Integration of Wazuh and Suricata with Telegram for Enhanced Threat Detection and Multiple Attack Notifications Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.47772/ijriss.2025.91100378
The rise of connected devices over the internet has led to an increase in attacks on users, compromising their information exchange and revealing sensitive data. Modern cyber threats are becoming increasingly sophisticated and severe, taking advantage of security vulnerabilities in interconnected systems. With the growing complexity of cyber threats, effective threat detection systems are essential for maintaining network security. To improve the detection of various attack types and provide real- time warnings via Telegram, this project focuses on integrating Wazuh which is a security information and event management (SIEM) platform, with Suricata, a powerful network intrusion detection and prevention system (IDS/IPS). By offering a complete solution for log management and multi-attack detection, the integration seeks to strengthen an organization's entire security posture. From system analysis and design to implementation and testing, the process adheres to the Software Development Life Cycle (SDLC). To evaluate the effectiveness of the integrated system, several attack simulations were carried out, including DoS attacks (ICMP Ping and SYN flood), FTP brute-force attacks, and port-scanning activities. The system successfully detected all these attacks. This study highlights the strengths and limitations of integrating Wazuh with Suricata, providing valuable insights for future research aimed at developing more robust intrusion detection systems.
Related Topics
- Type
- article
- Landing Page
- https://doi.org/10.47772/ijriss.2025.91100378
- https://rsisinternational.org/journals/ijriss/uploads/vol9-iss11-pg4806-4817-202512_pdf.pdf
- OA Status
- bronze
- OpenAlex ID
- https://openalex.org/W7114991816
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W7114991816Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.47772/ijriss.2025.91100378Digital Object Identifier
- Title
-
Integration of Wazuh and Suricata with Telegram for Enhanced Threat Detection and Multiple Attack NotificationsWork title
- Type
-
articleOpenAlex work type
- Publication year
-
2025Year of publication
- Publication date
-
2025-12-11Full publication date if available
- Authors
-
Noor Syahirah Abdullah, Nurhashikin Mohd Salleh, Mohd Faizal Abdollah, Siti Rahayu SelamatList of authors in order
- Landing page
-
https://doi.org/10.47772/ijriss.2025.91100378Publisher landing page
- PDF URL
-
https://rsisinternational.org/journals/ijriss/uploads/vol9-iss11-pg4806-4817-202512_pdf.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
bronzeOpen access status per OpenAlex
- OA URL
-
https://rsisinternational.org/journals/ijriss/uploads/vol9-iss11-pg4806-4817-202512_pdf.pdfDirect OA link when available
- Concepts
-
Computer security, Intrusion detection system, Computer science, Process (computing), Network security, Event (particle physics), Intrusion prevention system, Security information and event management, The Internet, Information security, File Transfer Protocol, Software, Information exchange, Threat model, Security policy, Information system, System integration, Information sensitivity, Cyber threats, Security testing, Information technologyTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
Full payload
| id | https://openalex.org/W7114991816 |
|---|---|
| doi | https://doi.org/10.47772/ijriss.2025.91100378 |
| ids.doi | https://doi.org/10.47772/ijriss.2025.91100378 |
| ids.openalex | https://openalex.org/W7114991816 |
| fwci | 0.0 |
| type | article |
| title | Integration of Wazuh and Suricata with Telegram for Enhanced Threat Detection and Multiple Attack Notifications |
| biblio.issue | 11 |
| biblio.volume | 9 |
| biblio.last_page | 4817 |
| biblio.first_page | 4806 |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.5099226236343384 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| topics[1].id | https://openalex.org/T12127 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.07345424592494965 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1705 |
