{"id":"https://openalex.org/W3206014301","doi":"https://doi.org/10.1109/bigdataservice52369.2021.00023","title":"Mitigating Class Imbalance for IoT Network Intrusion Detection: A Survey","display_name":"Mitigating Class Imbalance for IoT Network Intrusion Detection: A Survey","publication_year":2021,"publication_date":"2021-08-01","ids":{"openalex":"https://openalex.org/W3206014301","doi":"https://doi.org/10.1109/bigdataservice52369.2021.00023","mag":"3206014301"},"language":"en","primary_location":{"id":"doi:10.1109/bigdataservice52369.2021.00023","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdataservice52369.2021.00023","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Seventh International Conference on Big Data Computing Service and Applications (BigDataService)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004094853","display_name":"Joffrey L. Leevy","orcid":"https://orcid.org/0000-0002-7079-7540"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Joffrey L. Leevy","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089170562","display_name":"Taghi M. Khoshgoftaar","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Taghi M. Khoshgoftaar","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5059862877","display_name":"Jared M. Peterson","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jared M. Peterson","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5004094853"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.8338,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.86055872,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"143","last_page":"148"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8135653734207153},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7655106782913208},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.7151262164115906},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6828798651695251},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.6709776520729065},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.6552485227584839},{"id":"https://openalex.org/keywords/range","display_name":"Range (aeronautics)","score":0.5281517505645752},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47264164686203003},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4000512957572937},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3852187991142273},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3659442663192749},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.34558629989624023},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.33659103512763977},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.19053995609283447},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.0846070647239685}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8135653734207153},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7655106782913208},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.7151262164115906},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6828798651695251},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.6709776520729065},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.6552485227584839},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.5281517505645752},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47264164686203003},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4000512957572937},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3852187991142273},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3659442663192749},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.34558629989624023},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33659103512763977},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.19053995609283447},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0846070647239685},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bigdataservice52369.2021.00023","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdataservice52369.2021.00023","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Seventh International Conference on Big Data Computing Service and Applications (BigDataService)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.49000000953674316,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W2040340473","https://openalex.org/W2099940443","https://openalex.org/W2104471998","https://openalex.org/W2142279020","https://openalex.org/W2165669526","https://openalex.org/W2185428759","https://openalex.org/W2296509296","https://openalex.org/W2318802957","https://openalex.org/W2590373591","https://openalex.org/W2610127543","https://openalex.org/W2611652092","https://openalex.org/W2724268118","https://openalex.org/W2807319534","https://openalex.org/W2899434936","https://openalex.org/W2901835867","https://openalex.org/W2905471643","https://openalex.org/W2913326662","https://openalex.org/W2952066300","https://openalex.org/W2963748489","https://openalex.org/W2971991542","https://openalex.org/W2991507433","https://openalex.org/W2997604048","https://openalex.org/W3000307855","https://openalex.org/W3005895046","https://openalex.org/W3010556302","https://openalex.org/W3013692727","https://openalex.org/W3014810737","https://openalex.org/W3034942609","https://openalex.org/W3041121917","https://openalex.org/W3041133507","https://openalex.org/W3092528892","https://openalex.org/W3105233262","https://openalex.org/W3105570852","https://openalex.org/W3108630703","https://openalex.org/W3109522940","https://openalex.org/W3116162736","https://openalex.org/W3116191808","https://openalex.org/W3120934607","https://openalex.org/W3121022046","https://openalex.org/W3126752450","https://openalex.org/W3165582150","https://openalex.org/W4235730433","https://openalex.org/W4285719527","https://openalex.org/W6686497313","https://openalex.org/W6737493824"],"related_works":["https://openalex.org/W2294483539","https://openalex.org/W2378449000","https://openalex.org/W3187581118","https://openalex.org/W2938399969","https://openalex.org/W2616994865","https://openalex.org/W3143747655","https://openalex.org/W2002178493","https://openalex.org/W2901835651","https://openalex.org/W2883616266","https://openalex.org/W186576250"],"abstract_inverted_index":{"As":[0],"the":[1,13,18,63,80,102,111,165],"number":[2],"of":[3,5,54,62,82,114,118,167],"Internet":[4],"Things":[6],"(IoT)":[7],"devices":[8],"continues":[9],"to":[10,15,35,132,156],"rapidly":[11],"increase,":[12],"need":[14],"effectively":[16],"manage":[17],"related":[19],"security":[20],"risks":[21],"has":[22],"become":[23],"more":[24],"obvious.":[25],"For":[26],"this":[27,69,105],"reason,":[28],"datasets":[29],"such":[30],"as":[31],"Bot-IoT":[32,44,123],"were":[33],"created":[34],"train":[36],"machine":[37],"learning":[38],"models":[39],"on":[40,98,139],"network-based":[41],"intrusion":[42],"detection.":[43],"is":[45,124,129],"modern,":[46],"publicly":[47],"available,":[48],"and":[49,170],"covers":[50],"a":[51,115,125,146],"wide":[52],"range":[53,117],"botnet":[55],"attack":[56],"traffic":[57],"in":[58,68,104,145,177],"IoT":[59],"networks.":[60],"Out":[61],"roughly":[64],"73,000,000":[65],"instances":[66],"contained":[67],"dataset,":[70],"only":[71],"about":[72],"0.013%":[73],"represents":[74],"normal":[75],"traffic,":[76],"which":[77],"indicates":[78],"that":[79,100,128,137],"issue":[81],"class":[83,175],"imbalance":[84,103,176],"should":[85],"not":[86],"be":[87],"ignored":[88],"for":[89,153,173],"Bot-IoT.":[90,178],"Our":[91],"contribution":[92],"includes":[93],"several":[94],"important":[95],"findings":[96],"based":[97],"works":[99],"address":[101],"dataset.":[106],"In":[107],"general,":[108],"we":[109,163],"noted":[110,164],"excellent":[112],"performance":[113],"diverse":[116],"trained":[119],"models.":[120],"This":[121],"suggests":[122],"reliable":[126],"dataset":[127],"relatively":[130],"easy":[131],"classify.":[133],"We":[134],"also":[135],"observed":[136],"information":[138],"data":[140],"cleaning":[141],"was":[142],"left":[143],"out":[144],"few":[147],"papers,":[148],"thus":[149],"making":[150],"it":[151],"challenging":[152],"outside":[154],"researchers":[155],"reproduce":[157],"experiments":[158],"from":[159],"these":[160],"works.":[161],"Finally,":[162],"popularity":[166],"both":[168],"data-level":[169],"algorithm-level":[171],"approaches":[172],"mitigating":[174]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
