{"id":"https://openalex.org/W2801763249","doi":"https://doi.org/10.1145/3184066.3184089","title":"Design and implementation of intrusion detection system using convolutional neural network for DoS detection","display_name":"Design and implementation of intrusion detection system using convolutional neural network for DoS detection","publication_year":2018,"publication_date":"2018-02-02","ids":{"openalex":"https://openalex.org/W2801763249","doi":"https://doi.org/10.1145/3184066.3184089","mag":"2801763249"},"language":"en","primary_location":{"id":"doi:10.1145/3184066.3184089","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3184066.3184089","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd International Conference on Machine Learning and Soft Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065839861","display_name":"Sinh-Ngoc Nguyen","orcid":null},"institutions":[{"id":"https://openalex.org/I111277659","display_name":"Chonnam National University","ror":"https://ror.org/05kzjxq56","country_code":"KR","type":"education","lineage":["https://openalex.org/I111277659"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Sinh-Ngoc Nguyen","raw_affiliation_strings":["Chonnam National University, Gwangju, South Korea"],"affiliations":[{"raw_affiliation_string":"Chonnam National University, Gwangju, South Korea","institution_ids":["https://openalex.org/I111277659"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002473513","display_name":"Van-Quyet Nguyen","orcid":"https://orcid.org/0000-0002-6898-4224"},"institutions":[{"id":"https://openalex.org/I111277659","display_name":"Chonnam National University","ror":"https://ror.org/05kzjxq56","country_code":"KR","type":"education","lineage":["https://openalex.org/I111277659"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Van-Quyet Nguyen","raw_affiliation_strings":["Chonnam National University, Gwangju, South Korea"],"affiliations":[{"raw_affiliation_string":"Chonnam National University, Gwangju, South Korea","institution_ids":["https://openalex.org/I111277659"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059089951","display_name":"Jintae Choi","orcid":null},"institutions":[{"id":"https://openalex.org/I111277659","display_name":"Chonnam National University","ror":"https://ror.org/05kzjxq56","country_code":"KR","type":"education","lineage":["https://openalex.org/I111277659"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jintae Choi","raw_affiliation_strings":["Chonnam National University, Gwangju, South Korea"],"affiliations":[{"raw_affiliation_string":"Chonnam National University, Gwangju, South Korea","institution_ids":["https://openalex.org/I111277659"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015500546","display_name":"Kyungbaek Kim","orcid":"https://orcid.org/0000-0001-9985-3051"},"institutions":[{"id":"https://openalex.org/I111277659","display_name":"Chonnam National University","ror":"https://ror.org/05kzjxq56","country_code":"KR","type":"education","lineage":["https://openalex.org/I111277659"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Kyungbaek Kim","raw_affiliation_strings":["Chonnam National University, Gwangju, South Korea"],"affiliations":[{"raw_affiliation_string":"Chonnam National University, Gwangju, South Korea","institution_ids":["https://openalex.org/I111277659"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5065839861"],"corresponding_institution_ids":["https://openalex.org/I111277659"],"apc_list":null,"apc_paid":null,"fwci":4.6133,"has_fulltext":false,"cited_by_count":57,"citation_normalized_percentile":{"value":0.95215012,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"34","last_page":"38"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8556923866271973},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7988825440406799},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.7223656177520752},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.5796058177947998},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.5335211157798767},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5040261149406433},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5029444098472595},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.47773927450180054},{"id":"https://openalex.org/keywords/network-administrator","display_name":"Network administrator","score":0.4714718163013458},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.42576634883880615},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.41391271352767944},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3499643802642822},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21375855803489685}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8556923866271973},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7988825440406799},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.7223656177520752},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.5796058177947998},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.5335211157798767},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5040261149406433},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5029444098472595},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.47773927450180054},{"id":"https://openalex.org/C2779173999","wikidata":"https://www.wikidata.org/wiki/Q680296","display_name":"Network administrator","level":2,"score":0.4714718163013458},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.42576634883880615},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.41391271352767944},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3499643802642822},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21375855803489685}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3184066.3184089","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3184066.3184089","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd International Conference on Machine Learning and Soft Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7099999785423279,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2074416483","https://openalex.org/W2087286216","https://openalex.org/W2096118443","https://openalex.org/W2129879631","https://openalex.org/W2136112593","https://openalex.org/W2142889610","https://openalex.org/W2502697733","https://openalex.org/W2600428724","https://openalex.org/W2622259984","https://openalex.org/W2733765803","https://openalex.org/W2999412597","https://openalex.org/W3150719513"],"related_works":["https://openalex.org/W2061466315","https://openalex.org/W2376886931","https://openalex.org/W1992118813","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W1495178644","https://openalex.org/W2185594426"],"abstract_inverted_index":{"Nowadays,":[0],"network":[1,22,68,124],"is":[2,43,58,87],"one":[3],"of":[4,8,12,35,91,100,108],"the":[5,19,29,33,36,52,56,64,67,73,80,98,106],"essential":[6],"parts":[7],"life,":[9],"and":[10,31,49,70,95,102,157],"lots":[11],"primary":[13],"activities":[14],"are":[15,105],"performed":[16],"by":[17],"using":[18],"network.":[20],"Also,":[21,97],"security":[23],"plays":[24],"an":[25,117],"important":[26],"role":[27],"in":[28],"administrator":[30],"monitors":[32],"operation":[34],"system.":[37,82],"The":[38],"intrusion":[39],"detection":[40,101,110,140],"system":[41,57,61,69],"(IDS)":[42],"a":[44],"crucial":[45],"module":[46],"to":[47,128],"detect":[48,129],"defend":[50],"against":[51],"malicious":[53,85],"traffics":[54,86],"before":[55],"affected.":[59],"This":[60],"can":[62],"extract":[63],"information":[65],"from":[66],"quickly":[71],"indicate":[72],"reaction":[74],"which":[75],"provides":[76],"real-time":[77],"protection":[78],"for":[79],"protected":[81],"However,":[83],"detecting":[84],"very":[88],"complicating":[89],"because":[90],"their":[92],"large":[93],"quantity":[94],"variants.":[96],"accuracy":[99,143],"execution":[103],"time":[104],"challenges":[107],"some":[109],"methods.":[111],"In":[112],"this":[113],"paper,":[114],"we":[115],"propose":[116],"IDS":[118],"platform":[119],"based":[120,138],"on":[121],"convolutional":[122],"neural":[123],"(CNN)":[125],"called":[126],"IDS-CNN":[127],"DoS":[130,139],"attack.":[131],"Experimental":[132],"results":[133],"show":[134],"that":[135,161],"our":[136,162],"CNN":[137],"obtains":[141],"high":[142],"at":[144],"most":[145],"99.87%.":[146],"Moreover,":[147],"comparisons":[148],"with":[149],"other":[150],"machine":[151],"learning":[152],"techniques":[153],"including":[154],"KNN,":[155],"SVM,":[156],"Na\u00efve":[158],"Bayes":[159],"demonstrate":[160],"proposed":[163],"method":[164],"outperforms":[165],"traditional":[166],"ones.":[167]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":14},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