| topics[1].subfield.display_name | Computer Networks and Communications |
| topics[1].display_name | Software System Performance and Reliability |
| topics[2].id | https://openalex.org/T12479 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.04058494418859482 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1710 |
| topics[2].subfield.display_name | Information Systems |
| topics[2].display_name | Web Application Security Vulnerabilities |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C38652104 |
| concepts[0].level | 1 |
| concepts[0].score | 0.7478278279304504 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[0].display_name | Computer security |
| concepts[1].id | https://openalex.org/C35525427 |
| concepts[1].level | 2 |
| concepts[1].score | 0.7079368233680725 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q745881 |
| concepts[1].display_name | Intrusion detection system |
| concepts[2].id | https://openalex.org/C41008148 |
| concepts[2].level | 0 |
| concepts[2].score | 0.659686267375946 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[2].display_name | Computer science |
| concepts[3].id | https://openalex.org/C98045186 |
| concepts[3].level | 2 |
| concepts[3].score | 0.49120256304740906 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q205663 |
| concepts[3].display_name | Process (computing) |
| concepts[4].id | https://openalex.org/C182590292 |
| concepts[4].level | 2 |
| concepts[4].score | 0.4358784854412079 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q989632 |
| concepts[4].display_name | Network security |
| concepts[5].id | https://openalex.org/C2779662365 |
| concepts[5].level | 2 |
| concepts[5].score | 0.41555875539779663 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q5416694 |
| concepts[5].display_name | Event (particle physics) |
| concepts[6].id | https://openalex.org/C27061796 |
| concepts[6].level | 3 |
| concepts[6].score | 0.41203415393829346 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q745881 |
| concepts[6].display_name | Intrusion prevention system |
| concepts[7].id | https://openalex.org/C103377522 |
| concepts[7].level | 4 |
| concepts[7].score | 0.38271015882492065 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q3493999 |
| concepts[7].display_name | Security information and event management |
| concepts[8].id | https://openalex.org/C110875604 |
| concepts[8].level | 2 |
| concepts[8].score | 0.380249559879303 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q75 |
| concepts[8].display_name | The Internet |
| concepts[9].id | https://openalex.org/C527648132 |
| concepts[9].level | 2 |
| concepts[9].score | 0.3403918147087097 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q189900 |
| concepts[9].display_name | Information security |
| concepts[10].id | https://openalex.org/C169485995 |
| concepts[10].level | 3 |
| concepts[10].score | 0.3394549787044525 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q42283 |
| concepts[10].display_name | File Transfer Protocol |
| concepts[11].id | https://openalex.org/C2777904410 |
| concepts[11].level | 2 |
| concepts[11].score | 0.31987613439559937 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q7397 |
| concepts[11].display_name | Software |
| concepts[12].id | https://openalex.org/C189693848 |
| concepts[12].level | 2 |
| concepts[12].score | 0.316762775182724 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q6031064 |
| concepts[12].display_name | Information exchange |
| concepts[13].id | https://openalex.org/C140547941 |
| concepts[13].level | 2 |
| concepts[13].score | 0.29894307255744934 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q7797194 |
| concepts[13].display_name | Threat model |
| concepts[14].id | https://openalex.org/C154908896 |
| concepts[14].level | 2 |
| concepts[14].score | 0.29236462712287903 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q2167404 |
