{"id":"https://openalex.org/W4284899318","doi":"https://doi.org/10.1109/eit53891.2022.9813892","title":"Detecting Cyber Attacks: A Reinforcement Learning Based Intrusion Detection System","display_name":"Detecting Cyber Attacks: A Reinforcement Learning Based Intrusion Detection System","publication_year":2022,"publication_date":"2022-05-19","ids":{"openalex":"https://openalex.org/W4284899318","doi":"https://doi.org/10.1109/eit53891.2022.9813892"},"language":"en","primary_location":{"id":"doi:10.1109/eit53891.2022.9813892","is_oa":false,"landing_page_url":"https://doi.org/10.1109/eit53891.2022.9813892","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Electro Information Technology (eIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014889503","display_name":"Mostofa Ahsan","orcid":"https://orcid.org/0000-0002-1748-5652"},"institutions":[{"id":"https://openalex.org/I57328836","display_name":"North Dakota State University","ror":"https://ror.org/05h1bnb22","country_code":"US","type":"education","lineage":["https://openalex.org/I57328836"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mostofa Ahsan","raw_affiliation_strings":["North Dakota State University,Dept. of Computer Science,Fargo,ND,USA","Dept. of Computer Science, North Dakota State University, Fargo, ND, USA"],"affiliations":[{"raw_affiliation_string":"North Dakota State University,Dept. of Computer Science,Fargo,ND,USA","institution_ids":["https://openalex.org/I57328836"]},{"raw_affiliation_string":"Dept. of Computer Science, North Dakota State University, Fargo, ND, USA","institution_ids":["https://openalex.org/I57328836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008515625","display_name":"Nafiz Rifat","orcid":"https://orcid.org/0000-0002-5011-2778"},"institutions":[{"id":"https://openalex.org/I57328836","display_name":"North Dakota State University","ror":"https://ror.org/05h1bnb22","country_code":"US","type":"education","lineage":["https://openalex.org/I57328836"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nafiz Rifat","raw_affiliation_strings":["North Dakota State University,Dept. of Computer Science,Fargo,ND,USA","Dept. of Computer Science, North Dakota State University, Fargo, ND, USA"],"affiliations":[{"raw_affiliation_string":"North Dakota State University,Dept. of Computer Science,Fargo,ND,USA","institution_ids":["https://openalex.org/I57328836"]},{"raw_affiliation_string":"Dept. of Computer Science, North Dakota State University, Fargo, ND, USA","institution_ids":["https://openalex.org/I57328836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064125900","display_name":"Md Minhaz Chowdhury","orcid":"https://orcid.org/0000-0003-0145-6838"},"institutions":[{"id":"https://openalex.org/I79060951","display_name":"East Stroudsburg University","ror":"https://ror.org/05atz9219","country_code":"US","type":"education","lineage":["https://openalex.org/I79060951"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Md Chowdhury","raw_affiliation_strings":["East Stroudsburg University,Dept. of Computer Science,East Stroudsburg,PA,USA","Dept. of Computer Science, East Stroudsburg University, East Stroudsburg, PA, USA"],"affiliations":[{"raw_affiliation_string":"East Stroudsburg University,Dept. of Computer Science,East Stroudsburg,PA,USA","institution_ids":["https://openalex.org/I79060951"]},{"raw_affiliation_string":"Dept. of Computer Science, East Stroudsburg University, East Stroudsburg, PA, USA","institution_ids":["https://openalex.org/I79060951"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034845580","display_name":"Rahul Gomes","orcid":"https://orcid.org/0000-0002-5377-8196"},"institutions":[{"id":"https://openalex.org/I124727415","display_name":"University of Wisconsin\u2013Eau Claire","ror":"https://ror.org/03mnm0t94","country_code":"US","type":"education","lineage":["https://openalex.org/I124727415"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rahul Gomes","raw_affiliation_strings":["University of Wisconsin-Eau Claire,Dept. of Computer Science,Eau Claire,WI,USA","Dept. of Computer Science, University of Wisconsin-Eau Claire, Eau Claire, WI, USA"],"affiliations":[{"raw_affiliation_string":"University of Wisconsin-Eau Claire,Dept. of Computer Science,Eau Claire,WI,USA","institution_ids":["https://openalex.org/I124727415"]},{"raw_affiliation_string":"Dept. of Computer Science, University of Wisconsin-Eau Claire, Eau Claire, WI, USA","institution_ids":["https://openalex.org/I124727415"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5014889503"],"corresponding_institution_ids":["https://openalex.org/I57328836"],"apc_list":null,"apc_paid":null,"fwci":0.5527,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.66439088,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"69","issue":null,"first_page":"461","last_page":"466"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7996166944503784},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7572934031486511},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.7246461510658264},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.637675940990448},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5629192590713501},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5271430015563965},{"id":"https://openalex.org/keywords/unsupervised-learning","display_name":"Unsupervised