{"id":"https://openalex.org/W2810292876","doi":"https://doi.org/10.1145/3167132.3167180","title":"An efficient hybrid SVDD/clustering approach for anomaly-based intrusion detection","display_name":"An efficient hybrid SVDD/clustering approach for anomaly-based intrusion detection","publication_year":2018,"publication_date":"2018-04-09","ids":{"openalex":"https://openalex.org/W2810292876","doi":"https://doi.org/10.1145/3167132.3167180","mag":"2810292876"},"language":"en","primary_location":{"id":"doi:10.1145/3167132.3167180","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3167132.3167180","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 33rd Annual ACM Symposium on Applied Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065268986","display_name":"Tayeb Kenaza","orcid":"https://orcid.org/0000-0002-4240-2978"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Tayeb Kenaza","raw_affiliation_strings":["Ecole Militaire Polytechnique, Alger, Alg\u00e9rie"],"affiliations":[{"raw_affiliation_string":"Ecole Militaire Polytechnique, Alger, Alg\u00e9rie","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084146300","display_name":"Khadidja Bennaceur","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Khadidja Bennaceur","raw_affiliation_strings":["Ecole Nationale Pr\u00e9paratoire aux, Alger, Alg\u00e9rie"],"affiliations":[{"raw_affiliation_string":"Ecole Nationale Pr\u00e9paratoire aux, Alger, Alg\u00e9rie","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078548974","display_name":"Abdenour Labed","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Abdenour Labed","raw_affiliation_strings":["Ecole Militaire Polytechnique, Alger, Alg\u00e9rie"],"affiliations":[{"raw_affiliation_string":"Ecole Militaire Polytechnique, Alger, Alg\u00e9rie","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5065268986"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.5502,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.84853767,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"435","last_page":"443"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hypersphere","display_name":"Hypersphere","score":0.9155715107917786},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.6358436346054077},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6152287125587463},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.6136682629585266},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6039988994598389},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.6002737283706665},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5928512215614319},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5316726565361023},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.5256006717681885},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4885588586330414},{"id":"https://openalex.org/keywords/one-class-classification","display_name":"One-class classification","score":0.4880179464817047},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4637748599052429}],"concepts":[{"id":"https://openalex.org/C2776562905","wikidata":"https://www.wikidata.org/wiki/Q306610","display_name":"Hypersphere","level":2,"score":0.9155715107917786},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.6358436346054077},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6152287125587463},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.6136682629585266},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6039988994598389},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.6002737283706665},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5928512215614319},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5316726565361023},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.5256006717681885},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4885588586330414},{"id":"https://openalex.org/C34872919","wikidata":"https://www.wikidata.org/wiki/Q7092302","display_name":"One-class classification","level":3,"score":0.4880179464817047},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4637748599052429},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.0},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C194257627","wikidata":"https://www.wikidata.org/wiki/Q211554","display_name":"Amplifier","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3167132.3167180","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3167132.3167180","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 33rd Annual ACM Symposium on Applied Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W74920699","https://openalex.org/W433644524","https://openalex.org/W826547871","https://openalex.org/W1955600018","https://openalex.org/W1970088130","https://openalex.org/W1985987493","https://openalex.org/W1996747841","https://openalex.org/W2014888575","https://openalex.org/W2087432251","https://openalex.org/W2102978615","https://openalex.org/W2105485795","https://openalex.org/W2107373450","https://openalex.org/W2112203433","https://openalex.org/W2119821739","https://openalex.org/W2129066856","https://openalex.org/W2130802299","https://openalex.org/W2284202417","https://openalex.org/W2302729890","https://openalex.org/W2340896621","https://openalex.org/W2342408547","https://openalex.org/W2345951342","https://openalex.org/W3085162807","https://openalex.org/W3169161996","https://openalex.org/W4249764700","https://openalex.org/W4297957988"],"related_works":["https://openalex.org/W2379219300","https://openalex.org/W4312271657","https://openalex.org/W2770473807","https://openalex.org/W2153477625","https://openalex.org/W3171512724","https://openalex.org/W2169365377","https://openalex.org/W2810292876","https://openalex.org/W2135836407","https://openalex.org/W3210448364","https://openalex.org/W4378901613"],"abstract_inverted_index":{"A":[0],"hybrid":[1],"solution":[2],"is":[3,45,95,98],"proposed":[4],"in":[5,124],"this":[6,118],"paper":[7,103],"to":[8,25,79,157,170],"enhance":[9,158,171],"the":[10,27,35,42,49,56,62,66,70,75,93,106,110,125,133,139,142,159,165,172,175,180,185],"quality":[11],"of":[12,29,37,51,60,69,132,141,148,167,174],"anomaly":[13,177],"detection":[14,160],"systems":[15],"using":[16,47],"Supports":[17],"Vectors":[18],"Data":[19],"Description":[20],"(SVDD).":[21],"The":[22],"SVDD":[23,43,183],"aims":[24],"characterize":[26],"dataset":[28],"a":[30,83,86,114,130,146],"single":[31],"target":[32],"class.":[33],"In":[34,117],"case":[36,108],"Intrusion":[38],"Detection":[39],"Systems":[40],"(IDS)":[41],"model":[44,77],"trained":[46],"only":[48],"class":[50],"normal":[52],"user":[53],"behavior.":[54],"Indeed,":[55],"learning":[57],"step":[58],"consists":[59],"finding":[61],"hypersphere":[63,84,126],"that":[64,74,92,150],"encloses":[65],"entire":[67],"scatter":[68,94,111],"training":[71],"set.":[72],"Notice":[73],"resulting":[76],"have":[78,113],"be":[80],"optimal,":[81],"i.e.":[82],"with":[85,105],"minimal":[87],"radius.":[88],"This":[89,102],"assumes":[90],"implicitly":[91],"spherical":[96],"which":[97,127],"not":[99],"always":[100],"true.":[101],"deals":[104],"general":[107],"where":[109],"may":[112,122],"random":[115],"shape.":[116],"case,":[119],"some":[120],"voids":[121,156],"occur":[123],"mainly":[128],"causes":[129],"distortion":[131],"data":[134],"description,":[135],"and":[136,154,184],"consequently":[137],"reduces":[138],"accuracy":[140,173],"detection.":[143],"We":[144],"propose":[145],"set":[147],"improvements":[149],"helps":[151],"removing":[152],"internal":[153],"external":[155],"accuracy.":[161],"Experimental":[162],"results":[163],"show":[164],"effectiveness":[166],"our":[168],"proposals":[169],"SVDD-based":[176],"detection,":[178],"especially":[179],"hybridization":[181],"between":[182],"clustering.":[186]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1}],"updated_date":"2026-03-04T09:10:02.777135","created_date":"2025-10-10T00:00:00"}
