{"id":"https://openalex.org/W4382468150","doi":"https://doi.org/10.1109/access.2023.3290613","title":"A Hierarchical Intrusion Detection Model Combining Multiple Deep Learning Models With Attention Mechanism","display_name":"A Hierarchical Intrusion Detection Model Combining Multiple Deep Learning Models With Attention Mechanism","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4382468150","doi":"https://doi.org/10.1109/access.2023.3290613"},"language":"en","primary_location":{"id":"doi:10.1109/access.2023.3290613","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3290613","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10168116.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10168116.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021827637","display_name":"Hongsheng Xu","orcid":"https://orcid.org/0000-0002-0749-0271"},"institutions":[{"id":"https://openalex.org/I4210117164","display_name":"Luoyang Normal University","ror":"https://ror.org/029man787","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210117164"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hongsheng Xu","raw_affiliation_strings":["College of Electronic Commerce, Luoyang Normal University, Luoyang, China","Henan key Laboratory for Big Data Processing & Analytics of Electronic Commerce, Luoyang Normal University, Luoyang, Henan, China","College of Electronic Commerce, Luoyang Normal University, Luoyang, Henan, China"],"raw_orcid":"https://orcid.org/0000-0002-0749-0271","affiliations":[{"raw_affiliation_string":"College of Electronic Commerce, Luoyang Normal University, Luoyang, China","institution_ids":["https://openalex.org/I4210117164"]},{"raw_affiliation_string":"Henan key Laboratory for Big Data Processing & Analytics of Electronic Commerce, Luoyang Normal University, Luoyang, Henan, China","institution_ids":["https://openalex.org/I4210117164"]},{"raw_affiliation_string":"College of Electronic Commerce, Luoyang Normal University, Luoyang, Henan, China","institution_ids":["https://openalex.org/I4210117164"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101726475","display_name":"Libo Sun","orcid":"https://orcid.org/0000-0002-9555-7586"},"institutions":[{"id":"https://openalex.org/I123946342","display_name":"Binghamton University","ror":"https://ror.org/008rmbt77","country_code":"US","type":"education","lineage":["https://openalex.org/I123946342"]},{"id":"https://openalex.org/I4210117164","display_name":"Luoyang Normal University","ror":"https://ror.org/029man787","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210117164"]}],"countries":["CN","US"],"is_corresponding":false,"raw_author_name":"Libo Sun","raw_affiliation_strings":["College of Electronic Commerce, Luoyang Normal University, Luoyang, China","College of Electronic Commerce, Luoyang Normal University, Luoyang, Henan, China","Binghamton University STATE UNIVERSITY OF NEW YORK, Binghamton, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Electronic Commerce, Luoyang Normal University, Luoyang, China","institution_ids":["https://openalex.org/I4210117164"]},{"raw_affiliation_string":"College of Electronic Commerce, Luoyang Normal University, Luoyang, Henan, China","institution_ids":["https://openalex.org/I4210117164"]},{"raw_affiliation_string":"Binghamton University STATE UNIVERSITY OF NEW YORK, Binghamton, USA","institution_ids":["https://openalex.org/I123946342"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073461762","display_name":"Ganglong Fan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210117164","display_name":"Luoyang Normal University","ror":"https://ror.org/029man787","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210117164"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ganglong Fan","raw_affiliation_strings":["College of Electronic Commerce, Luoyang Normal University, Luoyang, China","Henan key Laboratory for Big Data Processing & Analytics of Electronic Commerce, Luoyang Normal University, Luoyang, Henan, China","College of Electronic Commerce, Luoyang Normal University, Luoyang, Henan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Electronic Commerce, Luoyang Normal University, Luoyang, China","institution_ids":["https://openalex.org/I4210117164"]},{"raw_affiliation_string":"Henan key Laboratory for Big Data Processing & Analytics of Electronic Commerce, Luoyang Normal University, Luoyang, Henan, China","institution_ids":["https://openalex.org/I4210117164"]},{"raw_affiliation_string":"College of Electronic Commerce, Luoyang Normal University, Luoyang, Henan, China","institution_ids":["https://openalex.org/I4210117164"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033762091","display_name":"Wanxing