{"id":"https://openalex.org/W4281721559","doi":"https://doi.org/10.1109/noms54207.2022.9789927","title":"Network-based Intrusion Detection: A One-class Classification Approach","display_name":"Network-based Intrusion Detection: A One-class Classification Approach","publication_year":2022,"publication_date":"2022-04-25","ids":{"openalex":"https://openalex.org/W4281721559","doi":"https://doi.org/10.1109/noms54207.2022.9789927"},"language":"en","primary_location":{"id":"doi:10.1109/noms54207.2022.9789927","is_oa":false,"landing_page_url":"https://doi.org/10.1109/noms54207.2022.9789927","pdf_url":null,"source":{"id":"https://openalex.org/S4363605650","display_name":"NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070831714","display_name":"Paulina Arregoc\u00e9s","orcid":null},"institutions":[{"id":"https://openalex.org/I36243813","display_name":"Universidad Nacional de Colombia","ror":"https://ror.org/059yx9a68","country_code":"CO","type":"education","lineage":["https://openalex.org/I36243813"]}],"countries":["CO"],"is_corresponding":true,"raw_author_name":"Paulina Arregoces","raw_affiliation_strings":["Universidad Nacional de Colombia,Faculty of Engineering,Medell&#x00ED;n,Colombia"],"affiliations":[{"raw_affiliation_string":"Universidad Nacional de Colombia,Faculty of Engineering,Medell&#x00ED;n,Colombia","institution_ids":["https://openalex.org/I36243813"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080810409","display_name":"Jaime Vergara","orcid":"https://orcid.org/0000-0002-3590-1795"},"institutions":[{"id":"https://openalex.org/I35961687","display_name":"Universidad de Antioquia","ror":"https://ror.org/03bp5hc83","country_code":"CO","type":"education","lineage":["https://openalex.org/I35961687"]}],"countries":["CO"],"is_corresponding":false,"raw_author_name":"Jaime Vergara","raw_affiliation_strings":["Universidad de Antioquia,Faculty of Engineering,Medell&#x00ED;n,Colombia"],"affiliations":[{"raw_affiliation_string":"Universidad de Antioquia,Faculty of Engineering,Medell&#x00ED;n,Colombia","institution_ids":["https://openalex.org/I35961687"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060312365","display_name":"Sergio Armando Guti\u00e9rrez","orcid":"https://orcid.org/0000-0003-2880-4601"},"institutions":[{"id":"https://openalex.org/I4210150825","display_name":"Universidad Aut\u00f3noma Latinoamericana","ror":"https://ror.org/05tkb8v92","country_code":"CO","type":"education","lineage":["https://openalex.org/I4210150825"]}],"countries":["CO"],"is_corresponding":false,"raw_author_name":"Sergio Armando Gutierrez","raw_affiliation_strings":["Universidad Aut&#x00F3;noma Latinoamericana,Faculty of Engineering,Medell&#x00ED;n,Colombia"],"affiliations":[{"raw_affiliation_string":"Universidad Aut&#x00F3;noma Latinoamericana,Faculty of Engineering,Medell&#x00ED;n,Colombia","institution_ids":["https://openalex.org/I4210150825"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072727038","display_name":"Juan Felipe Botero","orcid":"https://orcid.org/0000-0002-7072-8924"},"institutions":[{"id":"https://openalex.org/I35961687","display_name":"Universidad de Antioquia","ror":"https://ror.org/03bp5hc83","country_code":"CO","type":"education","lineage":["https://openalex.org/I35961687"]}],"countries":["CO"],"is_corresponding":false,"raw_author_name":"Juan Felipe Botero","raw_affiliation_strings":["Universidad de Antioquia,Faculty of Engineering,Medell&#x00ED;n,Colombia"],"affiliations":[{"raw_affiliation_string":"Universidad de Antioquia,Faculty of Engineering,Medell&#x00ED;n,Colombia","institution_ids":["https://openalex.org/I35961687"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5070831714"],"corresponding_institution_ids":["https://openalex.org/I36243813"],"apc_list":null,"apc_paid":null,"fwci":1.5119,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.80533927,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.8658903241157532},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8253294825553894},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6966413259506226},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.6944797039031982},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6707944273948669},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.6523936986923218},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5950412750244141},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4890156686306},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4804082214832306},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4022263288497925},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.07422277331352234}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.8658903241157532},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8253294825553894},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6966413259506226},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