{"id":"https://openalex.org/W4224312132","doi":"https://doi.org/10.1007/s40747-022-00739-0","title":"Strengthening intrusion detection system for adversarial attacks: improved handling of imbalance classification problem","display_name":"Strengthening intrusion detection system for adversarial attacks: improved handling of imbalance classification problem","publication_year":2022,"publication_date":"2022-04-25","ids":{"openalex":"https://openalex.org/W4224312132","doi":"https://doi.org/10.1007/s40747-022-00739-0"},"language":"en","primary_location":{"id":"doi:10.1007/s40747-022-00739-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s40747-022-00739-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s40747-022-00739-0.pdf","source":{"id":"https://openalex.org/S3035462843","display_name":"Complex & Intelligent Systems","issn_l":"2198-6053","issn":["2198-6053","2199-4536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Complex &amp; Intelligent Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/s40747-022-00739-0.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063284203","display_name":"Chutipon Pimsarn","orcid":null},"institutions":[{"id":"https://openalex.org/I34002243","display_name":"Mae Fah Luang University","ror":"https://ror.org/00mwhaw71","country_code":"TH","type":"education","lineage":["https://openalex.org/I34002243"]}],"countries":["TH"],"is_corresponding":true,"raw_author_name":"Chutipon Pimsarn","raw_affiliation_strings":["Center of Excellence in AI and Emerging Technologies, School of Information Technology, Mae Fah Luang University, Chiang Rai, 57100, Thailand"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Center of Excellence in AI and Emerging Technologies, School of Information Technology, Mae Fah Luang University, Chiang Rai, 57100, Thailand","institution_ids":["https://openalex.org/I34002243"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Tossapon Boongoen","orcid":"https://orcid.org/0000-0002-2874-1922"},"institutions":[{"id":"https://openalex.org/I16038530","display_name":"Aberystwyth University","ror":"https://ror.org/015m2p889","country_code":"GB","type":"education","lineage":["https://openalex.org/I16038530"]},{"id":"https://openalex.org/I34002243","display_name":"Mae Fah Luang University","ror":"https://ror.org/00mwhaw71","country_code":"TH","type":"education","lineage":["https://openalex.org/I34002243"]}],"countries":["GB","TH"],"is_corresponding":false,"raw_author_name":"Tossapon Boongoen","raw_affiliation_strings":["Center of Excellence in AI and Emerging Technologies, School of Information Technology, Mae Fah Luang University, Chiang Rai, 57100, Thailand","Department of Computer Science, Aberystwyth University, Aberystwyth, UK"],"raw_orcid":"https://orcid.org/0000-0002-2874-1922","affiliations":[{"raw_affiliation_string":"Center of Excellence in AI and Emerging Technologies, School of Information Technology, Mae Fah Luang University, Chiang Rai, 57100, Thailand","institution_ids":["https://openalex.org/I34002243"]},{"raw_affiliation_string":"Department of Computer Science, Aberystwyth University, Aberystwyth, UK","institution_ids":["https://openalex.org/I16038530"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064389509","display_name":"Natthakan Iam-On","orcid":"https://orcid.org/0000-0002-9060-5331"},"institutions":[{"id":"https://openalex.org/I16038530","display_name":"Aberystwyth University","ror":"https://ror.org/015m2p889","country_code":"GB","type":"education","lineage":["https://openalex.org/I16038530"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Natthakan Iam-On","raw_affiliation_strings":["Department of Computer Science, Aberystwyth University, Aberystwyth, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Aberystwyth University, Aberystwyth, UK","institution_ids":["https://openalex.org/I16038530"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089628794","display_name":"Nitin Naik","orcid":"https://orcid.org/0000-0002-0659-9646"},"institutions":[{"id":"https://openalex.org/I169199633","display_name":"Aston University","ror":"https://ror.org/05j0ve876","country_code":"GB","type":"education","lineage":["https://openalex.org/I169199633"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Nitin