Li","orcid":"https://orcid.org/0009-0004-8406-9810"},"institutions":[{"id":"https://openalex.org/I4210117164","display_name":"Luoyang Normal University","ror":"https://ror.org/029man787","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210117164"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wanxing Li","raw_affiliation_strings":["College of Electronic Commerce, Luoyang Normal University, Luoyang, China","Henan key Laboratory for Big Data Processing & Analytics of Electronic Commerce, Luoyang Normal University, Luoyang, Henan, China","College of Electronic Commerce, Luoyang Normal University, Luoyang, Henan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Electronic Commerce, Luoyang Normal University, Luoyang, China","institution_ids":["https://openalex.org/I4210117164"]},{"raw_affiliation_string":"Henan key Laboratory for Big Data Processing & Analytics of Electronic Commerce, Luoyang Normal University, Luoyang, Henan, China","institution_ids":["https://openalex.org/I4210117164"]},{"raw_affiliation_string":"College of Electronic Commerce, Luoyang Normal University, Luoyang, Henan, China","institution_ids":["https://openalex.org/I4210117164"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033439821","display_name":"Guofang Kuang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210117164","display_name":"Luoyang Normal University","ror":"https://ror.org/029man787","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210117164"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guofang Kuang","raw_affiliation_strings":["School of Information Technology, Luoyang Normal University, Luoyang, China","School of Information Technology, Luoyang Normal University, Luoyang, Henan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Information Technology, Luoyang Normal University, Luoyang, China","institution_ids":["https://openalex.org/I4210117164"]},{"raw_affiliation_string":"School of Information Technology, Luoyang Normal University, Luoyang, Henan, China","institution_ids":["https://openalex.org/I4210117164"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5021827637"],"corresponding_institution_ids":["https://openalex.org/I4210117164"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":7.6096,"has_fulltext":true,"cited_by_count":39,"citation_normalized_percentile":{"value":0.9771171,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"11","issue":null,"first_page":"66212","last_page":"66226"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8467244505882263},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7436313629150391},{"id":"https://openalex.org/keywords/softmax-function","display_name":"Softmax function","score":0.6573635935783386},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6417131423950195},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5539209842681885},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5469971299171448},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4731498956680298},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.4720883071422577}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8467244505882263},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7436313629150391},{"id":"https://openalex.org/C188441871","wikidata":"https://www.wikidata.org/wiki/Q7554146","display_name":"Softmax function","level":3,"score":0.6573635935783386},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6417131423950195},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5539209842681885},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5469971299171448},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4731498956680298},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.4720883071422577}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2023.3290613","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3290613","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10168116.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:7140d4ea842e48b797cfe928fc916e90","is_oa":true,"landing_page_url":"https://doaj.org/article/7140d4ea842e48b797cfe928fc916e90","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 11, Pp 66212-66226 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2023.3290613","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3290613","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10168116.