{"id":"https://openalex.org/W2904640502","doi":"https://doi.org/10.1145/3286606.3286805","title":"Novel Framework Based on Genetic Algorithm and Simulated Annealing Algorithm for Optimization of BP Neural Network Applied to Network IDS","display_name":"Novel Framework Based on Genetic Algorithm and Simulated Annealing Algorithm for Optimization of BP Neural Network Applied to Network IDS","publication_year":2018,"publication_date":"2018-10-10","ids":{"openalex":"https://openalex.org/W2904640502","doi":"https://doi.org/10.1145/3286606.3286805","mag":"2904640502"},"language":"en","primary_location":{"id":"doi:10.1145/3286606.3286805","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3286606.3286805","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International Conference on Smart City Applications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040097612","display_name":"Zouhair Chiba","orcid":"https://orcid.org/0000-0002-6200-0087"},"institutions":[{"id":"https://openalex.org/I99297268","display_name":"University of Hassan II Casablanca","ror":"https://ror.org/001q4kn48","country_code":"MA","type":"education","lineage":["https://openalex.org/I99297268"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Zouhair Chiba","raw_affiliation_strings":["LIMSAD Labs, Hassan II University of Casablanca, Casablanca, Morocco"],"affiliations":[{"raw_affiliation_string":"LIMSAD Labs, Hassan II University of Casablanca, Casablanca, Morocco","institution_ids":["https://openalex.org/I99297268"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032038935","display_name":"Noreddine Abghour","orcid":"https://orcid.org/0000-0002-8429-6712"},"institutions":[{"id":"https://openalex.org/I99297268","display_name":"University of Hassan II Casablanca","ror":"https://ror.org/001q4kn48","country_code":"MA","type":"education","lineage":["https://openalex.org/I99297268"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Noreddine Abghour","raw_affiliation_strings":["LIMSAD Labs, Hassan II University of Casablanca, Casablanca, Morocco"],"affiliations":[{"raw_affiliation_string":"LIMSAD Labs, Hassan II University of Casablanca, Casablanca, Morocco","institution_ids":["https://openalex.org/I99297268"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010907886","display_name":"Khalid Moussaid","orcid":"https://orcid.org/0000-0002-7542-9640"},"institutions":[{"id":"https://openalex.org/I99297268","display_name":"University of Hassan II Casablanca","ror":"https://ror.org/001q4kn48","country_code":"MA","type":"education","lineage":["https://openalex.org/I99297268"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Khalid Moussaid","raw_affiliation_strings":["LIMSAD Labs, Hassan II University of Casablanca, Casablanca, Morocco"],"affiliations":[{"raw_affiliation_string":"LIMSAD Labs, Hassan II University of Casablanca, Casablanca, Morocco","institution_ids":["https://openalex.org/I99297268"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112116285","display_name":"Amina El Omri","orcid":null},"institutions":[{"id":"https://openalex.org/I99297268","display_name":"University of Hassan II Casablanca","ror":"https://ror.org/001q4kn48","country_code":"MA","type":"education","lineage":["https://openalex.org/I99297268"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Amina El Omri","raw_affiliation_strings":["LIMSAD Labs, Hassan II University of Casablanca, Casablanca, Morocco"],"affiliations":[{"raw_affiliation_string":"LIMSAD Labs, Hassan II University of Casablanca, Casablanca, Morocco","institution_ids":["https://openalex.org/I99297268"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086156614","display_name":"Mohamed Rida","orcid":"https://orcid.org/0000-0002-4964-4347"},"institutions":[{"id":"https://openalex.org/I99297268","display_name":"University of Hassan II Casablanca","ror":"https://ror.org/001q4kn48","country_code":"MA","type":"education","lineage":["https://openalex.org/I99297268"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Mohamed Rida","raw_affiliation_strings":["LIMSAD Labs, Hassan II University of Casablanca, Casablanca, Morocco"],"affiliations":[{"raw_affiliation_string":"LIMSAD Labs, Hassan II University of Casablanca, Casablanca, Morocco","institution_ids":["https://openalex.org/I99297268"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5040097612"],"corresponding_institution_ids":["https://openalex.org/I99297268"],"apc_list":null,"apc_paid":null,"fwci":0.5536,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.7167743,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"100","issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7864114046096802},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7128430008888245},{"id":"https://openalex.org/keywords/simulated-annealing","display_name":"Simulated annealing","score":0.6780097484588623},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.6543819904327393},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.6297231912612915},{"id":"https://openalex.org/keywords/genetic-algorithm","display_name":"Genetic