{"id":"https://openalex.org/W2891652141","doi":"https://doi.org/10.1109/patmos.2018.8463997","title":"Multiclass Network Attack Classifier Using CNN Tuned with Genetic Algorithms","display_name":"Multiclass Network Attack Classifier Using CNN Tuned with Genetic Algorithms","publication_year":2018,"publication_date":"2018-07-01","ids":{"openalex":"https://openalex.org/W2891652141","doi":"https://doi.org/10.1109/patmos.2018.8463997","mag":"2891652141"},"language":"en","primary_location":{"id":"doi:10.1109/patmos.2018.8463997","is_oa":false,"landing_page_url":"https://doi.org/10.1109/patmos.2018.8463997","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 28th International Symposium on Power and Timing Modeling, Optimization and Simulation (PATMOS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048291994","display_name":"Roberto Blanco","orcid":"https://orcid.org/0000-0002-6071-9426"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Roberto Blanco","raw_affiliation_strings":["CCS - Center for Computational Simulation Campus de Montegancedo UPM, Boadilla del Monte, Spain"],"affiliations":[{"raw_affiliation_string":"CCS - Center for Computational Simulation Campus de Montegancedo UPM, Boadilla del Monte, Spain","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072051824","display_name":"Pedro Malag\u00f3n","orcid":"https://orcid.org/0000-0002-8167-508X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Pedro Malagon","raw_affiliation_strings":["CCS - Center for Computational Simulation Campus de Montegancedo UPM, Boadilla del Monte, Spain"],"affiliations":[{"raw_affiliation_string":"CCS - Center for Computational Simulation Campus de Montegancedo UPM, Boadilla del Monte, Spain","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004238468","display_name":"Juan J. Cilla","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Juan J. Cilla","raw_affiliation_strings":["CCS - Center for Computational Simulation Campus de Montegancedo UPM, Boadilla del Monte, Spain"],"affiliations":[{"raw_affiliation_string":"CCS - Center for Computational Simulation Campus de Montegancedo UPM, Boadilla del Monte, Spain","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048400925","display_name":"Jos\u00e9 M. Moya","orcid":"https://orcid.org/0000-0003-4433-2296"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jose M. Moya","raw_affiliation_strings":["CCS - Center for Computational Simulation Campus de Montegancedo UPM, Boadilla del Monte, Spain"],"affiliations":[{"raw_affiliation_string":"CCS - Center for Computational Simulation Campus de Montegancedo UPM, Boadilla del Monte, Spain","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5048291994"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.768,"has_fulltext":false,"cited_by_count":30,"citation_normalized_percentile":{"value":0.91333855,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"177","last_page":"182"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8387312889099121},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.6942342519760132},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.6855324506759644},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6196236610412598},{"id":"https://openalex.org/keywords/multiclass-classification","display_name":"Multiclass classification","score":0.5763198137283325},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5722262859344482},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.548408031463623},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5387841463088989},{"id":"https://openalex.org/keywords/router","display_name":"Router","score":0.53071129322052},{"id":"https://openalex.org/keywords/genetic-algorithm","display_name":"Genetic algorithm","score":0.511405885219574},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4733674228191376},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.41788288950920105},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.22794193029403687},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.13892531394958496}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8387312889099121},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.6942342519760132},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.6855324506759644},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6196236610412598},{"id":"https://openalex.org/C123860398","wikidata":"https://www.wikidata.org/wiki/Q6934605","display_name":"Multiclass