{"id":"https://openalex.org/W7125926050","doi":"https://doi.org/10.1109/smc58881.2025.11343270","title":"Combining Side-Channel Features with Deep Learning for Network Traffic Anomaly Detection","display_name":"Combining Side-Channel Features with Deep Learning for Network Traffic Anomaly Detection","publication_year":2025,"publication_date":"2025-10-05","ids":{"openalex":"https://openalex.org/W7125926050","doi":"https://doi.org/10.1109/smc58881.2025.11343270"},"language":null,"primary_location":{"id":"doi:10.1109/smc58881.2025.11343270","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11343270","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030362510","display_name":"Yu Gong","orcid":"https://orcid.org/0000-0002-5411-376X"},"institutions":[{"id":"https://openalex.org/I63354593","display_name":"Sichuan Normal University","ror":"https://ror.org/043dxc061","country_code":"CN","type":"education","lineage":["https://openalex.org/I63354593"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yu Gong","raw_affiliation_strings":["Sichuan Normal University,College of Computer Science,Chengdu,China,610101"],"affiliations":[{"raw_affiliation_string":"Sichuan Normal University,College of Computer Science,Chengdu,China,610101","institution_ids":["https://openalex.org/I63354593"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124115360","display_name":"Min Li","orcid":null},"institutions":[{"id":"https://openalex.org/I63354593","display_name":"Sichuan Normal University","ror":"https://ror.org/043dxc061","country_code":"CN","type":"education","lineage":["https://openalex.org/I63354593"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Min Li","raw_affiliation_strings":["Sichuan Normal University,College of Computer Science,Chengdu,China,610101"],"affiliations":[{"raw_affiliation_string":"Sichuan Normal University,College of Computer Science,Chengdu,China,610101","institution_ids":["https://openalex.org/I63354593"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100538999","display_name":"Keyu Zhu","orcid":"https://orcid.org/0000-0003-1187-7126"},"institutions":[{"id":"https://openalex.org/I63354593","display_name":"Sichuan Normal University","ror":"https://ror.org/043dxc061","country_code":"CN","type":"education","lineage":["https://openalex.org/I63354593"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Keyu Zhu","raw_affiliation_strings":["Sichuan Normal University,College of Computer Science,Chengdu,China,610101"],"affiliations":[{"raw_affiliation_string":"Sichuan Normal University,College of Computer Science,Chengdu,China,610101","institution_ids":["https://openalex.org/I63354593"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124097410","display_name":"Chen Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I63354593","display_name":"Sichuan Normal University","ror":"https://ror.org/043dxc061","country_code":"CN","type":"education","lineage":["https://openalex.org/I63354593"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chen Huang","raw_affiliation_strings":["Sichuan Normal University,College of Computer Science,Chengdu,China,610101"],"affiliations":[{"raw_affiliation_string":"Sichuan Normal University,College of Computer Science,Chengdu,China,610101","institution_ids":["https://openalex.org/I63354593"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124061530","display_name":"Yuanfang Lu","orcid":null},"institutions":[{"id":"https://openalex.org/I63354593","display_name":"Sichuan Normal University","ror":"https://ror.org/043dxc061","country_code":"CN","type":"education","lineage":["https://openalex.org/I63354593"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuanfang Lu","raw_affiliation_strings":["Sichuan Normal University,College of Computer Science,Chengdu,China,610101"],"affiliations":[{"raw_affiliation_string":"Sichuan Normal University,College of Computer Science,Chengdu,China,610101","institution_ids":["https://openalex.org/I63354593"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5124074244","display_name":"Xiuwei Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I63354593","display_name":"Sichuan Normal University","ror":"https://ror.org/043dxc061","country_code":"CN","type":"education","lineage":["https://openalex.org/I63354593"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiuwei Zhou","raw_affiliation_strings":["Sichuan Normal University,College of Computer Science,Chengdu,China,610101"],"affiliations":[{"raw_affiliation_string":"Sichuan Normal University,College of Computer Science,Chengdu,China,610101","institution_ids":["https://openalex.org/I63354593"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5030362510"],"corresponding_institution_ids":["https://openalex.org/I63354593"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.74538825,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1695","last_page":"1702"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.6079000234603882,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.6079000234603882,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.1307000070810318,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.05860000103712082,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.7364000082015991},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5931000113487244},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.5827999711036682},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.5490000247955322},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.5465999841690063},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5041999816894531},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.48809999227523804},{"id":"https://openalex.org/keywords/curse-of-dimensionality","display_name":"Curse