{"id":"https://openalex.org/W4392248538","doi":"https://doi.org/10.1109/icce59016.2024.10444363","title":"Performance Evaluation of Network Intrusion Detection Using Machine Learning","display_name":"Performance Evaluation of Network Intrusion Detection Using Machine Learning","publication_year":2024,"publication_date":"2024-01-06","ids":{"openalex":"https://openalex.org/W4392248538","doi":"https://doi.org/10.1109/icce59016.2024.10444363"},"language":"en","primary_location":{"id":"doi:10.1109/icce59016.2024.10444363","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce59016.2024.10444363","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Consumer Electronics (ICCE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5094023333","display_name":"Sajepan Gnanasivam","orcid":null},"institutions":[{"id":"https://openalex.org/I19923696","display_name":"\u00d8stfold University College","ror":"https://ror.org/04gf7fp41","country_code":"NO","type":"education","lineage":["https://openalex.org/I19923696"]}],"countries":["NO"],"is_corresponding":true,"raw_author_name":"Sajepan Gnanasivam","raw_affiliation_strings":["&#x00D8;stfold University College (HiOF),Faculty of Computer Science,Halden,Norway"],"affiliations":[{"raw_affiliation_string":"&#x00D8;stfold University College (HiOF),Faculty of Computer Science,Halden,Norway","institution_ids":["https://openalex.org/I19923696"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5094023334","display_name":"Daniel Tveter","orcid":null},"institutions":[{"id":"https://openalex.org/I19923696","display_name":"\u00d8stfold University College","ror":"https://ror.org/04gf7fp41","country_code":"NO","type":"education","lineage":["https://openalex.org/I19923696"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Daniel Tveter","raw_affiliation_strings":["&#x00D8;stfold University College (HiOF),Faculty of Computer Science,Halden,Norway"],"affiliations":[{"raw_affiliation_string":"&#x00D8;stfold University College (HiOF),Faculty of Computer Science,Halden,Norway","institution_ids":["https://openalex.org/I19923696"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065001059","display_name":"Nga Dinh","orcid":null},"institutions":[{"id":"https://openalex.org/I19923696","display_name":"\u00d8stfold University College","ror":"https://ror.org/04gf7fp41","country_code":"NO","type":"education","lineage":["https://openalex.org/I19923696"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Nga Dinh","raw_affiliation_strings":["&#x00D8;stfold University College (HiOF),Faculty of Computer Science,Halden,Norway"],"affiliations":[{"raw_affiliation_string":"&#x00D8;stfold University College (HiOF),Faculty of Computer Science,Halden,Norway","institution_ids":["https://openalex.org/I19923696"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5094023333"],"corresponding_institution_ids":["https://openalex.org/I19923696"],"apc_list":null,"apc_paid":null,"fwci":1.099,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.76399949,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7564306259155273},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7409003376960754},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.47364962100982666},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.41992971301078796},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3775366544723511}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7564306259155273},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7409003376960754},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.47364962100982666},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.41992971301078796},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3775366544723511}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icce59016.2024.10444363","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce59016.2024.10444363","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Consumer Electronics (ICCE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W2156204309","https://openalex.org/W2296509296","https://openalex.org/W2334853001","https://openalex.org/W2783796368","https://openalex.org/W2887670553","https://openalex.org/W2926701059","https://openalex.org/W3004752684","https://openalex.org/W3008764542","https://openalex.org/W3011040471","https://openalex.org/W3043486047","https://openalex.org/W3106741970","https://openalex.org/W3112343206","https://openalex.org/W3115883673","https://openalex.org/W3116057280","https://openalex.org/W3116191808","https://openalex.org/W3117252255","https://openalex.org/W3119351666","https://openalex.org/W3126212539","https://openalex.org/W3126698296","https://openalex.org/W3133233862","https://openalex.org/W3188003272","https://openalex.org/W3211966592","https://openalex.org/W3214378786","https://openalex.org/W4221152215","https://openalex.org/W4295788744","https://openalex.org/W4323797442"],"related_works":["https://openalex.org/W2961085424","https://openalex.org/W4306674287","https://openalex.org/W3046775127","https://openalex.org/W4394896187","https://openalex.org/W3170094116","https://openalex.org/W4386462264","https://openalex.org/W3107602296","https://openalex.org/W4364306694","https://openalex.org/W4312192474","https://openalex.org/W4283697347"],"abstract_inverted_index":{"The":[0,164,181],"development":[1],"of":[2,12,87,91,166,215,226],"5G":[3],"network":[4],"and":[5,28,53,65,127,161,178,245,263,289],"beyond":[6],"has":[7],"led":[8],"to":[9,19,26,62,83,140],"an":[10,21,39],"explosion":[11],"data":[13],"generation.":[14],"It":[15],"is":[16,192,199,202,210],"therefore":[17,37],"crucial":[18],"have":[20],"intrusion":[22],"detection":[23],"system":[24],"(IDS)":[25],"detect":[27],"remove":[29],"malicious":[30,64],"packets":[31],"from":[32,183],"entering":[33],"network.":[34],"This":[35],"paper":[36],"presents":[38],"IDS":[40],"based":[41,173,257],"on":[42,68,79,101,174,258,275],"a":[43,69,88],"Feature":[44,51,76,96,261,280],"Selection":[45,77,97,262,281],"approach":[46,98,282],"which":[47],"applies":[48],"the":[49,85,142,167,188,195,203,252,271],"Recursive":[50],"Elimination":[52],"Random":[54,114],"Forest":[55,115],"Classifier":[56],"with":[57,221,230,234,238,242,247,267,270],"10":[58],"-fold":[59],"Cross":[60],"Validation":[61],"classify":[63],"benign":[66],"traffic":[67],"publicly":[70],"available":[71],"UNSW-NB15":[72,276],"dataset.":[73],"Most":[74],"existing":[75,268],"approaches":[78],"this":[80],"dataset":[81],"directed":[82],"enhance":[84],"performance":[86,165],"limited":[89],"number":[90],"algorithms":[92,108,170,274],"used.":[93],"Our":[94],"proposed":[95,260,279],"was":[99],"tested":[100],"six":[102],"well-known":[103],"supervised":[104],"machine":[105],"learning":[106],"(ML)":[107],"including":[109],"Artificial":[110],"Neural":[111],"Network":[112],"(ANN),":[113],"(RF),":[116],"Decision":[117],"Tree":[118],"(DT),":[119],"K-Nearest":[120],"Neighbor":[121],"(KNN),":[122],"Support":[123],"Vector":[124],"Machines":[125],"(SVM)":[126],"Logistic":[128],"Regression":[129],"(LR)":[130],"performing":[131,197,205],"binary":[132],"classification.":[133],"In":[134,217,250],"addition,":[135,251],"we":[136,156],"performed":[137],"hyperparameter":[138,151],"tuning":[139,152],"get":[141],"best":[143],"possible":[144],"parameters":[145],"for":[146],"each":[147],"ML":[148,169,273,294],"algorithm.":[149],"Unlike":[150],"in":[153,286],"most":[154,189,287],"studies,":[155],"perform":[157],"both":[158],"Manual":[159],"Search":[160],"Grid":[162],"Search.":[163],"selected":[168],"are":[171,255],"evaluated":[172],"Accuracy,":[175],"Recall,":[176],"Precision,":[177],"F1":[179,224],"score.":[180],"results":[182,285],"our":[184,259,278],"experiments":[185],"indicate":[186],"that":[187,214],"robust":[190],"algorithm":[191,198],"ANN":[193,219],"whereas":[194],"weakest":[196],"LR.":[200],"RF":[201,229],"second-best":[204],"algorithm,":[206],"however,":[207],"its":[208],"runtime":[209],"much":[211],"lower":[212],"than":[213],"ANN.":[216],"particular,":[218],"excels":[220],"(testing":[222],"accuracy,":[223],"score)":[225],"(88.62%,":[227],"96.473%),":[228],"(87.40%,":[231],"89.60%),":[232],"DT":[233],"(87.266%,":[235],"89.414%),":[236],"KNN":[237],"(87.11%,":[239],"88.7%),":[240],"SVM":[241],"(81.835%,":[243,248],"86.959%)":[244],"LR":[246],"85.632%).":[249],"over-fitting":[253],"problems":[254],"eliminated":[256],"Hyperparameter":[264],"turning.":[265],"Compared":[266],"works":[269],"same":[272],"dataset,":[277],"achieved":[283],"better":[284],"cases":[288],"more":[290],"stable":[291],"among":[292],"different":[293],"algorithms.":[295]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