classification","level":3,"score":0.5763198137283325},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5722262859344482},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.548408031463623},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5387841463088989},{"id":"https://openalex.org/C2775896111","wikidata":"https://www.wikidata.org/wiki/Q642560","display_name":"Router","level":2,"score":0.53071129322052},{"id":"https://openalex.org/C8880873","wikidata":"https://www.wikidata.org/wiki/Q187787","display_name":"Genetic algorithm","level":2,"score":0.511405885219574},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4733674228191376},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.41788288950920105},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.22794193029403687},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.13892531394958496}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/patmos.2018.8463997","is_oa":false,"landing_page_url":"https://doi.org/10.1109/patmos.2018.8463997","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 28th International Symposium on Power and Timing Modeling, Optimization and Simulation (PATMOS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6399999856948853}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W111228695","https://openalex.org/W1970150595","https://openalex.org/W2053154970","https://openalex.org/W2064236088","https://openalex.org/W2156163116","https://openalex.org/W2187254185","https://openalex.org/W2248387459","https://openalex.org/W2287408518","https://openalex.org/W2296509296","https://openalex.org/W2326324325","https://openalex.org/W2334853001","https://openalex.org/W2399941526","https://openalex.org/W2407877235","https://openalex.org/W2528663298","https://openalex.org/W2560162835","https://openalex.org/W2576897537","https://openalex.org/W2599306383","https://openalex.org/W2600328926","https://openalex.org/W6686842524","https://openalex.org/W6696151112","https://openalex.org/W6697252871","https://openalex.org/W6712640429","https://openalex.org/W6728354244","https://openalex.org/W6732343696"],"related_works":["https://openalex.org/W2122026593","https://openalex.org/W1588358165","https://openalex.org/W2582203024","https://openalex.org/W4237683758","https://openalex.org/W2370711413","https://openalex.org/W2052038519","https://openalex.org/W2375932043","https://openalex.org/W2841075164","https://openalex.org/W1980506749","https://openalex.org/W2136729892"],"abstract_inverted_index":{"Intrusion":[0],"Detection":[1],"Systems":[2],"(IDS)":[3],"are":[4],"implemented":[5],"by":[6,80],"service":[7,24],"providers":[8],"and":[9,14,21,114],"network":[10,59],"operators":[11],"to":[12,17,75,129],"monitor":[13],"detect":[15],"attacks":[16],"protect":[18],"their":[19],"infrastructures":[20],"increase":[22],"the":[23,82,85,89,132,134,144],"availability.":[25],"Many":[26],"machine":[27],"learning":[28],"algorithms,":[29],"standalone":[30],"or":[31],"combined,":[32],"have":[33,98],"been":[34,99],"proposed,":[35],"including":[36],"different":[37,92,103,107,145],"types":[38],"of":[39,84,91,109,154],"Artificial":[40],"Neural":[41,49],"Networks":[42],"(ANN).":[43],"This":[44],"work":[45],"evaluates":[46],"a":[47,57,67,77,148],"Convolutional":[48],"Network":[50],"(CNN),":[51],"created":[52],"for":[53],"image":[54],"classification,":[55],"as":[56],"multiclass":[58],"attack":[60],"classifier":[61,151],"that":[62],"can":[63,140],"be":[64,141],"deployed":[65],"in":[66,127],"router.":[68],"A":[69],"Genetic":[70],"Algorithm":[71],"(GA)":[72],"is":[73],"used":[74],"find":[76],"high-quality":[78],"solution":[79],"rearranging":[81],"layout":[83],"input":[86],"features,":[87],"reducing":[88],"amount":[90],"features":[93],"if":[94],"required.":[95],"The":[96],"tests":[97],"done":[100],"using":[101],"two":[102],"public":[104],"datasets":[105],"with":[106,152],"ratio":[108],"attacks:":[110],"UNSW":[111],"(10":[112],"classes)":[113],"NSL-KDD":[115],"(4":[116],"classes).":[117],"Both":[118],"classifiers":[119],"distinguish":[120],"correctly":[121,130],"normal":[122],"traffic":[123],"from":[124],"attack.":[125],"However,":[126],"order":[128],"classify":[131],"attack,":[133],"latter":[135],"works":[136],"better":[137],"because":[138],"it":[139],"proportionate":[142],"between":[143],"classes,":[146],"obtaining":[147],"cross-validated":[149],"multi-class":[150],"K":[153],"0.95.":[155]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
