{"id":"https://openalex.org/W2165875088","doi":"https://doi.org/10.1109/cec.2011.5949798","title":"Multi agent system for network attack classification using flow-based intrusion detection","display_name":"Multi agent system for network attack classification using flow-based intrusion detection","publication_year":2011,"publication_date":"2011-06-01","ids":{"openalex":"https://openalex.org/W2165875088","doi":"https://doi.org/10.1109/cec.2011.5949798","mag":"2165875088"},"language":"en","primary_location":{"id":"doi:10.1109/cec.2011.5949798","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cec.2011.5949798","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 IEEE Congress of Evolutionary Computation (CEC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028628770","display_name":"D. L. Hancock","orcid":"https://orcid.org/0000-0002-8478-7976"},"institutions":[{"id":"https://openalex.org/I55061410","display_name":"U.S. Air Force Institute of Technology","ror":"https://ror.org/03f9f1d95","country_code":"US","type":"education","lineage":["https://openalex.org/I1294991024","https://openalex.org/I1330347796","https://openalex.org/I1330347796","https://openalex.org/I2802362820","https://openalex.org/I4210089612","https://openalex.org/I4210102105","https://openalex.org/I4210102105","https://openalex.org/I55061410"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"David L. Hancock","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Graduate School of Engineering and Management, Air Force Institute of Technology, Dayton, OH, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Graduate School of Engineering and Management, Air Force Institute of Technology, Dayton, OH, USA","institution_ids":["https://openalex.org/I55061410"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110638040","display_name":"Gary B. Lamont","orcid":null},"institutions":[{"id":"https://openalex.org/I55061410","display_name":"U.S. Air Force Institute of Technology","ror":"https://ror.org/03f9f1d95","country_code":"US","type":"education","lineage":["https://openalex.org/I1294991024","https://openalex.org/I1330347796","https://openalex.org/I1330347796","https://openalex.org/I2802362820","https://openalex.org/I4210089612","https://openalex.org/I4210102105","https://openalex.org/I4210102105","https://openalex.org/I55061410"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gary B. Lamont","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Graduate School of Engineering and Management, Air Force Institute of Technology, Dayton, OH, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Graduate School of Engineering and Management, Air Force Institute of Technology, Dayton, OH, USA","institution_ids":["https://openalex.org/I55061410"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5028628770"],"corresponding_institution_ids":["https://openalex.org/I55061410"],"apc_list":null,"apc_paid":null,"fwci":1.1087,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.8123288,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1535","last_page":"1542"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7844995260238647},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6737486720085144},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.563407301902771},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5397229194641113},{"id":"https://openalex.org/keywords/flow-network","display_name":"Flow network","score":0.5029820799827576},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.4357423186302185},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.4227338433265686},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4145946800708771},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3231854736804962},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.31627315282821655},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.11197736859321594}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7844995260238647},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6737486720085144},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.563407301902771},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5397229194641113},{"id":"https://openalex.org/C114809511","wikidata":"https://www.wikidata.org/wiki/Q1412924","display_name":"Flow network","level":2,"score":0.5029820799827576},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.4357423186302185},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.4227338433265686},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4145946800708771},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3231854736804962},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.31627315282821655},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.11197736859321594},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cec.2011.5949798","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cec.2011.5949798","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 IEEE Congress of Evolutionary Computation (CEC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W49087170","https://openalex.org/W120010193","https://openalex.org/W173570005","https://openalex.org/W1490760466","https://openalex.org/W1554944419","https://openalex.org/W1955507566","https://openalex.org/W1968076133","https://openalex.org/W2008620264","https://openalex.org/W2011283335","https://openalex.org/W2025226660","https://openalex.org/W2122923407","https://openalex.org/W2125429422","https://openalex.org/W2148415182","https://openalex.org/W2171331105","https://openalex.org/W2799061466","https://openalex.org/W4285719527","https://openalex.org/W6601990374","https://openalex.org/W6604939574"],"related_works":["https://openalex.org/W2061466315","https://openalex.org/W2376886931","https://openalex.org/W1992118813","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W1495178644","https://openalex.org/W2185594426"],"abstract_inverted_index":{"Intrusion":[0],"Detection":[1],"(ID)":[2],"is":[3,35,55,79,136],"essential":[4],"for":[5,84,125,163,190],"protecting":[6],"contemporary":[7],"computer":[8],"networks":[9],"from":[10],"a":[11,80,126,149,211],"range":[12],"of":[13,43,91,111,141,175],"threats.":[14],"Modern":[15],"ID":[16,34,54,62,146],"techniques":[17],"must":[18],"cope":[19],"with":[20],"increasingly":[21],"sophisticated":[22],"attacks":[23],"as":[24,26,58,68],"well":[25],"rapidly":[27],"rising":[28],"network":[29,48,166],"line":[30],"speeds.":[31],"Signature":[32],"based":[33],"forced":[36],"to":[37,87,152,155,185],"sample":[38],"sparsely,":[39],"increasing":[40,142],"the":[41,47,89,94,108,112,173,188,203,207],"likelihood":[42],"malicious":[44,101,165],"traffic":[45],"entering":[46],"without":[49],"scrutiny.":[50],"Con":[51],"sequently,":[52],"flow-based":[53,130],"gaining":[56],"attention":[57],"an":[59,123,176,197],"effective":[60,162,191],"complement.":[61],"systems":[63],"are":[64,160],"furthermore":[65],"often":[66],"characterized":[67],"either":[69],"network-based":[70,105],"or":[71],"host-based.":[72],"The":[73,134],"autonomous":[74],"multi":[75,128,181],"agent":[76,199],"design":[77,171],"paradigm":[78],"scalable,":[81],"attractive":[82],"alternative":[83],"its":[85],"potential":[86],"leverage":[88],"strengths":[90],"both":[92],"architectures:":[93],"broad":[95],"perspective":[96],"and":[97,107],"visibility":[98],"into":[99],"distributed":[100],"activity":[102],"provided":[103,115],"by":[104,116],"ID,":[106],"comprehensive":[109],"view":[110],"local":[113],"node":[114],"host-based":[117],"ID.":[118],"This":[119],"paper":[120],"therefore":[121],"develops":[122],"architecture":[124,135],"new":[127],"agent,":[129],"intrusion":[131],"detection":[132],"sysem.":[133],"designed":[137],"in":[138,187],"two":[139],"iterations":[140],"complexity.":[143],"These":[144],"innovative":[145,177],"designs":[147],"use":[148],"\"repuation\"":[150],"system":[151,170,209],"permit":[153],"agents":[154],"dynamically":[156],"find":[157],"nodes":[158],"that":[159,179],"most":[161],"classifying":[164],"activity.":[167],"Furthermore,":[168],"each":[169],"includes":[172],"development":[174],"classifier":[178],"uses":[180],"objective":[182],"evolutionary":[183],"algorithms":[184],"aid":[186],"search":[189],"operational":[192],"parameter":[193],"values.":[194],"Evaluation":[195],"using":[196],"extensive":[198],"simulation":[200],"framework":[201],"highlights":[202],"conditions":[204],"under":[205],"which":[206],"reputation":[208],"provides":[210],"significant":[212],"classification":[213],"benefit.":[214]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-03-14T06:41:57.775601","created_date":"2025-10-10T00:00:00"}
