{"id":"https://openalex.org/W4285233421","doi":"https://doi.org/10.1109/tnsm.2022.3175710","title":"Griffin: Real-Time Network Intrusion Detection System via Ensemble of Autoencoder in SDN","display_name":"Griffin: Real-Time Network Intrusion Detection System via Ensemble of Autoencoder in SDN","publication_year":2022,"publication_date":"2022-05-17","ids":{"openalex":"https://openalex.org/W4285233421","doi":"https://doi.org/10.1109/tnsm.2022.3175710"},"language":"en","primary_location":{"id":"doi:10.1109/tnsm.2022.3175710","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2022.3175710","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071697357","display_name":"Liyan Yang","orcid":"https://orcid.org/0000-0003-0630-944X"},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Liyan Yang","raw_affiliation_strings":["School of Cyber Science and Engineering and the Frontiers Science Center for Mobile Information Communication and Security, Southeast University, Nanjing, China","Purple Mountain Laboratories, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering and the Frontiers Science Center for Mobile Information Communication and Security, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Purple Mountain Laboratories, Nanjing, China","institution_ids":["https://openalex.org/I4210155350"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081876978","display_name":"Yubo Song","orcid":"https://orcid.org/0000-0002-1347-6126"},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yubo Song","raw_affiliation_strings":["School of Cyber Science and Engineering and the Frontiers Science Center for Mobile Information Communication and Security, Southeast University, Nanjing, China","Purple Mountain Laboratories, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering and the Frontiers Science Center for Mobile Information Communication and Security, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Purple Mountain Laboratories, Nanjing, China","institution_ids":["https://openalex.org/I4210155350"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076028438","display_name":"Shang Gao","orcid":"https://orcid.org/0000-0003-2692-057X"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Shang Gao","raw_affiliation_strings":["Department of Computing, The Hong Kong Polytechnic University, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075678549","display_name":"Aiqun Hu","orcid":"https://orcid.org/0000-0002-0398-4899"},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Aiqun Hu","raw_affiliation_strings":["School of Cyber Science and Engineering and the Frontiers Science Center for Mobile Information Communication and Security, Southeast University, Nanjing, China","Purple Mountain Laboratories, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering and the Frontiers Science Center for Mobile Information Communication and Security, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Purple Mountain Laboratories, Nanjing, China","institution_ids":["https://openalex.org/I4210155350"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100365935","display_name":"Bin Xiao","orcid":"https://orcid.org/0000-0003-4223-8220"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Bin Xiao","raw_affiliation_strings":["Department of Computing, The Hong Kong Polytechnic University, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong","institution_ids":["https://openalex.org/I14243506"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5071697357"],"corresponding_institution_ids":["https://openalex.org/I4210155350","https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":9.8487,"has_fulltext":false,"cited_by_count":71,"citation_normalized_percentile":{"value":0.98581115,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"19","issue":"3","first_page":"2269","last_page":"2281"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8736205697059631},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.8210318088531494},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6095132827758789},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6051573157310486},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5509381890296936},{"id":"https://openalex.org/keywords/griffin","display_name":"Griffin","score":0.5396192073822021},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5291517376899719},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4983985424041748},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.49268728494644165},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.46892836689949036},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.45297661423683167},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.41822510957717896},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.3258908689022064},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.15017977356910706}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8736205697059631},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.8210318088531494},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6095132827758789},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6051573157310486},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5509381890296936},{"id":"https://openalex.org/C2775969163","wikidata":"https://www.wikidata.org/wiki/Q130223","display_name":"Griffin","level":2,"score":0.5396192073822021},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5291517376899719},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4983985424041748},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.49268728494644165},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.46892836689949036},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.45297661423683167},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.41822510957717896},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3258908689022064},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.15017977356910706},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnsm.2022.3175710","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2022.3175710","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1412479805","display_name":null,"funder_award_id":"2242022k30007","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G6838844248","display_name":null,"funder_award_id":"2020YFE0200600","funder_id":"https://openalex.org/F4320330000","funder_display_name":"China