{"id":"https://openalex.org/W2295469779","doi":"https://doi.org/10.5220/0005556803430348","title":"Distributed Intrusion Detection System based on Anticipation and Prediction Approach","display_name":"Distributed Intrusion Detection System based on Anticipation and Prediction Approach","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2295469779","doi":"https://doi.org/10.5220/0005556803430348","mag":"2295469779"},"language":"en","primary_location":{"id":"doi:10.5220/0005556803430348","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005556803430348","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th International Conference on Security and Cryptography","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0005556803430348","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020364842","display_name":"Hajar Benmoussa","orcid":null},"institutions":[{"id":"https://openalex.org/I119856527","display_name":"Cadi Ayyad University","ror":"https://ror.org/04xf6nm78","country_code":"MA","type":"education","lineage":["https://openalex.org/I119856527"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Hajar Benmoussa","raw_affiliation_strings":["Cadi Ayyad University and ENSA Marrakesh, Morocco"],"affiliations":[{"raw_affiliation_string":"Cadi Ayyad University and ENSA Marrakesh, Morocco","institution_ids":["https://openalex.org/I119856527"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078156328","display_name":"Anas Abou El Kalam","orcid":"https://orcid.org/0000-0001-7714-4801"},"institutions":[{"id":"https://openalex.org/I119856527","display_name":"Cadi Ayyad University","ror":"https://ror.org/04xf6nm78","country_code":"MA","type":"education","lineage":["https://openalex.org/I119856527"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Anas Abou El Kalam","raw_affiliation_strings":["Cadi Ayyad University and ENSA Marrakesh, Morocco"],"affiliations":[{"raw_affiliation_string":"Cadi Ayyad University and ENSA Marrakesh, Morocco","institution_ids":["https://openalex.org/I119856527"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071485893","display_name":"A.Ait. Ouahman","orcid":null},"institutions":[{"id":"https://openalex.org/I119856527","display_name":"Cadi Ayyad University","ror":"https://ror.org/04xf6nm78","country_code":"MA","type":"education","lineage":["https://openalex.org/I119856527"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Abdallah Ait Ouahman","raw_affiliation_strings":["Cadi Ayyad University and ENSA Marrakesh, Morocco"],"affiliations":[{"raw_affiliation_string":"Cadi Ayyad University and ENSA Marrakesh, Morocco","institution_ids":["https://openalex.org/I119856527"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5020364842"],"corresponding_institution_ids":["https://openalex.org/I119856527"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.1778186,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"343","last_page":"348"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.8448935747146606},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7548331022262573},{"id":"https://openalex.org/keywords/anticipation","display_name":"Anticipation (artificial intelligence)","score":0.7291375994682312},{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.6996313333511353},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6627615094184875},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5746784806251526},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.5408139824867249},{"id":"https://openalex.org/keywords/damages","display_name":"Damages","score":0.5096950531005859},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.49067461490631104},{"id":"https://openalex.org/keywords/scope","display_name":"Scope (computer science)","score":0.48725786805152893},{"id":"https://openalex.org/keywords/anomaly-based-intrusion-detection-system","display_name":"Anomaly-based intrusion detection system","score":0.4871082305908203},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.47337740659713745},{"id":"https://openalex.org/keywords/bayesian-network","display_name":"Bayesian network","score":0.44985613226890564},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2174040675163269},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1862894594669342}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.8448935747146606},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7548331022262573},{"id":"https://openalex.org/C176777502","wikidata":"https://www.wikidata.org/wiki/Q4774623","display_name":"Anticipation (artificial intelligence)","level":2,"score":0.7291375994682312},{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.6996313333511353},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6627615094184875},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5746784806251526},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.5408139824867249},{"id":"https://openalex.org/C2777381055","wikidata":"https://www.wikidata.org/wiki/Q308922","display_name":"Damages","level":2,"score":0.5096950531005859},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.49067461490631104},{"id":"https://openalex.org/C2778012447","wikidata":"https://www.wikidata.org/wiki/Q1034415","display_name":"Scope (computer science)","level":2,"score":0.48725786805152893},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.4871082305908203},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.47337740659713745},{"id":"https://openalex.org/C33724603","wikidata":"https://www.wikidata.org/wiki/Q812540","display_name":"Bayesian network","level":2,"score":0.44985613226890564},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2174040675163269},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1862894594669342},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5220/0005556803430348","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005556803430348","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th International Conference on Security and Cryptography","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.5220/0005556803430348","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005556803430348","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th International Conference on Security and Cryptography","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W267897065","https://openalex.org/W1904065432","https://openalex.org/W1994212840","https://openalex.org/W2013627100","https://openalex.org/W2100903665","https://openalex.org/W2133453279","https://openalex.org/W2148415182","https://openalex.org/W2163746301","https://openalex.org/W2964009694"],"related_works":["https://openalex.org/W2361650029","https://openalex.org/W2158220440","https://openalex.org/W1852121458","https://openalex.org/W2352199719","https://openalex.org/W2360075860","https://openalex.org/W2391477130","https://openalex.org/W2353452694","https://openalex.org/W2369414226","https://openalex.org/W2355532322","https://openalex.org/W4362733457"],"abstract_inverted_index":{"Despite":[0],"the":[1,6,32,39,42,56,64,90,117],"importance":[2],"and":[3,13,41,82,101,123],"reputation":[4],"of":[5,74,110],"current":[7],"intrusion":[8,28,76],"detection":[9,77,119],"systems,":[10],"their":[11,86],"efficiency":[12],"effectiveness":[14],"remain":[15],"limited":[16],"as":[17],"they":[18],"rely":[19],"on":[20,38,98],"passive":[21],"defensive":[22],"approaches.":[23],"In":[24],"fact,":[25],"when":[26],"an":[27],"is":[29,35,49,96],"detected":[30],"by":[31],"IDS,":[33],"it":[34,115],"already":[36],"happened":[37],"network":[40,91],"time":[43],"required":[44],"to":[45,55,58,79,92,105],"update":[46],"security":[47],"rules":[48],"usually":[50],"short,":[51],"which":[52],"provide":[53],"opportunity":[54],"attacker":[57],"inflict":[59],"damages":[60],"that":[61],"may":[62],"paralyze":[63],"network.":[65],"For":[66],"this":[67],"purpose":[68],"we":[69],"suggest":[70],"a":[71,107],"new":[72],"approach":[73,95,122],"distributed":[75],"system":[78],"wisely":[80],"anticipate":[81],"predict":[83],"intrusions":[84],"before":[85],"first":[87],"occurrence":[88],"in":[89],"secure.":[93],"Our":[94],"based":[97],"intelligent":[99],"agents":[100],"using":[102],"honeypot":[103],"technology":[104],"gather":[106],"vast":[108],"scope":[109],"information":[111],"about":[112],"attacks.":[113],"Moreover":[114],"combines":[116],"two":[118],"strategies":[120],"\u201canomaly":[121],"misuse":[124],"approach\u201d.":[125]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
