{"id":"https://openalex.org/W3165853173","doi":"https://doi.org/10.1109/access.2021.3082160","title":"Host-Based Intrusion Detection Model Using Siamese Network","display_name":"Host-Based Intrusion Detection Model Using Siamese Network","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3165853173","doi":"https://doi.org/10.1109/access.2021.3082160","mag":"3165853173"},"language":"en","primary_location":{"id":"doi:10.1109/access.2021.3082160","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3082160","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09436776.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09436776.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011053759","display_name":"Daekyeong Park","orcid":null},"institutions":[{"id":"https://openalex.org/I28777354","display_name":"Sejong University","ror":"https://ror.org/00aft1q37","country_code":"KR","type":"education","lineage":["https://openalex.org/I28777354"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Daekyeong Park","raw_affiliation_strings":["Sejong University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Sejong University, Seoul, South Korea","institution_ids":["https://openalex.org/I28777354"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100780590","display_name":"Sang Soo Kim","orcid":"https://orcid.org/0000-0002-0352-2838"},"institutions":[{"id":"https://openalex.org/I2801036362","display_name":"Agency for Defense Development","ror":"https://ror.org/05fhe0r85","country_code":"KR","type":"government","lineage":["https://openalex.org/I1327899338","https://openalex.org/I1344042128","https://openalex.org/I2801036362","https://openalex.org/I2801339556"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Sangsoo Kim","raw_affiliation_strings":["Agency for Defense Development, Daejeon, South Korea"],"affiliations":[{"raw_affiliation_string":"Agency for Defense Development, Daejeon, South Korea","institution_ids":["https://openalex.org/I2801036362"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043531362","display_name":"Hyuk-Jin Kwon","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hyukjin Kwon","raw_affiliation_strings":["Center for Military Analysis and Planning, Korea Institute for Defense Analyses (KIDA), Seoul, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Center for Military Analysis and Planning, Korea Institute for Defense Analyses (KIDA), Seoul, Republic of Korea","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107967381","display_name":"Dongil Shin","orcid":"https://orcid.org/0000-0002-8621-715X"},"institutions":[{"id":"https://openalex.org/I28777354","display_name":"Sejong University","ror":"https://ror.org/00aft1q37","country_code":"KR","type":"education","lineage":["https://openalex.org/I28777354"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Dongil Shin","raw_affiliation_strings":["Sejong University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Sejong University, Seoul, South Korea","institution_ids":["https://openalex.org/I28777354"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008353224","display_name":"Dongkyoo Shin","orcid":"https://orcid.org/0000-0002-2665-3339"},"institutions":[{"id":"https://openalex.org/I28777354","display_name":"Sejong University","ror":"https://ror.org/00aft1q37","country_code":"KR","type":"education","lineage":["https://openalex.org/I28777354"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Dongkyoo Shin","raw_affiliation_strings":["Sejong University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Sejong University, Seoul, South Korea","institution_ids":["https://openalex.org/I28777354"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5011053759"],"corresponding_institution_ids":["https://openalex.org/I28777354"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":4.8901,"has_fulltext":true,"cited_by_count":46,"citation_normalized_percentile":{"value":0.95250698,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":"9","issue":null,"first_page":"76614","last_page":"76623"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7273775339126587},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7271718978881836},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.6646146774291992},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3521134853363037},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3063051104545593}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7273775339126587},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7271718978881836},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.6646146774291992},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3521134853363037},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3063051104545593},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2021.3082160","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3082160","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09436776.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:28fdfebb0aa240dba14c4b803b87eeb5","is_oa":true,"landing_page_url":"https://doaj.org/article/28fdfebb0aa240dba14c4b803b87eeb5","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 9, Pp 76614-76623 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2021.3082160","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3082160","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09436776.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1169057657","display_name":null,"funder_award_id":"UD200014ED","funder_id":"https://openalex.org/F4320334874","funder_display_name":"Defense Acquisition Program Administration"}],"funders":[{"id":"https://openalex.org/F4320323103","display_name":"Agency for Defense Development","ror":"https://ror.org/05fhe0r85"},{"id":"https://openalex.org/F4320334874","display_name":"Defense Acquisition Program Administration","ror":"https://ror.org/04bjg9m96"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3165853173.pdf","grobid_xml":"https://content.openalex.org/works/W3165853173.grobid-xml"},"referenced_works_count":37,"referenced_works":["https://openalex.org/W1483650506","https://openalex.org/W2099940443","https://openalex.org/W2136140045","https://openalex.org/W2145287260","https://openalex.org/W2551087083","https://openalex.org/W2598811698","https://openalex.org/W2751469117","https://openalex.org/W2753160622","https://openalex.org/W2762776925","https://openalex.org/W2769921573","https://openalex.org/W2773175795","https://openalex.org/W2783664444","https://openalex.org/W2793223501","https://openalex.org/W2796394805","https://openalex.org/W2801888526","https://openalex.org/W2886020981","https://openalex.org/W2918854598","https://openalex.org/W2951105308","https://openalex.org/W2954144630","https://openalex.org/W2974057884","https://openalex.org/W2981091784","https://openalex.org/W3000225415","https://openalex.org/W3009016625","https://openalex.org/W3025093231","https://openalex.org/W3032021129","https://openalex.org/W3040266635","https://openalex.org/W3049201419","https://openalex.org/W3088591515","https://openalex.org/W3091905774","https://openalex.org/W3135550350","https://openalex.org/W3207068952","https://openalex.org/W6729739840","https://openalex.org/W6743661861","https://openalex.org/W6744049000","https://openalex.org/W6783596713","https://openalex.org/W6948268659","https://openalex.org/W6996243346"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"As":[0,210],"cyberattacks":[1],"become":[2],"more":[3],"intelligent,":[4],"the":[5,49,83,109,112,131,145,163,167,171,187,194,206,215,226,229,242],"difficulty":[6],"increases":[7],"for":[8],"traditional":[9],"intrusion":[10,30,94,116],"detection":[11,31,95,117],"systems":[12],"to":[13,53,65,105,179,204,241],"detect":[14],"advanced":[15],"attacks":[16],"that":[17,36,225],"deviate":[18],"from":[19],"previously":[20],"stored":[21],"patterns.":[22],"To":[23],"solve":[24],"this":[25,76,234],"problem,":[26],"a":[27,57,67,92,114,136,155,211],"deep":[28,45],"learning-based":[29],"system":[32],"model":[33,118,231],"has":[34],"emerged":[35],"analyzes":[37],"intelligent":[38],"attack":[39,164],"patterns":[40],"through":[41],"data":[42,71,96],"learning.":[43],"However,":[44],"learning":[46,147,154,189],"models":[47],"have":[48],"disadvantage":[50],"of":[51,70,111,120,158,174,193,208,213,228],"having":[52],"re-learn":[54],"each":[55,175],"time":[56,63],"new":[58],"cyberattack":[59,176],"method":[60],"emerges.":[61],"The":[62,182,191],"required":[64],"learn":[66],"large":[68],"amount":[69,157],"is":[72,91,128,142,166],"not":[73],"efficient.":[74],"In":[75,101,130],"paper,":[77],"an":[78,180],"experiment":[79],"was":[80,184,223],"conducted":[81],"using":[82,144,186],"Leipzig":[84],"Intrusion":[85],"Detection":[86],"Data":[87],"Set":[88],"(LID-DS),":[89],"which":[90,149],"host-based":[93,115],"set":[97],"released":[98],"in":[99,103,233],"2018.":[100],"addition,":[102],"order":[104],"evaluate":[106],"and":[107,125,133,200,219],"improve":[108],"performance":[110,152,192,207],"system,":[113],"consisting":[119],"pre-processing,":[121],"vector-to-image":[122],"processing,":[123],"training":[124,132],"testing":[126,134],"steps":[127],"proposed.":[129],"steps,":[135],"Siamese":[137],"Convolutional":[138,196],"Neural":[139,197],"Network":[140,198],"(Siamese-CNN)":[141],"constructed":[143],"few-shot":[146,188],"method,":[148],"shows":[150],"excellent":[151],"by":[153,237],"small":[156],"data.":[159],"Siamese-CNN":[160,201,230],"determines":[161],"whether":[162],"type":[165],"same":[168],"based":[169],"on":[170],"similarity":[172],"score":[173],"sample":[177],"converted":[178],"image.":[181],"accuracy":[183],"calculated":[185],"technique.":[190],"Vanilla":[195],"(Vanilla-CNN)":[199],"are":[202],"compared":[203,240],"confirm":[205],"Siamese-CNN.":[209],"result":[212],"measuring":[214],"accuracy,":[216],"precision,":[217],"recall,":[218],"F1-score":[220],"indicators,":[221],"it":[222],"confirmed":[224],"recall":[227],"proposed":[232],"study":[235],"increased":[236],"about":[238],"6%":[239],"Vanilla-CNN":[243],"model.":[244]},"counts_by_year":[{"year":2025,"cited_by_count":14},{"year":2024,"cited_by_count":12},{"year":2023,"cited_by_count":12},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
