{"id":"https://openalex.org/W2534449777","doi":"https://doi.org/10.1109/iske.2010.5680860","title":"Multiple kernel learning method for network anomaly detection","display_name":"Multiple kernel learning method for network anomaly detection","publication_year":2010,"publication_date":"2010-11-01","ids":{"openalex":"https://openalex.org/W2534449777","doi":"https://doi.org/10.1109/iske.2010.5680860","mag":"2534449777"},"language":"en","primary_location":{"id":"doi:10.1109/iske.2010.5680860","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iske.2010.5680860","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009663195","display_name":"Guanghui Song","orcid":"https://orcid.org/0000-0002-9873-0903"},"institutions":[{"id":"https://openalex.org/I159389169","display_name":"Ningbo University of Technology","ror":"https://ror.org/037dym702","country_code":"CN","type":"education","lineage":["https://openalex.org/I159389169"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guanghui Song","raw_affiliation_strings":["Ningbo Institute of Technology, University of Zhejiang, Ningbo, China"],"affiliations":[{"raw_affiliation_string":"Ningbo Institute of Technology, University of Zhejiang, Ningbo, China","institution_ids":["https://openalex.org/I159389169"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104264228","display_name":"Xiaogang Jin","orcid":null},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaogang Jin","raw_affiliation_strings":["Zhejiang University, Hangzhou, Zhejiang, CN"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou, Zhejiang, CN","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086905984","display_name":"Genlang Chen","orcid":"https://orcid.org/0009-0008-6964-8143"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Genlang Chen","raw_affiliation_strings":["Zhejiang University, Hangzhou, Zhejiang, CN"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou, Zhejiang, CN","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101619290","display_name":"Yan Nie","orcid":"https://orcid.org/0000-0001-6007-3197"},"institutions":[{"id":"https://openalex.org/I109935558","display_name":"Ningbo University","ror":"https://ror.org/03et85d35","country_code":"CN","type":"education","lineage":["https://openalex.org/I109935558"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yan Nie","raw_affiliation_strings":["College of Science and Technology, Ningbo University, Ningbo, China"],"affiliations":[{"raw_affiliation_string":"College of Science and Technology, Ningbo University, Ningbo, China","institution_ids":["https://openalex.org/I109935558"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5009663195"],"corresponding_institution_ids":["https://openalex.org/I159389169"],"apc_list":null,"apc_paid":null,"fwci":0.3561,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.68495002,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"296","last_page":"299"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9725000262260437,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.8146713972091675},{"id":"https://openalex.org/keywords/multiple-kernel-learning","display_name":"Multiple kernel learning","score":0.8022968769073486},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7572116851806641},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.6733263731002808},{"id":"https://openalex.org/keywords/kernel","display_name":"Kernel (algebra)","score":0.6351150274276733},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6331316232681274},{"id":"https://openalex.org/keywords/constant-false-alarm-rate","display_name":"Constant false alarm rate","score":0.6208038926124573},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5439820289611816},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5325345993041992},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.46742743253707886},{"id":"https://openalex.org/keywords/false-positive-rate","display_name":"False positive rate","score":0.4608229398727417},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4015117883682251},{"id":"https://openalex.org/keywords/kernel-method","display_name":"Kernel method","score":0.279057115316391},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11885267496109009}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.8146713972091675},{"id":"https://openalex.org/C2776879701","wikidata":"https://www.wikidata.org/wiki/Q25048660","display_name":"Multiple kernel learning","level":4,"score":0.8022968769073486},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7572116851806641},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.6733263731002808},{"id":"https://openalex.org/C74193536","wikidata":"https://www.wikidata.org/wiki/Q574844","display_name":"Kernel (algebra)","level":2,"score":0.6351150274276733},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6331316232681274},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.6208038926124573},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5439820289611816},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5325345993041992},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.46742743253707886},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.4608229398727417},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4015117883682251},{"id":"https://openalex.org/C122280245","wikidata":"https://www.wikidata.org/wiki/Q620622","display_name":"Kernel method","level":3,"score":0.279057115316391},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11885267496109009},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iske.2010.5680860","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iske.2010.5680860","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.41999998688697815}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1964357740","https://openalex.org/W1982901903","https://openalex.org/W2094243482","https://openalex.org/W2101109743","https://openalex.org/W2126984875","https://openalex.org/W2145295623","https://openalex.org/W2154630456","https://openalex.org/W2155983177","https://openalex.org/W2331064364","https://openalex.org/W2380881055","https://openalex.org/W2806234565","https://openalex.org/W4285719527","https://openalex.org/W6641446668","https://openalex.org/W6678886527","https://openalex.org/W6682657502","https://openalex.org/W6752437253"],"related_works":["https://openalex.org/W2393267898","https://openalex.org/W2369874171","https://openalex.org/W2013909972","https://openalex.org/W2383301100","https://openalex.org/W2392864074","https://openalex.org/W2352639800","https://openalex.org/W2280598164","https://openalex.org/W4388425184","https://openalex.org/W3112374511","https://openalex.org/W2189092700"],"abstract_inverted_index":{"The":[0],"source":[1],"data":[2,126],"of":[3,10,23,35,50,69,106,114],"intrusion":[4,90,124],"detection":[5,46,91,125,135],"system":[6],"(IDS)":[7],"are":[8,85],"characteristic":[9],"heavy-flow,":[11],"high-dimension":[12],"and":[13,32,48,63,137],"nonlinearity.":[14],"A":[15],"frequent":[16],"problem":[17],"in":[18],"IDS":[19,51,75,107],"is":[20,41],"the":[21,24,36,39,45,53,61,67,86,115,120],"choice":[22],"right":[25],"features":[26],"that":[27,129],"give":[28],"rise":[29],"to":[30,43,59,89,144],"compact":[31],"concise":[33],"representations":[34],"network":[37],"data;":[38],"other":[40],"how":[42],"improve":[44,66],"efficiency":[47],"accuracy":[49],"under":[52],"small":[54],"sample":[55],"conditions.":[56],"In":[57],"order":[58],"delete":[60],"redundant":[62],"noisy":[64],"features,":[65],"performance":[68],"IDS,":[70],"we":[71],"present":[72],"an":[73],"efficient":[74],"based":[76],"on":[77,119],"multiple":[78],"kernel":[79,146],"learning":[80],"(MKL)":[81],"method.":[82],"Kernel":[83],"methods":[84,94,131],"effective":[87],"approaches":[88],"problems.":[92],"MKL":[93,130],"combined":[95],"with":[96],"support":[97],"vector":[98],"machines":[99],"(SVMs)":[100],"can":[101],"overcome":[102],"some":[103],"practice":[104],"difficulties":[105],"such":[108],"as":[109],"irregular":[110],"data,":[111],"non-flat":[112],"distribution":[113],"samples,":[116],"etc.":[117],"Experiments":[118],"KDD":[121],"Cup":[122],"(1999)":[123],"set":[127],"show":[128],"have":[132],"a":[133,138],"higher":[134],"rate":[136,142],"lower":[139],"false":[140],"alarm":[141],"compared":[143],"single":[145],"methods.":[147]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
