{"id":"https://openalex.org/W4394966806","doi":"https://doi.org/10.1109/tnsm.2024.3391250","title":"A Lightweight Intrusion Detection System Using a Finite Dirichlet Mixture Model With Extended Stochastic Variational Inference","display_name":"A Lightweight Intrusion Detection System Using a Finite Dirichlet Mixture Model With Extended Stochastic Variational Inference","publication_year":2024,"publication_date":"2024-04-19","ids":{"openalex":"https://openalex.org/W4394966806","doi":"https://doi.org/10.1109/tnsm.2024.3391250"},"language":"en","primary_location":{"id":"doi:10.1109/tnsm.2024.3391250","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2024.3391250","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004631861","display_name":"Yuping Lai","orcid":"https://orcid.org/0000-0002-3797-1228"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuping Lai","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-3797-1228","affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101385511","display_name":"Yongqian Yu","orcid":"https://orcid.org/0000-0001-9031-7922"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yiying Yu","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0001-9031-7922","affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103239389","display_name":"Wenbo Guan","orcid":"https://orcid.org/0000-0002-4645-6121"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenbo Guan","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-4645-6121","affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012719173","display_name":"Lijuan Luo","orcid":"https://orcid.org/0000-0002-3702-372X"},"institutions":[{"id":"https://openalex.org/I11406153","display_name":"Shanghai International Studies University","ror":"https://ror.org/01bn89z48","country_code":"CN","type":"education","lineage":["https://openalex.org/I11406153"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lijuan Luo","raw_affiliation_strings":["School of Business and Management, Shanghai International Studies University, Shanghai, China"],"raw_orcid":"https://orcid.org/0000-0002-3702-372X","affiliations":[{"raw_affiliation_string":"School of Business and Management, Shanghai International Studies University, Shanghai, China","institution_ids":["https://openalex.org/I11406153"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100739538","display_name":"Jing Fan","orcid":null},"institutions":[{"id":"https://openalex.org/I145897649","display_name":"Minzu University of China","ror":"https://ror.org/0044e2g62","country_code":"CN","type":"education","lineage":["https://openalex.org/I145897649"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Fan","raw_affiliation_strings":["School of Electrical and Information Technology, Yunnan Minzu University, Kunming, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Electrical and Information Technology, Yunnan Minzu University, Kunming, China","institution_ids":["https://openalex.org/I145897649"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090488152","display_name":"Nanrun Zhou","orcid":"https://orcid.org/0000-0002-5080-2189"},"institutions":[{"id":"https://openalex.org/I141962983","display_name":"Shanghai University of Engineering Science","ror":"https://ror.org/0557b9y08","country_code":"CN","type":"education","lineage":["https://openalex.org/I141962983"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Nanrun Zhou","raw_affiliation_strings":["School of Electronic and Electrical Engineering, Shanghai University of Engineering Science, Shanghai, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Electronic and Electrical Engineering, Shanghai University of Engineering Science, Shanghai, China","institution_ids":["https://openalex.org/I141962983"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089715871","display_name":"Yuan Ping","orcid":"https://orcid.org/0000-0001-7703-4637"},"institutions":[{"id":"https://openalex.org/I903994226","display_name":"Xuchang University","ror":"https://ror.org/03k174p87","country_code":"CN","type":"education","lineage":["https://openalex.org/I903994226"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan Ping","raw_affiliation_strings":["School of Information Engineering, Xuchang University, Xuchang, China"],"raw_orcid":"https://orcid.org/0000-0001-7703-4637","affiliations":[{"raw_affiliation_string":"School of Information Engineering, Xuchang University, Xuchang, China","institution_ids":["https://openalex.org/I903994226"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5004631861"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":3.364,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.92555908,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"21","issue":"4","first_page":"4701","last_page":"4712"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9805999994277954,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7467387914657593},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.6130965352058411},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.574020266532898},{"id":"https://openalex.org/keywords/latent-dirichlet-allocation","display_name":"Latent Dirichlet allocation","score":0.43016231060028076},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.34508073329925537},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2934742867946625},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.29335564374923706},{"id":"https://openalex.org/keywords/topic-model","display_name":"Topic model","score":0.10586535930633545}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7467387914657593},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.6130965352058411},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.574020266532898},{"id":"https://openalex.org/C500882744","wikidata":"https://www.wikidata.org/wiki/Q269236","display_name":"Latent Dirichlet