{"id":"https://openalex.org/W4381734333","doi":"https://doi.org/10.1109/noms56928.2023.10154343","title":"FSA-IDS: A Flow-based Self-Active Intrusion Detection System","display_name":"FSA-IDS: A Flow-based Self-Active Intrusion Detection System","publication_year":2023,"publication_date":"2023-05-08","ids":{"openalex":"https://openalex.org/W4381734333","doi":"https://doi.org/10.1109/noms56928.2023.10154343"},"language":"en","primary_location":{"id":"doi:10.1109/noms56928.2023.10154343","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/noms56928.2023.10154343","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013756259","display_name":"Mehrdad Hajizadeh","orcid":null},"institutions":[{"id":"https://openalex.org/I2610724","display_name":"Chemnitz University of Technology","ror":"https://ror.org/00a208s56","country_code":"DE","type":"education","lineage":["https://openalex.org/I2610724"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Mehrdad Hajizadeh","raw_affiliation_strings":["Technische Universit&#x00E4;t Chemnitz,Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit&#x00E4;t Chemnitz,Germany","institution_ids":["https://openalex.org/I2610724"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102526793","display_name":"Sudip Barua","orcid":null},"institutions":[{"id":"https://openalex.org/I2610724","display_name":"Chemnitz University of Technology","ror":"https://ror.org/00a208s56","country_code":"DE","type":"education","lineage":["https://openalex.org/I2610724"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Sudip Barua","raw_affiliation_strings":["Technische Universit&#x00E4;t Chemnitz,Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit&#x00E4;t Chemnitz,Germany","institution_ids":["https://openalex.org/I2610724"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070682118","display_name":"Pegah Golchin","orcid":"https://orcid.org/0000-0002-8686-113X"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Pegah Golchin","raw_affiliation_strings":["Technische Universit&#x00E4;t Darmstadt,Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit&#x00E4;t Darmstadt,Germany","institution_ids":["https://openalex.org/I31512782"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5013756259"],"corresponding_institution_ids":["https://openalex.org/I2610724"],"apc_list":null,"apc_paid":null,"fwci":2.0091,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.87063308,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"32","issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7983193397521973},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7965326309204102},{"id":"https://openalex.org/keywords/benchmarking","display_name":"Benchmarking","score":0.5978670120239258},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5293736457824707},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.47270748019218445},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4358806610107422},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.43494290113449097},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.43416935205459595},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.41037318110466003},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.37023788690567017},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2926912307739258},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.14010444283485413},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.09418827295303345}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7983193397521973},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7965326309204102},{"id":"https://openalex.org/C86251818","wikidata":"https://www.wikidata.org/wiki/Q816754","display_name":"Benchmarking","level":2,"score":0.5978670120239258},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5293736457824707},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.47270748019218445},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4358806610107422},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.43494290113449097},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.43416935205459595},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.41037318110466003},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.37023788690567017},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2926912307739258},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.14010444283485413},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.09418827295303345},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/noms56928.2023.10154343","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/noms56928.2023.10154343","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"NOMS 