| concepts[14].display_name | Security policy |
| concepts[15].id | https://openalex.org/C180198813 |
| concepts[15].level | 2 |
| concepts[15].score | 0.2867167890071869 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q121182 |
| concepts[15].display_name | Information system |
| concepts[16].id | https://openalex.org/C19527686 |
| concepts[16].level | 2 |
| concepts[16].score | 0.26565229892730713 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q1665453 |
| concepts[16].display_name | System integration |
| concepts[17].id | https://openalex.org/C137822555 |
| concepts[17].level | 2 |
| concepts[17].score | 0.26287636160850525 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q2587068 |
| concepts[17].display_name | Information sensitivity |
| concepts[18].id | https://openalex.org/C3018725008 |
| concepts[18].level | 2 |
| concepts[18].score | 0.260547399520874 |
| concepts[18].wikidata | https://www.wikidata.org/wiki/Q4071928 |
| concepts[18].display_name | Cyber threats |
| concepts[19].id | https://openalex.org/C195518309 |
| concepts[19].level | 5 |
| concepts[19].score | 0.25997787714004517 |
| concepts[19].wikidata | https://www.wikidata.org/wiki/Q13424265 |
| concepts[19].display_name | Security testing |
| concepts[20].id | https://openalex.org/C121017731 |
| concepts[20].level | 2 |
| concepts[20].score | 0.2515058219432831 |
| concepts[20].wikidata | https://www.wikidata.org/wiki/Q11661 |
| concepts[20].display_name | Information technology |
| keywords[0].id | https://openalex.org/keywords/intrusion-detection-system |
| keywords[0].score | 0.7079368233680725 |
| keywords[0].display_name | Intrusion detection system |
| keywords[1].id | https://openalex.org/keywords/process |
| keywords[1].score | 0.49120256304740906 |
| keywords[1].display_name | Process (computing) |
| keywords[2].id | https://openalex.org/keywords/network-security |
| keywords[2].score | 0.4358784854412079 |
| keywords[2].display_name | Network security |
| keywords[3].id | https://openalex.org/keywords/event |
| keywords[3].score | 0.41555875539779663 |
| keywords[3].display_name | Event (particle physics) |
| keywords[4].id | https://openalex.org/keywords/intrusion-prevention-system |
| keywords[4].score | 0.41203415393829346 |
| keywords[4].display_name | Intrusion prevention system |
| keywords[5].id | https://openalex.org/keywords/security-information-and-event-management |
| keywords[5].score | 0.38271015882492065 |
| keywords[5].display_name | Security information and event management |
| keywords[6].id | https://openalex.org/keywords/the-internet |
| keywords[6].score | 0.380249559879303 |
| keywords[6].display_name | The Internet |
| keywords[7].id | https://openalex.org/keywords/information-security |
| keywords[7].score | 0.3403918147087097 |
| keywords[7].display_name | Information security |
| language | |
| locations[0].id | doi:10.47772/ijriss.2025.91100378 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210198394 |
| locations[0].source.issn | 2454-6186 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 2454-6186 |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | International Journal of Research and Innovation in Social Science |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | |
| locations[0].pdf_url | https://rsisinternational.org/journals/ijriss/uploads/vol9-iss11-pg4806-4817-202512_pdf.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | International Journal of Research and Innovation in Social Science |
| locations[0].landing_page_url | https://doi.org/10.47772/ijriss.2025.91100378 |
| indexed_in | crossref |
| authorships[0].author.id | |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Noor Syahirah Abdullah |
| authorships[0].countries | MY |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I32589535 |
| authorships[0].affiliations[0].raw_affiliation_string | Fakulti Kecerdasan Buatan dan Keselamatan Siber, Universiti Teknikal Malaysia Melaka, Hang Tuah Jaya, 76100 Durian Tunggal, Melaka |
| authorships[0].institutions[0].id | https://openalex.org/I32589535 |
