{"id":"https://openalex.org/W3008735069","doi":"https://doi.org/10.1109/access.2020.2975716","title":"Similarity Based Feature Transformation for Network Anomaly Detection","display_name":"Similarity Based Feature Transformation for Network Anomaly Detection","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3008735069","doi":"https://doi.org/10.1109/access.2020.2975716","mag":"3008735069"},"language":"en","primary_location":{"id":"doi:10.1109/access.2020.2975716","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2975716","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09006824.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09006824.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037466905","display_name":"Arun Nagaraja","orcid":"https://orcid.org/0000-0002-2652-4748"},"institutions":[{"id":"https://openalex.org/I106826634","display_name":"Jain University","ror":"https://ror.org/01cnqpt53","country_code":"IN","type":"education","lineage":["https://openalex.org/I106826634"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Arun Nagaraja","raw_affiliation_strings":["Department of Information Science and Engineering, Jain University, Bengaluru, India"],"affiliations":[{"raw_affiliation_string":"Department of Information Science and Engineering, Jain University, Bengaluru, India","institution_ids":["https://openalex.org/I106826634"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024763489","display_name":"Uma Boregowda","orcid":"https://orcid.org/0000-0001-5125-798X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Uma Boregowda","raw_affiliation_strings":["Department of Information Science and Engineering, Malnad College of Engineering, Hassan, India"],"affiliations":[{"raw_affiliation_string":"Department of Information Science and Engineering, Malnad College of Engineering, Hassan, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043013659","display_name":"Khalaf Khatatneh","orcid":"https://orcid.org/0000-0003-1796-604X"},"institutions":[{"id":"https://openalex.org/I33926330","display_name":"Al-Balqa Applied University","ror":"https://ror.org/00qedmt22","country_code":"JO","type":"education","lineage":["https://openalex.org/I33926330"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Khalaf Khatatneh","raw_affiliation_strings":["Department of Computer Science, Al Balqa\u2019 Applied University, Al-Salt, Jordan","Department of Computer Science, Al Balqa' Applied University, Al-Salt, Jordan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Al Balqa\u2019 Applied University, Al-Salt, Jordan","institution_ids":["https://openalex.org/I33926330"]},{"raw_affiliation_string":"Department of Computer Science, Al Balqa' Applied University, Al-Salt, Jordan","institution_ids":["https://openalex.org/I33926330"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041895275","display_name":"Vangipuram Radhakrishna","orcid":"https://orcid.org/0000-0002-7373-6276"},"institutions":[{"id":"https://openalex.org/I2801452159","display_name":"Vignana Jyothi Institute of Management","ror":"https://ror.org/02ken4f88","country_code":"IN","type":"education","lineage":["https://openalex.org/I2801452159"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Radhakrishna Vangipuram","raw_affiliation_strings":["Department of Information Technology, VNR Vignana Jyothi Institute of Engineering and Technology, Hyderabad, India"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, VNR Vignana Jyothi Institute of Engineering and Technology, Hyderabad, India","institution_ids":["https://openalex.org/I2801452159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065420830","display_name":"N. Rajasekhar","orcid":"https://orcid.org/0000-0003-0035-0994"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rajasekhar Nuvvusetty","raw_affiliation_strings":["Department of Information Technology, Gokaraju Rangaraju Institute of Engineering and Technology, Hyderabad, India"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Gokaraju Rangaraju Institute of Engineering and Technology, Hyderabad, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035719972","display_name":"V. Sravan Kiran","orcid":"https://orcid.org/0000-0001-5059-0123"},"institutions":[{"id":"https://openalex.org/I2801452159","display_name":"Vignana Jyothi Institute of Management","ror":"https://ror.org/02ken4f88","country_code":"IN","type":"education","lineage":["https://openalex.org/I2801452159"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"V. Sravan Kiran","raw_affiliation_strings":["Department of Information Technology, VNR Vignana Jyothi Institute of Engineering and Technology, Hyderabad, India"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, VNR Vignana Jyothi Institute of Engineering and Technology, Hyderabad, India","institution_ids":["https://openalex.org/I2801452159"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5037466905"],"corresponding_institution_ids":["https://openalex.org/I106826634"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":8.5451,"has_fulltext":true,"cited_by_count":74,"citation_normalized_percentile":{"value":0.97892945,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":"8","issue":null,"first_page":"39184","last_page":"39196"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.752507209777832},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7328420877456665},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.622546911239624},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5948604345321655},{"id":"https://openalex.org/keywords/feature-vector","display_name":"Feature vector","score":0.5347698330879211},{"id":"https://openalex.org/keywords/dimensionality-reduction","display_name":"Dimensionality reduction","score":0.5062943696975708},{"id":"https://openalex.org/keywords/curse-of-dimensionality","display_name":"Curse of dimensionality","score":0.50162672996521},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.5014636516571045},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4561211168766022},{"id":"https://openalex.org/keywords/transformation","display_name":"Transformation (genetics)","score":0.41376838088035583},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.39906400442123413}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.752507209777832},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7328420877456665},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.622546911239624},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5948604345321655},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.5347698330879211},{"id":"https://openalex.org/C70518039","wikidata":"https://www.wikidata.org/wiki/Q16000077","display_name":"Dimensionality reduction","level":2,"score":0.5062943696975708},{"id":"https://openalex.org/C111030470","wikidata":"https://www.wikidata.org/wiki/Q1430460","display_name":"Curse of dimensionality","level":2,"score":0.50162672996521},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.5014636516571045},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4561211168766022},{"id":"https://openalex.org/C204241405","wikidata":"https://www.wikidata.org/wiki/Q461499","display_name":"Transformation (genetics)","level":3,"score":0.41376838088035583},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.39906400442123413},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2020.2975716","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2975716","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09006824.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:9a9a112129ed4bdaaec1112132ad668a","is_oa":true,"landing_page_url":"https://doaj.org/article/9a9a112129ed4bdaaec1112132ad668a","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 8, Pp 39184-39196 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2020.2975716","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2975716","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09006824.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3008735069.pdf","grobid_xml":"https://content.openalex.org/works/W3008735069.grobid-xml"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W1941823481","https://openalex.org/W1977366836","https://openalex.org/W2063676706","https://openalex.org/W2093859880","https://openalex.org/W2105499314","https://openalex.org/W2116377106","https://openalex.org/W2117594971","https://openalex.org/W2145252566","https://openalex.org/W2435595312","https://openalex.org/W2549066293","https://openalex.org/W2557835779","https://openalex.org/W2559070724","https://openalex.org/W2570160403","https://openalex.org/W2574209248","https://openalex.org/W2596206083","https://openalex.org/W2604105233","https://openalex.org/W2759696253","https://openalex.org/W2772110660","https://openalex.org/W2800369870","https://openalex.org/W2885080997","https://openalex.org/W2886560752","https://openalex.org/W2886954500","https://openalex.org/W2898623405","https://openalex.org/W2919659556","https://openalex.org/W2920682993","https://openalex.org/W2921483046"],"related_works":["https://openalex.org/W1995622179","https://openalex.org/W1484111231","https://openalex.org/W1552543208","https://openalex.org/W2074396517","https://openalex.org/W2166963679","https://openalex.org/W2187269125","https://openalex.org/W1641615907","https://openalex.org/W3089231081","https://openalex.org/W2093956241","https://openalex.org/W2354420595"],"abstract_inverted_index":{"The":[0,21,105],"fundamental":[1],"objective":[2],"behind":[3],"any":[4,60,108,160],"network":[5,25,33,109],"intrusion":[6],"detection":[7,13,27,41,111,276,288],"system":[8,61,112],"is":[9,28,36,64,146,155,170,250],"to":[10,29,44,66,93,136,190,194,255,287],"automate":[11],"the":[12,19,24,32,85,88,95,103,115,138,165,173,185,196,201,279,296],"process":[14],"whenever":[15],"intrusions":[16],"occur":[17],"in":[18,200,218,235,295],"network.":[20],"problem":[22],"of":[23,59,87,107,117,150,243],"anomaly":[26,275],"determine,":[30],"if":[31],"incoming":[34,46],"traffic":[35,48,78],"legitimate":[37,100],"(or)":[38,119],"anomalous.":[39],"Automated":[40],"systems":[42],"designed":[43],"identify":[45,67],"anomalous":[47,68,75,110],"patterns":[49],"usually":[50],"apply":[51],"widely":[52,231],"used":[53],"machine":[54,90,161,244],"learning":[55,91,162,245],"techniques.":[56],"However,":[57,178],"irrespective":[58],"model":[62,92],"which":[63,132],"developed":[65],"traffic,":[69],"all":[70],"these":[71],"models":[72],"requires":[73],"comparing":[74],"and":[76,102,122,216,226,265,292],"normal":[77],"patterns.":[79],"Such":[80],"comparisons":[81],"implicitly":[82],"depend":[83],"on":[84,114,224],"ability":[86],"underlying":[89],"gauge":[94],"similarity":[96,120,139],"between":[97,140],"a":[98],"known":[99],"observation":[101],"target.":[104],"efficiency":[106],"depends":[113],"use":[116],"distance":[118,130,188],"measures":[121],"how":[123],"they":[124],"are":[125,222],"actually":[126],"applied.":[127],"A":[128],"novel":[129],"function":[131,189],"can":[133],"be":[134],"applied":[135,232,251],"determine":[137],"two":[141],"conditional":[142],"feature":[143,168,175,182,281],"pattern":[144],"vectors":[145],"an":[147],"important":[148,157],"contribution":[149],"present":[151,166],"research.":[152],"Feature":[153],"dimensionality":[154,192],"another":[156],"issue":[158],"for":[159,181,212,274],"algorithm.":[163],"In":[164],"work,":[167],"reduction":[169,193],"achieved":[171],"using":[172],"proposed":[174,186,208,280],"transformation":[176,183,203,282],"technique.":[177],"our":[179,272],"approach":[180,273],"uses":[184],"gaussian":[187,219],"achieve":[191],"represent":[195],"original":[197],"input":[198],"dataset":[199],"new":[202,209],"space.":[204,220],"We":[205],"have":[206,269],"also":[207],"computation":[210],"expressions":[211],"determining":[213],"equivalent":[214],"deviation":[215],"threshold":[217],"Experiments":[221],"performed":[223],"KDD":[225],"NSL-KDD":[227],"datasets":[228],"by":[229,252],"considering":[230,258],"classifier":[233],"algorithms":[234],"various":[236],"state-of-art":[237],"research":[238,298],"contributions.":[239],"For":[240],"performance":[241],"validation":[242,249],"models,":[246],"k-fold":[247],"cross":[248],"setting":[253],"k":[254],"10":[256],"through":[257],"evaluation":[259],"parameters":[260],"such":[261],"as":[262],"accuracy,":[263],"precision":[264],"recall.":[266],"Experiment":[267],"results":[268],"proved":[270,284],"that":[271,277],"applies":[278],"technique":[283],"comparatively":[285],"better":[286],"methods":[289],"CANN,":[290],"GARUDA,":[291],"UTTAMA":[293],"addressed":[294],"recent":[297],"literature.":[299]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":30},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":19},{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
