{"id":"https://openalex.org/W4405490777","doi":"https://doi.org/10.1109/iccp63557.2024.10793023","title":"Network Intrusion Detection System Using Anomaly Detection Techniques","display_name":"Network Intrusion Detection System Using Anomaly Detection Techniques","publication_year":2024,"publication_date":"2024-10-17","ids":{"openalex":"https://openalex.org/W4405490777","doi":"https://doi.org/10.1109/iccp63557.2024.10793023"},"language":"en","primary_location":{"id":"doi:10.1109/iccp63557.2024.10793023","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccp63557.2024.10793023","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 20th International Conference on Intelligent Computer Communication and Processing (ICCP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.1109/ICCP63557.2024.10793023","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115513799","display_name":"David Oroian","orcid":null},"institutions":[{"id":"https://openalex.org/I158333966","display_name":"Technical University of Cluj-Napoca","ror":"https://ror.org/03r8nwp71","country_code":"RO","type":"education","lineage":["https://openalex.org/I158333966"]}],"countries":["RO"],"is_corresponding":true,"raw_author_name":"David Oroian","raw_affiliation_strings":["Technical University of Cluj-Napoca,Communications Department,Cluj-Napoca,Romania"],"affiliations":[{"raw_affiliation_string":"Technical University of Cluj-Napoca,Communications Department,Cluj-Napoca,Romania","institution_ids":["https://openalex.org/I158333966"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023791378","display_name":"Roland Bolboac\u0103","orcid":"https://orcid.org/0000-0002-4825-8786"},"institutions":[{"id":"https://openalex.org/I3125032317","display_name":"Universitatea de Medicin\u0103, Farmacie, \u0218tiin\u021be \u0219i Tehnologie \u201eGeorge Emil Palade\u201d din T\u00e2rgu Mure\u0219","ror":"https://ror.org/03gwbzf29","country_code":"RO","type":"education","lineage":["https://openalex.org/I3125032317"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Roland Bolboaca","raw_affiliation_strings":["&#x201C;George Emil Palade&#x201D; University of Medicine,Pharmacy, Science and Technology of Targu Mures,Department of Engineering and Engineering Technology,Targu Mures,Romania"],"affiliations":[{"raw_affiliation_string":"&#x201C;George Emil Palade&#x201D; University of Medicine,Pharmacy, Science and Technology of Targu Mures,Department of Engineering and Engineering Technology,Targu Mures,Romania","institution_ids":["https://openalex.org/I3125032317"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044480752","display_name":"Adrian-Silviu Roman","orcid":"https://orcid.org/0000-0002-2246-3415"},"institutions":[{"id":"https://openalex.org/I3125032317","display_name":"Universitatea de Medicin\u0103, Farmacie, \u0218tiin\u021be \u0219i Tehnologie \u201eGeorge Emil Palade\u201d din T\u00e2rgu Mure\u0219","ror":"https://ror.org/03gwbzf29","country_code":"RO","type":"education","lineage":["https://openalex.org/I3125032317"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Adrian-Silviu Roman","raw_affiliation_strings":["&#x201C;George Emil Palade&#x201D; University of Medicine,Pharmacy, Science and Technology of Targu Mures,Department of Engineering and Engineering Technology,Targu Mures,Romania"],"affiliations":[{"raw_affiliation_string":"&#x201C;George Emil Palade&#x201D; University of Medicine,Pharmacy, Science and Technology of Targu Mures,Department of Engineering and Engineering Technology,Targu Mures,Romania","institution_ids":["https://openalex.org/I3125032317"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028369867","display_name":"Virgil Dobrot\u0103","orcid":"https://orcid.org/0000-0001-5917-4003"},"institutions":[{"id":"https://openalex.org/I158333966","display_name":"Technical University of Cluj-Napoca","ror":"https://ror.org/03r8nwp71","country_code":"RO","type":"education","lineage":["https://openalex.org/I158333966"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Virgil Dobrota","raw_affiliation_strings":["Technical University of Cluj-Napoca,Communications Department,Cluj-Napoca,Romania"],"affiliations":[{"raw_affiliation_string":"Technical University of Cluj-Napoca,Communications Department,Cluj-Napoca,Romania","institution_ids":["https://openalex.org/I158333966"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5115513799"],"corresponding_institution_ids":["https://openalex.org/I158333966"],"apc_list":null,"apc_paid":null,"fwci":1.0958,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.80477399,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.983299970626831,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.983299970626831,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.8251410722732544},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.785772442817688},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.643130362033844},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.5337311625480652},{"id":"https://openalex.org/keywords/anomaly-based-intrusion-detection-system","display_name":"Anomaly-based intrusion detection system","score":0.5335109233856201},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.43531137704849243},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.4129173457622528},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3311138451099396},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2475970983505249}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.8251410722732544},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.785772442817688},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.643130362033844},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.5337311625480652},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.5335109233856201},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.43531137704849243},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.4129173457622528},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3311138451099396},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2475970983505249},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/iccp63557.2024.10793023","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccp63557.2024.10793023","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 