{"id":"https://openalex.org/W3006165800","doi":"https://doi.org/10.1109/access.2020.2973219","title":"Increasing the Performance of Machine Learning-Based IDSs on an Imbalanced and Up-to-Date Dataset","display_name":"Increasing the Performance of Machine Learning-Based IDSs on an Imbalanced and Up-to-Date Dataset","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3006165800","doi":"https://doi.org/10.1109/access.2020.2973219","mag":"3006165800"},"language":"en","primary_location":{"id":"doi:10.1109/access.2020.2973219","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2973219","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/08993711.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/08993711.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112523396","display_name":"G\u00f6zde Karata\u015f","orcid":null},"institutions":[{"id":"https://openalex.org/I197185219","display_name":"Istanbul K\u00fclt\u00fcr University","ror":"https://ror.org/05jvrwv37","country_code":"TR","type":"education","lineage":["https://openalex.org/I197185219"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Gozde Karatas","raw_affiliation_strings":["Department of Mathematics and Computer Sciences, Faculty of Science and Literature, Istanbul K\u00fclt\u00fcr University, Istanbul, Turkey"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Sciences, Faculty of Science and Literature, Istanbul K\u00fclt\u00fcr University, Istanbul, Turkey","institution_ids":["https://openalex.org/I197185219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048984385","display_name":"\u00d6nder Demir","orcid":"https://orcid.org/0000-0003-4540-663X"},"institutions":[{"id":"https://openalex.org/I74897591","display_name":"Marmara University","ror":"https://ror.org/02kswqa67","country_code":"TR","type":"education","lineage":["https://openalex.org/I74897591"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Onder Demir","raw_affiliation_strings":["Department of Computer Engineering, Faculty of Technology, Marmara University, Istanbul, Turkey"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Faculty of Technology, Marmara University, Istanbul, Turkey","institution_ids":["https://openalex.org/I74897591"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074737067","display_name":"\u00d6zg\u00fcr Koray \u015eahing\u00f6z","orcid":"https://orcid.org/0000-0002-1588-8220"},"institutions":[{"id":"https://openalex.org/I197185219","display_name":"Istanbul K\u00fclt\u00fcr University","ror":"https://ror.org/05jvrwv37","country_code":"TR","type":"education","lineage":["https://openalex.org/I197185219"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Ozgur Koray Sahingoz","raw_affiliation_strings":["Department of Computer Engineering, Faculty of Engineering, Istanbul K\u00fclt\u00fcr University, Istanbul, Turkey"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Faculty of Engineering, Istanbul K\u00fclt\u00fcr University, Istanbul, Turkey","institution_ids":["https://openalex.org/I197185219"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5112523396"],"corresponding_institution_ids":["https://openalex.org/I197185219"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":28.2148,"has_fulltext":true,"cited_by_count":279,"citation_normalized_percentile":{"value":0.99808888,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"8","issue":null,"first_page":"32150","last_page":"32162"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8346955180168152},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.7621124982833862},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7185901403427124},{"id":"https://openalex.org/keywords/adaboost","display_name":"AdaBoost","score":0.679923415184021},{"id":"https://openalex.org/keywords/boosting","display_name":"Boosting (machine learning)","score":0.6211414933204651},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6036146879196167},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.5892077088356018},{"id":"https://openalex.org/keywords/oversampling","display_name":"Oversampling","score":0.5454495549201965},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.4950930178165436},{"id":"https://openalex.org/keywords/linear-discriminant-analysis","display_name":"Linear discriminant