algorithm","score":0.5777071118354797},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5738551616668701},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5578083395957947},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.48296111822128296},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.47318434715270996},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3896685540676117},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.37278926372528076},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12416258454322815},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10487401485443115}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7864114046096802},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7128430008888245},{"id":"https://openalex.org/C126980161","wikidata":"https://www.wikidata.org/wiki/Q863783","display_name":"Simulated annealing","level":2,"score":0.6780097484588623},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6543819904327393},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.6297231912612915},{"id":"https://openalex.org/C8880873","wikidata":"https://www.wikidata.org/wiki/Q187787","display_name":"Genetic algorithm","level":2,"score":0.5777071118354797},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5738551616668701},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5578083395957947},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.48296111822128296},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.47318434715270996},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3896685540676117},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.37278926372528076},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12416258454322815},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10487401485443115},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3286606.3286805","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3286606.3286805","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International Conference on Smart City Applications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6399999856948853,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W987648574","https://openalex.org/W2152714487","https://openalex.org/W2238003663","https://openalex.org/W2556855889","https://openalex.org/W2564857486","https://openalex.org/W2756940441","https://openalex.org/W2757421369","https://openalex.org/W2775994730","https://openalex.org/W2777920897","https://openalex.org/W2782815793","https://openalex.org/W2790583291","https://openalex.org/W2904250082"],"related_works":["https://openalex.org/W2061466315","https://openalex.org/W2376886931","https://openalex.org/W1992118813","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W1495178644","https://openalex.org/W2185594426"],"abstract_inverted_index":{"Nowadays,":[0],"network":[1,18,60,187],"security":[2,10,65],"is":[3,46,182],"a":[4,77,91,101,119],"world":[5],"hot":[6],"topic":[7],"in":[8,17,22,73,80,171],"computer":[9,59],"and":[11,33,50,61,83,129,165,168,176,180],"defense.":[12],"Intrusions,":[13],"attacks":[14],"or":[15],"anomalies":[16],"infrastructures":[19],"lead":[20],"mostly":[21],"great":[23],"financial":[24],"losses,":[25],"massive":[26],"sensitive":[27],"data":[28],"leaks,":[29],"thereby":[30],"decreasing":[31],"efficiency":[32],"the":[34,55,64,69,154],"quality":[35],"of":[36,38,58,71,90,173],"productivity":[37],"an":[39,47,74,87],"organization.":[40,93],"Network":[41,116],"Intrusion":[42],"Detection":[43],"System":[44],"(NIDS)":[45],"effective":[48],"countermeasure":[49],"high-profile":[51],"method":[52],"to":[53,62,99],"detect":[54],"unauthorized":[56],"use":[57],"provide":[63],"for":[66,109,186],"information.":[67],"Thus,":[68],"presence":[70],"NIDS":[72],"organization":[75],"plays":[76],"vital":[78],"part":[79,89],"attack":[81],"mitigation,":[82],"it":[84,181],"has":[85],"become":[86],"integral":[88],"secure":[92],"In":[94],"this":[95],"paper,":[96],"we":[97],"propose":[98],"optimize":[100],"very":[102,183],"popular":[103],"soft":[104],"computing":[105],"tool":[106],"widely":[107],"used":[108],"intrusion":[110],"detection":[111,174],"namely":[112],"Back":[113],"Propagation":[114],"Neural":[115],"(BPNN)":[117],"using":[118,162],"novel":[120],"hybrid":[121],"Framework":[122],"(GASAA)":[123],"based":[124,148],"on":[125,136],"Genetic":[126],"Algorithm":[127,132],"(GA)":[128],"Simulated":[130],"Annealing":[131],"(SAA).":[133],"Experimental":[134],"results":[135],"KDD":[137],"CUP'":[138],"99":[139],"dataset":[140],"show":[141],"that":[142],"our":[143],"optimized":[144,160],"ANIDS":[145,156,158],"(Anomaly":[146],"NIDS)":[147],"BPNN,":[149,157],"called":[150],"\"ANIDS":[151],"BPNN-GASAA\"":[152],"outperforms":[153],"original":[155],"BPNN":[159],"by":[161],"only":[163],"GA":[164],"several":[166],"traditional":[167],"new":[169],"techniques":[170],"terms":[172],"rate":[175],"false":[177],"positive":[178],"rate,":[179],"much":[184],"suitable":[185],"anomaly":[188],"detection.":[189]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
