{"id":"https://openalex.org/W4284896524","doi":"https://doi.org/10.1109/eit53891.2022.9814045","title":"Network Anomaly Uncovering on CICIDS-2017 Dataset: A Supervised Artificial Intelligence Approach","display_name":"Network Anomaly Uncovering on CICIDS-2017 Dataset: A Supervised Artificial Intelligence Approach","publication_year":2022,"publication_date":"2022-05-19","ids":{"openalex":"https://openalex.org/W4284896524","doi":"https://doi.org/10.1109/eit53891.2022.9814045"},"language":"en","primary_location":{"id":"doi:10.1109/eit53891.2022.9814045","is_oa":false,"landing_page_url":"https://doi.org/10.1109/eit53891.2022.9814045","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Electro Information Technology (eIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027221767","display_name":"Pankaj Jairu","orcid":null},"institutions":[{"id":"https://openalex.org/I173963315","display_name":"St. Cloud State University","ror":"https://ror.org/016czhx14","country_code":"US","type":"education","lineage":["https://openalex.org/I173963315","https://openalex.org/I91221267"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Pankaj Jairu","raw_affiliation_strings":["St. Cloud State University,Department of Information Systems,St. Cloud,MN,USA","Department of Information Systems, St. Cloud State University, St. Cloud, MN, USA"],"affiliations":[{"raw_affiliation_string":"St. Cloud State University,Department of Information Systems,St. Cloud,MN,USA","institution_ids":["https://openalex.org/I173963315"]},{"raw_affiliation_string":"Department of Information Systems, St. Cloud State University, St. Cloud, MN, USA","institution_ids":["https://openalex.org/I173963315"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089315954","display_name":"Akalanka B. Mailewa","orcid":"https://orcid.org/0000-0003-4426-0608"},"institutions":[{"id":"https://openalex.org/I173963315","display_name":"St. Cloud State University","ror":"https://ror.org/016czhx14","country_code":"US","type":"education","lineage":["https://openalex.org/I173963315","https://openalex.org/I91221267"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Akalanka B. Mailewa","raw_affiliation_strings":["St. Cloud State University,Department of Computer Science and Information Technology,St. Cloud,MN,USA","Department of Computer Science and Information Technology, St. Cloud State University, St. Cloud, MN, USA"],"affiliations":[{"raw_affiliation_string":"St. Cloud State University,Department of Computer Science and Information Technology,St. Cloud,MN,USA","institution_ids":["https://openalex.org/I173963315"]},{"raw_affiliation_string":"Department of Computer Science and Information Technology, St. Cloud State University, St. Cloud, MN, USA","institution_ids":["https://openalex.org/I173963315"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5027221767"],"corresponding_institution_ids":["https://openalex.org/I173963315"],"apc_list":null,"apc_paid":null,"fwci":1.7051,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.84680089,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"606","last_page":"615"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7414457201957703},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.7305554151535034},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.7152525186538696},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6724320650100708},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.6655232906341553},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6427537798881531},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.6339331269264221},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5947935581207275},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5946030020713806},{"id":"https://openalex.org/keywords/supervised-learning","display_name":"Supervised learning","score":0.506622850894928},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5020253658294678},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.41779381036758423},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.38035517930984497},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.34331509470939636}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7414457201957703},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.7305554151535034},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.7152525186538696},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6724320650100708},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.6655232906341553},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6427537798881531},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.6339331269264221},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5947935581207275},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5946030020713806},{"id":"https://openalex.org/C136389625","wikidata":"https://www.wikidata.org/wiki/Q334384","display_name":"Supervised