{"id":"https://openalex.org/W3119910173","doi":"https://doi.org/10.1109/acit50332.2020.9299965","title":"A Hybrid Model for Anomaly-Based Intrusion Detection in Complex Computer Networks","display_name":"A Hybrid Model for Anomaly-Based Intrusion Detection in Complex Computer Networks","publication_year":2020,"publication_date":"2020-11-28","ids":{"openalex":"https://openalex.org/W3119910173","doi":"https://doi.org/10.1109/acit50332.2020.9299965","mag":"3119910173"},"language":"en","primary_location":{"id":"doi:10.1109/acit50332.2020.9299965","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit50332.2020.9299965","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 21st International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085587232","display_name":"Danijela Proti\u0107","orcid":"https://orcid.org/0000-0003-0827-2863"},"institutions":[{"id":"https://openalex.org/I152518017","display_name":"University of Nis","ror":"https://ror.org/00965bg92","country_code":"RS","type":"education","lineage":["https://openalex.org/I152518017"]}],"countries":["RS"],"is_corresponding":true,"raw_author_name":"Danijela Protic","raw_affiliation_strings":["Faculty of Electronics Engineering, University of Nis, Center for Applied Mathematics and Electronics, Belgrade, Serbia"],"affiliations":[{"raw_affiliation_string":"Faculty of Electronics Engineering, University of Nis, Center for Applied Mathematics and Electronics, Belgrade, Serbia","institution_ids":["https://openalex.org/I152518017"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086315941","display_name":"Miomir Stankovi\u0107","orcid":"https://orcid.org/0009-0002-8504-6966"},"institutions":[{"id":"https://openalex.org/I4390039372","display_name":"Mathematical Institute of the Serbian Academy of Sciences and Arts","ror":"https://ror.org/02jxk1021","country_code":null,"type":"education","lineage":["https://openalex.org/I1338511612","https://openalex.org/I4390039372"]},{"id":"https://openalex.org/I4210117138","display_name":"Institute of Technical Sciences of SASA","ror":"https://ror.org/02f2wk572","country_code":"RS","type":"facility","lineage":["https://openalex.org/I1338511612","https://openalex.org/I4210117138"]}],"countries":["RS"],"is_corresponding":false,"raw_author_name":"Miomir Stankovic","raw_affiliation_strings":["Mathematical Institute of SASA, Belgrade, Serbia"],"affiliations":[{"raw_affiliation_string":"Mathematical Institute of SASA, Belgrade, Serbia","institution_ids":["https://openalex.org/I4210117138","https://openalex.org/I4390039372"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5085587232"],"corresponding_institution_ids":["https://openalex.org/I152518017"],"apc_list":null,"apc_paid":null,"fwci":0.9251,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.77971735,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7204124331474304},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7127670645713806},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.598770022392273},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5903705954551697},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5464720129966736},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5412483215332031},{"id":"https://openalex.org/keywords/normalization","display_name":"Normalization (sociology)","score":0.5358558893203735},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.5094597935676575},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5086053609848022},{"id":"https://openalex.org/keywords/curse-of-dimensionality","display_name":"Curse of dimensionality","score":0.507429301738739},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.48444607853889465},{"id":"https://openalex.org/keywords/anomaly-based-intrusion-detection-system","display_name":"Anomaly-based intrusion detection system","score":0.46475473046302795},{"id":"https://openalex.org/keywords/k-nearest-neighbors-algorithm","display_name":"k-nearest neighbors algorithm","score":0.4301531910896301},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.4206467866897583},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.35598739981651306}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7204124331474304},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7127670645713806},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.598770022392273},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5903705954551697},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5464720129966736},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5412483215332031},{"id":"https://openalex.org/C136886441","wikidata":"https://www.wikidata.org/wiki/Q926129","display_name":"Normalization (sociology)","level":2,"score":0.5358558893203735},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.5094597935676575},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5086053609848022},{"id":"https://openalex.org/C111030470","wikidata":"https://www.wikidata.org/wiki/Q1430460","display_name":"Curse