| authorships[0].institutions[0].ror | https://ror.org/01xb6rs26 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I32589535 |
| authorships[0].institutions[0].country_code | MY |
| authorships[0].institutions[0].display_name | Technical University of Malaysia Malacca |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Noor Syahirah Abdullah |
| authorships[0].is_corresponding | True |
| authorships[0].raw_affiliation_strings | Fakulti Kecerdasan Buatan dan Keselamatan Siber, Universiti Teknikal Malaysia Melaka, Hang Tuah Jaya, 76100 Durian Tunggal, Melaka |
| authorships[1].author.id | |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Nurhashikin Mohd Salleh |
| authorships[1].countries | MY |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I32589535 |
| authorships[1].affiliations[0].raw_affiliation_string | Fakulti Kecerdasan Buatan dan Keselamatan Siber, Universiti Teknikal Malaysia Melaka, Hang Tuah Jaya, 76100 Durian Tunggal, Melaka |
| authorships[1].institutions[0].id | https://openalex.org/I32589535 |
| authorships[1].institutions[0].ror | https://ror.org/01xb6rs26 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I32589535 |
| authorships[1].institutions[0].country_code | MY |
| authorships[1].institutions[0].display_name | Technical University of Malaysia Malacca |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Nurhashikin Mohd Salleh |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Fakulti Kecerdasan Buatan dan Keselamatan Siber, Universiti Teknikal Malaysia Melaka, Hang Tuah Jaya, 76100 Durian Tunggal, Melaka |
| authorships[2].author.id | |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | Mohd Faizal Abdollah |
| authorships[2].countries | MY |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I32589535 |
| authorships[2].affiliations[0].raw_affiliation_string | Fakulti Kecerdasan Buatan dan Keselamatan Siber, Universiti Teknikal Malaysia Melaka, Hang Tuah Jaya, 76100 Durian Tunggal, Melaka |
| authorships[2].institutions[0].id | https://openalex.org/I32589535 |
| authorships[2].institutions[0].ror | https://ror.org/01xb6rs26 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I32589535 |
| authorships[2].institutions[0].country_code | MY |
| authorships[2].institutions[0].display_name | Technical University of Malaysia Malacca |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Mohd Faizal Abdollah |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Fakulti Kecerdasan Buatan dan Keselamatan Siber, Universiti Teknikal Malaysia Melaka, Hang Tuah Jaya, 76100 Durian Tunggal, Melaka |
| authorships[3].author.id | |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | Siti Rahayu Selamat |
| authorships[3].countries | MY |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I32589535 |
| authorships[3].affiliations[0].raw_affiliation_string | Fakulti Kecerdasan Buatan dan Keselamatan Siber, Universiti Teknikal Malaysia Melaka, Hang Tuah Jaya, 76100 Durian Tunggal, Melaka |
| authorships[3].institutions[0].id | https://openalex.org/I32589535 |
| authorships[3].institutions[0].ror | https://ror.org/01xb6rs26 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I32589535 |
| authorships[3].institutions[0].country_code | MY |
| authorships[3].institutions[0].display_name | Technical University of Malaysia Malacca |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | Siti Rahayu Selamat |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Fakulti Kecerdasan Buatan dan Keselamatan Siber, Universiti Teknikal Malaysia Melaka, Hang Tuah Jaya, 76100 Durian Tunggal, Melaka |
| has_content.pdf | True |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://rsisinternational.org/journals/ijriss/uploads/vol9-iss11-pg4806-4817-202512_pdf.pdf |
| open_access.oa_status | bronze |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-12-13T00:00:00 |
| display_name | Integration of Wazuh and Suricata with Telegram for Enhanced Threat Detection and Multiple Attack Notifications |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-12-14T23:10:33.342130 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.5099226236343384 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.47772/ijriss.2025.91100378 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210198394 |