Naik","raw_affiliation_strings":["School of Informatics and Digital Engineering, Aston University, Birmingham, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Informatics and Digital Engineering, Aston University, Birmingham, UK","institution_ids":["https://openalex.org/I169199633"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065079117","display_name":"Longzhi Yang","orcid":"https://orcid.org/0000-0003-2115-4909"},"institutions":[{"id":"https://openalex.org/I32394136","display_name":"Northumbria University","ror":"https://ror.org/049e6bc10","country_code":"GB","type":"education","lineage":["https://openalex.org/I32394136"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Longzhi Yang","raw_affiliation_strings":["Department of Computer and Information Sciences, Northumbria University, Newcastle upon Tyne, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, Northumbria University, Newcastle upon Tyne, UK","institution_ids":["https://openalex.org/I32394136"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5063284203"],"corresponding_institution_ids":["https://openalex.org/I34002243"],"apc_list":{"value":1320,"currency":"GBP","value_usd":1619},"apc_paid":{"value":1320,"currency":"GBP","value_usd":1619},"fwci":2.7108,"has_fulltext":true,"cited_by_count":20,"citation_normalized_percentile":{"value":0.90202356,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"8","issue":"6","first_page":"4863","last_page":"4880"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/undersampling","display_name":"Undersampling","score":0.8751257658004761},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.7450305819511414},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6901719570159912},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.633015513420105},{"id":"https://openalex.org/keywords/centroid","display_name":"Centroid","score":0.6180206537246704},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.591554582118988},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5459576845169067},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5431060791015625},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.483835369348526},{"id":"https://openalex.org/keywords/computational-intelligence","display_name":"Computational intelligence","score":0.4632139801979065},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.4433452785015106},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.42533621191978455},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3596700429916382}],"concepts":[{"id":"https://openalex.org/C136536468","wikidata":"https://www.wikidata.org/wiki/Q1225894","display_name":"Undersampling","level":2,"score":0.8751257658004761},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.7450305819511414},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6901719570159912},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.633015513420105},{"id":"https://openalex.org/C146599234","wikidata":"https://www.wikidata.org/wiki/Q511093","display_name":"Centroid","level":2,"score":0.6180206537246704},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.591554582118988},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5459576845169067},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5431060791015625},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.483835369348526},{"id":"https://openalex.org/C139502532","wikidata":"https://www.wikidata.org/wiki/Q1122090","display_name":"Computational intelligence","level":2,"score":0.4632139801979065},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.4433452785015106},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.42533621191978455},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3596700429916382},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/s40747-022-00739-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s40747-022-00739-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s40747-022-00739-0.pdf","source":{"id":"https://openalex.org/S3035462843","display_name":"Complex & Intelligent Systems","issn_l":"2198-6053","issn":["2198-6053","2199-4536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Complex &amp; Intelligent