allocation","level":3,"score":0.43016231060028076},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.34508073329925537},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2934742867946625},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.29335564374923706},{"id":"https://openalex.org/C171686336","wikidata":"https://www.wikidata.org/wiki/Q3532085","display_name":"Topic model","level":2,"score":0.10586535930633545}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnsm.2024.3391250","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2024.3391250","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1327470224","display_name":null,"funder_award_id":"71942003","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6101491803","display_name":null,"funder_award_id":"72101157","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6864565690","display_name":null,"funder_award_id":"2023TD003","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G77669080","display_name":null,"funder_award_id":"62272051","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":60,"referenced_works":["https://openalex.org/W1977838479","https://openalex.org/W1998496248","https://openalex.org/W2000930721","https://openalex.org/W2003244299","https://openalex.org/W2005913992","https://openalex.org/W2039424734","https://openalex.org/W2053571848","https://openalex.org/W2097034581","https://openalex.org/W2099940443","https://openalex.org/W2100200066","https://openalex.org/W2111194889","https://openalex.org/W2118020653","https://openalex.org/W2135631383","https://openalex.org/W2165072487","https://openalex.org/W2288740059","https://openalex.org/W2342992012","https://openalex.org/W2393727648","https://openalex.org/W2490662969","https://openalex.org/W2525336835","https://openalex.org/W2527999453","https://openalex.org/W2625602624","https://openalex.org/W2783741806","https://openalex.org/W2789389144","https://openalex.org/W2790234745","https://openalex.org/W2890034837","https://openalex.org/W2907421153","https://openalex.org/W2919938126","https://openalex.org/W2923501483","https://openalex.org/W2924689635","https://openalex.org/W2945976633","https://openalex.org/W2963460857","https://openalex.org/W2975042594","https://openalex.org/W2980185226","https://openalex.org/W2984148598","https://openalex.org/W3001683812","https://openalex.org/W3005097670","https://openalex.org/W3006503311","https://openalex.org/W3021740526","https://openalex.org/W3046475869","https://openalex.org/W3048377462","https://openalex.org/W3102091066","https://openalex.org/W3131541364","https://openalex.org/W3134696756","https://openalex.org/W3154196099","https://openalex.org/W3165871547","https://openalex.org/W3206674745","https://openalex.org/W3214669781","https://openalex.org/W4205413245","https://openalex.org/W4213251304","https://openalex.org/W4225693907","https://openalex.org/W4285818738","https://openalex.org/W4294562888","https://openalex.org/W4295916558","https://openalex.org/W4307230603","https://openalex.org/W4312648203","https://openalex.org/W4367663257","https://openalex.org/W4378365142","https://openalex.org/W4387011098","https://openalex.org/W6684578138","https://openalex.org/W6713018481"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W3126382579","https://openalex.org/W3107650560","https://openalex.org/W4315588616","https://openalex.org/W4317422773","https://openalex.org/W2888805565","https://openalex.org/W2810542905","https://openalex.org/W2129350855","https://openalex.org/W2913821620"],"abstract_inverted_index":{"With":[0,99],"the":[1,5,52,89,92,100,104,133,168,179],"rapid":[2],"development":[3],"of":[4,74,91,123,144],"internet":[6],"worldwide,":[7],"network":[8,27,36],"security":[9,28],"issues":[10],"are":[11,79],"becoming":[12],"increasingly":[13],"prominent.":[14],"Network":[15],"intrusion":[16,188],"detection":[17,145,172,189],"systems":[18],"(NIDSs)":[19],"play":[20],"a":[21,65,82,116,183],"vital":[22],"role":[23],"in":[24,60,88,115],"ensuring":[25],"computer":[26],"due":[29],"to":[30,33,142],"their":[31],"ability":[32],"identify":[34],"potential":[35],"threats.":[37],"Despite":[38],"considerable":[39],"research":[40],"efforts,":[41],"deploying":[42],"NIDSs":[43],"on":[44,126,148],"resource-constrained":[45],"devices":[46],"has":[47],"been":[48],"challenging.":[49],"To":[50],"reduce":[51],"imposed":[53],"computational":[54],"cost":[55],"and":[56,76,107,158,171,185],"model":[57,86,108,135,181],"storage":[58],"requirements,":[59],"this":[61,71],"paper,":[62],"we":[63],"propose":[64],"novel":[66],"lightweight":[67,187],"NIDS":[68],"model.":[69,190],"In":[70],"model,":[72],"patterns":[73],"normal":[75],"malicious":[77],"actions":[78],"learned":[80],"via":[81],"finite":[83,151],"Dirichlet":[84],"mixture":[85,152],"(DMM)":[87],"context":[90],"extended":[93],"stochastic":[94],"variational":[95],"inference":[96],"(ESVI)":[97],"framework.":[98,119],"proposed":[101,134,180],"method,":[102],"both":[103],"parameter":[105],"estimation":[106],"selection":[109],"processes":[110],"can":[111],"be":[112],"simultaneously":[113],"addressed":[114],"unified":[117],"Bayesian":[118],"A":[120],"great":[121],"number":[122],"experiments":[124],"conducted":[125],"three":[127],"publicly":[128],"available":[129],"datasets":[130],"demonstrate":[131],"that":[132,143,178],"not":[136],"only":[137],"achieves":[138],"comparable":[139],"classification":[140],"performance":[141],"models":[146],"based":[147],"several":[149],"well-studied":[150],"modeling,":[153],"traditional":[154],"machine":[155],"learning":[156,161],"(ML)":[157],"promising":[159],"deep":[160],"(DL)":[162],"algorithms":[163],"but":[164],"also":[165],"significantly":[166],"reduces":[167],"required":[169],"training":[170],"time.":[173],"Extensive":[174],"experimental":[175],"results":[176],"validate":[177],"is":[182],"feasible":[184],"efficient":[186]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":9}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
