{"id":"https://openalex.org/W3112187180","doi":"https://doi.org/10.1109/icccs49678.2020.9276875","title":"Ensemble and Feature Selection-based Intrusion Detection System for Multi-attack Environment","display_name":"Ensemble and Feature Selection-based Intrusion Detection System for Multi-attack Environment","publication_year":2020,"publication_date":"2020-10-14","ids":{"openalex":"https://openalex.org/W3112187180","doi":"https://doi.org/10.1109/icccs49678.2020.9276875","mag":"3112187180"},"language":"en","primary_location":{"id":"doi:10.1109/icccs49678.2020.9276875","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccs49678.2020.9276875","pdf_url":null,"source":{"id":"https://openalex.org/S4306498618","display_name":"2020 5th International Conference on Computing, Communication and Security (ICCCS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 5th International Conference on Computing, Communication and Security (ICCCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030338103","display_name":"Shraddha R. Khonde","orcid":"https://orcid.org/0000-0003-3020-8593"},"institutions":[{"id":"https://openalex.org/I43814544","display_name":"Sathyabama Institute of Science and Technology","ror":"https://ror.org/01defpn95","country_code":"IN","type":"education","lineage":["https://openalex.org/I43814544"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"S. R. Khonde","raw_affiliation_strings":["Department of CSE, Sathyabama Institute of Science and Technology, Chennai, India","Sathyabama Inst. Of Science and Technology,Department of CSE,Chennai,India"],"affiliations":[{"raw_affiliation_string":"Department of CSE, Sathyabama Institute of Science and Technology, Chennai, India","institution_ids":["https://openalex.org/I43814544"]},{"raw_affiliation_string":"Sathyabama Inst. Of Science and Technology,Department of CSE,Chennai,India","institution_ids":["https://openalex.org/I43814544"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059008434","display_name":"V. Ulagamuthalvi","orcid":null},"institutions":[{"id":"https://openalex.org/I43814544","display_name":"Sathyabama Institute of Science and Technology","ror":"https://ror.org/01defpn95","country_code":"IN","type":"education","lineage":["https://openalex.org/I43814544"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"V. Ulagamuthalvi","raw_affiliation_strings":["Department of CSE, Sathyabama Institute of Science and Technology, Chennai, India","Sathyabama Inst. Of Science and Technology,Department of CSE,Chennai,India"],"affiliations":[{"raw_affiliation_string":"Department of CSE, Sathyabama Institute of Science and Technology, Chennai, India","institution_ids":["https://openalex.org/I43814544"]},{"raw_affiliation_string":"Sathyabama Inst. Of Science and Technology,Department of CSE,Chennai,India","institution_ids":["https://openalex.org/I43814544"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5030338103"],"corresponding_institution_ids":["https://openalex.org/I43814544"],"apc_list":null,"apc_paid":null,"fwci":0.5554,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.60751665,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8614947199821472},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7191161513328552},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.6594216227531433},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.568045437335968},{"id":"https://openalex.org/keywords/constant-false-alarm-rate","display_name":"Constant false alarm rate","score":0.5490135550498962},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5401524305343628},{"id":"https://openalex.org/keywords/false-positive-rate","display_name":"False positive rate","score":0.5356603860855103},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.458437979221344},{"id":"https://openalex.org/keywords/false-alarm","display_name":"False alarm","score":0.4500751793384552},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.444368839263916},{"id":"https://openalex.org/keywords/network-administrator","display_name":"Network administrator","score":0.4301767945289612},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3955073654651642},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3763880729675293},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2632887065410614}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8614947199821472},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7191161513328552},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.6594216227531433},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.568045437335968},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.5490135550498962},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5401524305343628},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.5356603860855103},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.458437979221344},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.4500751793384552},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.444368839263916},{"id":"https://openalex.org/C2779173999","wikidata":"https://www.wikidata.org/wiki/Q680296","display_name":"Network