{"id":"https://openalex.org/W2919615098","doi":"https://doi.org/10.1145/3293663.3293683","title":"Anomaly based Detection Analysis for Intrusion Detection System using Big Data Technique with Learning Vector Quantization (LVQ) and Principal Component Analysis (PCA)","display_name":"Anomaly based Detection Analysis for Intrusion Detection System using Big Data Technique with Learning Vector Quantization (LVQ) and Principal Component Analysis (PCA)","publication_year":2018,"publication_date":"2018-11-23","ids":{"openalex":"https://openalex.org/W2919615098","doi":"https://doi.org/10.1145/3293663.3293683","mag":"2919615098"},"language":"en","primary_location":{"id":"doi:10.1145/3293663.3293683","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3293663.3293683","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 International Conference on Artificial Intelligence and Virtual Reality","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103168994","display_name":"Muhammad Salman","orcid":"https://orcid.org/0000-0002-0156-6271"},"institutions":[{"id":"https://openalex.org/I29617571","display_name":"University of Indonesia","ror":"https://ror.org/0116zj450","country_code":"ID","type":"education","lineage":["https://openalex.org/I29617571"]}],"countries":["ID"],"is_corresponding":true,"raw_author_name":"Muhammad Salman","raw_affiliation_strings":["Department of Electrical Engineering, Universitas Indonesia, Depok, Indonesia"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Universitas Indonesia, Depok, Indonesia","institution_ids":["https://openalex.org/I29617571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014850686","display_name":"Diyanatul Husna","orcid":null},"institutions":[{"id":"https://openalex.org/I29617571","display_name":"University of Indonesia","ror":"https://ror.org/0116zj450","country_code":"ID","type":"education","lineage":["https://openalex.org/I29617571"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Diyanatul Husna","raw_affiliation_strings":["Department of Electrical Engineering, Universitas Indonesia, Depok, Indonesia"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Universitas Indonesia, Depok, Indonesia","institution_ids":["https://openalex.org/I29617571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070280327","display_name":"Stella Gabriella Apriliani","orcid":null},"institutions":[{"id":"https://openalex.org/I29617571","display_name":"University of Indonesia","ror":"https://ror.org/0116zj450","country_code":"ID","type":"education","lineage":["https://openalex.org/I29617571"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Stella Gabriella Apriliani","raw_affiliation_strings":["Department of Electrical Engineering, Universitas Indonesia, Depok, Indonesia"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Universitas Indonesia, Depok, Indonesia","institution_ids":["https://openalex.org/I29617571"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052737357","display_name":"Josua Geovani Pinem","orcid":"https://orcid.org/0000-0002-3464-7828"},"institutions":[{"id":"https://openalex.org/I29617571","display_name":"University of Indonesia","ror":"https://ror.org/0116zj450","country_code":"ID","type":"education","lineage":["https://openalex.org/I29617571"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Josua Geovani Pinem","raw_affiliation_strings":["Department of Electrical Engineering, Universitas Indonesia, Depok, Indonesia"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Universitas Indonesia, Depok, Indonesia","institution_ids":["https://openalex.org/I29617571"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5103168994"],"corresponding_institution_ids":["https://openalex.org/I29617571"],"apc_list":null,"apc_paid":null,"fwci":0.5536,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.72342023,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"20","last_page":"23"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.984000027179718,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.984000027179718,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9397000074386597,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/learning-vector-quantization","display_name":"Learning vector quantization","score":0.8753423094749451},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6880614161491394},{"id":"https://openalex.org/keywords/principal-component-analysis","display_name":"Principal component analysis","score":0.6769073605537415},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6719395518302917},{"id":"https://openalex.org/keywords/confusion-matrix","display_name":"Confusion matrix","score":0.663972020149231},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5593109726905823},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.534359335899353},{"id":"https://openalex.org/keywords/vector-quantization","display_name":"Vector quantization","score":0.5290438532829285},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.4847109317779541},{"id":"https://openalex.org/keywords/anomaly-based-intrusion-detection-system","display_name":"Anomaly-based