{"id":"https://openalex.org/W4406893089","doi":"https://doi.org/10.1109/csnet64211.2024.10851735","title":"A Multi-Level Network Traffic Classification in Combating Cyberattacks Using Stack Deep Learning Models","display_name":"A Multi-Level Network Traffic Classification in Combating Cyberattacks Using Stack Deep Learning Models","publication_year":2024,"publication_date":"2024-12-04","ids":{"openalex":"https://openalex.org/W4406893089","doi":"https://doi.org/10.1109/csnet64211.2024.10851735"},"language":"en","primary_location":{"id":"doi:10.1109/csnet64211.2024.10851735","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csnet64211.2024.10851735","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 8th Cyber Security in Networking Conference (CSNet)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040190458","display_name":"Believe Ayodele","orcid":"https://orcid.org/0000-0001-9014-2296"},"institutions":[{"id":"https://openalex.org/I197854408","display_name":"University of Malta","ror":"https://ror.org/03a62bv60","country_code":"MT","type":"education","lineage":["https://openalex.org/I197854408"]}],"countries":["MT"],"is_corresponding":true,"raw_author_name":"Believe Ayodele","raw_affiliation_strings":["University of Malta,Dept of Communications &#x0026; Computer Engineering,Msida,Malta"],"affiliations":[{"raw_affiliation_string":"University of Malta,Dept of Communications &#x0026; Computer Engineering,Msida,Malta","institution_ids":["https://openalex.org/I197854408"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008457832","display_name":"Victor Buttigieg","orcid":"https://orcid.org/0000-0002-8875-1348"},"institutions":[{"id":"https://openalex.org/I197854408","display_name":"University of Malta","ror":"https://ror.org/03a62bv60","country_code":"MT","type":"education","lineage":["https://openalex.org/I197854408"]}],"countries":["MT"],"is_corresponding":false,"raw_author_name":"Victor Buttigieg","raw_affiliation_strings":["University of Malta,Dept of Communications &#x0026; Computer Engineering,Msida,Malta"],"affiliations":[{"raw_affiliation_string":"University of Malta,Dept of Communications &#x0026; Computer Engineering,Msida,Malta","institution_ids":["https://openalex.org/I197854408"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5040190458"],"corresponding_institution_ids":["https://openalex.org/I197854408"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.24402496,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"143","last_page":"146"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9492999911308289,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7038379907608032},{"id":"https://openalex.org/keywords/stack","display_name":"Stack (abstract data type)","score":0.6454970836639404},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5733634829521179},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.46199727058410645},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45773863792419434},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3474650979042053},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06550097465515137}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7038379907608032},{"id":"https://openalex.org/C9395851","wikidata":"https://www.wikidata.org/wiki/Q177929","display_name":"Stack (abstract data type)","level":2,"score":0.6454970836639404},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5733634829521179},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.46199727058410645},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45773863792419434},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3474650979042053},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06550097465515137}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csnet64211.2024.10851735","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csnet64211.2024.10851735","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 8th Cyber Security in Networking Conference (CSNet)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2139864917","https://openalex.org/W3048282123","https://openalex.org/W3082712634","https://openalex.org/W3108827348","https://openalex.org/W3179240416","https://openalex.org/W3185928824","https://openalex.org/W3200723554","https://openalex.org/W4221036817","https://openalex.org/W4224240205","https://openalex.org/W4283205402","https://openalex.org/W4321349459","https://openalex.org/W4385059314","https://openalex.org/W4388878537","https://openalex.org/W4396980283"],"related_works":["https://openalex.org/W2731899572","https://openalex.org/W2961085424","https://openalex.org/W3215138031","https://openalex.org/W4306674287","https://openalex.org/W3009238340","https://openalex.org/W4360585206","https://openalex.org/W4321369474","https://openalex.org/W4285208911","https://openalex.org/W4387369504","https://openalex.org/W3046775127"],"abstract_inverted_index":{"Recent":[0],"advances":[1],"in":[2,23,36],"computing":[3],"power":[4],"and":[5,38,83,100,107,129,140],"the":[6,16,42,66,97,113,123,143],"growing":[7],"number":[8],"of":[9,18,57,75,134,150],"threats":[10],"to":[11,27,30,88,116,136,152],"IT":[12],"infrastructure":[13],"have":[14],"increased":[15],"use":[17],"Deep":[19],"Learning":[20],"(DL)":[21],"models":[22,44,109,124],"combating":[24],"attacks":[25],"due":[26],"their":[28],"ability":[29],"act":[31],"as":[32,127],"an":[33,132],"inference":[34],"engine":[35],"detecting":[37],"classifying":[39],"cyberattacks.":[40],"However,":[41],"DL":[43],"proposed":[45,104],"so":[46],"far":[47],"fall":[48],"short":[49],"by":[50,65,91],"focusing":[51],"predominantly":[52],"on":[53,112],"a":[54,72],"single":[55],"type":[56],"network":[58],"traffic":[59,94],"analysis,":[60],"which":[61],"is":[62],"usually":[63],"dictated":[64],"dataset":[67,115],"used.":[68],"This":[69],"research":[70],"presents":[71],"stack":[73],"model":[74],"Recurrent":[76,85],"Neural":[77],"Networks":[78,86],"(RNN),":[79],"Long-Short-Term":[80],"memory":[81],"(LSTM),":[82],"Gated":[84],"(GRU)":[87],"combat":[89],"cyberattacks":[90],"utilising":[92],"multilevel":[93],"analysis":[95],"at":[96],"packet,":[98],"flow,":[99],"session":[101],"levels.":[102],"The":[103,119],"RNNLSTM-GRU,":[105],"RNNGRU-LSTM,":[106],"LSTMGRU-RNN":[108],"are":[110],"exploited":[111],"same":[114],"compare":[117],"performance.":[118],"results":[120],"show":[121],"that":[122],"performed":[125],"well":[126],"binary":[128],"multiclassifiers,":[130],"with":[131],"accuracy":[133],"up":[135,151],"99.99%.":[137],"With":[138],"flow":[139],"session-level":[141],"training,":[142],"performance":[144],"was":[145],"somewhat":[146],"lower,":[147],"achieving":[148],"accuracies":[149],"97.63%.":[153]},"counts_by_year":[],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
