{"id":"https://openalex.org/W4312645596","doi":"https://doi.org/10.1109/icccnt54827.2022.9984365","title":"Man-In-The-Middle Attack Detection Using Ensemble Learning","display_name":"Man-In-The-Middle Attack Detection Using Ensemble Learning","publication_year":2022,"publication_date":"2022-10-03","ids":{"openalex":"https://openalex.org/W4312645596","doi":"https://doi.org/10.1109/icccnt54827.2022.9984365"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt54827.2022.9984365","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt54827.2022.9984365","pdf_url":null,"source":{"id":"https://openalex.org/S4363607876","display_name":"2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043211854","display_name":"Krittika Das","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Krittika Das","raw_affiliation_strings":["Techno International New Town,Department of CSE,Kolkata,India,700156"],"affiliations":[{"raw_affiliation_string":"Techno International New Town,Department of CSE,Kolkata,India,700156","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062285583","display_name":"Rajdeep Basu","orcid":"https://orcid.org/0000-0002-4395-4504"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rajdeep Basu","raw_affiliation_strings":["Techno International New Town,Department of AI &amp; ML,Kolkata,India,700156"],"affiliations":[{"raw_affiliation_string":"Techno International New Town,Department of AI &amp; ML,Kolkata,India,700156","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025251681","display_name":"Raja Karmakar","orcid":"https://orcid.org/0000-0003-1916-7743"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Raja Karmakar","raw_affiliation_strings":["Techno International New Town,Department of CSE,Kolkata,India,700156"],"affiliations":[{"raw_affiliation_string":"Techno International New Town,Department of CSE,Kolkata,India,700156","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5043211854"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.3781,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.90892659,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/man-in-the-middle-attack","display_name":"Man-in-the-middle attack","score":0.9500434398651123},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7765694856643677},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7078279256820679},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5643578171730042},{"id":"https://openalex.org/keywords/damages","display_name":"Damages","score":0.4937792718410492},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3839525580406189},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.20494931936264038}],"concepts":[{"id":"https://openalex.org/C196491621","wikidata":"https://www.wikidata.org/wiki/Q554830","display_name":"Man-in-the-middle attack","level":3,"score":0.9500434398651123},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7765694856643677},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7078279256820679},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5643578171730042},{"id":"https://openalex.org/C2777381055","wikidata":"https://www.wikidata.org/wiki/Q308922","display_name":"Damages","level":2,"score":0.4937792718410492},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3839525580406189},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.20494931936264038},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt54827.2022.9984365","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt54827.2022.9984365","pdf_url":null,"source":{"id":"https://openalex.org/S4363607876","display_name":"2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6399999856948853,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1506438275","https://openalex.org/W1875028359","https://openalex.org/W1987288681","https://openalex.org/W2011131726","https://openalex.org/W2101234009","https://openalex.org/W2107706338","https://openalex.org/W2127425371","https://openalex.org/W2136132422","https://openalex.org/W2139864917","https://openalex.org/W2154533168","https://openalex.org/W2798334860","https://openalex.org/W2803881474","https://openalex.org/W2950250245","https://openalex.org/W2983291275","https://openalex.org/W3002469388","https://openalex.org/W3003073963","https://openalex.org/W3017093935","https://openalex.org/W3046417006","https://openalex.org/W3155578322","https://openalex.org/W4213269540","https://openalex.org/W4223968314","https://openalex.org/W4285101190","https://openalex.org/W4288532656","https://openalex.org/W6630572928","https://openalex.org/W6675354045"],"related_works":["https://openalex.org/W853046806","https://openalex.org/W2152125702","https://openalex.org/W1536059956","https://openalex.org/W2150112053","https://openalex.org/W4389115301","https://openalex.org/W2801930800","https://openalex.org/W4240774184","https://openalex.org/W2930089461","https://openalex.org/W2048968742","https://openalex.org/W2061361563"],"abstract_inverted_index":{"Cyber":[0],"security":[1,40],"is":[2],"one":[3],"of":[4,41,61,133],"the":[5,18,39,51,55,131],"most":[6],"vital":[7],"demands":[8],"about":[9],"network":[10,44],"infrastructure":[11],"and":[12,21,49,75,97],"hence":[13],"very":[14],"necessary":[15],"to":[16,30,64,88,112,125],"protect":[17],"information":[19],"sent":[20],"received":[22],"during":[23],"data":[24,67],"transmission":[25],"against":[26],"outside":[27],"factors":[28],"trying":[29],"intercept":[31],"systems.":[32],"Man-In-The-Middle":[33,90],"(MITM)":[34],"attacks":[35],"can":[36],"dramatically":[37],"compromise":[38],"wireless":[42,56],"fidelity":[43],"where":[45],"an":[46],"attacker":[47],"eavesdrops":[48],"intercepts":[50],"communication":[52,57],"medium":[53],"over":[54],"networks.":[58],"This":[59],"kind":[60],"attack":[62,94,115],"aims":[63],"steal":[65],"sensitive":[66],"such":[68],"as":[69],"credit":[70],"card":[71],"details,":[72],"login":[73],"accounts,":[74],"other":[76],"important":[77],"financial":[78],"transactions.":[79],"Even":[80],"though,":[81],"many":[82],"detection":[83,132],"techniques":[84],"have":[85],"been":[86],"proposed":[87],"mitigate":[89],"attacks,":[91],"however,":[92],"this":[93,102],"still":[95],"occurs":[96],"causes":[98],"tremendous":[99],"damages.":[100],"In":[101],"study,":[103],"we":[104],"propose":[105],"a":[106,118,127],"systematic":[107],"approach":[108,123],"using":[109],"Ensemble":[110,121],"Learning":[111,122],"detect":[113],"MITM":[114,134],"packets":[116],"in":[117],"network.":[119],"Our":[120],"proves":[124],"be":[126],"valid":[128],"stratagem":[129],"for":[130],"Attack":[135],"Packets.":[136]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
