{"id":"https://openalex.org/W2999410069","doi":"https://doi.org/10.1109/rivf48685.2020.9140751","title":"Active Learning for Intrusion Detection Systems","display_name":"Active Learning for Intrusion Detection Systems","publication_year":2020,"publication_date":"2020-07-15","ids":{"openalex":"https://openalex.org/W2999410069","doi":"https://doi.org/10.1109/rivf48685.2020.9140751","mag":"2999410069"},"language":"en","primary_location":{"id":"doi:10.1109/rivf48685.2020.9140751","is_oa":false,"landing_page_url":"https://doi.org/10.1109/rivf48685.2020.9140751","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 RIVF International Conference on Computing and Communication Technologies (RIVF)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://hal.inria.fr/hal-02443773","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076385867","display_name":"Quang-Vinh Dang","orcid":"https://orcid.org/0000-0002-3877-8024"},"institutions":[{"id":"https://openalex.org/I202539009","display_name":"Industrial University of Ho Chi Minh City","ror":"https://ror.org/03mj71j26","country_code":"VN","type":"education","lineage":["https://openalex.org/I202539009"]}],"countries":["VN"],"is_corresponding":true,"raw_author_name":"Quang-Vinh Dang","raw_affiliation_strings":["Data Innovation Lab, Industrial University of Ho Chi Minh City, Vietnam"],"affiliations":[{"raw_affiliation_string":"Data Innovation Lab, Industrial University of Ho Chi Minh City, Vietnam","institution_ids":["https://openalex.org/I202539009"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5076385867"],"corresponding_institution_ids":["https://openalex.org/I202539009"],"apc_list":null,"apc_paid":null,"fwci":3.5572,"has_fulltext":false,"cited_by_count":32,"citation_normalized_percentile":{"value":0.92928841,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"3"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8527915477752686},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7342113256454468},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6848964095115662},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.6765470504760742},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6288173198699951},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5717663764953613},{"id":"https://openalex.org/keywords/binary-classification","display_name":"Binary classification","score":0.537883996963501},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.43728673458099365},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3709503412246704},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.16639915108680725}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8527915477752686},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7342113256454468},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6848964095115662},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.6765470504760742},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6288173198699951},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5717663764953613},{"id":"https://openalex.org/C66905080","wikidata":"https://www.wikidata.org/wiki/Q17005494","display_name":"Binary classification","level":3,"score":0.537883996963501},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.43728673458099365},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3709503412246704},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.16639915108680725}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/rivf48685.2020.9140751","is_oa":false,"landing_page_url":"https://doi.org/10.1109/rivf48685.2020.9140751","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 RIVF International Conference on Computing and Communication Technologies (RIVF)","raw_type":"proceedings-article"},{"id":"pmh:oai:HAL:hal-02443773v1","is_oa":true,"landing_page_url":"https://hal.inria.fr/hal-02443773","pdf_url":null,"source":{"id":"https://openalex.org/S4406922276","display_name":"INRIA a CCSD electronic archive server","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Research, Innovation and Vision for the Future","raw_type":"info:eu-repo/semantics/conferenceObject"},{"id":"pmh:oai:HAL:hal-02443773v2","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-02443773","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Research, Innovation and Vision for the Future, Apr 2020, Ho Chi Minh, Vietnam","raw_type":"Conference papers"}],"best_oa_location":{"id":"pmh:oai:HAL:hal-02443773v1","is_oa":true,"landing_page_url":"https://hal.inria.fr/hal-02443773","pdf_url":null,"source":{"id":"https://openalex.org/S4406922276","display_name":"INRIA a CCSD electronic archive server","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Research, Innovation and Vision for the Future","raw_type":"info:eu-repo/semantics/conferenceObject"},"sustainable_development_goals":[{"score":0.41999998688697815,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1543388142","https://openalex.org/W1554891714","https://openalex.org/W1966809779","https://openalex.org/W2016070752","https://openalex.org/W2018770010","https://openalex.org/W2031163547","https://openalex.org/W2163605009","https://openalex.org/W2169768310","https://openalex.org/W2170689836","https://openalex.org/W2295598076","https://openalex.org/W2296719434","https://openalex.org/W2587505737","https://openalex.org/W2738679187","https://openalex.org/W2772317693","https://openalex.org/W2798046836","https://openalex.org/W2803414046","https://openalex.org/W2886900206","https://openalex.org/W2890708726","https://openalex.org/W2903158431","https://openalex.org/W2911505293","https://openalex.org/W2926701059","https://openalex.org/W2969641252","https://openalex.org/W2989882788","https://openalex.org/W3102476541","https://openalex.org/W6632547301","https://openalex.org/W6655195918","https://openalex.org/W6684191040","https://openalex.org/W6751671829","https://openalex.org/W6753883945","https://openalex.org/W6761384616","https://openalex.org/W6767033589","https://openalex.org/W6770129978"],"related_works":["https://openalex.org/W2357468538","https://openalex.org/W1577110157","https://openalex.org/W2394466068","https://openalex.org/W2355007334","https://openalex.org/W3202247611","https://openalex.org/W3158472548","https://openalex.org/W4382934300","https://openalex.org/W2121061354","https://openalex.org/W4285388059","https://openalex.org/W2999368888"],"abstract_inverted_index":{"Intrusion":[0],"Detection":[1],"Systems":[2],"(IDSs)":[3],"play":[4],"a":[5,46,75,92],"vital":[6],"role":[7],"in":[8,64,106],"the":[9,29,35,65,69,72,101,111,116,124],"modern":[10],"cyber-security":[11],"system.":[12],"The":[13],"main":[14],"task":[15],"of":[16,37,74,103],"an":[17,43,53],"IDS":[18,44],"is":[19],"to":[20,109],"distinguish":[21],"between":[22],"benign":[23],"and":[24,31,77,128],"malicious":[25],"network":[26],"flows.":[27],"Hence,":[28],"researchers":[30],"practitioners":[32],"usually":[33],"utilize":[34],"power":[36],"machine":[38],"learning":[39,55,105],"techniques":[40],"by":[41],"considering":[42],"as":[45],"binary-classifier.":[47],"Recent":[48],"research":[49],"works":[50],"demonstrate":[51],"that":[52,130],"ensemble":[54],"algorithm":[56,80],"like":[57,81],"xgboost":[58],"can":[59,84,90],"achieve":[60],"almost":[61],"perfect":[62],"classification":[63,79,117],"offline":[66],"configuration.":[67],"On":[68],"other":[70],"hand,":[71],"performance":[73],"simple":[76],"lightweight":[78],"Naive":[82],"Bayes":[83],"be":[85],"improved":[86],"significantly":[87],"if":[88],"we":[89,99],"select":[91],"proper":[93],"sub-training":[94],"set.":[95],"In":[96],"this":[97],"paper,":[98],"discuss":[100],"usage":[102],"active":[104],"online":[107],"configuration":[108],"reduce":[110],"labeling":[112],"cost":[113],"but":[114],"maintaining":[115],"performance.":[118],"We":[119],"evaluate":[120],"our":[121,131],"approach":[122,132],"using":[123],"popular":[125],"real-world":[126],"datasets":[127],"showed":[129],"outperformed":[133],"state-of-the-art":[134],"results.":[135]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":11},{"year":2020,"cited_by_count":3}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