| best_oa_location.source.issn | 2454-6186 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 2454-6186 |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | International Journal of Research and Innovation in Social Science |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://rsisinternational.org/journals/ijriss/uploads/vol9-iss11-pg4806-4817-202512_pdf.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | International Journal of Research and Innovation in Social Science |
| best_oa_location.landing_page_url | https://doi.org/10.47772/ijriss.2025.91100378 |
| primary_location.id | doi:10.47772/ijriss.2025.91100378 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210198394 |
| primary_location.source.issn | 2454-6186 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 2454-6186 |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | International Journal of Research and Innovation in Social Science |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | |
| primary_location.pdf_url | https://rsisinternational.org/journals/ijriss/uploads/vol9-iss11-pg4806-4817-202512_pdf.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | International Journal of Research and Innovation in Social Science |
| primary_location.landing_page_url | https://doi.org/10.47772/ijriss.2025.91100378 |
| publication_date | 2025-12-11 |
| publication_year | 2025 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 82, 92, 103 |
| abstract_inverted_index.By | 101 |
| abstract_inverted_index.To | 59, 141 |
| abstract_inverted_index.an | 11, 117 |
| abstract_inverted_index.at | 195 |
| abstract_inverted_index.in | 13, 39 |
| abstract_inverted_index.is | 81 |
| abstract_inverted_index.of | 2, 36, 46, 63, 145, 183 |
| abstract_inverted_index.on | 15, 77 |
| abstract_inverted_index.to | 10, 115, 127, 134 |
| abstract_inverted_index.DoS | 156 |
| abstract_inverted_index.FTP | 163 |
| abstract_inverted_index.SYN | 161 |
| abstract_inverted_index.The | 0, 169 |
| abstract_inverted_index.all | 173 |
| abstract_inverted_index.and | 21, 32, 67, 85, 97, 109, 125, 129, 160, 166, 181 |
| abstract_inverted_index.are | 28, 53 |
| abstract_inverted_index.for | 55, 106, 191 |
| abstract_inverted_index.has | 8 |
| abstract_inverted_index.led | 9 |
| abstract_inverted_index.log | 107 |
| abstract_inverted_index.the | 6, 43, 61, 112, 131, 135, 143, 146, 179 |
| abstract_inverted_index.via | 72 |
| abstract_inverted_index.From | 122 |
| abstract_inverted_index.Life | 138 |
| abstract_inverted_index.Ping | 159 |
| abstract_inverted_index.This | 176 |
| abstract_inverted_index.With | 42 |
| abstract_inverted_index.more | 197 |
| abstract_inverted_index.out, | 154 |
| abstract_inverted_index.over | 5 |
| abstract_inverted_index.rise | 1 |
| abstract_inverted_index.this | 74 |
| abstract_inverted_index.time | 70 |
| abstract_inverted_index.were | 152 |
| abstract_inverted_index.with | 90, 186 |
| abstract_inverted_index.(ICMP | 158 |
| abstract_inverted_index.Cycle | 139 |
| abstract_inverted_index.Wazuh | 79, 185 |
| abstract_inverted_index.aimed | 194 |
| abstract_inverted_index.cyber | 26, 47 |
| abstract_inverted_index.data. | 24 |
| abstract_inverted_index.event | 86 |
| abstract_inverted_index.real- | 69 |
| abstract_inverted_index.seeks | 114 |
| abstract_inverted_index.study | 177 |
| abstract_inverted_index.their | 18 |
| abstract_inverted_index.these | 174 |
| abstract_inverted_index.types | 66 |
| abstract_inverted_index.which | 80 |
| abstract_inverted_index.(SIEM) | 88 |
| abstract_inverted_index.Modern | 25 |
| abstract_inverted_index.attack | 65, 150 |
| abstract_inverted_index.design | 126 |
| abstract_inverted_index.entire | 119 |
| abstract_inverted_index.future | 192 |
| abstract_inverted_index.robust | 198 |
| abstract_inverted_index.system | 99, 123, 170 |
| abstract_inverted_index.taking | 34 |
| abstract_inverted_index.threat | 50 |