.6944797039031982},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6707944273948669},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.6523936986923218},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5950412750244141},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4890156686306},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4804082214832306},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4022263288497925},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.07422277331352234},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/noms54207.2022.9789927","is_oa":false,"landing_page_url":"https://doi.org/10.1109/noms54207.2022.9789927","pdf_url":null,"source":{"id":"https://openalex.org/S4363605650","display_name":"NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/3","display_name":"Good health and well-being","score":0.47999998927116394}],"awards":[],"funders":[{"id":"https://openalex.org/F4320314235","display_name":"TED","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W1823976324","https://openalex.org/W1966809779","https://openalex.org/W2125835628","https://openalex.org/W2159637520","https://openalex.org/W2165250079","https://openalex.org/W2167240430","https://openalex.org/W2279785795","https://openalex.org/W2296509296","https://openalex.org/W2300162798","https://openalex.org/W2570296101","https://openalex.org/W2767514946","https://openalex.org/W2783796368","https://openalex.org/W2789828921","https://openalex.org/W2797915143","https://openalex.org/W2805410182","https://openalex.org/W2899638272","https://openalex.org/W2934386458","https://openalex.org/W2944643572","https://openalex.org/W2950204666","https://openalex.org/W2958285686","https://openalex.org/W2973032842","https://openalex.org/W2979888616","https://openalex.org/W2979925643","https://openalex.org/W2982676361","https://openalex.org/W3004752684","https://openalex.org/W3008764542","https://openalex.org/W3100068262","https://openalex.org/W3104917574","https://openalex.org/W3119351666","https://openalex.org/W3126698296","https://openalex.org/W3130980823","https://openalex.org/W3168793901","https://openalex.org/W4254182148","https://openalex.org/W6638684992","https://openalex.org/W6695404774","https://openalex.org/W6697668916","https://openalex.org/W6750357693","https://openalex.org/W6761637733"],"related_works":["https://openalex.org/W2357468538","https://openalex.org/W1577110157","https://openalex.org/W2355007334","https://openalex.org/W2390009783","https://openalex.org/W4254602698","https://openalex.org/W2394461323","https://openalex.org/W2349441905","https://openalex.org/W2361044160","https://openalex.org/W3120792425","https://openalex.org/W2354233396"],"abstract_inverted_index":{"The":[0],"adoption":[1],"of":[2,9,16,38,47,62,81,91,110,132],"new":[3,33],"technologies":[4],"and":[5],"the":[6,14,36,60,63,79,85,89,99,108,111,119,130,144,157],"increasing":[7],"amount":[8],"connected":[10],"devices":[11],"have":[12,58],"drawn":[13,59],"attention":[15,61],"cyber-attackers,":[17],"whose":[18],"intentions":[19],"are":[20,44,122,166],"oriented":[21],"to":[22,98,117,146,169],"disturb":[23],"computational":[24],"services":[25],"or":[26],"even":[27],"steal":[28],"critical":[29,76],"information.":[30],"This":[31],"poses":[32],"challenges":[34],"in":[35,45,78],"design":[37,80],"Intrusion":[39],"Detection":[40],"Systems":[41],"(IDS),":[42],"which":[43],"charge":[46],"detecting":[48],"threats.":[49],"When":[50],"dealing":[51],"with":[52],"unknown":[53],"cyber-attacks,":[54],"anomaly-based":[55],"IDS":[56],"(AIDS)":[57],"research":[64],"community,":[65],"since":[66],"they":[67],"could":[68],"detect,":[69],"for":[70],"instance,":[71],"zero-day":[72],"attacks.":[73],"A":[74],"recurrent":[75],"aspect":[77],"these":[82],"systems":[83],"is":[84],"training":[86,94],"procedures.":[87],"In":[88,125],"context":[90],"attack":[92,172],"detection,":[93],"involves":[95],"difficulties":[96],"due":[97],"imbalanced":[100],"nature":[101],"(one":[102],"class":[103,120],"much":[104],"more":[105],"represented":[106],"than":[107],"other)":[109],"associated":[112],"data":[113],"sets.":[114],"Hence,":[115],"approaches":[116],"address":[118],"imbalance":[121],"always":[123],"relevant.":[124],"this":[126,153],"work,":[127],"we":[128,155],"present":[129],"evaluation":[131],"different":[133],"machine":[134],"learning":[135],"(ML)":[136],"algorithms,":[137],"known":[138],"as":[139],"one-class":[140],"classifiers,":[141],"that":[142,165],"hold":[143],"potential":[145],"be":[147],"implemented":[148],"over":[149],"an":[150,171],"AIDS.":[151],"For":[152],"task,":[154],"used":[156,168],"UNSW-NB15,":[158],"comparing":[159],"their":[160],"performance":[161],"using":[162],"pertinent":[163],"metrics":[164],"normally":[167],"assess":[170],"detection":[173],"algorithm.":[174]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
