{"id":"https://openalex.org/W4220876184","doi":"https://doi.org/10.23919/icact53585.2022.9728831","title":"Quick Blocking Operation of Firewall System Cooperating with IDS and SDN","display_name":"Quick Blocking Operation of Firewall System Cooperating with IDS and SDN","publication_year":2022,"publication_date":"2022-02-13","ids":{"openalex":"https://openalex.org/W4220876184","doi":"https://doi.org/10.23919/icact53585.2022.9728831"},"language":"en","primary_location":{"id":"doi:10.23919/icact53585.2022.9728831","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact53585.2022.9728831","pdf_url":null,"source":{"id":"https://openalex.org/S4363608017","display_name":"2022 24th International Conference on Advanced Communication Technology (ICACT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 24th International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071750386","display_name":"Yusei Katsura","orcid":null},"institutions":[{"id":"https://openalex.org/I75917431","display_name":"Nara Institute of Science and Technology","ror":"https://ror.org/05bhada84","country_code":"JP","type":"education","lineage":["https://openalex.org/I75917431"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Yusei Katsura","raw_affiliation_strings":["Nara Institute of Science and Technology,Graduate School of Science and Technology,Nara,Japan","Graduate School of Science and Technology, Nara Institute of Science and Technology, Nara, Japan"],"affiliations":[{"raw_affiliation_string":"Nara Institute of Science and Technology,Graduate School of Science and Technology,Nara,Japan","institution_ids":["https://openalex.org/I75917431"]},{"raw_affiliation_string":"Graduate School of Science and Technology, Nara Institute of Science and Technology, Nara, Japan","institution_ids":["https://openalex.org/I75917431"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063349195","display_name":"Pranpariya Sakarin","orcid":null},"institutions":[{"id":"https://openalex.org/I25399158","display_name":"Mahidol University","ror":"https://ror.org/01znkr924","country_code":"TH","type":"education","lineage":["https://openalex.org/I25399158"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Pranpariya Sakarin","raw_affiliation_strings":["Mahidol University,Faculty of Information and Communication Technology,Nakhon Pathom,Thailand","Faculty of Information and Communication Technology, Mahidol University, Nakhon Pathom, Thailand"],"affiliations":[{"raw_affiliation_string":"Mahidol University,Faculty of Information and Communication Technology,Nakhon Pathom,Thailand","institution_ids":["https://openalex.org/I25399158"]},{"raw_affiliation_string":"Faculty of Information and Communication Technology, Mahidol University, Nakhon Pathom, Thailand","institution_ids":["https://openalex.org/I25399158"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058678508","display_name":"Nariyoshi Yamai","orcid":"https://orcid.org/0000-0003-2651-2701"},"institutions":[{"id":"https://openalex.org/I92614990","display_name":"Tokyo University of Agriculture and Technology","ror":"https://ror.org/00qg0kr10","country_code":"JP","type":"education","lineage":["https://openalex.org/I92614990"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Nariyoshi Yamai","raw_affiliation_strings":["Institute of Engineering, Tokyo University of Agriculture and Technology,Tokyo,Japan","Institute of Engineering, Tokyo University of Agriculture and Technology, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Institute of Engineering, Tokyo University of Agriculture and Technology,Tokyo,Japan","institution_ids":["https://openalex.org/I92614990"]},{"raw_affiliation_string":"Institute of Engineering, Tokyo University of Agriculture and Technology, Tokyo, Japan","institution_ids":["https://openalex.org/I92614990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072121135","display_name":"Hiroyuki Kimiyama","orcid":null},"institutions":[{"id":"https://openalex.org/I51803142","display_name":"Daido University","ror":"https://ror.org/02cntp233","country_code":"JP","type":"education","lineage":["https://openalex.org/I51803142"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hiroyuki Kimiyama","raw_affiliation_strings":["Daido University,School of Informatics,Nagoya,Japan","School of Informatics, Daido University, Nagoya, Japan"],"affiliations":[{"raw_affiliation_string":"Daido University,School of Informatics,Nagoya,Japan","institution_ids":["https://openalex.org/I51803142"]},{"raw_affiliation_string":"School of Informatics, Daido University, Nagoya, Japan","institution_ids":["https://openalex.org/I51803142"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084908618","display_name":"Vasaka Visoottiviseth","orcid":null},"institutions":[{"id":"https://openalex.org/I25399158","display_name":"Mahidol University","ror":"https://ror.org/01znkr924","country_code":"TH","type":"education","lineage":["https://openalex.org/I25399158"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Vasaka Visoottiviseth","raw_affiliation_strings":["Mahidol University,Faculty of Information and Communication Technology,Nakhon Pathom,Thailand","Faculty of Information and Communication Technology, Mahidol University, Nakhon Pathom, Thailand"],"affiliations":[{"raw_affiliation_string":"Mahidol University,Faculty of Information and Communication Technology,Nakhon Pathom,Thailand","institution_ids":["https://openalex.org/I25399158"]},{"raw_affiliation_string":"Faculty of Information and Communication Technology, Mahidol University, Nakhon