analysis","score":0.4504564106464386},{"id":"https://openalex.org/keywords/statistical-classification","display_name":"Statistical classification","score":0.44532716274261475},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.4240744709968567},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.40735551714897156},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.08840042352676392}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8346955180168152},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.7621124982833862},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7185901403427124},{"id":"https://openalex.org/C141404830","wikidata":"https://www.wikidata.org/wiki/Q2823869","display_name":"AdaBoost","level":3,"score":0.679923415184021},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.6211414933204651},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6036146879196167},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.5892077088356018},{"id":"https://openalex.org/C197323446","wikidata":"https://www.wikidata.org/wiki/Q331222","display_name":"Oversampling","level":3,"score":0.5454495549201965},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.4950930178165436},{"id":"https://openalex.org/C69738355","wikidata":"https://www.wikidata.org/wiki/Q1228929","display_name":"Linear discriminant analysis","level":2,"score":0.4504564106464386},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.44532716274261475},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.4240744709968567},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.40735551714897156},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.08840042352676392},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/access.2020.2973219","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2973219","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/08993711.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:a24a9b88579144cb943ea4f179530124","is_oa":true,"landing_page_url":"https://doaj.org/article/a24a9b88579144cb943ea4f179530124","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 8, Pp 32150-32162 (2020)","raw_type":"article"},{"id":"pmh:oai:openaccess.marmara.edu.tr:11424/245336","is_oa":true,"landing_page_url":"https://hdl.handle.net/11424/245336","pdf_url":null,"source":{"id":"https://openalex.org/S4306401380","display_name":"Dspace Repository (Marmara \u00dcniversitesi)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I74897591","host_organization_name":"Marmara University","host_organization_lineage":["https://openalex.org/I74897591"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2020.2973219","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2973219","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/08993711.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5400000214576721,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320325078","display_name":"Marmara \u00dcniversitesi","ror":"https://ror.org/02kswqa67"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3006165800.pdf","grobid_xml":"https://content.openalex.org/works/W3006165800.grobid-xml"},"referenced_works_count":51,"referenced_works":["https://openalex.org/W1533970595","https://openalex.org/W2028070713","https://openalex.org/W2047408376","https://openalex.org/W2087240369","https://openalex.org/W2099940443","https://openalex.org/W2111542531","https://openalex.org/W2136140045","https://openalex.org/W2136580951","https://openalex.org/W2147331788","https://openalex.org/W2170505850","https://openalex.org/W2261059368","https://openalex.org/W2295071300","https://openalex.org/W2296509296","https://openalex.org/W2302058010","https://openalex.org/W2305976078","https://openalex.org/W2414767909","https://openalex.org/W2473882306","https://openalex.org/W2560982200","https://openalex.org/W2597441556","https://openalex.org/W2601474892","https://openalex.org/W2606436201","https://openalex.org/W2614183994","https://openalex.org/W2747144285","https://openalex.org/W2768348081","https://openalex.org/W2770942607","https://openalex.org/W2782614128","https://openalex.org/W2789828921","https://openalex.org/W2803090662","https://openalex.org/W2806822872","https://openalex.org/W2807319534","https://openalex.org/W2807786182","https://openalex.org/W2899653275","https://openalex.org/W2901624508","https://openalex.org/W2914968227","https://openalex.org