{"id":"https://openalex.org/W3017346274","doi":"https://doi.org/10.1109/icaiic48513.2020.9064976","title":"1D CNN based network intrusion detection with normalization on imbalanced data","display_name":"1D CNN based network intrusion detection with normalization on imbalanced data","publication_year":2020,"publication_date":"2020-02-01","ids":{"openalex":"https://openalex.org/W3017346274","doi":"https://doi.org/10.1109/icaiic48513.2020.9064976","mag":"3017346274"},"language":"en","primary_location":{"id":"doi:10.1109/icaiic48513.2020.9064976","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icaiic48513.2020.9064976","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047086073","display_name":"Azizjon Meliboev","orcid":"https://orcid.org/0000-0003-2742-0059"},"institutions":[{"id":"https://openalex.org/I12832649","display_name":"Gachon University","ror":"https://ror.org/03ryywt80","country_code":"KR","type":"education","lineage":["https://openalex.org/I12832649"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Meliboev Azizjon","raw_affiliation_strings":["Dept. of Computer engineering, Gachon university, SeongNam, S.Korea"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer engineering, Gachon university, SeongNam, S.Korea","institution_ids":["https://openalex.org/I12832649"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037862489","display_name":"Jumabek Alikhanov","orcid":"https://orcid.org/0000-0003-3103-6033"},"institutions":[{"id":"https://openalex.org/I191879574","display_name":"Inha University","ror":"https://ror.org/01easw929","country_code":"KR","type":"education","lineage":["https://openalex.org/I191879574"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Alikhanov Jumabek","raw_affiliation_strings":["Dept. of Computer and information engineering, Inha university, Incheon, S.Korea"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer and information engineering, Inha university, Incheon, S.Korea","institution_ids":["https://openalex.org/I191879574"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103004428","display_name":"Wooseong Kim","orcid":"https://orcid.org/0000-0003-0955-3421"},"institutions":[{"id":"https://openalex.org/I12832649","display_name":"Gachon University","ror":"https://ror.org/03ryywt80","country_code":"KR","type":"education","lineage":["https://openalex.org/I12832649"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Wooseong Kim","raw_affiliation_strings":["Dept. of Computer engineering, Gachon university, SeongNam, S.Korea"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer engineering, Gachon university, SeongNam, S.Korea","institution_ids":["https://openalex.org/I12832649"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5047086073"],"corresponding_institution_ids":["https://openalex.org/I12832649"],"apc_list":null,"apc_paid":null,"fwci":17.9663,"has_fulltext":false,"cited_by_count":214,"citation_normalized_percentile":{"value":0.99441029,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"218","last_page":"224"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8547037839889526},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7634531259536743},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6930699944496155},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.6694530248641968},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6388484239578247},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5738810896873474},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.5662914514541626},{"id":"https://openalex.org/keywords/normalization","display_name":"Normalization (sociology)","score":0.48835012316703796},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4323880076408386},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.13855931162834167}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8547037839889526},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7634531259536743},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6930699944496155},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.6694530248641968},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6388484239578247},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5738810896873474},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.5662914514541626},{"id":"https://openalex.org/C136886441","wikidata":"https://www.wikidata.org/wiki/Q926129","display_name":"Normalization (sociology)","level":2,"score":0.48835012316703796},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4323880076408386},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.13855931162834167},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C19165224","wikidata":"https://www.wikidata.org/wiki/Q23404","display_name":"Anthropology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icaiic48513.2020.9064976","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icaiic48513.2020.9064976","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W169052826","https://openalex.org/W205159212","https://openalex.org/W1483650506","https://openalex.org/W1836465849","https://openalex.org/W1849277567","https://openalex.org/W1983291981","https://openalex.org/W2095705004","https://openalex.org/W2099940443","https://openalex.org/W2100537916","https://openalex.org/W2120685459","https://openalex.org/W2163605009","https://openalex.org/W2296509296","https://openalex.org/W2335999708","https://openalex.org/W2399941526","https://openalex.org/W2512144135","https://openalex.org/W2529525882","https://openalex.org/W2547629195","https://openalex.org/W2750674396","https://openalex.org/W2762776925","https://openalex.org/W2775103799","https://openalex.org/W2783741806","https://openalex.org/W2793758704","https://openalex.org/W2943967631","https://openalex.org/W2949117887","https://openalex.org/W2963919294","https://openalex.org/W4288358460","https://openalex.org/W6608394925","https://openalex.org/W6639204139","https://openalex.org/W6674330103","https://openalex.org/W6684191040"],"related_works":["https://openalex.org/W2591697403","https://openalex.org/W2944728705","https://openalex.org/W2904022177","https://openalex.org/W2359348847","https://openalex.org/W3011538607","https://openalex.org/W4294432981","https://openalex.org/W2387580700","https://openalex.org/W2746581472","https://openalex.org/W60934498","https://openalex.org/W2899285606"],"abstract_inverted_index":{"Intrusion":[0],"detection":[1],"system":[2],"(IDS)":[3],"plays":[4],"an":[5,129],"essential":[6],"role":[7],"in":[8,84,89,123,150,171,184,212],"computer":[9,90],"networks":[10],"protecting":[11],"computing":[12],"resources":[13],"and":[14,25,32,48,68,139,145,178,193,216,220],"data":[15],"from":[16],"outside":[17],"attacks.":[18,34],"Recent":[19],"IDS":[20,29,70,159],"faces":[21],"challenges":[22],"improving":[23],"flexibility":[24],"efficiency":[26],"of":[27,87,165,255,259],"the":[28,66,94,113,135,151,163,187,200,228,238,243,252],"for":[30,42,64,99,134,147],"unexpected":[31],"unpredictable":[33],"Deep":[35],"neural":[36],"network":[37,141,191,260],"(DNN)":[38],"is":[39,234],"considered":[40],"popularly":[41],"complex":[43],"systems":[44],"to":[45,161,186,205,227,237,245],"abstract":[46,253],"features":[47],"learn":[49],"as":[50,128],"a":[51,60,107,124,209],"machine":[52,108,173,230],"learning":[53,62,101,109,149,210,231],"technique.":[54],"In":[55,197],"this":[56],"paper,":[57],"we":[58],"propose":[59],"deep":[61],"approach":[63],"developing":[65],"efficient":[67],"flexible":[69],"using":[71],"one-dimensional":[72],"Convolutional":[73],"Neural":[74],"Network":[75],"(1D-CNN).":[76],"Two-dimensional":[77],"CNN":[78,241],"methods":[79],"have":[80,224],"shown":[81],"remarkable":[82],"performance":[83],"detecting":[85],"objects":[86],"images":[88],"vision":[91],"area.":[92],"Meanwhile,":[93],"1D-CNN":[95,114,188,219],"can":[96],"be":[97],"used":[98],"supervised":[100,148],"on":[102,112,157,214],"time-series":[103],"data.":[104,218],"We":[105,153],"establish":[106],"model":[110,133,156],"based":[111],"by":[115],"serializing":[116],"Transmission":[117],"Control":[118],"Protocol/Internet":[119],"Protocol":[120],"(TCP/IP)":[121],"packets":[122],"predetermined":[125],"time":[126],"range":[127],"invasion":[130],"Internet":[131],"traffic":[132,261],"IDS,":[136],"where":[137],"normal":[138],"abnormal":[140],"traffics":[142],"are":[143,195,202],"categorized":[144],"labeled":[146],"1D-CNN.":[152],"evaluated":[154],"our":[155,166],"UNSW_NB15":[158],"dataset":[160],"show":[162],"effectiveness":[164],"method.":[167],"For":[168],"comparison":[169],"study":[170],"performance,":[172],"learning-based":[174],"Random":[175],"Forest":[176],"(RF)":[177],"Support":[179],"Vector":[180],"Machine":[181],"(SVM)":[182],"models":[183,201],"addition":[185],"with":[189,208],"various":[190],"parameters":[192],"architecture":[194],"exploited.":[196],"each":[198],"experiment,":[199],"run":[203],"up":[204],"200":[206],"epochs":[207],"rate":[211],"0.0001":[213],"imbalanced":[215],"balanced":[217],"its":[221],"variant":[222],"architectures":[223],"outperformed":[225],"compared":[226],"classical":[229],"classifiers.":[232],"This":[233],"mainly":[235],"due":[236],"reason":[239],"that":[240,250],"has":[242],"capability":[244],"extract":[246],"high-level":[247],"feature":[248,257],"representations":[249],"represent":[251],"form":[254],"low-level":[256],"sets":[258],"connections.":[262]},"counts_by_year":[{"year":2026,"cited_by_count":8},{"year":2025,"cited_by_count":39},{"year":2024,"cited_by_count":56},{"year":2023,"cited_by_count":37},{"year":2022,"cited_by_count":42},{"year":2021,"cited_by_count":29},{"year":2020,"cited_by_count":3}],"updated_date":"2026-04-23T09:07:50.710637","created_date":"2025-10-10T00:00:00"}