Science and Technology Exchange Center"}],"funders":[{"id":"https://openalex.org/F4320330000","display_name":"China Science and Technology Exchange Center","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W54019231","https://openalex.org/W1985987493","https://openalex.org/W2010947830","https://openalex.org/W2040424958","https://openalex.org/W2054876181","https://openalex.org/W2114996745","https://openalex.org/W2116065364","https://openalex.org/W2122646361","https://openalex.org/W2129700391","https://openalex.org/W2136451165","https://openalex.org/W2139325411","https://openalex.org/W2139792342","https://openalex.org/W2142889610","https://openalex.org/W2182421051","https://openalex.org/W2294281138","https://openalex.org/W2342408547","https://openalex.org/W2473418344","https://openalex.org/W2498359591","https://openalex.org/W2560162835","https://openalex.org/W2620827576","https://openalex.org/W2746495981","https://openalex.org/W2763937804","https://openalex.org/W2789780249","https://openalex.org/W2795175906","https://openalex.org/W2886897065","https://openalex.org/W2892214024","https://openalex.org/W2963197901","https://openalex.org/W2963313259","https://openalex.org/W2971776695","https://openalex.org/W2988337058","https://openalex.org/W3000225415","https://openalex.org/W3000421206","https://openalex.org/W3026790608","https://openalex.org/W3047608117","https://openalex.org/W3093410479","https://openalex.org/W3102834148","https://openalex.org/W3125641641","https://openalex.org/W3195631217","https://openalex.org/W4231410305","https://openalex.org/W4244657151","https://openalex.org/W6602214101","https://openalex.org/W6680820299","https://openalex.org/W6685992501","https://openalex.org/W6723978441","https://openalex.org/W6749973653","https://openalex.org/W6768120510","https://openalex.org/W6773099888","https://openalex.org/W6948155282"],"related_works":["https://openalex.org/W588680182","https://openalex.org/W2093304180","https://openalex.org/W2276557871","https://openalex.org/W3024933229","https://openalex.org/W145413986","https://openalex.org/W2414931473","https://openalex.org/W3124843757","https://openalex.org/W4230535072","https://openalex.org/W2159052453","https://openalex.org/W4321789545"],"abstract_inverted_index":{"Many":[0],"efforts":[1],"have":[2],"been":[3],"devoted":[4],"to":[5,27,34,56,77,91,96,107,117,191],"the":[6,79,83,93,119,123,129,157,161,184],"development":[7],"of":[8,82,128,168],"efficient":[9,73],"Network":[10,21],"Intrusion":[11],"Detection":[12],"System":[13],"(NIDS)":[14],"using":[15,131],"machine":[16,53,199],"learning":[17,54,200],"approaches":[18],"in":[19,64,156,198],"Software-defined":[20],"(SDN).":[22],"Unfortunately,":[23],"existing":[24,153],"solutions":[25],"failed":[26],"detect":[28,57],"real-time":[29,65],"and":[30,38,60,114,126,144],"zero-day":[31,61],"attacks":[32,63],"due":[33],"their":[35],"limited":[36],"throughput":[37],"prior":[39],"knowledge-based":[40],"detection.":[41],"To":[42],"this":[43,180],"end,":[44],"we":[45],"propose":[46],"Griffin,":[47],"a":[48,172],"NIDS":[49],"that":[50,137],"uses":[51,71],"unsupervised":[52],"expertise":[55],"both":[58],"known":[59],"intrusion":[62],"with":[66,111,159,176],"high":[67,115],"accuracy.":[68],"Specifically,":[69],"Griffin":[70,162],"an":[72,101],"feature":[74,94],"extraction":[75],"framework":[76,187],"capture":[78],"sequential":[80],"features":[81,110],"traffic":[84],"packets.":[85],"Then,":[86],"it":[87],"utilizes":[88,183],"cluster":[89],"analysis":[90],"reduce":[92],"scale":[95],"achieve":[97],"low":[98,112],"throughput.":[99],"Moreover,":[100],"ensemble":[102],"autoencoder":[103],"is":[104,140,147,171,196],"built":[105],"automatically":[106],"further":[108],"extract":[109],"complexity":[113,127,139],"precision":[116],"train":[118],"model.":[120],"We":[121],"evaluate":[122],"accuracy,":[124],"robustness,":[125],"system":[130],"open":[132],"datasets.":[133],"The":[134],"result":[135],"shows":[136],"Griffin\u2019s":[138],"about":[141],"40%":[142],"lower,":[143],"its":[145],"accuracy":[146],"at":[148,164],"most":[149,165],"19%":[150],"higher":[151],"than":[152],"NIDS.Additionally,":[154],"even":[155],"situation":[158],"evasion,":[160],"has":[163],"9%":[166],"decrease":[167],"AUC,":[169],"which":[170,195],"good":[173],"performance":[174],"compared":[175],"other":[177],"solutions.":[178],"Furthermore,":[179],"paper":[181],"also":[182],"differential":[185],"privacy":[186,194],"during":[188],"training":[189],"autoencoders":[190],"protect":[192],"datasets\u2019":[193],"inherent":[197],"approaches.":[201]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":19},{"year":2024,"cited_by_count":19},{"year":2023,"cited_by_count":25},{"year":2022,"cited_by_count":6}],"updated_date":"2026-04-12T07:58:50.170612","created_date":"2025-10-10T00:00:00"}
