{"id":"https://openalex.org/W4405490347","doi":"https://doi.org/10.1109/commnet63022.2024.10793323","title":"Evaluating Machine Learning Algorithms for Intrusion Detection: A Step Toward Securing Real-Time Big Data","display_name":"Evaluating Machine Learning Algorithms for Intrusion Detection: A Step Toward Securing Real-Time Big Data","publication_year":2024,"publication_date":"2024-12-04","ids":{"openalex":"https://openalex.org/W4405490347","doi":"https://doi.org/10.1109/commnet63022.2024.10793323"},"language":"en","primary_location":{"id":"doi:10.1109/commnet63022.2024.10793323","is_oa":false,"landing_page_url":"https://doi.org/10.1109/commnet63022.2024.10793323","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 7th International Conference on Advanced Communication Technologies and Networking (CommNet)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020860368","display_name":"Ikram Hamdaoui","orcid":"https://orcid.org/0009-0002-0448-5968"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ikram Hamdaoui","raw_affiliation_strings":["Mohammed First University,LaMAO laboratory, MSC team, FPD,Nador,Morocco"],"affiliations":[{"raw_affiliation_string":"Mohammed First University,LaMAO laboratory, MSC team, FPD,Nador,Morocco","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001534531","display_name":"Khalid El Makkaoui","orcid":"https://orcid.org/0000-0002-9569-9162"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Khalid El Makkaoui","raw_affiliation_strings":["Mohammed First University,LaMAO laboratory, MSC team, FPD,Nador,Morocco"],"affiliations":[{"raw_affiliation_string":"Mohammed First University,LaMAO laboratory, MSC team, FPD,Nador,Morocco","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037552656","display_name":"Zakaria El Allali","orcid":"https://orcid.org/0000-0002-3146-6423"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zakaria El Allali","raw_affiliation_strings":["Mohammed First University,LaMAO laboratory, MSC team, FPD,Nador,Morocco"],"affiliations":[{"raw_affiliation_string":"Mohammed First University,LaMAO laboratory, MSC team, FPD,Nador,Morocco","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5020860368"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.3663,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.65154351,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9193999767303467,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9193999767303467,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7772523164749146},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.69649338722229},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.5862395167350769},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.40745681524276733},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.377901554107666},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.34667783975601196},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.34165266156196594},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3378998041152954}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7772523164749146},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.69649338722229},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.5862395167350769},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.40745681524276733},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.377901554107666},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34667783975601196},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.34165266156196594},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3378998041152954}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/commnet63022.2024.10793323","is_oa":false,"landing_page_url":"https://doi.org/10.1109/commnet63022.2024.10793323","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 7th International Conference on Advanced Communication Technologies and Networking (CommNet)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2789828921","https://openalex.org/W3042945059","https://openalex.org/W3048313003","https://openalex.org/W3051995256","https://openalex.org/W3126290967","https://openalex.org/W3198955447","https://openalex.org/W4293799851","https://openalex.org/W4304695527","https://openalex.org/W4313313328","https://openalex.org/W4362504379","https://openalex.org/W4386624928","https://openalex.org/W4391317833","https://openalex.org/W4396707597","https://openalex.org/W4400737507","https://openalex.org/W4402437224"],"related_works":["https://openalex.org/W4390608645","https://openalex.org/W4394895745","https://openalex.org/W4247566972","https://openalex.org/W2960264696","https://openalex.org/W3090563135","https://openalex.org/W2497432351","https://openalex.org/W2364419519","https://openalex.org/W2360767377","https://openalex.org/W2017948608","https://openalex.org/W2360951146"],"abstract_inverted_index":{"Nowadays,":[0],"Big":[1],"Data":[2],"(BD)":[3],"plays":[4],"an":[5],"important":[6],"role":[7],"in":[8,32,86],"driving":[9],"business":[10],"decisions":[11],"and":[12,34,46,68,75],"strategic":[13],"planning":[14],"by":[15],"extracting":[16],"valuable":[17],"insights":[18],"from":[19],"massive":[20],"amounts":[21],"of":[22,49],"data":[23,44],"generated":[24],"every":[25],"day.":[26],"However,":[27],"as":[28,43],"BD":[29,88],"systems":[30],"grow":[31],"size":[33],"complexity,":[35],"they":[36],"become":[37],"more":[38],"vulnerable":[39],"to":[40,59,77],"cyberattacks":[41],"such":[42],"breaches":[45],"Distributed":[47],"Denial":[48],"Service":[50],"(DDoS)":[51],"attacks.":[52],"This":[53],"paper":[54],"presents":[55],"a":[56],"comparison":[57],"study":[58],"evaluate":[60],"three":[61],"Machine":[62],"Learning":[63],"algorithms:":[64],"Random":[65],"Forest,":[66],"XGBoost,":[67],"SGD":[69],"Classifier,":[70],"using":[71],"two":[72],"datasets":[73],"(CIC-IDS-2017":[74],"CICIoV2024)":[76],"determine":[78],"which":[79],"is":[80],"best":[81],"suited":[82],"for":[83],"future":[84],"use":[85],"real-time":[87],"security.":[89]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
