{"id":"https://openalex.org/W4313562790","doi":"https://doi.org/10.1109/itnac55475.2022.9998363","title":"SDN Intrusion Detection: An Ensemble Approach to Reducing False Negative Rate for Novel Attacks","display_name":"SDN Intrusion Detection: An Ensemble Approach to Reducing False Negative Rate for Novel Attacks","publication_year":2022,"publication_date":"2022-11-30","ids":{"openalex":"https://openalex.org/W4313562790","doi":"https://doi.org/10.1109/itnac55475.2022.9998363"},"language":"en","primary_location":{"id":"doi:10.1109/itnac55475.2022.9998363","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itnac55475.2022.9998363","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051850848","display_name":"John William O'Meara","orcid":"https://orcid.org/0000-0003-2803-3974"},"institutions":[{"id":"https://openalex.org/I100930933","display_name":"University College Dublin","ror":"https://ror.org/05m7pjf47","country_code":"IE","type":"education","lineage":["https://openalex.org/I100930933"]}],"countries":["IE"],"is_corresponding":true,"raw_author_name":"John William O'Meara","raw_affiliation_strings":["School of Computer Science, University College Dublin,Dublin,Ireland","School of Computer Science, University College Dublin, Dublin, Ireland"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University College Dublin,Dublin,Ireland","institution_ids":["https://openalex.org/I100930933"]},{"raw_affiliation_string":"School of Computer Science, University College Dublin, Dublin, Ireland","institution_ids":["https://openalex.org/I100930933"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088141347","display_name":"Mahmoud Said Elsayed","orcid":"https://orcid.org/0000-0003-2416-7481"},"institutions":[{"id":"https://openalex.org/I100930933","display_name":"University College Dublin","ror":"https://ror.org/05m7pjf47","country_code":"IE","type":"education","lineage":["https://openalex.org/I100930933"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Mahmoud Said Elsayed","raw_affiliation_strings":["School of Computer Science, University College Dublin,Dublin,Ireland","School of Computer Science, University College Dublin, Dublin, Ireland"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University College Dublin,Dublin,Ireland","institution_ids":["https://openalex.org/I100930933"]},{"raw_affiliation_string":"School of Computer Science, University College Dublin, Dublin, Ireland","institution_ids":["https://openalex.org/I100930933"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089955586","display_name":"Takfarinas Saber","orcid":"https://orcid.org/0000-0003-2958-7979"},"institutions":[{"id":"https://openalex.org/I188760350","display_name":"Ollscoil na Gaillimhe \u2013 University of Galway","ror":"https://ror.org/03bea9k73","country_code":"IE","type":"education","lineage":["https://openalex.org/I188760350"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Takfarinas Saber","raw_affiliation_strings":["School of Computer Science, University of Galway,Galway,Ireland","School of Computer Science, University of Galway, Galway, Ireland"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Galway,Galway,Ireland","institution_ids":["https://openalex.org/I188760350"]},{"raw_affiliation_string":"School of Computer Science, University of Galway, Galway, Ireland","institution_ids":["https://openalex.org/I188760350"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022546955","display_name":"Anca Delia Jurcut","orcid":"https://orcid.org/0000-0002-2705-1823"},"institutions":[{"id":"https://openalex.org/I100930933","display_name":"University College Dublin","ror":"https://ror.org/05m7pjf47","country_code":"IE","type":"education","lineage":["https://openalex.org/I100930933"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Anca Delia Jurcut","raw_affiliation_strings":["School of Computer Science, University College Dublin,Dublin,Ireland","School of Computer Science, University College Dublin, Dublin, Ireland"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University College Dublin,Dublin,Ireland","institution_ids":["https://openalex.org/I100930933"]},{"raw_affiliation_string":"School of Computer Science, University College Dublin, Dublin, Ireland","institution_ids":["https://openalex.org/I100930933"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5051850848"],"corresponding_institution_ids":["https://openalex.org/I100930933"],"apc_list":null,"apc_paid":null,"fwci":0.4281,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.65409002,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7619343400001526},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7536295652389526},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6267805099487305},{"id":"https://openalex.org/keywords/false-positive-rate","display_name":"False positive rate","score":0.5732967853546143},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5545750856399536},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5265583992004395},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5043712854385376},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5025620460510254},{"id":"https://openalex.org/keywords/ensemble-forecasting","display_name":"Ensemble forecasting","score":0.47390496730804443},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.47061067819595337},{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.44985637068748474},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.445894718170166},{"id":"https://openalex.org/keywords/range","display_name":"Range (aeronautics)","score":0.44542163610458374},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18742823600769043},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09303390979766846}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7619343400001526},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7536295652389526},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6267805099487305},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.5732967853546143},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5545750856399536},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5265583992004395},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5043712854385376},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5025620460510254},{"id":"https://openalex.org/C119898033","wikidata":"https://www.wikidata.org/wiki/Q3433888","display_name":"Ensemble forecasting","level":2,"score":0.47390496730804443},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.47061067819595337},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.44985637068748474},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.445894718170166},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.44542163610458374},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18742823600769043},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09303390979766846},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/itnac55475.2022.9998363","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itnac55475.2022.9998363","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7316039843","display_name":null,"funder_award_id":"18/CRT/6183","funder_id":"https://openalex.org/F4320320847","funder_display_name":"Science Foundation Ireland"}],"funders":[{"id":"https://openalex.org/F4320320847","display_name":"Science Foundation Ireland","ror":"https://ror.org/0271asj38"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W28412257","https://openalex.org/W1571846953","https://openalex.org/W1985987493","https://openalex.org/W2031163547","https://openalex.org/W2099940443","https://openalex.org/W2110722699","https://openalex.org/W2142889610","https://openalex.org/W2148143831","https://openalex.org/W2296509296","https://openalex.org/W2330219538","https://openalex.org/W2789828921","https://openalex.org/W2898227265","https://openalex.org/W2906883204","https://openalex.org/W2919121218","https://openalex.org/W2950204666","https://openalex.org/W2954879405","https://openalex.org/W3084346886","https://openalex.org/W3085955590","https://openalex.org/W3100068262","https://openalex.org/W3110277274","https://openalex.org/W4212883601","https://openalex.org/W4285274733","https://openalex.org/W4288038854","https://openalex.org/W4399647672","https://openalex.org/W6755712434","https://openalex.org/W6768311046","https://openalex.org/W6869608176"],"related_works":["https://openalex.org/W2794896638","https://openalex.org/W2891633941","https://openalex.org/W4390905871","https://openalex.org/W3202800081","https://openalex.org/W2393267898","https://openalex.org/W3124390867","https://openalex.org/W3101614107","https://openalex.org/W1909207154","https://openalex.org/W3036530763","https://openalex.org/W1514365828"],"abstract_inverted_index":{"Machine":[0],"Learning":[1],"(ML)":[2],"based":[3,101],"Intrusion":[4],"Detection":[5],"Systems":[6],"(IDSs)":[7],"have":[8,78,110,136],"rapidly":[9],"overtaken":[10],"other":[11],"solutions":[12],"for":[13,212],"securing":[14],"networks.":[15,62],"Robust":[16],"and":[17,53,77,158,236],"varied":[18],"datasets":[19,73],"are":[20],"required":[21],"to":[22,27,60,69,81,88,196,219],"train":[23],"the":[24,34,38,79,89,96,105,122,140,162,167,183,231,242,245],"ML":[25,66,100,145],"models":[26,67,209],"perform":[28],"this":[29],"role.":[30],"The":[31,228],"separation":[32],"of":[33,92,98,104,107,117,127,164,169,175,179,186,203,208,225,230,244],"control":[35],"plane":[36,40],"from":[37,75],"forwarding":[39],"within":[41],"Software":[42],"Defined":[43],"Networks":[44],"(SDNs)":[45],"results":[46],"in":[47,49,86,144,154,166],"differences":[48],"network":[50],"traffic":[51,115],"patterns":[52],"different":[54],"potential":[55,80],"intrusion":[56],"vectors":[57],"when":[58],"compared":[59],"traditional":[61],"Consequently,":[63],"SDN":[64,83],"specific":[65,84],"need":[68],"be":[70],"trained":[71,129],"on":[72,161,241],"captured":[74],"SDNs,":[76],"recognise":[82],"attacks":[85,108,177],"addition":[87],"standard":[90,141],"cadre":[91],"exploits.":[93],"When":[94],"assessing":[95],"performance":[97,229,243],"an":[99],"IDS,":[102],"reduction":[103],"incidences":[106],"that":[109,210],"been":[111,137],"misclassified":[112],"as":[113],"normal":[114],"is":[116,131,178,194,217,234],"key":[118,156],"importance.":[119],"Therefore,":[120],"measuring":[121],"False":[123],"Negative":[124],"Rate":[125],"(FNR)":[126],"a":[128,201,238],"model":[130,146,170,199],"crucial":[132],"once":[133],"high":[134,151],"percentiles":[135],"reached":[138],"across":[139,200],"metrics":[142,157],"used":[143],"assessment.":[147],"This":[148],"paper":[149],"establishes":[150],"baseline":[152],"scores":[153],"all":[155],"then":[159],"focuses":[160],"importance":[163,181],"FNR":[165],"assessment":[168],"performance.":[171],"In":[172],"addition,":[173],"identification":[174],"unseen":[176,204],"paramount":[180],"given":[182],"rapid":[184],"evolution":[185],"malicious":[187],"traffic.":[188],"A":[189],"hold":[190],"out":[191],"testing":[192],"strategy":[193],"employed":[195],"assess":[197],"each":[198,213],"range":[202],"attacks.":[205,227],"An":[206],"ensemble":[207,233],"compensate":[211],"other's":[214],"relative":[215],"weaknesses":[216],"proposed":[218,232],"mitigate":[220],"variability,":[221],"thus":[222],"maximising":[223],"detection":[224],"new":[226],"evaluated":[235],"demonstrates":[237],"clear":[239],"improvement":[240],"individual":[246],"component":[247],"models.":[248]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-10T00:00:00"}