learning","level":3,"score":0.506622850894928},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5020253658294678},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.41779381036758423},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.38035517930984497},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.34331509470939636},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/eit53891.2022.9814045","is_oa":false,"landing_page_url":"https://doi.org/10.1109/eit53891.2022.9814045","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Electro Information Technology (eIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/15","display_name":"Life in Land","score":0.5}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W2080184650","https://openalex.org/W2314002629","https://openalex.org/W2516066574","https://openalex.org/W2737711166","https://openalex.org/W2751219778","https://openalex.org/W2756489700","https://openalex.org/W2783741806","https://openalex.org/W2789828921","https://openalex.org/W2803437104","https://openalex.org/W2807786182","https://openalex.org/W2900236636","https://openalex.org/W2911964244","https://openalex.org/W2919115771","https://openalex.org/W2924689635","https://openalex.org/W2969419315","https://openalex.org/W2981025625","https://openalex.org/W2986055611","https://openalex.org/W3014732532","https://openalex.org/W3016987480","https://openalex.org/W3022413490","https://openalex.org/W3043530913","https://openalex.org/W3047132966","https://openalex.org/W3112696791","https://openalex.org/W3116162237","https://openalex.org/W3118822599","https://openalex.org/W3119693685","https://openalex.org/W3120725026","https://openalex.org/W3120973779","https://openalex.org/W3121026104","https://openalex.org/W3126814579","https://openalex.org/W3134696756","https://openalex.org/W3136238191","https://openalex.org/W3186831322","https://openalex.org/W4200044479","https://openalex.org/W4206016309","https://openalex.org/W4211009987","https://openalex.org/W6766630991","https://openalex.org/W6806507448"],"related_works":["https://openalex.org/W4377964522","https://openalex.org/W4384345534","https://openalex.org/W4292865745","https://openalex.org/W3036095178","https://openalex.org/W2742600041","https://openalex.org/W4318350883","https://openalex.org/W4283016678","https://openalex.org/W4206687566","https://openalex.org/W3210877509","https://openalex.org/W2772393799"],"abstract_inverted_index":{"In":[0],"today\u2019s":[1],"world,":[2],"businesses":[3],"and":[4,27,31,83,89,126],"services":[5],"are":[6,29,63,87,95],"shifted":[7],"to":[8,46,52,66],"a":[9,13,90],"digital":[10],"transformation.":[11],"As":[12],"result,":[14],"network":[15,25,75,79],"traffic":[16],"has":[17,40],"tremendously":[18],"increased":[19],"over":[20],"the":[21,34],"years.":[22],"With":[23],"that,":[24,33],"threats":[26],"attacks":[28],"growing":[30],"with":[32,147],"importance":[35],"of":[36,93,132],"intrusion":[37,47,57,68],"detection":[38,48,58,69],"systems":[39],"increased.":[41],"The":[42,111,137],"traditional":[43],"signature-based":[44],"approach":[45],"is":[49],"not":[50],"sufficient":[51],"detect":[53,78],"intrusions,":[54],"so":[55],"anomaly-based":[56],"came":[59],"into":[60],"play.":[61],"There":[62],"many":[64],"methods":[65,70],"Anomaly-based":[67],"that":[71,140],"can":[72],"classify":[73],"unknown":[74],"attacks.":[76],"To":[77],"anomalies,":[80],"Machine":[81,108,117],"Learning":[82,85,109],"Deep":[84],"techniques":[86],"applied,":[88],"considerable":[91],"number":[92],"studies":[94],"done":[96],"in":[97],"this":[98],"field.":[99],"This":[100],"research":[101],"presents":[102],"classification":[103],"models":[104],"built":[105],"using":[106,153,157],"supervised":[107,145],"algorithms.":[110],"algorithms":[112,146],"Logistic":[113],"Regression,":[114],"Support":[115],"Vector":[116],"(SVM),":[118],"K-Nearest":[119],"Neighbor":[120],"(KNN),":[121],"Na\u00efve":[122],"Bayes,":[123],"Decision":[124],"Tree":[125],"Random":[127,141],"Forest":[128,142],"on":[129],"multiple":[130],"datasets":[131],"realistic":[133],"evaluation":[134],"dataset":[135],"CICIDS-2017.":[136],"results":[138],"show":[139],"outperforms":[143],"other":[144],"as":[148,150],"high":[149],"99.93%":[151],"accuracy":[152],"14":[154],"features":[155],"selected":[156],"Pearson\u2019s":[158],"correlation":[159],"coefficient":[160],"method.":[161]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":2}],"updated_date":"2026-03-23T07:41:27.035349","created_date":"2025-10-10T00:00:00"}