20th International Conference on Intelligent Computer Communication and Processing (ICCP)","raw_type":"proceedings-article"},{"id":"pmh:oai:aaltodoc.aalto.fi:123456789/142802","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ICCP63557.2024.10793023","pdf_url":null,"source":{"id":"https://openalex.org/S4306401663","display_name":"Aaltodoc (Aalto University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I9927081","host_organization_name":"Aalto University","host_organization_lineage":["https://openalex.org/I9927081"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"acceptedVersion"}],"best_oa_location":{"id":"pmh:oai:aaltodoc.aalto.fi:123456789/142802","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ICCP63557.2024.10793023","pdf_url":null,"source":{"id":"https://openalex.org/S4306401663","display_name":"Aaltodoc (Aalto University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I9927081","host_organization_name":"Aalto University","host_organization_lineage":["https://openalex.org/I9927081"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"acceptedVersion"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","display_name":"Climate action","score":0.6399999856948853}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W28412257","https://openalex.org/W1977366836","https://openalex.org/W2043488438","https://openalex.org/W2085196969","https://openalex.org/W2099940443","https://openalex.org/W2166058639","https://openalex.org/W2167287136","https://openalex.org/W2296509296","https://openalex.org/W2626468835","https://openalex.org/W2789253769","https://openalex.org/W2892556724","https://openalex.org/W2963748489","https://openalex.org/W2986055611","https://openalex.org/W2995048048","https://openalex.org/W3002193070","https://openalex.org/W3006206203","https://openalex.org/W3109474479","https://openalex.org/W3144192494","https://openalex.org/W4233056867","https://openalex.org/W4319264752","https://openalex.org/W4321497442","https://openalex.org/W4390474892","https://openalex.org/W4400277594"],"related_works":["https://openalex.org/W2357468538","https://openalex.org/W2362800560","https://openalex.org/W4300599821","https://openalex.org/W2355007334","https://openalex.org/W1496376327","https://openalex.org/W2383127772","https://openalex.org/W2348767155","https://openalex.org/W2374614522","https://openalex.org/W2061466315","https://openalex.org/W2355532322"],"abstract_inverted_index":{"In":[0],"the":[1,22,81,92,103,113,149,152,157,171,184,200,209,219],"current":[2],"digital":[3],"landscape,":[4],"protecting":[5],"networks":[6],"against":[7,193],"malicious":[8],"activities":[9],"is":[10],"a":[11,70,75,176],"critical":[12],"challenge.":[13],"Network":[14],"Intrusion":[15],"Detection":[16],"Systems":[17],"(NIDS)":[18],"are":[19],"vital":[20],"as":[21,74,183,188],"first":[23],"line":[24],"of":[25,151,162,203,211],"defense,":[26],"continuously":[27],"monitoring":[28],"network":[29,87,223],"traffic":[30],"to":[31,47,85,156,167,199],"detect":[32],"and":[33,44,90,96,98,120,126,132,143,164],"prevent":[34],"potential":[35,220],"attacks":[36],"in":[37,160,215],"real-time.":[38],"As":[39],"cyber-attacks":[40],"get":[41],"more":[42,45,55,204],"complex":[43],"similar":[46],"normal":[48],"traffic,":[49,88],"robust":[50],"NIDS":[51,67,206],"solutions":[52],"have":[53],"become":[54],"crucial":[56],"than":[57],"ever.":[58],"This":[59,196],"paper":[60],"proposes":[61],"an":[62,65,189],"architecture":[63],"for":[64,102,112,139,221],"anomaly-based":[66],"that":[68,175],"has":[69],"Multi-Layer":[71],"Perceptron":[72],"(MLP)":[73],"binary":[76],"classifier.":[77],"The":[78,128,145],"system":[79],"employs":[80],"Cisco":[82],"TRex":[83],"generator":[84],"simulate":[86],"capturing":[89],"analyzing":[91],"data":[93],"using":[94,105],"tcpdump":[95],"Zeek,":[97],"lastly":[99],"preprocessing":[100],"it":[101],"MLP":[104,185],"Python":[106],"scripts.":[107],"Three":[108],"algorithms":[109],"were":[110,130],"evaluated":[111],"classification":[114],"task:":[115],"Isolation":[116],"Forest":[117],"(IF),":[118],"MLP,":[119],"Autoencoder,":[121],"all":[122],"implemented":[123],"with":[124],"TensorFlow":[125],"Keras.":[127],"models":[129],"trained":[131],"tested":[133],"on":[134],"two":[135],"widely":[136],"recognized":[137],"datasets":[138],"anomaly":[140,216],"detection,":[141,217],"KDDCUP99":[142,158],"UNSW-NB15.":[144],"experimental":[146],"results":[147,172],"show":[148],"superiority":[150],"UNSW-NB15":[153],"dataset":[154],"compared":[155],"one":[159],"terms":[161],"complexity":[163],"its":[165],"likeness":[166],"real-world":[168],"traffic.":[169],"Moreover,":[170],"also":[173],"prove":[174],"simple":[177],"Deep":[178],"Learning":[179],"(DL)":[180],"algorithm":[181],"such":[182],"can":[186],"serve":[187],"effective":[190,205],"first-line":[191],"defense":[192],"cyber":[194],"threats.":[195],"study":[197],"contributes":[198],"ongoing":[201],"development":[202],"by":[207],"exploring":[208],"application":[210],"machine":[212],"learning":[213],"techniques":[214],"offering":[218],"enhancing":[222],"security.":[224]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