Pathom, Thailand","institution_ids":["https://openalex.org/I25399158"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5071750386"],"corresponding_institution_ids":["https://openalex.org/I75917431"],"apc_list":null,"apc_paid":null,"fwci":1.2971,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.76307008,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"393","last_page":"398"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8079546093940735},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6748874187469482},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5499805212020874},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.5481999516487122},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.543273389339447},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.4992549419403076},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.4937363564968109},{"id":"https://openalex.org/keywords/blocking","display_name":"Blocking (statistics)","score":0.47769859433174133},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.4336661696434021},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3781982362270355},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3603054881095886},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2664555311203003},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2541009783744812},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.08429023623466492}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8079546093940735},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6748874187469482},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5499805212020874},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.5481999516487122},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.543273389339447},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.4992549419403076},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.4937363564968109},{"id":"https://openalex.org/C144745244","wikidata":"https://www.wikidata.org/wiki/Q4927286","display_name":"Blocking (statistics)","level":2,"score":0.47769859433174133},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.4336661696434021},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3781982362270355},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3603054881095886},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2664555311203003},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2541009783744812},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.08429023623466492},{"id":"https://openalex.org/C115304011","wikidata":"https://www.wikidata.org/wiki/Q72755","display_name":"Schwarzschild radius","level":3,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C124017977","wikidata":"https://www.wikidata.org/wiki/Q11412","display_name":"Gravitation","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C74650414","wikidata":"https://www.wikidata.org/wiki/Q11397","display_name":"Classical mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/icact53585.2022.9728831","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact53585.2022.9728831","pdf_url":null,"source":{"id":"https://openalex.org/S4363608017","display_name":"2022 24th International Conference on Advanced Communication Technology (ICACT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 24th International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1588071859","https://openalex.org/W2147118406","https://openalex.org/W2898685569","https://openalex.org/W2900858862","https://openalex.org/W2955864823","https://openalex.org/W2973827139","https://openalex.org/W3136712907","https://openalex.org/W6765645180"],"related_works":["https://openalex.org/W2387982609","https://openalex.org/W2359453783","https://openalex.org/W2767068794","https://openalex.org/W2735897973","https://openalex.org/W3114854705","https://openalex.org/W4229489764","https://openalex.org/W3036366741","https://openalex.org/W3195575042","https://openalex.org/W2898113880","https://openalex.org/W2793567886"],"abstract_inverted_index":{"Firewalls,":[0],"intrusion":[1,6],"detection":[2],"systems":[3,8],"(IDSs),":[4],"and":[5,17,26,58,143,154,177],"prevention":[7],"(IPSs)":[9],"are":[10],"normally":[11],"used":[12],"to":[13,47,76,97,112,118,122,133],"filter":[14],"anomaly":[15,78,88],"traffic":[16,79],"prevent":[18],"attacks":[19],"from":[20],"the":[21,36,44,49,85,98,113,124,135,147,174],"Internet.":[22],"However,":[23],"preconfiguring":[24],"firewalls":[25],"IDS":[27,70,86],"on":[28],"multiple":[29],"devices":[30],"is":[31,43],"an":[32,55,93],"exhausting":[33],"work":[34],"for":[35],"network":[37,50],"administrators.":[38],"Software":[39],"Defined":[40],"Network":[41],"(SDN)":[42],"concept":[45],"proposed":[46,139,169],"make":[48],"management":[51],"easier":[52],"by":[53],"using":[54,141],"SDN":[56,59,73,99,114],"controller":[57,115],"switches.":[60],"In":[61],"this":[62,102],"research,":[63],"we":[64,130],"propose":[65],"a":[66,81,109],"system":[67,140],"that":[68,150,167],"integrates":[69],"together":[71],"with":[72,146],"in":[74,80,116,158,173],"order":[75,117],"block":[77,123,180],"fast":[82],"manner.":[83],"Once":[84],"detects":[87],"traffic,":[89],"it":[90],"will":[91,105],"send":[92],"alert":[94,103],"message":[95,104,111],"back":[96],"switch.":[100],"Then,":[101],"be":[106],"sent":[107],"as":[108],"PacketIn":[110],"set":[119],"up":[120],"rules":[121],"attack.":[125],"To":[126],"evaluate":[127],"our":[128,138,168],"system,":[129],"conduct":[131],"experiments":[132],"compare":[134],"performance":[136],"of":[137,160],"syslog":[142],"Socket":[144],"API":[145],"existing":[148],"method":[149,170],"uses":[151],"REST":[152],"API,":[153],"another":[155],"comparison":[156],"method,":[157],"term":[159],"processing":[161],"time.":[162],"Our":[163],"experiment":[164],"results":[165],"confirm":[166],"can":[171,178],"result":[172],"smaller":[175],"latency":[176],"quickly":[179],"malicious":[181],"traffic.":[182]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