/W2919868916","https://openalex.org/W2936503027","https://openalex.org/W2942611521","https://openalex.org/W2946806001","https://openalex.org/W2950250245","https://openalex.org/W2955155733","https://openalex.org/W2964161291","https://openalex.org/W2973766583","https://openalex.org/W4297821991","https://openalex.org/W6631885290","https://openalex.org/W6636308168","https://openalex.org/W6696927340","https://openalex.org/W6698160013","https://openalex.org/W6737563499","https://openalex.org/W6745609711","https://openalex.org/W6745861399","https://openalex.org/W6747435960"],"related_works":["https://openalex.org/W2327035729","https://openalex.org/W2348748958","https://openalex.org/W3039673966","https://openalex.org/W1538046993","https://openalex.org/W1570592793","https://openalex.org/W1525436954","https://openalex.org/W2385662756","https://openalex.org/W2585372724","https://openalex.org/W2241444561","https://openalex.org/W1502951582"],"abstract_inverted_index":{"In":[0,131],"recent":[1],"years,":[2],"due":[3],"to":[4,29,48,183,195,232],"the":[5,9,11,25,52,76,120,185,188,202,233,244,249],"extensive":[6],"use":[7],"of":[8,13,24,75,112,122,170,187],"Internet,":[10],"number":[12],"networked":[14],"computers":[15,32,53],"has":[16],"been":[17],"increasing":[18],"in":[19,90],"our":[20],"daily":[21],"lives.":[22],"Weaknesses":[23],"servers":[26],"enable":[27],"hackers":[28],"intrude":[30],"on":[31,191],"by":[33,68,139,207],"using":[34,69,140,208],"not":[35],"only":[36],"known":[37],"but":[38],"also":[39,180],"new":[40],"attack-types,":[41],"which":[42,60],"are":[43,102,230],"more":[44,159],"sophisticated":[45],"and":[46,94,104,116,151,172,194,199,227],"harder":[47],"detect.":[49],"To":[50,156],"protect":[51],"from":[54],"them,":[55],"Intrusion":[56],"Detection":[57],"System":[58],"(IDS),":[59],"is":[61,73,167,179,205,222],"trained":[62],"with":[63],"some":[64,91],"machine":[65],"learning":[66],"techniques":[67],"a":[70,87,158,209],"pre-collected":[71],"dataset,":[72,165],"one":[74],"most":[77],"preferred":[78],"protection":[79],"mechanisms.":[80],"The":[81,176],"used":[82,168],"datasets":[83,118],"were":[84],"collected":[85],"during":[86],"limited":[88],"period":[89],"specific":[92],"networks":[93],"generally":[95],"don't":[96],"contain":[97],"up-to-date":[98,163],"data.":[99],"Additionally,":[100],"they":[101],"imbalanced":[103,115],"cannot":[105],"hold":[106],"sufficient":[107],"data":[108,211,235],"for":[109,126,224,252],"all":[110],"types":[111,193],"attacks.":[113],"These":[114],"outdated":[117],"decrease":[119,196],"efficiency":[121,186],"current":[123],"IDSs,":[124],"especially":[125],"rarely":[127,253],"encountered":[128,254],"attack":[129,192],"types.":[130],"this":[132,238],"paper,":[133],"we":[134],"propose":[135],"six":[136],"machine-learning-based":[137],"IDSs":[138],"K":[141],"Nearest":[142],"Neighbor,":[143],"Random":[144],"Forest,":[145],"Gradient":[146],"Boosting,":[147],"Adaboost,":[148],"Decision":[149],"Tree,":[150],"Linear":[152],"Discriminant":[153],"Analysis":[154],"algorithms.":[155],"implement":[157],"realistic":[160],"IDS,":[161],"an":[162],"security":[164],"CSE-CIC-IDS2018,":[166],"instead":[169],"older":[171],"mostly":[173],"worked":[174],"datasets.":[175],"selected":[177],"dataset":[178],"imbalanced.":[181],"Therefore,":[182],"increase":[184],"system":[189],"depending":[190],"missed":[197],"intrusions":[198],"false":[200],"alarms,":[201],"imbalance":[203],"ratio":[204],"reduced":[206],"synthetic":[210],"generation":[212,221],"model":[213],"called":[214],"Synthetic":[215],"Minority":[216],"Oversampling":[217],"TEchnique":[218],"(SMOTE).":[219],"Data":[220],"performed":[223],"minor":[225],"classes,":[226],"their":[228],"numbers":[229],"increased":[231],"average":[234],"size":[236],"via":[237],"technique.":[239],"Experimental":[240],"results":[241],"demonstrated":[242],"that":[243],"proposed":[245],"approach":[246],"considerably":[247],"increases":[248],"detection":[250],"rate":[251],"intrusions.":[255]},"counts_by_year":[{"year":2026,"cited_by_count":7},{"year":2025,"cited_by_count":44},{"year":2024,"cited_by_count":53},{"year":2023,"cited_by_count":67},{"year":2022,"cited_by_count":55},{"year":2021,"cited_by_count":41},{"year":2020,"cited_by_count":12}],"updated_date":"2026-03-29T08:15:47.926485","created_date":"2020-02-24T00:00:00"}