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5099999904632568}],"awards":[{"id":"https://openalex.org/G7572044835","display_name":null,"funder_award_id":"61272015","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4382468150.pdf","grobid_xml":"https://content.openalex.org/works/W4382468150.grobid-xml"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W1811853421","https://openalex.org/W2504610970","https://openalex.org/W2762776925","https://openalex.org/W2772317693","https://openalex.org/W2789828921","https://openalex.org/W2883554196","https://openalex.org/W2885195348","https://openalex.org/W2886020981","https://openalex.org/W2921453769","https://openalex.org/W2969973402","https://openalex.org/W2982682021","https://openalex.org/W2982853004","https://openalex.org/W2986055611","https://openalex.org/W2990225485","https://openalex.org/W2999360110","https://openalex.org/W3005630930","https://openalex.org/W3005805195","https://openalex.org/W3006165800","https://openalex.org/W3022413490","https://openalex.org/W3028728764","https://openalex.org/W3034726856","https://openalex.org/W3045828810","https://openalex.org/W3090709119","https://openalex.org/W3108087516","https://openalex.org/W3119693685","https://openalex.org/W3140593863","https://openalex.org/W3156442476","https://openalex.org/W3157156764","https://openalex.org/W3199790628","https://openalex.org/W3215693540","https://openalex.org/W4220757726","https://openalex.org/W4223912177","https://openalex.org/W4226263724","https://openalex.org/W4281387608","https://openalex.org/W4312998103"],"related_works":["https://openalex.org/W3107204728","https://openalex.org/W4287591324","https://openalex.org/W3108503355","https://openalex.org/W3090555870","https://openalex.org/W4226420367","https://openalex.org/W2962876041","https://openalex.org/W3022820045","https://openalex.org/W4323060069","https://openalex.org/W3120400911","https://openalex.org/W4380075502"],"abstract_inverted_index":{"In":[0],"order":[1],"to":[2,15,87,125,139,155,184,192,214],"ensure":[3],"the":[4,58,61,73,80,120,127,148,158,161,168,186,197,209,216,221,224,251,255,262],"security":[5],"of":[6,60,82,114,129,143,171,188,223,254],"computer":[7],"systems":[8,21],"and":[9,17,25,29,40,90,132,163,195,229,236,261],"networks,":[10],"it":[11],"is":[12,123,137,153,182,206,212],"very":[13],"important":[14,198],"design":[16],"implement":[18],"intrusion":[19,45,75,100],"detection":[20,46,55,76,84,101,239],"that":[22,67,167,250],"can":[23,175],"detect":[24],"mitigate":[26],"network":[27,144,172],"attacks":[28],"threats.":[30],"Deep":[31],"learning":[32,51,107],"has":[33,53],"great":[34],"advantages":[35,113],"in":[36,72,200,243],"processing":[37],"complex,":[38],"high-dimensional":[39],"large-scale":[41],"traffic":[42,130,145,173],"data.":[43],"Therefore,":[44],"system":[47],"based":[48],"on":[49],"deep":[50,106],"method":[52],"better":[54],"effect.":[56],"Through":[57],"analysis":[59],"research":[62],"status,":[63],"this":[64,95,115,244],"paper":[65,96],"finds":[66],"there":[68],"are":[69,232,241],"some":[70],"problems":[71,81],"existing":[74],"system.":[77],"To":[78,219],"solve":[79],"low":[83],"accuracy,":[85],"structure":[86],"be":[88,176],"optimized":[89],"high":[91],"false":[92,263],"positive":[93,264],"rate,":[94],"presents":[97],"a":[98,179,203],"hierarchical":[99,116],"model":[102,117,122,205,257],"which":[103],"combines":[104],"multiple":[105],"models":[108,240],"with":[109],"attention":[110],"mechanism.":[111],"The":[112,246],"include:":[118],"Firstly,":[119],"SCDAE":[121],"used":[124,138,213],"extract":[126,140],"features":[128,142,170],"data":[131,146,174],"reduce":[133],"noise;":[134],"Secondly,":[135],"CNN":[136],"spatial":[141,149],"from":[147],"dimension;":[150],"Thirdly,":[151],"BiLSTM":[152],"able":[154],"fully":[156],"consider":[157],"relationship":[159],"between":[160],"front":[162],"back":[164],"features,":[165],"so":[166],"temporal":[169],"mined;":[177],"Fourthly,":[178],"Self-Attention":[180],"mechanism":[181],"added":[183],"weight":[185],"output":[187],"each":[189],"time":[190],"step":[191],"sum":[193],"up":[194],"retain":[196],"information":[199],"it.":[201],"Thus,":[202],"CNN-BiLSTM-Attention":[204],"constructed;":[207],"Finally,":[208],"Softmax":[210],"classifier":[211],"obtain":[215],"classification":[217,252],"results.":[218],"verify":[220],"effectiveness":[222],"proposed":[225,256],"model,":[226],"four":[227],"time-sensitive":[228],"representative":[230],"datasets":[231],"selected":[233],"for":[234],"experiments":[235],"five":[237],"classical":[238],"compared":[242],"paper.":[245],"experimental":[247],"results":[248],"show":[249],"accuracy":[253],"reaches":[258,266],"93.26":[259],"%":[260],"rate":[265],"7.53%.":[267]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":19},{"year":2024,"cited_by_count":18},{"year":2023,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
