{"id":"https://openalex.org/W4402263597","doi":"https://doi.org/10.1109/wincom62286.2024.10655131","title":"Enhancing Intrusion Detection Systems Using Machine Learning Classifiers on the CSE-CIC-IDS2018 Dataset","display_name":"Enhancing Intrusion Detection Systems Using Machine Learning Classifiers on the CSE-CIC-IDS2018 Dataset","publication_year":2024,"publication_date":"2024-07-23","ids":{"openalex":"https://openalex.org/W4402263597","doi":"https://doi.org/10.1109/wincom62286.2024.10655131"},"language":"en","primary_location":{"id":"doi:10.1109/wincom62286.2024.10655131","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wincom62286.2024.10655131","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 11th International Conference on Wireless Networks and Mobile Communications (WINCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036440733","display_name":"Khalil Ibrahimi","orcid":"https://orcid.org/0000-0002-9682-9555"},"institutions":[{"id":"https://openalex.org/I3121676899","display_name":"Universit\u00e9 Ibn-Tofail","ror":"https://ror.org/02wj89n04","country_code":"MA","type":"education","lineage":["https://openalex.org/I3121676899"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Khalil Ibrahimi","raw_affiliation_strings":["Ibn Tofail University,Faculty of Sciences, Laoratory of Computer Sciences (LaRI),Kenitra,Morocco"],"affiliations":[{"raw_affiliation_string":"Ibn Tofail University,Faculty of Sciences, Laoratory of Computer Sciences (LaRI),Kenitra,Morocco","institution_ids":["https://openalex.org/I3121676899"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065165118","display_name":"Mohammed Jouhari","orcid":"https://orcid.org/0000-0001-5406-8594"},"institutions":[{"id":"https://openalex.org/I4210121440","display_name":"Moroccan Foundation for Advanced Science, Innovation and Research","ror":"https://ror.org/02gjqpv16","country_code":"MA","type":"nonprofit","lineage":["https://openalex.org/I4210121440"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Mohammed Jouhari","raw_affiliation_strings":["Moroccan School of Engineering Sciences (EMSI),LSIA Laboratory,Tanger,Morocco"],"affiliations":[{"raw_affiliation_string":"Moroccan School of Engineering Sciences (EMSI),LSIA Laboratory,Tanger,Morocco","institution_ids":["https://openalex.org/I4210121440"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5107013661","display_name":"Zineb Jakout","orcid":null},"institutions":[{"id":"https://openalex.org/I3121676899","display_name":"Universit\u00e9 Ibn-Tofail","ror":"https://ror.org/02wj89n04","country_code":"MA","type":"education","lineage":["https://openalex.org/I3121676899"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Zineb Jakout","raw_affiliation_strings":["Ibn Tofail University,Faculty of Sciences, Laoratory of Computer Sciences (LaRI),Kenitra,Morocco"],"affiliations":[{"raw_affiliation_string":"Ibn Tofail University,Faculty of Sciences, Laoratory of Computer Sciences (LaRI),Kenitra,Morocco","institution_ids":["https://openalex.org/I3121676899"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5036440733"],"corresponding_institution_ids":["https://openalex.org/I3121676899"],"apc_list":null,"apc_paid":null,"fwci":1.099,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.79050731,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9861999750137329,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7919120788574219},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7277931571006775},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5752294063568115},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5622241497039795}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7919120788574219},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7277931571006775},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5752294063568115},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5622241497039795}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wincom62286.2024.10655131","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wincom62286.2024.10655131","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 11th International Conference on Wireless Networks and Mobile Communications (WINCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W3041601928","https://openalex.org/W3208275713","https://openalex.org/W3209651413","https://openalex.org/W4220895840","https://openalex.org/W4280563843","https://openalex.org/W4315630370","https://openalex.org/W4320559971","https://openalex.org/W4320920814","https://openalex.org/W4376455422","https://openalex.org/W4377022569","https://openalex.org/W4387870457","https://openalex.org/W4388893638","https://openalex.org/W4388915800","https://openalex.org/W4388969448","https://openalex.org/W4400728141","https://openalex.org/W6780649578","https://openalex.org/W6837878407"],"related_works":["https://openalex.org/W2961085424","https://openalex.org/W4306674287","https://openalex.org/W3046775127","https://openalex.org/W3107602296","https://openalex.org/W4394896187","https://openalex.org/W3170094116","https://openalex.org/W4386462264","https://openalex.org/W4364306694","https://openalex.org/W4312192474","https://openalex.org/W4283697347"],"abstract_inverted_index":{"With":[0],"the":[1,5,35,72,118,139,143,148],"rapid":[2],"growth":[3],"in":[4,40,134,161],"Internet":[6],"of":[7,28,37,69,98,120,147,157],"Things":[8],"(IoT),":[9],"current":[10,140],"cybersecurity":[11,179],"threats":[12],"are":[13],"growing":[14],"to":[15,33,43,45,94,151,178],"levels":[16],"at":[17],"which":[18,70],"traditional":[19],"intrusion":[20],"detection":[21,119],"systems":[22],"(IDSs)":[23],"cannot":[24],"suffice.":[25],"The":[26,164],"purpose":[27],"this":[29,137],"paper,":[30],"therefore,":[31],"is":[32,133],"evaluate":[34],"efficacy":[36],"ML":[38,57],"techniques":[39],"enhancing":[41,130],"IDS":[42,114,171],"adapt":[44],"emerging":[46],"sophisticated":[47],"and":[48,65,90,101,145,155,175],"dynamic":[49],"modern":[50],"cyber":[51,83,99,127],"threats.":[52,84],"We":[53,85],"adopted":[54],"four":[55],"supervised":[56],"models:":[58],"Decision":[59],"Tree,":[60],"Random":[61],"Forest,":[62],"Naive":[63],"Bayes,":[64],"Gradient":[66],"Boost,":[67],"all":[68],"describe":[71],"CSE-CIC-IDS2018":[73],"dataset":[74],"representing":[75],"different":[76],"network":[77],"attack":[78],"situations.":[79],"This":[80,110],"reflects":[81],"today's":[82],"have":[86],"analyzed":[87],"both":[88],"binary":[89],"multiclass":[91],"classification":[92],"tasks":[93],"understand":[95],"what":[96],"kind":[97],"threat":[100],"how":[102],"many":[103],"any":[104],"model":[105],"was":[106],"best":[107],"suitable":[108],"for.":[109],"implies":[111],"that":[112,138,169],"ML-supported":[113],"can":[115],"effectively":[116],"improve":[117],"not":[121],"only":[122],"generic":[123],"but":[124],"also":[125],"specific":[126],"threats,":[128],"therefore":[129],"security.":[131],"It":[132],"line":[135],"with":[136],"paper":[141],"outlines":[142],"strengths":[144],"weaknesses":[146],"discussed":[149],"models":[150],"produce":[152],"an":[153],"insight":[154],"judgment":[156],"their":[158],"practical":[159],"implementation":[160],"real-world":[162],"scalability.":[163],"outcomes":[165],"came":[166],"into":[167],"view":[168],"ML-based":[170],"gives":[172],"resilient,":[173],"adaptable,":[174],"proactive":[176],"solutions":[177],"over":[180],"IoT":[181],"networks.":[182]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
