{"id":"https://openalex.org/W2018004276","doi":"https://doi.org/10.1145/2345396.2345501","title":"Network intrusion detection system using genetic network programming with support vector machine","display_name":"Network intrusion detection system using genetic network programming with support vector machine","publication_year":2012,"publication_date":"2012-08-03","ids":{"openalex":"https://openalex.org/W2018004276","doi":"https://doi.org/10.1145/2345396.2345501","mag":"2018004276"},"language":"en","primary_location":{"id":"doi:10.1145/2345396.2345501","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2345396.2345501","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Advances in Computing, Communications and Informatics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102925577","display_name":"P. Sujatha","orcid":null},"institutions":[{"id":"https://openalex.org/I33585257","display_name":"Anna University, Chennai","ror":"https://ror.org/01qhf1r47","country_code":"IN","type":"education","lineage":["https://openalex.org/I33585257"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"P. Kola Sujatha","raw_affiliation_strings":["Anna University"],"affiliations":[{"raw_affiliation_string":"Anna University","institution_ids":["https://openalex.org/I33585257"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103445163","display_name":"C. Suba Priya","orcid":null},"institutions":[{"id":"https://openalex.org/I33585257","display_name":"Anna University, Chennai","ror":"https://ror.org/01qhf1r47","country_code":"IN","type":"education","lineage":["https://openalex.org/I33585257"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"C. Suba Priya","raw_affiliation_strings":["Anna University"],"affiliations":[{"raw_affiliation_string":"Anna University","institution_ids":["https://openalex.org/I33585257"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017525339","display_name":"A. Kannan","orcid":"https://orcid.org/0000-0002-3564-395X"},"institutions":[{"id":"https://openalex.org/I33585257","display_name":"Anna University, Chennai","ror":"https://ror.org/01qhf1r47","country_code":"IN","type":"education","lineage":["https://openalex.org/I33585257"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"A. Kannan","raw_affiliation_strings":["Anna University"],"affiliations":[{"raw_affiliation_string":"Anna University","institution_ids":["https://openalex.org/I33585257"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102925577"],"corresponding_institution_ids":["https://openalex.org/I33585257"],"apc_list":null,"apc_paid":null,"fwci":0.7092,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.71630281,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"645","last_page":"649"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11975","display_name":"Evolutionary Algorithms and Applications","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9850000143051147,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7802528142929077},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7797812223434448},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.7184085845947266},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.6777846217155457},{"id":"https://openalex.org/keywords/anomaly-based-intrusion-detection-system","display_name":"Anomaly-based intrusion detection system","score":0.6313090920448303},{"id":"https://openalex.org/keywords/misuse-detection","display_name":"Misuse detection","score":0.5956276059150696},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5621691942214966},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.5617671012878418},{"id":"https://openalex.org/keywords/data-pre-processing","display_name":"Data pre-processing","score":0.48354220390319824},{"id":"https://openalex.org/keywords/genetic-programming","display_name":"Genetic programming","score":0.4819307327270508},{"id":"https://openalex.org/keywords/kernel","display_name":"Kernel (algebra)","score":0.471193790435791},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4698701500892639},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4600095748901367},{"id":"https://openalex.org/keywords/genetic-algorithm","display_name":"Genetic algorithm","score":0.4245739281177521},{"id":"https://openalex.org/keywords/false-positive-rate","display_name":"False positive rate","score":0.41846275329589844},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.41233694553375244},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08355855941772461}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7802528142929077},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7797812223434448},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.7184085845947266},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6777846217155457},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.6313090920448303},{"id":"https://openalex.org/C2776973144","wikidata":"https://www.wikidata.org/wiki/Q6880649","display_name":"Misuse