Systems","raw_type":"journal-article"},{"id":"pmh:oai:nrl.northumbria.ac.uk:49700","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401884","display_name":"Northumbria Research Link (Northumbria University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I32394136","host_organization_name":"Northumbria University","host_organization_lineage":["https://openalex.org/I32394136"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Article"},{"id":"pmh:oai:publications.aston.ac.uk:43752","is_oa":false,"landing_page_url":"https://publications.aston.ac.uk/view/author/aa4db887c0bf748e844ec405f73f8819.html>","pdf_url":null,"source":{"id":"https://openalex.org/S4306400483","display_name":"Aston Publications Explorer (Aston University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I169199633","host_organization_name":"Aston University","host_organization_lineage":["https://openalex.org/I169199633"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},{"id":"pmh:oai:aber.ac.uk:publications/6d85b1d1-66bf-4963-9548-2bdaa75880d2","is_oa":true,"landing_page_url":"https://hdl.handle.net/2160/6d85b1d1-66bf-4963-9548-2bdaa75880d2","pdf_url":null,"source":{"id":"https://openalex.org/S4306401660","display_name":"Aberystwyth Research portal (Aberystwyth University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I16038530","host_organization_name":"Aberystwyth University","host_organization_lineage":["https://openalex.org/I16038530"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":{"id":"doi:10.1007/s40747-022-00739-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s40747-022-00739-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s40747-022-00739-0.pdf","source":{"id":"https://openalex.org/S3035462843","display_name":"Complex & Intelligent Systems","issn_l":"2198-6053","issn":["2198-6053","2199-4536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Complex &amp; Intelligent Systems","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.46000000834465027,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320320005","display_name":"Royal Academy of Engineering","ror":"https://ror.org/0526snb40"},{"id":"https://openalex.org/F4320322399","display_name":"Mae Fah Luang University","ror":"https://ror.org/00mwhaw71"},{"id":"https://openalex.org/F4320322614","display_name":"Thailand Research Fund","ror":"https://ror.org/03gd1bh37"},{"id":"https://openalex.org/F4320322817","display_name":"National Research Council of Thailand","ror":"https://ror.org/018wfhg78"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4224312132.pdf"},"referenced_works_count":73,"referenced_works":["https://openalex.org/W930473687","https://openalex.org/W1574173537","https://openalex.org/W2013890379","https://openalex.org/W2024170198","https://openalex.org/W2026258420","https://openalex.org/W2034362794","https://openalex.org/W2043865575","https://openalex.org/W2046993841","https://openalex.org/W2047408376","https://openalex.org/W2056243682","https://openalex.org/W2065492702","https://openalex.org/W2072615238","https://openalex.org/W2074888575","https://openalex.org/W2091007025","https://openalex.org/W2096945460","https://openalex.org/W2109068396","https://openalex.org/W2116984363","https://openalex.org/W2118023920","https://openalex.org/W2125908420","https://openalex.org/W2147331788","https://openalex.org/W2148143831","https://openalex.org/W2161922052","https://openalex.org/W2338318698","https://openalex.org/W2435778079","https://openalex.org/W2495639697","https://openalex.org/W2512144135","https://openalex.org/W2605497964","https://openalex.org/W2612634114","https://openalex.org/W2617118748","https://openalex.org/W2626102168","https://openalex.org/W2732383329","https://openalex.org/W2766882809","https://openalex.org/W2772656773","https://openalex.org/W2789255312","https://openalex.org/W2789420469","https://openalex.org/W2790843555","https://openalex.org/W2794951181","https://openalex.org/W2803491532","https://openalex.org/W2885128583","https://openalex.org/W2890103762","https://openalex.org/W2896370767","https://openalex.org/W2899653275","https://openalex.org/W2913497771","https://openalex.org/W2916641566","https://openalex.org/W2919785014","https://openalex.org/W2942611521","https://openalex.org/W2944210580","https://openalex.org/W2950250245","https://openalex