{"id":"https://openalex.org/W2626250024","doi":"https://doi.org/10.1145/3055635.3056595","title":"Cluster Based Ensemble Classification for Intrusion Detection System","display_name":"Cluster Based Ensemble Classification for Intrusion Detection System","publication_year":2017,"publication_date":"2017-02-24","ids":{"openalex":"https://openalex.org/W2626250024","doi":"https://doi.org/10.1145/3055635.3056595","mag":"2626250024"},"language":"en","primary_location":{"id":"doi:10.1145/3055635.3056595","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3055635.3056595","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 9th International Conference on Machine Learning and Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075907949","display_name":"M. A. Jabbar","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"M. A. Jabbar","raw_affiliation_strings":["Vardhaman College of Engineering, Hyderabad, Telangana, India"],"affiliations":[{"raw_affiliation_string":"Vardhaman College of Engineering, Hyderabad, Telangana, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059873336","display_name":"Rajanikanth Aluvalu","orcid":"https://orcid.org/0000-0001-8508-6066"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rajanikanth Aluvalu","raw_affiliation_strings":["Vardhaman College of Engineering, Hyderabad, Telangana, India"],"affiliations":[{"raw_affiliation_string":"Vardhaman College of Engineering, Hyderabad, Telangana, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101684406","display_name":"S. Sai Satyanarayana Reddy","orcid":"https://orcid.org/0000-0002-2985-3555"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"S. Sai Satyanarayana Reddy","raw_affiliation_strings":["Vardhaman College of Engineering, Hyderabad, Telangana, India"],"affiliations":[{"raw_affiliation_string":"Vardhaman College of Engineering, Hyderabad, Telangana, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5075907949"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.9008,"has_fulltext":false,"cited_by_count":52,"citation_normalized_percentile":{"value":0.92126673,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"253","last_page":"257"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8109666705131531},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6918595433235168},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.6893270611763},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5844916701316833},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.5767778158187866},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5722545385360718},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5219128131866455},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.51123046875},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4853774309158325},{"id":"https://openalex.org/keywords/false-positive-rate","display_name":"False positive rate","score":0.41276222467422485},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4116646647453308},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.103207528591156}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8109666705131531},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6918595433235168},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.6893270611763},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5844916701316833},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.5767778158187866},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5722545385360718},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5219128131866455},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.51123046875},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4853774309158325},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.41276222467422485},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4116646647453308},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.103207528591156}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3055635.3056595","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3055635.3056595","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 9th International Conference on Machine Learning and Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5600000023841858,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W141002133","https://openalex.org/W353413754","https://openalex.org/W1881647329","https://openalex.org/W2002900768","https://openalex.org/W2033403400","https://openalex.org/W2036836321","https://openalex.org/W2070590796","https://openalex.org/W2093717447","https://openalex.org/W2107723979","https://openalex.org/W2191006491","https://openalex.org/W2281706614","https://openalex.org/W2512144135","https://openalex.org/W2534887021","https://openalex.org/W2585592536","https://openalex.org/W2608629053","https://openalex.org/W2745709034","https://openalex.org/W2962826307","https://openalex.org/W3105265400","https://openalex.org/W4249507550","https://openalex.org/W6611828327"],"related_works":["https://openalex.org/W2061466315","https://openalex.org/W2376886931","https://openalex.org/W1992118813","https://openalex.org/W2010561419","https://openalex.org/W2393267898","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W3157271777"],"abstract_inverted_index":{"Network":[0],"security":[1,63],"is":[2,8,60,103,135,161,168],"a":[3,9,26,61,104,136,151],"challenging":[4,82],"task,":[5],"as":[6],"there":[7],"tremendous":[10],"growth":[11],"of":[12,18,128,138],"network":[13,56,99],"-based":[14],"services":[15],"and":[16,48,76,172],"sharing":[17],"sensitive":[19],"information":[20],"on":[21],"the":[22,30,72,81,109,113,130,164,179],"network.":[23,31,73],"Intrusion":[24,58,87],"throws":[25],"serious":[27],"risk":[28],"in":[29,70,112,163],"Even":[32],"though":[33],"many":[34],"hardening":[35],"systems":[36],"are":[37,51,80,95,125],"developed":[38],"against":[39],"intrusions,":[40],"conventional":[41],"approaches":[42],"like":[43],"firewalls,":[44],"virtual":[45],"private":[46],"networks,":[47],"encryption":[49],"techniques":[50,94],"not":[52,126],"enough":[53],"to":[54,84,97,119],"provide":[55],"security.":[57],"detection":[59],"cyber":[62],"mechanism":[64],"that":[65,178],"plays":[66],"an":[67,86],"important":[68],"role":[69],"securing":[71],"Detection":[74,88],"rate":[75,79],"false":[77],"alarm":[78],"issues":[83],"design":[85],"System":[89],"(IDS).":[90],"Various":[91],"data":[92,114],"mining":[93],"used":[96,162],"implement":[98],"intrusion":[100],"detection.":[101],"Classification":[102],"supervised":[105],"learning":[106],"which":[107],"predicts":[108],"class":[110],"label":[111],"set.":[115],"Single":[116],"classifier":[117,134,142,155,167,182],"fails":[118],"obtain":[120],"high":[121],"accuracy.":[122,188],"Base":[123],"classifiers":[124,185],"capable":[127],"detecting":[129],"attacks":[131],"accurately.":[132],"Ensemble":[133,141,166],"combination":[137],"base":[139,144],"classifiers.":[140,145],"outperforms":[143,183],"In":[146],"this":[147],"paper,":[148],"we":[149],"propose":[150],"cluster-":[152],"based":[153],"ensemble":[154,181],"for":[156],"IDS.":[157],"K":[158],"means":[159],"clustering":[160],"experiment.":[165],"built":[169],"using":[170],"ADTree":[171],"KNN.":[173],"The":[174],"experimental":[175],"results":[176],"show":[177],"proposed":[180],"other":[184],"with":[186],"99.8%":[187]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":13},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