| abstract_inverted_index.users, | 16 |
| abstract_inverted_index.(SDLC). | 140 |
| abstract_inverted_index.adheres | 133 |
| abstract_inverted_index.attacks | 14, 157 |
| abstract_inverted_index.carried | 153 |
| abstract_inverted_index.devices | 4 |
| abstract_inverted_index.flood), | 162 |
| abstract_inverted_index.focuses | 76 |
| abstract_inverted_index.growing | 44 |
| abstract_inverted_index.improve | 60 |
| abstract_inverted_index.network | 57, 94 |
| abstract_inverted_index.process | 132 |
| abstract_inverted_index.project | 75 |
| abstract_inverted_index.provide | 68 |
| abstract_inverted_index.several | 149 |
| abstract_inverted_index.severe, | 33 |
| abstract_inverted_index.system, | 148 |
| abstract_inverted_index.systems | 52 |
| abstract_inverted_index.threats | 27 |
| abstract_inverted_index.various | 64 |
| abstract_inverted_index.Software | 136 |
| abstract_inverted_index.analysis | 124 |
| abstract_inverted_index.attacks, | 165 |
| abstract_inverted_index.attacks. | 175 |
| abstract_inverted_index.becoming | 29 |
| abstract_inverted_index.complete | 104 |
| abstract_inverted_index.detected | 172 |
| abstract_inverted_index.evaluate | 142 |
| abstract_inverted_index.exchange | 20 |
| abstract_inverted_index.increase | 12 |
| abstract_inverted_index.insights | 190 |
| abstract_inverted_index.internet | 7 |
| abstract_inverted_index.offering | 102 |
| abstract_inverted_index.posture. | 121 |
| abstract_inverted_index.powerful | 93 |
| abstract_inverted_index.research | 193 |
| abstract_inverted_index.security | 37, 83, 120 |
| abstract_inverted_index.solution | 105 |
| abstract_inverted_index.systems. | 41, 201 |
| abstract_inverted_index.testing, | 130 |
| abstract_inverted_index.threats, | 48 |
| abstract_inverted_index.valuable | 189 |
| abstract_inverted_index.warnings | 71 |
| abstract_inverted_index.Suricata, | 91, 187 |
| abstract_inverted_index.Telegram, | 73 |
| abstract_inverted_index.advantage | 35 |
| abstract_inverted_index.connected | 3 |
| abstract_inverted_index.detection | 51, 62, 96, 200 |
| abstract_inverted_index.effective | 49 |
| abstract_inverted_index.essential | 54 |
| abstract_inverted_index.including | 155 |
| abstract_inverted_index.intrusion | 95, 199 |
| abstract_inverted_index.platform, | 89 |
| abstract_inverted_index.providing | 188 |
| abstract_inverted_index.revealing | 22 |
| abstract_inverted_index.security. | 58 |
| abstract_inverted_index.sensitive | 23 |
| abstract_inverted_index.strengths | 180 |
| abstract_inverted_index.(IDS/IPS). | 100 |
| abstract_inverted_index.complexity | 45 |
| abstract_inverted_index.detection, | 111 |
| abstract_inverted_index.developing | 196 |
| abstract_inverted_index.highlights | 178 |
| abstract_inverted_index.integrated | 147 |
| abstract_inverted_index.management | 87, 108 |
| abstract_inverted_index.prevention | 98 |
| abstract_inverted_index.strengthen | 116 |
| abstract_inverted_index.Development | 137 |
| abstract_inverted_index.activities. | 168 |
| abstract_inverted_index.brute-force | 164 |
| abstract_inverted_index.information | 19, 84 |
| abstract_inverted_index.integrating | 78, 184 |
| abstract_inverted_index.integration | 113 |
| abstract_inverted_index.limitations | 182 |
| abstract_inverted_index.maintaining | 56 |
| abstract_inverted_index.simulations | 151 |
| abstract_inverted_index.compromising | 17 |
| abstract_inverted_index.increasingly | 30 |
| abstract_inverted_index.multi-attack | 110 |
| abstract_inverted_index.successfully | 171 |
| abstract_inverted_index.effectiveness | 144 |
| abstract_inverted_index.port-scanning | 167 |
| abstract_inverted_index.sophisticated | 31 |
| abstract_inverted_index.implementation | 128 |
| abstract_inverted_index.interconnected | 40 |
| abstract_inverted_index.organization's | 118 |
| abstract_inverted_index.vulnerabilities | 38 |
| cited_by_percentile_year | |
| countries_distinct_count | 1 |
| institutions_distinct_count | 4 |
| citation_normalized_percentile.value | 0.83364903 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |