/journals/misy/2017/2301970.pdf","source":{"id":"https://openalex.org/S152111507","display_name":"Mobile Information Systems","issn_l":"1574-017X","issn":["1574-017X","1875-905X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Mobile Information Systems","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b789f37d942e486caa16c471ef31614c","is_oa":true,"landing_page_url":"https://doaj.org/article/b789f37d942e486caa16c471ef31614c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Mobile Information Systems, Vol 2017 (2017)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2017/2301970","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2017/2301970","pdf_url":"http://downloads.hindawi.com/journals/misy/2017/2301970.pdf","source":{"id":"https://openalex.org/S152111507","display_name":"Mobile Information Systems","issn_l":"1574-017X","issn":["1574-017X","1875-905X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Mobile Information Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320325065","display_name":"Sichuan Agricultural University","ror":"https://ror.org/0388c3403"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2767140787.pdf","grobid_xml":"https://content.openalex.org/works/W2767140787.grobid-xml"},"referenced_works_count":7,"referenced_works":["https://openalex.org/W1495745096","https://openalex.org/W1573569206","https://openalex.org/W1796423611","https://openalex.org/W1966285605","https://openalex.org/W2075423963","https://openalex.org/W2132484736","https://openalex.org/W2140678915"],"related_works":["https://openalex.org/W2511073788","https://openalex.org/W572531444","https://openalex.org/W2921575628","https://openalex.org/W2120735849","https://openalex.org/W1846752851","https://openalex.org/W2036081147","https://openalex.org/W2094306501","https://openalex.org/W3105406291","https://openalex.org/W2992125264","https://openalex.org/W1939576174"],"abstract_inverted_index":{"Cloud":[0],"computing":[1,24,39,195],"platforms":[2],"are":[3,66,107,130],"usually":[4],"based":[5],"on":[6,95],"virtual":[7,16,35,53,74,136,155,176],"machines":[8,36,75],"as":[9,42],"the":[10,13,20,46,56,72,79,86,96,111,146,154,169,187],"underlying":[11],"architecture;":[12],"security":[14,189],"of":[15,22,37,48,64,88,99,135,171,193],"machine":[17,137,156],"systems":[18],"is":[19,76,165,180],"core":[21],"cloud":[23,38,194],"security.":[25],"This":[26],"paper":[27],"presents":[28],"an":[29],"immune-based":[30],"intrusion":[31],"detection":[32,162],"model":[33,80,147],"in":[34,51,71,110,174,190],"environment,":[40],"denoted":[41],"IB-IDS,":[43],"to":[44,84,167,182,185],"ensure":[45,85],"safety":[47],"user-level":[49,89,172,188],"applications":[50,100],"client":[52,73],"machines.":[54],"In":[55],"model,":[57],"system":[58,157],"call":[59],"sequences":[60],"and":[61,68,101,125,141,158,178],"their":[62],"parameters":[63],"processes":[65],"used,":[67],"environment":[69],"information":[70,126],"extracted.":[77],"Then":[78],"simulates":[81],"immune":[82,119],"responses":[83],"state":[87,170],"programs,":[90],"which":[91,129],"can":[92],"detect":[93],"attacks":[94],"dynamic":[97],"runtime":[98],"has":[102,159],"high":[103],"real-time":[104],"performance.":[105,163],"There":[106],"five":[108],"modules":[109],"model:":[112],"antigen":[113],"presenting":[114],"module,":[115,118,121,124,128],"signal":[116,122],"acquisition":[117],"response":[120],"measurement":[123],"monitoring":[127],"distributed":[131],"into":[132],"different":[133],"levels":[134],"environment.":[138],"Performance":[139],"analysis":[140],"experimental":[142],"results":[143],"show":[144],"that":[145],"brings":[148],"a":[149,160],"small":[150],"performance":[151],"overhead":[152],"for":[153],"good":[161],"It":[164],"applicable":[166],"judge":[168],"application":[173],"guest":[175],"machine,":[177],"it":[179,184],"feasible":[181],"use":[183],"increase":[186],"software":[191],"services":[192],"platform.":[196]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-12T23:11:45.498971","created_date":"2025-10-10T00:00:00"}
