{"id":"https://openalex.org/W3038890324","doi":"https://doi.org/10.1109/civemsa48639.2020.9132744","title":"Novel Approach Using Deep Learning for Intrusion Detection and Classification of the Network Traffic","display_name":"Novel Approach Using Deep Learning for Intrusion Detection and Classification of the Network Traffic","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3038890324","doi":"https://doi.org/10.1109/civemsa48639.2020.9132744","mag":"3038890324"},"language":"en","primary_location":{"id":"doi:10.1109/civemsa48639.2020.9132744","is_oa":false,"landing_page_url":"https://doi.org/10.1109/civemsa48639.2020.9132744","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (CIVEMSA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103067960","display_name":"Shahbaz Ahmad","orcid":"https://orcid.org/0000-0003-0148-4521"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Shahbaz Ahmad","raw_affiliation_strings":["Department of Computer Software Engineering, National University of Science and Technology, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Software Engineering, National University of Science and Technology, Islamabad, Pakistan","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002815889","display_name":"Fahim Arif","orcid":"https://orcid.org/0000-0002-5361-8600"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fahim Arif","raw_affiliation_strings":["Department of Computer Software Engineering, National University of Science and Technology, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Software Engineering, National University of Science and Technology, Islamabad, Pakistan","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091234821","display_name":"Zabeehullah Zabeehullah","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zabeehullah Zabeehullah","raw_affiliation_strings":["Department of Computer Software Engineering, National University of Science and Technology, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Software Engineering, National University of Science and Technology, Islamabad, Pakistan","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065396147","display_name":"Naima Iltaf","orcid":"https://orcid.org/0000-0001-5392-5187"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Naima Iltaf","raw_affiliation_strings":["Department of Computer Software Engineering, National University of Science and Technology, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Software Engineering, National University of Science and Technology, Islamabad, Pakistan","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5103067960"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.5418,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.84067945,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/overfitting","display_name":"Overfitting","score":0.8220512866973877},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.818744421005249},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7313245534896851},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5834186673164368},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.5621762871742249},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5541846752166748},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5358501672744751},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5268127918243408},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.46720024943351746},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.42116862535476685},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.4183172285556793},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1057172417640686}],"concepts":[{"id":"https://openalex.org/C22019652","wikidata":"https://www.wikidata.org/wiki/Q331309","display_name":"Overfitting","level":3,"score":0.8220512866973877},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.818744421005249},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7313245534896851},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5834186673164368},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.5621762871742249},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5541846752166748},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5358501672744751},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5268127918243408},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.46720024943351746},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.42116862535476685},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.4183172285556793},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1057172417640686},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/civemsa48639.2020.9132744","is_oa":false,"landing_page_url":"https://doi.org/10.1109/civemsa48639.2020.9132744","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (CIVEMSA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5600000023841858}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1544101352","https://openalex.org/W1967376128","https://openalex.org/W2066832805","https://openalex.org/W2314002629","https://openalex.org/W2317266891","https://openalex.org/W2324816571","https://openalex.org/W2598684549","https://openalex.org/W2783741806","https://openalex.org/W2795083874","https://openalex.org/W2795147830","https://openalex.org/W2853623529","https://openalex.org/W2899653275","https://openalex.org/W2914502888","https://openalex.org/W2915969651","https://openalex.org/W2926701059","https://openalex.org/W2928842143","https://openalex.org/W4245460974","https://openalex.org/W4249837478","https://openalex.org/W6735304853"],"related_works":["https://openalex.org/W1574414179","https://openalex.org/W4362597605","https://openalex.org/W2922073769","https://openalex.org/W4297676672","https://openalex.org/W4281702477","https://openalex.org/W4378510483","https://openalex.org/W2490526372","https://openalex.org/W4376166922","https://openalex.org/W3099765033","https://openalex.org/W2133389611"],"abstract_inverted_index":{"A":[0],"variety":[1],"of":[2,8],"challenges":[3],"are":[4,16,56],"being":[5],"faced":[6],"nowadays":[7],"network":[9,24],"intrusion":[10],"which":[11],"is":[12,29],"continually":[13],"increasing.":[14],"These":[15],"due":[17],"to":[18,92],"vulnerabilities":[19],"in":[20,58],"software,":[21],"hardware,":[22],"and":[23,32,52,80,85,96],"protocols.":[25],"Therefore,":[26],"stronger":[27],"IDS":[28,38],"required;":[30],"ML":[31],"DM":[33],"have":[34],"further":[35],"strengthened":[36],"the":[37,41,75],"technology.":[39],"At":[40],"same":[42],"time":[43],"threat":[44],"has":[45],"also":[46],"become":[47],"more":[48],"sophisticated.":[49],"Now":[50],"overfitting":[51],"structured":[53],"optimization":[54],"techniques":[55,101],"used":[57],"IDS.":[59,69],"In":[60],"this":[61],"paper,":[62],"we":[63],"proposed":[64],"a":[65],"deep":[66],"neural":[67],"network-based":[68],"The":[70],"DL":[71],"based":[72],"system":[73],"monitors":[74],"traffic":[76,88],"coming":[77],"from":[78],"authentic":[79],"non-authentic":[81],"sources.":[82],"It":[83],"classifies":[84],"segregates":[86],"malicious":[87],"with":[89,99],"accuracy":[90],"up":[91],"99.78used":[93],"for":[94],"experimentation":[95],"comparative":[97],"analysis":[98],"previous":[100],"shows":[102],"encouraging":[103],"results.":[104]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