learning","score":0.5256204009056091},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.49177125096321106},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.45418229699134827},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.39197903871536255},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.20294207334518433}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7996166944503784},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7572934031486511},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.7246461510658264},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.637675940990448},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5629192590713501},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5271430015563965},{"id":"https://openalex.org/C8038995","wikidata":"https://www.wikidata.org/wiki/Q1152135","display_name":"Unsupervised learning","level":2,"score":0.5256204009056091},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.49177125096321106},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.45418229699134827},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.39197903871536255},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.20294207334518433}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/eit53891.2022.9813892","is_oa":false,"landing_page_url":"https://doi.org/10.1109/eit53891.2022.9813892","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Electro Information Technology (eIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4099999964237213,"id":"https://metadata.un.org/sdg/15","display_name":"Life in Land"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W1887038067","https://openalex.org/W1988918299","https://openalex.org/W2061517920","https://openalex.org/W2099940443","https://openalex.org/W2100734569","https://openalex.org/W2120685459","https://openalex.org/W2399941526","https://openalex.org/W2560162835","https://openalex.org/W2762776925","https://openalex.org/W2769169032","https://openalex.org/W2789396120","https://openalex.org/W2889109290","https://openalex.org/W2899147610","https://openalex.org/W2899487481","https://openalex.org/W2911964244","https://openalex.org/W2929803724","https://openalex.org/W2964082701","https://openalex.org/W2972609722","https://openalex.org/W3011807858","https://openalex.org/W3135931079","https://openalex.org/W3168314302","https://openalex.org/W3173068042","https://openalex.org/W3183596256","https://openalex.org/W3188197973","https://openalex.org/W4205414765","https://openalex.org/W4243847365","https://openalex.org/W6639415379","https://openalex.org/W6746283674","https://openalex.org/W6775228959","https://openalex.org/W6799280473"],"related_works":["https://openalex.org/W2061466315","https://openalex.org/W2376886931","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W3157271777","https://openalex.org/W2377372927","https://openalex.org/W1495178644"],"abstract_inverted_index":{"The":[0,18,90,118],"network":[1,15,22,43],"traffic":[2,23,44,61,98],"is":[3,51],"an":[4,65,94,107],"ever":[5],"increasing":[6],"stream,":[7],"sourcing":[8],"from":[9],"incrementing":[10],"number":[11,96],"of":[12,20,31,59,97,114],"smart":[13],"and":[14,48,101,130],"connected":[16],"devices.":[17],"sources":[19],"the":[21,29,56,60,87,103,112,123],"cannot":[24],"be":[25],"always":[26],"trusted,":[27],"resulting":[28],"requirement":[30],"a":[32],"detection":[33,68,72,116],"system":[34],"that":[35],"can":[36],"flag":[37],"malicious":[38],"traffics":[39],"as":[40],"intruders.":[41],"Such":[42],"has":[45],"numerous":[46],"features":[47,58,82,100],"hence":[49],"it":[50],"important":[52],"to":[53,63],"select":[54],"only":[55],"relevant":[57],"data,":[62],"develop":[64],"efficient":[66],"intrusion":[67,71,115],"system.":[69,117],"Several":[70],"studies":[73],"focus":[74],"on":[75],"feature":[76],"selection":[77],"or":[78],"reduction":[79],"because":[80],"some":[81],"are":[83],"not":[84],"correlated":[85],"with":[86,106],"target":[88],"variable.":[89],"presented":[91],"research":[92],"selects":[93],"optimal":[95],"data":[99],"reduces":[102],"false":[104],"positives":[105],"unsupervised":[108,119],"learning":[109,135,141],"approach,":[110],"during":[111],"application":[113],"algorithms":[120],"selected":[121],"for":[122],"implementation":[124],"include":[125],"K-Nearest":[126],"Neighbors,":[127],"Isolation":[128],"Forest,":[129],"reinforcement":[131,134],"learning,":[132],"whereas":[133],"performs":[136],"better":[137],"than":[138],"other":[139],"semi-supervised":[140],"methods.":[142]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
