{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T07:00:45Z","timestamp":1760598045650,"version":"3.37.3"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"IoTFlows project"},{"name":"National Science Foundation"},{"name":"SaTC Program and the Brazilian Ministry of Science Technology and Innovation","award":["ID 002951"],"award-info":[{"award-number":["ID 002951"]}]},{"name":"Fundaco para a Ciencia e a Tecnologia","award":["PTDC\/CCI-COM\/29300\/2017 UIDB\/50021\/2020"],"award-info":[{"award-number":["PTDC\/CCI-COM\/29300\/2017 UIDB\/50021\/2020"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1109\/tr.2021.3061297","type":"journal-article","created":{"date-parts":[[2021,3,17]],"date-time":"2021-03-17T19:41:00Z","timestamp":1616010060000},"page":"370-381","source":"Crossref","is-referenced-by-count":15,"title":["Syrius: Synthesis of Rules for Intrusion Detectors"],"prefix":"10.1109","volume":"71","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9282-4730","authenticated-orcid":false,"given":"Lucas","family":"Alcantara","sequence":"first","affiliation":[{"name":"Centro de Informatica - CIn, Universidade Federal de Pernambuco, Recife, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5612-9298","authenticated-orcid":false,"given":"Guilherme","family":"Padilha","sequence":"additional","affiliation":[{"name":"Centro de Informatica - CIn, Universidade Federal de Pernambuco, Recife, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3734-3157","authenticated-orcid":false,"given":"Rui","family":"Abreu","sequence":"additional","affiliation":[{"name":"Faculty of Engineering, University of Porto, Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1323-8769","authenticated-orcid":false,"given":"Marcelo","family":"d'Amorim","sequence":"additional","affiliation":[{"name":"Centro de Informatica - CIn, Universidade Federal de Pernambuco, Recife, Brazil"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2542049"},{"year":"2020","key":"ref6","article-title":"Open source IDS tools"},{"year":"2020","key":"ref7","article-title":"Emerging threats open ruleset"},{"year":"2020","key":"ref8","article-title":"Emerging threats ruleset changelogs"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CICYBS.2011.5949394"},{"article-title":"Creating custom suricata signatures","year":"2019","author":"Akyldz","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2907070"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-020-05900-9"},{"year":"2020","key":"ref14","article-title":"Stratosphere Normal Traffic"},{"year":"2020","key":"ref15","article-title":"What is a Denial-of-Service (DoS) Attack"},{"year":"2019","key":"ref17","article-title":"Privilege escalation"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.19101\/ijatee.2018.546013"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.49"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330580"},{"volume":"2020","key":"ref21","article-title":"Open Information Security Foundation (OISF)"},{"article-title":"Penetration testing and network defense: Performing host reconnaissance","year":"2006","author":"Whitaker","key":"ref23"},{"article-title":"Network probes explained: Understanding port scans and ping sweeps","year":"2000","author":"Teo","key":"ref24"},{"year":"2020","key":"ref25","article-title":"Nmap Security Scanner"},{"year":"2020","key":"ref27","article-title":"Differential evolution algorithm"},{"key":"ref28","article-title":"Search Strings - Proxy of Popularity"},{"year":"2019","key":"ref30","article-title":"Remote code execution"},{"year":"2019","key":"ref31","article-title":"Local file inclusion"},{"year":"2020","key":"ref32","article-title":"Publicly available PCAP files"},{"year":"2020","key":"ref35","article-title":"hping3 Package Description, Kali Tools"},{"year":"2020","key":"ref37","article-title":"Intrusion detection evaluation dataset"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/IranianCEE.2016.7585840"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2015.10"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/IACC.2016.105"},{"year":"1999","key":"ref41","article-title":"DARPA intrusion detection evaluation dataset"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CICSYN.2009.19"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.23919\/FMCAD.2017.8102263"},{"article-title":"Extending signature-based intrusion detection systems with Bayesian abductive reasoning","year":"2019","author":"Ganesan","key":"ref44"},{"year":"2012","key":"ref45","article-title":"Capture files from mid-atlantic CCDC"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2805763"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2778711"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2017.7899588"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/24\/9725327\/9380789-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/9725327\/09380789.pdf?arnumber=9380789","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T22:55:35Z","timestamp":1704840935000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9380789\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3]]},"references-count":38,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tr.2021.3061297","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"type":"print","value":"0018-9529"},{"type":"electronic","value":"1558-1721"}],"subject":[],"published":{"date-parts":[[2022,3]]}}}