{"id":"https://openalex.org/W2771399008","doi":"https://doi.org/10.1109/icacci.2017.8126018","title":"Evaluating effectiveness of shallow and deep networks to intrusion detection system","display_name":"Evaluating effectiveness of shallow and deep networks to intrusion detection system","publication_year":2017,"publication_date":"2017-09-01","ids":{"openalex":"https://openalex.org/W2771399008","doi":"https://doi.org/10.1109/icacci.2017.8126018","mag":"2771399008"},"language":"en","primary_location":{"id":"doi:10.1109/icacci.2017.8126018","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2017.8126018","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112825787","display_name":"R. Vinayakumar","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"R. Vinayakumar","raw_affiliation_strings":["Centre for Computational Engineering and Networking (CEN), Amrita School of Engineering, Coimbatore"],"affiliations":[{"raw_affiliation_string":"Centre for Computational Engineering and Networking (CEN), Amrita School of Engineering, Coimbatore","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113113768","display_name":"K. P. Soman","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"K. P. Soman","raw_affiliation_strings":["Centre for Computational Engineering and Networking (CEN), Amrita School of Engineering, Coimbatore"],"affiliations":[{"raw_affiliation_string":"Centre for Computational Engineering and Networking (CEN), Amrita School of Engineering, Coimbatore","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029900047","display_name":"Prabaharan Poornachandran","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Prabaharan Poornachandran","raw_affiliation_strings":["Center for Cyber Security Systems and Networks, Amrita University, India"],"affiliations":[{"raw_affiliation_string":"Center for Cyber Security Systems and Networks, Amrita University, India","institution_ids":["https://openalex.org/I81556334"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5112825787"],"corresponding_institution_ids":["https://openalex.org/I81556334"],"apc_list":null,"apc_paid":null,"fwci":8.4952,"has_fulltext":false,"cited_by_count":82,"citation_normalized_percentile":{"value":0.9799188,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1282","last_page":"1289"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8083375692367554},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7093091011047363},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6879398226737976},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6421721577644348},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5223742127418518},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4717981219291687},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4485704004764557},{"id":"https://openalex.org/keywords/binary-classification","display_name":"Binary classification","score":0.4204232096672058},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1990104615688324},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.1385623812675476}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8083375692367554},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7093091011047363},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6879398226737976},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6421721577644348},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5223742127418518},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4717981219291687},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4485704004764557},{"id":"https://openalex.org/C66905080","wikidata":"https://www.wikidata.org/wiki/Q17005494","display_name":"Binary classification","level":3,"score":0.4204232096672058},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1990104615688324},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.1385623812675476}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icacci.2017.8126018","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2017.8126018","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W80917968","https://openalex.org/W162146437","https://openalex.org/W1516506771","https://openalex.org/W1520795727","https://openalex.org/W1544101352","https://openalex.org/W1800991598","https://openalex.org/W1851171594","https://openalex.org/W1966809779","https://openalex.org/W1973979667","https://openalex.org/W2095979141","https://openalex.org/W2098454077","https://openalex.org/W2099940443","https://openalex.org/W2100537916","https://openalex.org/W2101234009","https://openalex.org/W2132111557","https://openalex.org/W2133661814","https://openalex.org/W2134641333","https://openalex.org/W2136922672","https://openalex.org/W2150755264","https://openalex.org/W2262045390","https://openalex.org/W2402144811","https://openalex.org/W2541841318","https://openalex.org/W2576897537","https://openalex.org/W2789305555","https://openalex.org/W2802348331","https://openalex.org/W2953384591","https://openalex.org/W3214373139","https://openalex.org/W4245460974","https://openalex.org/W6675354045","https://openalex.org/W6679621003","https://openalex.org/W6679898850","https://openalex.org/W6692777677","https://openalex.org/W6713134421","https://openalex.org/W6748074358","https://openalex.org/W6751698863","https://openalex.org/W6803782233"],"related_works":["https://openalex.org/W4380075502","https://openalex.org/W2376886931","https://openalex.org/W2061466315","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W1495178644","https://openalex.org/W2185594426"],"abstract_inverted_index":{"Network":[0],"intrusion":[1],"detection":[2,55,205],"system":[3],"(NIDS)":[4],"is":[5,59],"a":[6,30,41,138,236],"tool":[7],"used":[8,208],"to":[9,37,48,87,121,134,146,169,230,243],"detect":[10],"and":[11,19,27,32,57,71,84,91,96,102,109,154,159,174,191,214,252],"classify":[12],"the":[13,49,52,79,99,122,128,148,172,193,221,240,246],"network":[14,140,156,178,212,226],"breaches":[15],"dynamically":[16],"in":[17,24,44,54,62,106,119,125,189,197,217,233,239],"information":[18,142],"communication":[20],"technologies":[21],"(ICT)":[22],"systems":[23],"both":[25,107],"academia":[26],"industries.":[28],"Adopting":[29],"new":[31],"existing":[33],"machine":[34],"learning":[35,237],"classifiers":[36],"NIDS":[38],"has":[39],"been":[40],"significant":[42],"area":[43],"security":[45,66],"research":[46],"due":[47],"fact":[50],"that":[51],"enhancement":[53],"rate":[56,238],"accuracy":[58],"of":[60,65,74,81,127,152,165,177,211,224,250],"important":[61],"large":[63],"volume":[64],"audit":[67],"data":[68,104],"including":[69],"diverse":[70],"dynamic":[72],"characteristics":[73],"attacks.":[75,254],"This":[76],"paper":[77],"evaluates":[78],"effectiveness":[80],"various":[82,175,209,222,253],"shallow":[83,90,123],"deep":[85,92,114,139,182,218,225],"networks":[86,93,115,124,183],"NIDS.":[88],"The":[89,113,131],"are":[94,116,227],"trained":[95],"evaluated":[97],"on":[98],"KDDCup":[100],"`99'":[101],"NSL-KDD":[103],"sets":[105],"binary":[108],"multi-class":[110],"classification":[111],"settings.":[112],"performed":[117,187],"well":[118,188],"comparison":[120],"most":[126],"experiment":[129],"configurations.":[130],"main":[132],"reason":[133],"this":[135],"might":[136],"be":[137],"passes":[141],"through":[143],"several":[144],"layers":[145],"learn":[147],"underlying":[149],"hidden":[150],"patterns":[151,249],"normal":[153,173,251],"attack":[155],"connection":[157,179],"records":[158],"finally":[160],"aggregates":[161],"these":[162],"learned":[163],"features":[164],"each":[166],"layer":[167],"together":[168],"effectively":[170,244],"distinguish":[171],"attacks":[176,195,199],"records.":[180],"Additionally,":[181],"have":[184],"not":[185],"only":[186],"detecting":[190],"classifying":[192],"known":[194],"additionally":[196],"unknown":[198],"too.":[200],"To":[201],"achieve":[202],"an":[203],"acceptable":[204],"rate,":[206],"we":[207],"configurations":[210,223],"settings":[213],"its":[215],"parameters":[216],"networks.":[219],"All":[220],"run":[228],"up":[229],"1000":[231],"epochs":[232],"training":[234],"with":[235],"range":[241],"[0.01-0.5]":[242],"capture":[245],"time":[247],"varying":[248]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":11},{"year":2020,"cited_by_count":20},{"year":2019,"cited_by_count":13},{"year":2018,"cited_by_count":8}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