of dimensionality","score":0.4839000105857849},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.4514999985694885}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7369999885559082},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.7364000082015991},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6388999819755554},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5931000113487244},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.5827999711036682},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5640000104904175},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.5490000247955322},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.5465999841690063},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5041999816894531},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.48809999227523804},{"id":"https://openalex.org/C111030470","wikidata":"https://www.wikidata.org/wiki/Q1430460","display_name":"Curse of dimensionality","level":2,"score":0.4839000105857849},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.4514999985694885},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4383000135421753},{"id":"https://openalex.org/C70518039","wikidata":"https://www.wikidata.org/wiki/Q16000077","display_name":"Dimensionality reduction","level":2,"score":0.4242999851703644},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.3926999866962433},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.3422999978065491},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3296999931335449},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.31139999628067017},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.3012000024318695},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2922999858856201},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2890999913215637},{"id":"https://openalex.org/C93959086","wikidata":"https://www.wikidata.org/wiki/Q6888345","display_name":"Model selection","level":2,"score":0.2818000018596649},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.27459999918937683},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.2732999920845032},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.27230000495910645},{"id":"https://openalex.org/C104122410","wikidata":"https://www.wikidata.org/wiki/Q1416406","display_name":"Network model","level":2,"score":0.2685000002384186},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.26600000262260437},{"id":"https://openalex.org/C101814296","wikidata":"https://www.wikidata.org/wiki/Q5439685","display_name":"Feature model","level":3,"score":0.25870001316070557},{"id":"https://openalex.org/C195807954","wikidata":"https://www.wikidata.org/wiki/Q1662562","display_name":"Information extraction","level":2,"score":0.2535000145435333}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smc58881.2025.11343270","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11343270","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.49968916177749634,"display_name":"Life in Land","id":"https://metadata.un.org/sdg/15"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2762776925","https://openalex.org/W2783741806","https://openalex.org/W2982853004","https://openalex.org/W3110378470","https://openalex.org/W3126814579","https://openalex.org/W4210743106","https://openalex.org/W4211180396","https://openalex.org/W4223912177","https://openalex.org/W4283643189","https://openalex.org/W4309919423","https://openalex.org/W4390616416","https://openalex.org/W4402600756","https://openalex.org/W4403605016","https://openalex.org/W4405440279"],"related_works":[],"abstract_inverted_index":{"As":[0],"cybersecurity":[1],"threats":[2],"evolve,":[3],"detecting":[4],"anomalous":[5],"network":[6,60,125],"traffic":[7,61],"is":[8,76],"crucial":[9],"for":[10,78],"protecting":[11],"information":[12,65],"systems.":[13],"However,":[14],"this":[15,35],"field":[16],"still":[17],"faces":[18],"challenges":[19],"such":[20],"as":[21],"data":[22],"imbalance,":[23],"feature":[24,45,54,79],"extraction":[25,55],"difficulties,":[26],"and":[27,47,81,91,108,116],"inadequate":[28],"model":[29,41,85],"performance.":[30],"To":[31],"address":[32],"these":[33],"challenges,":[34],"paper":[36],"designs":[37],"an":[38,120],"anomaly":[39],"detection":[40],"based":[42],"on":[43],"side-channel":[44,53],"selection":[46,80],"random":[48,72],"forest":[49,73],"dimensionality":[50],"reduction.":[51],"Specifically,":[52],"explores":[56],"potential":[57],"features":[58],"in":[59,105],"data,":[62],"capturing":[63],"implicit":[64],"often":[66],"missed":[67],"by":[68],"traditional":[69],"methods.":[70],"Subsequently,":[71],"importance":[74],"scoring":[75],"used":[77],"optimization.":[82],"Additionally,":[83],"the":[84,88,99,106],"also":[86],"integrates":[87],"attention":[89],"mechanism":[90],"bidirectional":[92],"long":[93],"short-term":[94],"memory":[95],"network.":[96],"In":[97],"experiments,":[98],"proposed":[100],"method":[101],"demonstrates":[102],"outstanding":[103],"performance":[104],"CIC-IDS2017":[107],"CIC":[109],"UNSW-NB15":[110],"datasets,":[111],"achieving":[112],"accuracies":[113],"of":[114],"98.90%":[115],"98.67%,":[117],"respectively,":[118],"providing":[119],"effective":[121],"strategy":[122],"to":[123],"strengthen":[124],"security":[126],"defenses.":[127]},"counts_by_year":[],"updated_date":"2026-01-29T23:17:01.242718","created_date":"2026-01-29T00:00:00"}
