{"id":"https://openalex.org/W3006124438","doi":"https://doi.org/10.1109/lcn44214.2019.8990890","title":"A Neural Attention Model for Real-Time Network Intrusion Detection","display_name":"A Neural Attention Model for Real-Time Network Intrusion Detection","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W3006124438","doi":"https://doi.org/10.1109/lcn44214.2019.8990890","mag":"3006124438"},"language":"en","primary_location":{"id":"doi:10.1109/lcn44214.2019.8990890","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcn44214.2019.8990890","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 44th Conference on Local Computer Networks (LCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019157039","display_name":"Mengxuan Tan","orcid":null},"institutions":[{"id":"https://openalex.org/I152815399","display_name":"Singapore University of Technology and Design","ror":"https://ror.org/05j6fvn87","country_code":"SG","type":"education","lineage":["https://openalex.org/I152815399"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Mengxuan Tan","raw_affiliation_strings":["Singapore University of Technology and Design,ST Engineering-SUTD Cyber Security Laboratory,Singapore","ST Engineering-SUTD Cyber Security Laboratory, Singapore University of Technology and Design, Singapore"],"affiliations":[{"raw_affiliation_string":"Singapore University of Technology and Design,ST Engineering-SUTD Cyber Security Laboratory,Singapore","institution_ids":["https://openalex.org/I152815399"]},{"raw_affiliation_string":"ST Engineering-SUTD Cyber Security Laboratory, Singapore University of Technology and Design, Singapore","institution_ids":["https://openalex.org/I152815399"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072710110","display_name":"Alfonso Iacovazzi","orcid":"https://orcid.org/0000-0001-6116-164X"},"institutions":[{"id":"https://openalex.org/I152815399","display_name":"Singapore University of Technology and Design","ror":"https://ror.org/05j6fvn87","country_code":"SG","type":"education","lineage":["https://openalex.org/I152815399"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Alfonso Iacovazzi","raw_affiliation_strings":["Singapore University of Technology and Design,ST Engineering-SUTD Cyber Security Laboratory,Singapore","ST Engineering-SUTD Cyber Security Laboratory, Singapore University of Technology and Design, Singapore"],"affiliations":[{"raw_affiliation_string":"Singapore University of Technology and Design,ST Engineering-SUTD Cyber Security Laboratory,Singapore","institution_ids":["https://openalex.org/I152815399"]},{"raw_affiliation_string":"ST Engineering-SUTD Cyber Security Laboratory, Singapore University of Technology and Design, Singapore","institution_ids":["https://openalex.org/I152815399"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057453537","display_name":"Ngai\u2010Man Cheung","orcid":"https://orcid.org/0000-0003-0135-3791"},"institutions":[{"id":"https://openalex.org/I152815399","display_name":"Singapore University of Technology and Design","ror":"https://ror.org/05j6fvn87","country_code":"SG","type":"education","lineage":["https://openalex.org/I152815399"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Ngai-Man Man Cheung","raw_affiliation_strings":["Singapore University of Technology and Design,ST Engineering-SUTD Cyber Security Laboratory,Singapore","ST Engineering-SUTD Cyber Security Laboratory, Singapore University of Technology and Design, Singapore"],"affiliations":[{"raw_affiliation_string":"Singapore University of Technology and Design,ST Engineering-SUTD Cyber Security Laboratory,Singapore","institution_ids":["https://openalex.org/I152815399"]},{"raw_affiliation_string":"ST Engineering-SUTD Cyber Security Laboratory, Singapore University of Technology and Design, Singapore","institution_ids":["https://openalex.org/I152815399"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072913672","display_name":"Yuval Elovici","orcid":"https://orcid.org/0000-0002-9641-128X"},"institutions":[{"id":"https://openalex.org/I152815399","display_name":"Singapore University of Technology and