.org/W2955751796","https://openalex.org/W2964113884","https://openalex.org/W2966650087","https://openalex.org/W2980945382","https://openalex.org/W2981880399","https://openalex.org/W2987421643","https://openalex.org/W2995778637","https://openalex.org/W2997953741","https://openalex.org/W3001683812","https://openalex.org/W3006165800","https://openalex.org/W3017250473","https://openalex.org/W3048377462","https://openalex.org/W3069275998","https://openalex.org/W3107757457","https://openalex.org/W3109878163","https://openalex.org/W3111001626","https://openalex.org/W3118406530","https://openalex.org/W3130982961","https://openalex.org/W3173665891","https://openalex.org/W3198227463","https://openalex.org/W3200525399","https://openalex.org/W3203118340","https://openalex.org/W3206162503","https://openalex.org/W3213944207","https://openalex.org/W4210592414"],"related_works":["https://openalex.org/W2109073422","https://openalex.org/W2887783772","https://openalex.org/W2101754595","https://openalex.org/W2534887053","https://openalex.org/W2026172757","https://openalex.org/W4249381695","https://openalex.org/W4389292014","https://openalex.org/W2394059563","https://openalex.org/W2017942469","https://openalex.org/W2103461412"],"abstract_inverted_index":{"Abstract":[0],"Most":[1],"defence":[2],"mechanisms":[3],"such":[4],"as":[5,233],"a":[6,25,32,70,99,132,148,194,234],"network-based":[7],"intrusion":[8],"detection":[9,17],"system":[10],"(NIDS)":[11],"are":[12,171,230],"often":[13,206],"sub-optimal":[14],"for":[15,79,85,173,225,236],"the":[16,37,48,56,73,80,89,107,115,129,139,157,190,214],"of":[18,27,46,91,109,128,134,141,150,160,183,193],"an":[19,227],"unseen":[20],"malicious":[21],"pattern.":[22],"In":[23,97],"response,":[24],"number":[26],"studies":[28],"attempt":[29],"to":[30,35,39,65,72,105,122,146,180],"empower":[31],"machine-learning-based":[33],"NIDS":[34],"improve":[36],"ability":[38],"recognize":[40],"adversarial":[41],"attacks.":[42],"Along":[43],"this":[44,165,174],"line":[45],"research,":[47],"present":[49],"work":[50],"focuses":[51],"on":[52,124,189],"non-payload":[53],"connections":[54],"at":[55],"TCP":[57],"stack":[58],"level,":[59],"which":[60],"is":[61,94,103,120,136,162],"generalized":[62],"and":[63,152,186,200,218,223],"applicable":[64],"different":[66,168,201],"network":[67],"applications.":[68,238],"As":[69],"compliment":[71],"recently":[74],"published":[75,195],"investigation":[76],"that":[77,112,127,144],"searches":[78],"most":[81],"informative":[82],"feature":[83],"space":[84],"classifying":[86],"obfuscated":[87],"connections,":[88],"problem":[90],"class":[92],"imbalance":[93],"examined":[95],"herein.":[96],"particular,":[98],"multiple-clustering-based":[100],"undersampling":[101,216],"framework":[102],"proposed":[104],"determine":[106],"set":[108,159],"cluster":[110],"centroids":[111,135],"best":[113],"represent":[114],"majority":[116],"class,":[117],"whose":[118],"size":[119],"reduced":[121],"be":[123],"par":[125],"with":[126],"minority.":[130],"Initially,":[131],"pool":[133],"created":[137],"using":[138],"concept":[140],"ensemble":[142],"clustering":[143],"aims":[145],"obtain":[147],"collection":[149],"accurate":[151],"diverse":[153],"clusterings.":[154],"From":[155],"that,":[156],"final":[158],"representatives":[161],"selected":[163],"from":[164],"pool.":[166],"Three":[167],"objective":[169],"functions":[170],"formed":[172],"optimization":[175],"driven":[176],"process,":[177],"thus":[178],"leading":[179],"three":[181],"variants":[182],"FF-Majority,":[184],"FF-Minority":[185],"FF-Overall.":[187],"Based":[188],"thorough":[191],"evaluation":[192],"dataset,":[196],"four":[197],"classification":[198],"models":[199],"settings,":[202],"these":[203],"new":[204],"methods":[205],"exhibit":[207],"better":[208],"predictive":[209],"performance":[210],"than":[211],"its":[212],"baseline,":[213],"single-clustering":[215],"counterpart":[217],"state-of-the-art":[219],"techniques.":[220],"Parameter":[221],"analysis":[222],"implication":[224],"analyzing":[226],"extreme":[228],"case":[229],"also":[231],"provided":[232],"guideline":[235],"future":[237]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1}],"updated_date":"2026-01-15T23:16:33.117629","created_date":"2025-10-10T00:00:00"}