detection","level":4,"score":0.5956276059150696},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5621691942214966},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.5617671012878418},{"id":"https://openalex.org/C10551718","wikidata":"https://www.wikidata.org/wiki/Q5227332","display_name":"Data pre-processing","level":2,"score":0.48354220390319824},{"id":"https://openalex.org/C110332635","wikidata":"https://www.wikidata.org/wiki/Q629498","display_name":"Genetic programming","level":2,"score":0.4819307327270508},{"id":"https://openalex.org/C74193536","wikidata":"https://www.wikidata.org/wiki/Q574844","display_name":"Kernel (algebra)","level":2,"score":0.471193790435791},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4698701500892639},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4600095748901367},{"id":"https://openalex.org/C8880873","wikidata":"https://www.wikidata.org/wiki/Q187787","display_name":"Genetic algorithm","level":2,"score":0.4245739281177521},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.41846275329589844},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.41233694553375244},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08355855941772461},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2345396.2345501","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2345396.2345501","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Advances in Computing, Communications and Informatics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W208128215","https://openalex.org/W1583975142","https://openalex.org/W1969828205","https://openalex.org/W2008868972","https://openalex.org/W2014573052","https://openalex.org/W2014712522","https://openalex.org/W2058614926","https://openalex.org/W2065523140","https://openalex.org/W2078408680","https://openalex.org/W2086776979","https://openalex.org/W2088210668","https://openalex.org/W2096545824","https://openalex.org/W2108118522","https://openalex.org/W2114123123","https://openalex.org/W2122539921","https://openalex.org/W2125215881","https://openalex.org/W2125298775","https://openalex.org/W2139731313","https://openalex.org/W2140190241","https://openalex.org/W2142616713","https://openalex.org/W2146341912","https://openalex.org/W2163080824","https://openalex.org/W3139607050"],"related_works":["https://openalex.org/W2106474518","https://openalex.org/W2369534771","https://openalex.org/W3036013726","https://openalex.org/W2337148208","https://openalex.org/W135634947","https://openalex.org/W1995261360","https://openalex.org/W2347501756","https://openalex.org/W2366105852","https://openalex.org/W2542430535","https://openalex.org/W2352639800"],"abstract_inverted_index":{"Nowadays":[0],"Internet":[1],"Services":[2],"spread":[3],"all":[4],"over":[5],"the":[6,16,20,25,39,42,50,59,70,104,108,118,134,137,144,155,158,162,169],"world.":[7],"There":[8],"are":[9,35],"large":[10],"amount":[11],"of":[12,157,161],"data":[13,72],"present":[14],"in":[15,41],"internet":[17,21],"services.":[18],"However":[19],"services":[22],"increases":[23,154],"at":[24],"same":[26],"time":[27],"intrusions":[28,40],"also":[29],"increases.":[30],"Network":[31,46,125,152,163],"Intrusion":[32,47,164],"Detection":[33,48,165],"Systems":[34],"used":[36,66,77,101,141],"to":[37,57,113,142],"detect":[38,143],"network.":[43],"For":[44],"efficient":[45],"System":[49],"preprocessing":[51],"is":[52,65,100,111],"most":[53],"essential.":[54],"In":[55,133],"order":[56],"preprocess":[58],"dataset":[60,85],"Support":[61],"Vector":[62],"Machine":[63],"algorithm":[64],"and":[67,95,116,167],"that":[68,114],"gives":[69],"new":[71],"model":[73],"which":[74,127],"has":[75,120,139],"been":[76,121,140],"for":[78,81,102],"creating":[79,103],"rules":[80,119],"misuse":[82,145],"detection.":[83],"The":[84],"can":[86],"be":[87],"classified":[88],"into":[89],"two":[90],"datasets;":[91],"namely":[92],"positive":[93,171],"kernel":[94],"negative":[96],"kernel.":[97],"Positive":[98],"Kernel":[99],"rules.":[105],"After":[106],"classifying":[107],"dataset,":[109],"fuzzification":[110],"applied":[112],"datset":[115],"then":[117],"created":[122],"by":[123],"Genetic":[124,151],"Programming":[126,153],"based":[128],"on":[129],"direct":[130],"graph":[131],"structure.":[132],"testing":[135],"phase":[136],"system":[138],"activities.":[146],"By":[147],"combining":[148],"SVM":[149],"with":[150],"performance":[156],"detection":[159],"rate":[160],"Model":[166],"reduces":[168],"false":[170],"rate.":[172]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2015,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