2023-2023 IEEE/IFIP Network Operations and Management Symposium","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W151377110","https://openalex.org/W2077488147","https://openalex.org/W2092126505","https://openalex.org/W2113592823","https://openalex.org/W2115627867","https://openalex.org/W2278186031","https://openalex.org/W2296719434","https://openalex.org/W2300445845","https://openalex.org/W2330735706","https://openalex.org/W2408186052","https://openalex.org/W2613731841","https://openalex.org/W2620580412","https://openalex.org/W2739052910","https://openalex.org/W2789828921","https://openalex.org/W2793130454","https://openalex.org/W2908954810","https://openalex.org/W2946254251","https://openalex.org/W2947883180","https://openalex.org/W2948145720","https://openalex.org/W2966907664","https://openalex.org/W2971624397","https://openalex.org/W2978426779","https://openalex.org/W2989964158","https://openalex.org/W3015308630","https://openalex.org/W3042565595","https://openalex.org/W3047754579","https://openalex.org/W3126220825","https://openalex.org/W3129339224","https://openalex.org/W3179338414","https://openalex.org/W3197004086","https://openalex.org/W3197584391","https://openalex.org/W3205184492","https://openalex.org/W3206325220","https://openalex.org/W4210995860","https://openalex.org/W4254182148","https://openalex.org/W4281719610","https://openalex.org/W4282943344","https://openalex.org/W6676772307","https://openalex.org/W6760652553","https://openalex.org/W6762913911"],"related_works":["https://openalex.org/W4238897586","https://openalex.org/W435179959","https://openalex.org/W2619091065","https://openalex.org/W2059640416","https://openalex.org/W1490753184","https://openalex.org/W2284465472","https://openalex.org/W2291782699","https://openalex.org/W1993948687","https://openalex.org/W2000169967","https://openalex.org/W2112883198"],"abstract_inverted_index":{"As":[0],"the":[1,44,63,85,129,141,159],"first":[2],"line":[3],"of":[4,68,76,188],"defense,":[5],"an":[6,136],"Intrusion":[7],"Detection":[8],"System":[9],"(IDS)":[10],"plays":[11],"a":[12,111,118,152,185],"crucial":[13],"role":[14],"in":[15,52],"early":[16],"cyber":[17,55,142],"threat":[18],"detection":[19,35,144],"and":[20,42,83,87,104,133,163,190],"successful":[21],"mitigation":[22],"operations.":[23],"IDSs":[24,48],"are":[25],"increasingly":[26],"adopting":[27,121],"machine":[28],"learning":[29,38,123],"(ML)-based":[30],"methods":[31],"to":[32,127,134,169,172],"enhance":[33],"their":[34,57],"engines":[36],"by":[37,167],"network":[39,93,181,192],"traffic":[40,71,94,182,193],"characteristics":[41],"improving":[43],"scalability.":[45],"Although":[46],"ML-based":[47],"have":[49],"proven":[50],"effective":[51,137],"detecting":[53],"diverse":[54],"attacks,":[56],"success":[58],"is":[59,97,105,117],"highly":[60],"dependent":[61],"on":[62],"input":[64],"data.":[65],"The":[66],"scarcity":[67],"labeled":[69],"benign/malicious":[70],"samples":[72],"affects":[73],"various":[74,173],"aspects":[75],"ML":[77],"model":[78,89],"operations,":[79],"e.g.,":[80],"benchmarking,":[81],"explaining":[82],"interpreting":[84],"results,":[86],"continuous":[88],"adaptation/improvement.":[90],"In":[91],"addition,":[92],"sample":[95],"labeling":[96,130,160],"costly,":[98],"complex,":[99],"requires":[100],"massive":[101],"human":[102],"effort,":[103],"sometimes":[106],"even":[107],"impossible.This":[108],"paper":[109],"introduces":[110],"Flow-based":[112],"Self-Active":[113],"IDS":[114],"(FSA-IDS),":[115],"which":[116],"novel":[119,153],"framework":[120],"active":[122],"(AL)":[124],"into":[125],"self-learning":[126],"reduce":[128],"cost":[131],"significantly":[132],"realize":[135],"IDS.":[138],"FSA-IDS":[139,177],"improves":[140],"attack":[143],"performance":[145],"while":[146],"reducing":[147],"false":[148],"alarms.":[149],"It":[150],"employs":[151],"cluster-based":[154],"sampling":[155],"approach":[156],"that":[157],"facilitates":[158],"automation":[161],"process":[162],"minimizes":[164],"expert":[165],"involvement":[166],"up":[168],"47%":[170],"compared":[171],"baselines.":[174],"We":[175],"evaluate":[176],"using":[178],"two":[179],"real-world":[180],"datasets":[183],"comprising":[184],"wide":[186],"range":[187],"benign":[189],"malicious":[191],"samples.":[194]},"counts_by_year":[{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":1}],"updated_date":"2025-12-24T23:09:58.560324","created_date":"2025-10-10T00:00:00"}
