{"id":"https://openalex.org/W4213180066","doi":"https://doi.org/10.1142/s0218001422500239","title":"Network Intrusion Logit Detection Model with IO Port Cross-Classification","display_name":"Network Intrusion Logit Detection Model with IO Port Cross-Classification","publication_year":2022,"publication_date":"2022-02-21","ids":{"openalex":"https://openalex.org/W4213180066","doi":"https://doi.org/10.1142/s0218001422500239"},"language":"en","primary_location":{"id":"doi:10.1142/s0218001422500239","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218001422500239","pdf_url":null,"source":{"id":"https://openalex.org/S41486457","display_name":"International Journal of Pattern Recognition and Artificial Intelligence","issn_l":"0218-0014","issn":["0218-0014","1793-6381"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Pattern Recognition and Artificial Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111657809","display_name":"Jingchun Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I1327237609","display_name":"Ministry of Education of the People's Republic of China","ror":"https://ror.org/01mv9t934","country_code":"CN","type":"funder","lineage":["https://openalex.org/I1327237609","https://openalex.org/I4210127390"]},{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingchun Sun","raw_affiliation_strings":["School of Management, Xi\u2019an Jiaotong University, China","The Key Laboratory of the Ministry of Education for Process Control and Efficiency Engineering, China","School of Management, Xi'an Jiaotong University, China"],"affiliations":[{"raw_affiliation_string":"School of Management, Xi\u2019an Jiaotong University, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"The Key Laboratory of the Ministry of Education for Process Control and Efficiency Engineering, China","institution_ids":["https://openalex.org/I1327237609"]},{"raw_affiliation_string":"School of Management, Xi'an Jiaotong University, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065493610","display_name":"Fei Deng","orcid":"https://orcid.org/0000-0002-9448-5496"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]},{"id":"https://openalex.org/I146071755","display_name":"Kunming University","ror":"https://ror.org/035rhx828","country_code":"CN","type":"education","lineage":["https://openalex.org/I146071755"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fei Deng","raw_affiliation_strings":["College of Information Engineering, Kunming University, China","Key Laboratory of Data Governance and Intelligent, Decision in Universities of Yunnan, China","School of Management, Xi\u2019an Jiaotong University, China","School of Management, Xi'an Jiaotong University, China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Kunming University, China","institution_ids":["https://openalex.org/I146071755"]},{"raw_affiliation_string":"Key Laboratory of Data Governance and Intelligent, Decision in Universities of Yunnan, China","institution_ids":[]},{"raw_affiliation_string":"School of Management, Xi\u2019an Jiaotong University, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"School of Management, Xi'an Jiaotong University, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024174938","display_name":"Qin Su","orcid":"https://orcid.org/0000-0001-5003-125X"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]},{"id":"https://openalex.org/I1327237609","display_name":"Ministry of Education of the People's Republic of China","ror":"https://ror.org/01mv9t934","country_code":"CN","type":"funder","lineage":["https://openalex.org/I1327237609","https://openalex.org/I4210127390"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qin Su","raw_affiliation_strings":["School of Management, Xi\u2019an Jiaotong University, China","The Key Laboratory of the Ministry of Education for Process Control and Efficiency Engineering, China","School of Management, Xi'an Jiaotong University, China"],"affiliations":[{"raw_affiliation_string":"School of Management, Xi\u2019an Jiaotong University, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"The Key Laboratory of the Ministry of Education for Process Control and Efficiency Engineering, China","institution_ids":["https://openalex.org/I1327237609"]},{"raw_affiliation_string":"School of Management, Xi'an Jiaotong University, China","institution_ids":["https://openalex.org/I87445476"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5065493610"],"corresponding_institution_ids":["https://openalex.org/I146071755","https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":0.1381,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.43246014,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"36","issue":"05","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7665766477584839},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7176017165184021},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.6419799327850342},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6253270506858826},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4313172698020935},{"id":"https://openalex.org/keywords/logit","display_name":"Logit","score":0.42088061571121216},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4122489094734192},{"id":"https://openalex.org/keywords/dimension","display_name":"Dimension (graph theory)","score":0.4104543924331665},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3549432158470154},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12956511974334717},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11351895332336426},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.10154157876968384}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7665766477584839},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7176017165184021},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6419799327850342},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6253270506858826},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4313172698020935},{"id":"https://openalex.org/C140331021","wikidata":"https://www.wikidata.org/wiki/Q1868104","display_name":"Logit","level":2,"score":0.42088061571121216},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4122489094734192},{"id":"https://openalex.org/C33676613","wikidata":"https://www.wikidata.org/wiki/Q13415176","display_name":"Dimension (graph theory)","level":2,"score":0.4104543924331665},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3549432158470154},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12956511974334717},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11351895332336426},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.10154157876968384},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0218001422500239","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218001422500239","pdf_url":null,"source":{"id":"https://openalex.org/S41486457","display_name":"International Journal of Pattern Recognition and Artificial Intelligence","issn_l":"0218-0014","issn":["0218-0014","1793-6381"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Pattern Recognition and Artificial Intelligence","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1564381015","display_name":null,"funder_award_id":"2019YFB1704100","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1963958326","https://openalex.org/W1985020045","https://openalex.org/W1988056000","https://openalex.org/W2022509481","https://openalex.org/W2035504202","https://openalex.org/W2078559757","https://openalex.org/W2114237760","https://openalex.org/W2116139218","https://openalex.org/W2162969618","https://openalex.org/W2314874964","https://openalex.org/W2953448948","https://openalex.org/W2963471098","https://openalex.org/W3007182219","https://openalex.org/W3014732532","https://openalex.org/W3023061032","https://openalex.org/W3047132966","https://openalex.org/W3088647798","https://openalex.org/W3091379954","https://openalex.org/W3155885603","https://openalex.org/W4239899209"],"related_works":["https://openalex.org/W2061466315","https://openalex.org/W2376886931","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W3157271777","https://openalex.org/W2377372927","https://openalex.org/W1495178644"],"abstract_inverted_index":{"Recently,":[0],"information":[1],"networks":[2],"are":[3,57],"becoming":[4],"a":[5,115,202],"significant":[6],"part":[7],"of":[8,28,31,50,117,141,151,170,177,180],"daily":[9],"life,":[10],"so":[11],"keeping":[12],"the":[13,29,32,35,45,48,58,68,77,83,104,132,138,146,149,157,165,168,171,175,191,197],"system\u2019s":[14],"security":[15,19],"is":[16,123,153,187],"necessary":[17],"for":[18,76,100,120,156],"tools,":[20,34],"such":[21],"as":[22],"firewalls":[23],"and":[24,54,88,91,113,183],"encryption.":[25],"However,":[26],"because":[27],"weaknesses":[30],"existing":[33],"Intrusion":[36],"Detection":[37],"System":[38],"(IDS)":[39],"has":[40,201],"been":[41],"implemented":[42],"to":[43,74,102,154],"solve":[44],"problem.":[46],"In":[47,63],"application":[49],"IDS,":[51],"feature":[52],"classification":[53,99,119],"data":[55,133],"analysis":[56],"two":[59],"most":[60],"important":[61],"steps.":[62],"this":[64],"paper,":[65],"by":[66,199],"using":[67],"Logit":[69],"regression":[70],"model,":[71],"we":[72,109,136],"attempt":[73],"search":[75,155],"optimal":[78,158],"cutting":[79,86,142,159,172,194],"value":[80,87],"based":[81],"on":[82],"relationship":[84],"between":[85,167],"accuracy":[89,147],"index":[90],"put":[92],"forward":[93],"an":[94],"input-output":[95],"port":[96],"crossed":[97],"(IOPC)":[98],"IDS":[101],"distinguish":[103],"new":[105],"intrusion":[106],"features.":[107],"First,":[108],"discuss":[110],"whole":[111],"features":[112],"propose":[114],"taxonomy":[116],"IOPC":[118,163],"CIC-IDS2017":[121,186],"that":[122,193],"different":[124],"from":[125],"other":[126],"former":[127],"studies,":[128],"which":[129,152,189],"can":[130],"reduce":[131],"space.":[134],"Second,":[135],"compute":[137],"distribution":[139,169,204],"curve":[140],"values":[143,173,195],"varied":[144],"with":[145,206],"index,":[148],"purpose":[150],"values.":[160],"Finally,":[161],"utilizing":[162],"classification,":[164],"difference":[166],"under":[174],"attacks":[176],"distributed":[178],"denial":[179],"service":[181],"(DDoS)":[182],"PortScan":[184,200],"in":[185],"discussed,":[188],"highlights":[190],"characteristic":[192],"besieged":[196],"attack":[198],"conditional":[203],"compared":[205],"DDoS.":[207]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
