{"id":"https://openalex.org/W2919936975","doi":"https://doi.org/10.1145/3297156.3297230","title":"Intrusion Detection System for NSL-KDD Dataset Using Convolutional Neural Networks","display_name":"Intrusion Detection System for NSL-KDD Dataset Using Convolutional Neural Networks","publication_year":2018,"publication_date":"2018-12-08","ids":{"openalex":"https://openalex.org/W2919936975","doi":"https://doi.org/10.1145/3297156.3297230","mag":"2919936975"},"language":"en","primary_location":{"id":"doi:10.1145/3297156.3297230","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3297156.3297230","pdf_url":null,"source":{"id":"https://openalex.org/S4306523626","display_name":"Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075420475","display_name":"Yalei Ding","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yalei Ding","raw_affiliation_strings":["Southeast University, China"],"affiliations":[{"raw_affiliation_string":"Southeast University, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103323164","display_name":"Yuqing Zhai","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuqing Zhai","raw_affiliation_strings":["Southeast University, China"],"affiliations":[{"raw_affiliation_string":"Southeast University, China","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5075420475"],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":13.608,"has_fulltext":false,"cited_by_count":139,"citation_normalized_percentile":{"value":0.99180681,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"81","last_page":"85"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8622581362724304},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7996009588241577},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.7273154258728027},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.710404098033905},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6968821287155151},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.6789294481277466},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.6314012408256531},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.5061103701591492},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.44780102372169495},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.33825600147247314}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8622581362724304},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7996009588241577},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.7273154258728027},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.710404098033905},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6968821287155151},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.6789294481277466},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.6314012408256531},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.5061103701591492},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.44780102372169495},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33825600147247314}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3297156.3297230","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3297156.3297230","pdf_url":null,"source":{"id":"https://openalex.org/S4306523626","display_name":"Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W104211377","https://openalex.org/W1631951852","https://openalex.org/W1995678176","https://openalex.org/W2016258134","https://openalex.org/W2076063813","https://openalex.org/W2097034581","https://openalex.org/W2120685459","https://openalex.org/W2335999708","https://openalex.org/W2342408547","https://openalex.org/W2399941526","https://openalex.org/W2512144135","https://openalex.org/W2655549288","https://openalex.org/W2762776925","https://openalex.org/W2783741806","https://openalex.org/W2793241948","https://openalex.org/W2886020981","https://openalex.org/W2919115771","https://openalex.org/W6744007665"],"related_works":["https://openalex.org/W4200112873","https://openalex.org/W4224941037","https://openalex.org/W2955796858","https://openalex.org/W2004826645","https://openalex.org/W2387580700","https://openalex.org/W2899285606","https://openalex.org/W2746581472","https://openalex.org/W4226493464","https://openalex.org/W4312417841","https://openalex.org/W3135818052"],"abstract_inverted_index":{"With":[0],"the":[1,21,55,68,80,112,115,124,160,169,190,193],"increment":[2],"of":[3,23,54,76,114,126,162,171,192],"cyber":[4,12,18,82],"traffic,":[5],"there":[6],"is":[7,20,166],"a":[8,101,198],"growing":[9],"demand":[10],"for":[11,202],"security.":[13],"How":[14],"to":[15,70,90,121,168],"accurately":[16],"detect":[17],"intrusions":[19],"hotspot":[22],"recent":[24],"research.":[25],"Traditional":[26],"Intrusion":[27],"Detection":[28],"Systems":[29],"(IDS),":[30],"based":[31,95,173],"on":[32,96,174],"traditional":[33,56,127,175],"machine":[34,57,128,176],"learning":[35,51,58,66,104,129,142,177,182],"methods,":[36],"lacks":[37],"reliability":[38],"and":[39,135,140,149,179,196],"accuracy.":[40],"In":[41],"this":[42],"paper,":[43],"we":[44,63,88],"build":[45],"an":[46,92],"IDS":[47,93,164],"model":[48,94,116,165,188],"with":[49,123],"deep":[50,65,103,141,181],"methodology.":[52],"Instead":[53],"used":[59],"in":[60,73,84,184],"previous":[61],"researches,":[62],"think":[64],"has":[67],"potential":[69],"perform":[71],"better":[72],"extracting":[74],"features":[75],"massive":[77,81],"data":[78],"considering":[79],"traffic":[83],"real":[85],"life.":[86],"Therefore,":[87],"propose":[89],"train":[91],"Convolution":[97],"Neural":[98],"Networks":[99],"(CNN),":[100],"typical":[102],"method,":[105],"using":[106,117],"entire":[107],"NSL-KDD":[108],"dataset.":[109],"We":[110],"study":[111],"performance":[113,125,161,170],"multi":[118],"class":[119],"classification":[120],"compare":[122],"methods":[130,143,178,183],"including":[131,144],"Random":[132],"Forest":[133],"(RF)":[134],"Support":[136],"Vector":[137],"Machine":[138],"(SVM),":[139],"Deep":[145],"Belief":[146],"Network":[147],"(DBN)":[148],"Long":[150],"Short":[151],"Term":[152],"Memory":[153],"(LSTM).":[154],"The":[155],"experimental":[156],"results":[157],"show":[158],"that":[159],"our":[163],"superior":[167],"models":[172],"novel":[180],"multi-class":[185],"classification.":[186],"Our":[187],"improves":[189],"accuracy":[191],"intrusion":[194,203],"detection":[195],"provides":[197],"new":[199],"research":[200],"direction":[201],"detection.":[204]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":16},{"year":2024,"cited_by_count":26},{"year":2023,"cited_by_count":28},{"year":2022,"cited_by_count":24},{"year":2021,"cited_by_count":29},{"year":2020,"cited_by_count":11},{"year":2019,"cited_by_count":3}],"updated_date":"2026-04-03T22:45:19.894376","created_date":"2025-10-10T00:00:00"}