of dimensionality","level":2,"score":0.507429301738739},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.48444607853889465},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.46475473046302795},{"id":"https://openalex.org/C113238511","wikidata":"https://www.wikidata.org/wiki/Q1071612","display_name":"k-nearest neighbors algorithm","level":2,"score":0.4301531910896301},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.4206467866897583},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.35598739981651306},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C19165224","wikidata":"https://www.wikidata.org/wiki/Q23404","display_name":"Anthropology","level":1,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acit50332.2020.9299965","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit50332.2020.9299965","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 21st International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W1196375415","https://openalex.org/W1498436455","https://openalex.org/W1506281249","https://openalex.org/W1520955823","https://openalex.org/W1994212840","https://openalex.org/W2002011878","https://openalex.org/W2007087405","https://openalex.org/W2008224380","https://openalex.org/W2017420094","https://openalex.org/W2058916297","https://openalex.org/W2059507684","https://openalex.org/W2087070363","https://openalex.org/W2115569246","https://openalex.org/W2131929175","https://openalex.org/W2139669429","https://openalex.org/W2155482699","https://openalex.org/W2155910151","https://openalex.org/W2182150622","https://openalex.org/W2250670532","https://openalex.org/W2253111707","https://openalex.org/W2256578114","https://openalex.org/W2267339884","https://openalex.org/W2288710422","https://openalex.org/W2311011991","https://openalex.org/W2326372000","https://openalex.org/W2334600178","https://openalex.org/W2363933990","https://openalex.org/W2407125289","https://openalex.org/W2408042555","https://openalex.org/W2548536088","https://openalex.org/W2574704267","https://openalex.org/W2777920897","https://openalex.org/W2782682862","https://openalex.org/W2941801350","https://openalex.org/W2954083790","https://openalex.org/W2955155733","https://openalex.org/W2999585430","https://openalex.org/W3007110981","https://openalex.org/W3008757006","https://openalex.org/W3046215358","https://openalex.org/W3156488904","https://openalex.org/W4236260447","https://openalex.org/W4236627665","https://openalex.org/W4285719527","https://openalex.org/W6683090604","https://openalex.org/W6685669216","https://openalex.org/W6693443336","https://openalex.org/W6707304944","https://openalex.org/W6732039816"],"related_works":["https://openalex.org/W2337148208","https://openalex.org/W3004832009","https://openalex.org/W3036013726","https://openalex.org/W1971929717","https://openalex.org/W1724519426","https://openalex.org/W2351051591","https://openalex.org/W2369534771","https://openalex.org/W2357468538","https://openalex.org/W1548126107","https://openalex.org/W2209997499"],"abstract_inverted_index":{"Anomaly-based":[0],"intrusion":[1,12],"detection":[2,144],"classifiers":[3,39,113],"detect":[4],"the":[5,24,27,35,38,56,59,91,99,126,137,142],"notion":[6],"of":[7,26,37,58,68,90,108],"normality":[8],"and":[9,50,65,77,111],"classify":[10],"both":[11,109],"and/or":[13],"misuse":[14],"as":[15],"either":[16],"'normal'":[17],"or":[18,134],"'anomaly'.":[19],"In":[20,42],"complex":[21],"computer":[22,93],"networks,":[23],"number":[25],"training":[28],"records":[29,89],"is":[30],"often":[31],"large":[32],"which":[33],"makes":[34],"evaluation":[36],"computationally":[40],"expensive.":[41],"this":[43],"paper":[44],"we":[45],"present":[46],"a":[47],"feature":[48],"selection":[49],"instances":[51],"normalization":[52],"algorithm":[53],"that":[54],"reduces":[55],"dimensionality":[57],"dataset":[60],"size,":[61],"decrease":[62],"processing":[63],"time":[64],"increase":[66],"accuracy":[67,107],"two":[69],"classifier":[70],"models,":[71],"namely":[72],"weighted":[73],"k-Nearest":[74],"Neighbor":[75],"(wk-NN)":[76],"Feedforward":[78],"Neural":[79],"Network":[80],"(FNN).":[81],"The":[82,103],"experiments":[83],"are":[84,123],"conducted":[85],"on":[86,119],"three":[87],"daily":[88],"real":[92],"network":[94],"traffic":[95],"data":[96],"derived":[97],"from":[98,146],"Kyoto":[100],"2006+":[101],"dataset.":[102],"results":[104],"show":[105],"high":[106],"wk-NN":[110],"FNN":[112],"but":[114],"variations":[115],"in":[116,141],"mutual":[117],"decisions":[118],"detected":[120],"anomalies.":[121],"Variations":[122],"determined":[124],"with":[125],"novel":[127],"hybrid":[128],"model":[129],"by":[130],"performing":[131],"logical":[132],"exclusive":[133],"operation":[135],"to":[136,148],"predicted":[138],"outcomes.":[139],"Improvement":[140],"anomaly":[143],"ranges":[145],"0.67%":[147],"8.08%.":[149]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