administrator","level":2,"score":0.4301767945289612},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3955073654651642},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3763880729675293},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2632887065410614}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccs49678.2020.9276875","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccs49678.2020.9276875","pdf_url":null,"source":{"id":"https://openalex.org/S4306498618","display_name":"2020 5th International Conference on Computing, Communication and Security (ICCCS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 5th International Conference on Computing, Communication and Security (ICCCS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W836876797","https://openalex.org/W2039424734","https://openalex.org/W2105779206","https://openalex.org/W2155926039","https://openalex.org/W2432038293","https://openalex.org/W2507920413","https://openalex.org/W2552899443","https://openalex.org/W2604105233","https://openalex.org/W2620580412","https://openalex.org/W2744536417","https://openalex.org/W2767153057","https://openalex.org/W2793442578","https://openalex.org/W2794048982","https://openalex.org/W2799548584","https://openalex.org/W2900953199","https://openalex.org/W2902529532","https://openalex.org/W2924689635","https://openalex.org/W2938820927","https://openalex.org/W2947334153","https://openalex.org/W2958357437","https://openalex.org/W2979830823","https://openalex.org/W3016509480","https://openalex.org/W3017080938","https://openalex.org/W3033403042"],"related_works":["https://openalex.org/W1983393909","https://openalex.org/W2040150569","https://openalex.org/W2468095590","https://openalex.org/W2132174924","https://openalex.org/W1911540634","https://openalex.org/W2013909972","https://openalex.org/W2280598164","https://openalex.org/W2189092700","https://openalex.org/W2993555267","https://openalex.org/W4241302526"],"abstract_inverted_index":{"In":[0,146],"the":[1,35,52,106,134,159],"world":[2],"of":[3,14,22,54,84,90,161,205,220,231,234,249],"internet":[4],"most":[5],"challenging":[6],"issue":[7],"is":[8,96,112,116,144,152,171,185,189,202,208,236],"to":[9,37,43,69,81,124],"maintain":[10],"confidentiality":[11],"and":[12,40,66,179,194,226,243],"integrity":[13],"data.":[15,44],"Network":[16],"provides":[17,246],"poor":[18],"performance":[19,248],"in":[20,34,51,142,222,229],"terms":[21],"security":[23,83],"when":[24],"it":[25],"gets":[26],"compromised":[27],"by":[28,239],"some":[29],"intruder.":[30],"Intruders":[31],"insert":[32],"intrusions":[33,48],"network":[36,47,61],"compromise":[38,46,70],"system":[39,94],"get":[41],"access":[42],"To":[45,86,136,176],"are":[49,78,122],"inserted":[50],"form":[53],"attack.":[55],"An":[56],"attack":[57,128],"enters":[58],"into":[59,73,105],"a":[60,63,130],"as":[62],"normal":[64],"traffic":[65],"then":[67],"tries":[68],"devices":[71],"connected":[72],"network.":[74,85,107,135],"Now":[75],"day's":[76],"intruders":[77],"using":[79,167,191],"multi-attacks":[80],"break":[82],"detect":[87,125],"such":[88],"type":[89],"activities":[91],"intrusion":[92],"detection":[93],"(IDS)":[95],"used.":[97,186],"IDS":[98,121,143,151],"keeps":[99],"eye":[100],"on":[101,133],"each":[102],"packet":[103],"entering":[104],"If":[108],"any":[109],"abnormal":[110],"behavior":[111],"identified":[113],"an":[114,149],"alert":[115],"generated":[117],"for":[118,173,200],"administrator.":[119],"However":[120],"able":[123],"only":[126],"single":[127],"at":[129],"time":[131,181],"happening":[132],"handle":[137,156],"modern":[138],"era":[139],"multi-attack":[140,157],"improvement":[141,228],"required.":[145],"this":[147],"paper":[148],"improved":[150,247],"presented":[153],"which":[154],"can":[155],"with":[158,210],"help":[160],"machine":[162],"learning":[163],"classifiers.":[164],"Ensemble":[165,241],"approach":[166,217,242],"majority":[168],"voting":[169],"algorithm":[170],"used":[172,199],"improving":[174],"performance.":[175],"reduce":[177],"training":[178],"computation":[180],"feature":[182,244],"selection":[183,245],"technique":[184],"Performance":[187],"evaluation":[188],"done":[190,209],"precision,":[192],"accuracy":[193,230],"false":[195,223],"alarm":[196,224],"rate.":[197],"Dataset":[198],"experiments":[201],"NSL-KDD.":[203],"Comparison":[204],"individual":[206],"classifier":[207],"ensemble":[211,216,235],"approach.":[212],"Results":[213],"show":[214],"that":[215],"shows":[218],"reduction":[219],"0.05%":[221],"rate":[225],"2%":[227],"IDS.":[232,250],"Precision":[233],"also":[237],"increased":[238],"0.01.":[240]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
