{"id":"https://openalex.org/W4400489845","doi":"https://doi.org/10.1109/tifs.2024.3426304","title":"ECNet: Robust Malicious Network Traffic Detection With Multi-View Feature and Confidence Mechanism","display_name":"ECNet: Robust Malicious Network Traffic Detection With Multi-View Feature and Confidence Mechanism","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4400489845","doi":"https://doi.org/10.1109/tifs.2024.3426304"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2024.3426304","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3426304","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081289998","display_name":"Xueying Han","orcid":"https://orcid.org/0009-0001-2881-9259"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xueying Han","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101589055","display_name":"Song Liu","orcid":"https://orcid.org/0000-0002-4563-0183"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Song Liu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Junrong Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junrong Liu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102920589","display_name":"Bo Jiang","orcid":"https://orcid.org/0000-0002-7185-990X"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Jiang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006911293","display_name":"Zhigang Lu","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhigang Lu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031113046","display_name":"Baoxu Liu","orcid":"https://orcid.org/0009-0006-9851-5548"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Baoxu Liu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5081289998"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404"],"apc_list":null,"apc_paid":null,"fwci":9.0738,"has_fulltext":false,"cited_by_count":26,"citation_normalized_percentile":{"value":0.98276528,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"19","issue":null,"first_page":"6871","last_page":"6885"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8161642551422119},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.5979575514793396},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4948515295982361},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48494866490364075},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4356255531311035},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4203999936580658},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.32938331365585327}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8161642551422119},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.5979575514793396},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4948515295982361},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48494866490364075},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4356255531311035},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4203999936580658},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.32938331365585327},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2024.3426304","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3426304","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3129173456","display_name":null,"funder_award_id":"2021156","funder_id":"https://openalex.org/F4320322847","funder_display_name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences"}],"funders":[{"id":"https://openalex.org/F4320321133","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35"},{"id":"https://openalex.org/F4320322847","display_name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences","ror":"https://ror.org/031141b54"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W2560100125","https://openalex.org/W2591712613","https://openalex.org/W2743556905","https://openalex.org/W2786712888","https://openalex.org/W2789828921","https://openalex.org/W2900633536","https://openalex.org/W2919493784","https://openalex.org/W2950702592","https://openalex.org/W2963197901","https://openalex.org/W3092978542","https://openalex.org/W3118220620","https://openalex.org/W3128341305","https://openalex.org/W3132453568","https://openalex.org/W3154284926","https://openalex.org/W3157745594","https://openalex.org/W3165871547","https://openalex.org/W3173170122","https://openalex.org/W4221153087","https://openalex.org/W4306406279","https://openalex.org/W4323275401","https://openalex.org/W4324007233","https://openalex.org/W4360995354","https://openalex.org/W4361289962","https://openalex.org/W4367047070","https://openalex.org/W4385444612","https://openalex.org/W4387011098","https://openalex.org/W4400945578","https://openalex.org/W6748163547","https://openalex.org/W6764018406","https://openalex.org/W6782171043","https://openalex.org/W6856899827","https://openalex.org/W6861814312"],"related_works":["https://openalex.org/W2382997850","https://openalex.org/W2390968135","https://openalex.org/W2382213751","https://openalex.org/W2351750670","https://openalex.org/W1597848696","https://openalex.org/W2354715126","https://openalex.org/W2388563748","https://openalex.org/W2375179084","https://openalex.org/W2366646518","https://openalex.org/W2370906336"],"abstract_inverted_index":{"Malicious":[0],"traffic":[1,117,170],"detection":[2,118],"in":[3,209,219],"the":[4,8,66,75,96,173,179,223],"real":[5],"world":[6],"faces":[7],"challenge":[9],"of":[10,16,98,175,181],"dealing":[11],"with":[12,83,194,213],"a":[13,132,146,216],"diverse":[14],"mix":[15],"known,":[17],"unknown,":[18],"and":[19,29,35,77,92,127,130,140,149,153,158,167,191],"variant":[20],"malicious":[21,54,115,169],"traffic,":[22,55],"requiring":[23],"methods":[24,40,49,80],"that":[25,201],"are":[26,41],"accurate,":[27],"generalizable,":[28],"reliable":[30],"for":[31],"identifying":[32],"both":[33,165],"known":[34,53,166],"emerging":[36],"threats.":[37],"However,":[38],"existing":[39,99],"unable":[42],"to":[43,72,94,215,222],"fully":[44],"meet":[45],"these":[46,107],"requirements.":[47],"Supervised":[48],"can":[50,81,162],"accurately":[51,163],"detect":[52,164],"but":[56,86],"their":[57,87],"performance":[58,180],"declines":[59],"significantly":[60],"when":[61],"encountering":[62],"unknown":[63,84,168,211],"attacks.":[64],"Additionally,":[65],"misclassification":[67],"is":[68],"usually":[69],"silent,":[70],"leading":[71],"doubts":[73],"about":[74],"reliability":[76],"practicality.":[78],"Unsupervised":[79],"deal":[82],"attacks,":[85,212],"high":[88],"false":[89],"positive":[90],"rate":[91],"inability":[93],"utilize":[95],"knowledge":[97],"attack":[100],"data":[101],"constitute":[102],"obvious":[103],"shortcomings.":[104],"To":[105,177],"overcome":[106],"limitations,":[108],"we":[109,183],"propose":[110],"ECNet,":[111,182],"an":[112,138],"end-to-end":[113],"robust":[114,141],"network":[116],"method.":[119,225],"Particularly,":[120],"ECNet":[121,144,193,202],"incorporates":[122],"multi-view":[123],"features,":[124,129],"including":[125],"content":[126],"pattern":[128],"employs":[131],"gated-based":[133],"feature":[134],"fusion":[135],"approach,":[136],"providing":[137],"efficient":[139],"representation.":[142],"Moreover,":[143],"introduces":[145],"confidence":[147,154],"mechanism":[148],"combines":[150],"category":[151],"probability":[152],"values":[155],"during":[156],"training":[157],"detection;":[159],"therefore,":[160],"it":[161],"while":[171],"ensuring":[172],"credibility":[174],"results.":[176],"validate":[178],"conduct":[184],"comprehensive":[185],"experiments":[186],"on":[187],"six":[188],"reorganized":[189],"datasets":[190],"compare":[192],"seven":[195],"state-of-the-art":[196],"methods.":[197],"The":[198],"results":[199],"demonstrate":[200],"outperforms":[203],"others,":[204],"particularly":[205],"showing":[206],"significant":[207],"improvements":[208],"detecting":[210],"up":[214],"14.15%":[217],"increase":[218],"F1":[220],"compared":[221],"best-performing":[224]},"counts_by_year":[{"year":2026,"cited_by_count":6},{"year":2025,"cited_by_count":16},{"year":2024,"cited_by_count":4}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