intrusion detection system","score":0.46452367305755615},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.40126776695251465},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.40123820304870605}],"concepts":[{"id":"https://openalex.org/C40567965","wikidata":"https://www.wikidata.org/wiki/Q1820283","display_name":"Learning vector quantization","level":3,"score":0.8753423094749451},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6880614161491394},{"id":"https://openalex.org/C27438332","wikidata":"https://www.wikidata.org/wiki/Q2873","display_name":"Principal component analysis","level":2,"score":0.6769073605537415},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6719395518302917},{"id":"https://openalex.org/C138602881","wikidata":"https://www.wikidata.org/wiki/Q2709591","display_name":"Confusion matrix","level":2,"score":0.663972020149231},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5593109726905823},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.534359335899353},{"id":"https://openalex.org/C199833920","wikidata":"https://www.wikidata.org/wiki/Q612536","display_name":"Vector quantization","level":2,"score":0.5290438532829285},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.4847109317779541},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.46452367305755615},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.40126776695251465},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.40123820304870605}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3293663.3293683","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3293663.3293683","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 International Conference on Artificial Intelligence and Virtual Reality","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W2052667194","https://openalex.org/W2291171016","https://openalex.org/W2548647095","https://openalex.org/W2575609578","https://openalex.org/W2626346790","https://openalex.org/W2767422967","https://openalex.org/W2784211455","https://openalex.org/W2804455053"],"related_works":["https://openalex.org/W2100968651","https://openalex.org/W4243803532","https://openalex.org/W1530525041","https://openalex.org/W4244998381","https://openalex.org/W2352648934","https://openalex.org/W4230688072","https://openalex.org/W1915693853","https://openalex.org/W2337148208","https://openalex.org/W2378212145","https://openalex.org/W2798892016"],"abstract_inverted_index":{"Data":[0,87],"security":[1,56],"has":[2,20],"become":[3,38,41],"a":[4,81,108,154],"very":[5],"serious":[6],"parf":[7],"of":[8,36,57,84,166,212],"any":[9],"organizational":[10],"information":[11,167],"system.":[12],"More":[13],"and":[14,22,40,73,117,148,214],"more":[15,42,155],"threats":[16],"across":[17],"the":[18,34,48,55,58,102,114,120,125,136,144,164,170,195,208],"Internet":[19],"evolved":[21],"capable":[23],"to":[24,44,79,100,124,130,189,219],"deceive":[25],"firewall":[26,49],"as":[27,29],"well":[28],"antivirus":[30,51],"software.":[31,52],"In":[32,76],"addition,":[33],"number":[35],"attacks":[37],"larger":[39],"dificult":[43],"be":[45],"processed":[46],"by":[47,63,134,162,193,205],"or":[50],"To":[53],"improve":[54,131,190],"system":[59,191],"is":[60,89,93,107,160,182],"usually":[61],"done":[62],"adding":[64],"Intrusion":[65],"Detection":[66],"System(IDS),":[67],"which":[68],"divided":[69],"into":[70],"anomaly-based":[71],"detection":[72,92],"signature-based":[74],"detection.":[75],"this":[77],"research":[78],"process":[80],"huge":[82],"amount":[83],"data,":[85],"Big":[86],"technique":[88,111,181],"used.":[90],"Anomaly-based":[91],"proposed":[94],"using":[95,199],"Learning":[96,104,186],"Vector":[97,105,187],"Quantization":[98,106,188],"Algorithm":[99],"detect":[101],"attacks.":[103],"neural":[109],"network":[110],"that":[112,139],"learn":[113],"input":[115],"itself":[116],"then":[118],"give":[119],"appropriate":[121],"output":[122,159],"according":[123],"input.":[126],"Modifications":[127],"were":[128],"made":[129],"test":[132,137],"accuracy":[133],"varying":[135],"parameters":[138],"present":[140],"in":[141,153],"LVQ.":[142],"Varying":[143],"learning":[145],"rate,":[146],"epoch":[147],"k-fold":[149],"cross":[150],"validation":[151],"resulted":[152],"efficient":[156],"output.":[157],"The":[158],"obtained":[161],"calculating":[163],"value":[165],"retrieval":[168],"from":[169,174],"confusion":[171],"matrix":[172],"table":[173],"each":[175],"attack":[176],"classes.":[177],"Principal":[178],"Component":[179],"Analysis":[180],"used":[183],"along":[184],"with":[185,207],"performance":[192],"reducing":[194],"data":[196],"dimensionality.":[197],"By":[198],"18-Principal":[200],"Component,":[201],"dataset":[202],"successfully":[203],"reduced":[204],"47.3%,":[206],"best":[209],"Recognition":[210],"Rate":[211],"96.52%":[213],"time":[215],"efficiency":[216],"improvement":[217],"up":[218],"43.16%.":[220]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