Design","ror":"https://ror.org/05j6fvn87","country_code":"SG","type":"education","lineage":["https://openalex.org/I152815399"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Yuval Elovici","raw_affiliation_strings":["Singapore University of Technology and Design,ST Engineering-SUTD Cyber Security Laboratory,Singapore","ST Engineering-SUTD Cyber Security Laboratory, Singapore University of Technology and Design, Singapore"],"affiliations":[{"raw_affiliation_string":"Singapore University of Technology and Design,ST Engineering-SUTD Cyber Security Laboratory,Singapore","institution_ids":["https://openalex.org/I152815399"]},{"raw_affiliation_string":"ST Engineering-SUTD Cyber Security Laboratory, Singapore University of Technology and Design, Singapore","institution_ids":["https://openalex.org/I152815399"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5019157039"],"corresponding_institution_ids":["https://openalex.org/I152815399"],"apc_list":null,"apc_paid":null,"fwci":2.4074,"has_fulltext":false,"cited_by_count":40,"citation_normalized_percentile":{"value":0.90198899,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"291","last_page":"299"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8510957956314087},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7401033639907837},{"id":"https://openalex.org/keywords/conditional-random-field","display_name":"Conditional random field","score":0.6952604055404663},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5945689678192139},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5348820686340332},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5321210026741028},{"id":"https://openalex.org/keywords/transformer","display_name":"Transformer","score":0.4963138699531555},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4854062497615814},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.46694982051849365},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.16049998998641968},{"id":"https://openalex.org/keywords/voltage","display_name":"Voltage","score":0.10159045457839966}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8510957956314087},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7401033639907837},{"id":"https://openalex.org/C152565575","wikidata":"https://www.wikidata.org/wiki/Q1124538","display_name":"Conditional random field","level":2,"score":0.6952604055404663},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5945689678192139},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5348820686340332},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5321210026741028},{"id":"https://openalex.org/C66322947","wikidata":"https://www.wikidata.org/wiki/Q11658","display_name":"Transformer","level":3,"score":0.4963138699531555},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4854062497615814},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.46694982051849365},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.16049998998641968},{"id":"https://openalex.org/C165801399","wikidata":"https://www.wikidata.org/wiki/Q25428","display_name":"Voltage","level":2,"score":0.10159045457839966},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lcn44214.2019.8990890","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcn44214.2019.8990890","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 44th Conference on Local Computer Networks (LCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44999998807907104,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":62,"referenced_works":["https://openalex.org/W1522301498","https://openalex.org/W1544101352","https://openalex.org/W1576154654","https://openalex.org/W1684452600","https://openalex.org/W1815076433","https://openalex.org/W1975415766","https://openalex.org/W1985987493","https://openalex.org/W2011778831","https://openalex.org/W2015401767","https://openalex.org/W2064675550","https://openalex.org/W2095705004","https://openalex.org/W2095844239","https://openalex.org/W2101234009","https://openalex.org/W2133564696","https://openalex.org/W2141099517","https://openalex.org/W2142889610","https://openalex.org/W2147880316","https://openalex.org/W2156876426","https://openalex.org/W2194775991","https://openalex.org/W2399941526","https://openalex.org/W2402144811","https://openalex.org/W2470673105","https://openalex.org/W2576897537","https://openalex.org/W2605203995","https://openalex.org/W2613904329","https://openalex.org/W2755146079","https://openalex.org/W2756489700","https://openalex.org/W2762776925","https://openalex.org/W2775103799","https://openalex.org/W2789828921","https://openalex.org/W2886249624","https://openalex.org/W2895233886","https://openalex.org/W2901695067","https://openalex.org/W2907837217","https://openalex.org/W2949847915","https://openalex.org/W2953384591","https://openalex.org/W2963403868","https://openalex.org/W2964121744","https://openalex.org/W2964265128","https://openalex.org/W2964304846","https://openalex.org/W2964308564","https://openalex.org/W3016607949","https://openalex.org/W3102259344","https://openalex.org/W3105682467","https://openalex.org/W4245460974","https://openalex.org/W4385245566","https://openalex.org/W6631190155","https://openalex.org/W6638545294","https://openalex.org/W6654147000","https://openalex.org/W6674330103","https://openalex.org/W6674793120","https://openalex.org/W6675354045","https://openalex.org/W6679434410","https://openalex.org/W6682082992","https://openalex.org/W6683161558","https://openalex.org/W6713134421","https://openalex.org/W6732343696","https://openalex.org/W6732958910","https://openalex.org/W6736198902","https://openalex.org/W6737778391","https://openalex.org/W6739901393","https://openalex.org/W6744671649"],"related_works":["https://openalex.org/W2356597680","https://openalex.org/W2093471820","https://openalex.org/W50079190","https://openalex.org/W2114846443","https://openalex.org/W3102147106","https://openalex.org/W2111726165","https://openalex.org/W2347460059","https://openalex.org/W1984858032","https://openalex.org/W2616891703","https://openalex.org/W2055466819"],"abstract_inverted_index":{"The":[0,93],"diversity":[1],"and":[2,108,139,148,167],"ever-evolving":[3],"nature":[4],"of":[5,23,44,100,131,164,190,193],"network":[6,126,132],"intrusion":[7],"attacks":[8],"has":[9,28,58,105],"made":[10],"defense":[11],"a":[12,33,65,97,119,123,188],"real":[13],"challenge":[14],"for":[15,83,146],"security":[16],"practitioners.":[17],"Recent":[18],"research":[19],"in":[20,110,162],"the":[21,56,70,101,111,136,154,159,183,191],"domain":[22],"Network-based":[24],"Intrusion":[25],"Detection":[26],"System":[27],"mainly":[29],"focused":[30],"on":[31,69,118],"adopting":[32],"flow-based":[34],"approach":[35],"when":[36],"extracting":[37],"features":[38],"from":[39,122],"raw":[40],"packets.":[41],"One":[42],"drawback":[43],"this":[45,61],"is":[46,96,178],"that":[47,153,175],"attack":[48,85],"detection":[49,86],"can":[50,80],"only":[51],"be":[52,81],"carried":[53],"out":[54],"after":[55],"flow":[57],"ended.":[59],"In":[60,171],"work,":[62],"we":[63,173],"present":[64],"new":[66],"technique":[67,79],"based":[68],"neural":[71],"attention":[72],"mechanism;":[73],"unlike":[74],"many":[75],"existing":[76],"solutions,":[77],"our":[78,149,176],"applied":[82],"real-time":[84],"since":[87],"it":[88],"uses":[89],"time":[90],"slot-based":[91],"features.":[92],"proposed":[94,107,155],"solution":[95,156,177],"modified":[98],"version":[99],"transformer":[102],"model":[103,186],"which":[104],"been":[106],"used":[109],"language":[112],"translation":[113],"domain.":[114],"We":[115,134],"conduct":[116],"experiments":[117],"dataset":[120],"extracted":[121],"recent":[124],"repository":[125],"traffic":[127],"containing":[128],"several":[129],"kinds":[130],"attack.":[133],"use":[135],"\"bidirectional":[137],"LSTM\"":[138],"\"conditional":[140],"random":[141],"fields\"":[142],"models":[143],"as":[144,187],"baseline":[145],"comparison":[147],"performance":[150],"results":[151],"demonstrate":[152],"significantly":[157],"outperforms":[158],"two":[160],"baselines":[161],"terms":[163],"precision,":[165],"recall,":[166],"false":[168],"positive":[169],"rates.":[170],"addition,":[172],"show":[174],"more":[179],"computationally":[180],"efficient":[181],"than":[182],"bidirectional":[184],"LSTM":[185],"result":[189],"removal":[192],"recurrent":[194],"layers.":[195]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":13},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
