{"id":"https://openalex.org/W4205873385","doi":"https://doi.org/10.1145/3484824.3484908","title":"Leveraging LSTM-RNN combined with SVM for Network Intrusion Detection","display_name":"Leveraging LSTM-RNN combined with SVM for Network Intrusion Detection","publication_year":2021,"publication_date":"2021-08-09","ids":{"openalex":"https://openalex.org/W4205873385","doi":"https://doi.org/10.1145/3484824.3484908"},"language":"en","primary_location":{"id":"doi:10.1145/3484824.3484908","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3484824.3484908","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Data Science, Machine Learning and Artificial Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073018313","display_name":"Shweta Patidar","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Shweta Patidar","raw_affiliation_strings":[""],"affiliations":[{"raw_affiliation_string":"","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074885448","display_name":"Meenakshi Tripathi","orcid":"https://orcid.org/0000-0002-6559-5151"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Meenakshi Tripathi","raw_affiliation_strings":[""],"affiliations":[{"raw_affiliation_string":"","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037401837","display_name":"Subham Gupta","orcid":"https://orcid.org/0000-0002-0351-634X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Subham Kumar Gupta","raw_affiliation_strings":[""],"affiliations":[{"raw_affiliation_string":"","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5073018313"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.4584,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.67291575,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"26","last_page":"31"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8385404944419861},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.6627171635627747},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.61958909034729},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6120162010192871},{"id":"https://openalex.org/keywords/recurrent-neural-network","display_name":"Recurrent neural network","score":0.5634647607803345},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5491174459457397},{"id":"https://openalex.org/keywords/dependency","display_name":"Dependency (UML)","score":0.5141194462776184},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5037395358085632},{"id":"https://openalex.org/keywords/long-short-term-memory","display_name":"Long short term memory","score":0.4390411972999573},{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.42553460597991943},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4253951907157898},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4220428168773651},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.381733775138855},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.12964022159576416}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8385404944419861},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.6627171635627747},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.61958909034729},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6120162010192871},{"id":"https://openalex.org/C147168706","wikidata":"https://www.wikidata.org/wiki/Q1457734","display_name":"Recurrent neural network","level":3,"score":0.5634647607803345},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5491174459457397},{"id":"https://openalex.org/C19768560","wikidata":"https://www.wikidata.org/wiki/Q320727","display_name":"Dependency (UML)","level":2,"score":0.5141194462776184},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5037395358085632},{"id":"https://openalex.org/C133488467","wikidata":"https://www.wikidata.org/wiki/Q6673524","display_name":"Long short term memory","level":4,"score":0.4390411972999573},{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.42553460597991943},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4253951907157898},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4220428168773651},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.381733775138855},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.12964022159576416}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3484824.3484908","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3484824.3484908","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Data Science, Machine Learning and Artificial Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W433644524","https://openalex.org/W1196375415","https://openalex.org/W1546411676","https://openalex.org/W2047350783","https://openalex.org/W2064675550","https://openalex.org/W2088263074","https://openalex.org/W2102113734","https://openalex.org/W2127233333","https://openalex.org/W2143612262","https://openalex.org/W2150755264","https://openalex.org/W2335999708","https://openalex.org/W2598811698","https://openalex.org/W2755146079","https://openalex.org/W2802423050","https://openalex.org/W2807786182","https://openalex.org/W2883098359","https://openalex.org/W2889165715","https://openalex.org/W2890624031","https://openalex.org/W2941716987","https://openalex.org/W2955155733","https://openalex.org/W2959752585","https://openalex.org/W2980576170","https://openalex.org/W2991219622","https://openalex.org/W3102259344","https://openalex.org/W3105750153","https://openalex.org/W6602432528","https://openalex.org/W6675327624","https://openalex.org/W6678796051","https://openalex.org/W6680230698"],"related_works":["https://openalex.org/W2312996858","https://openalex.org/W2392120181","https://openalex.org/W2307276533","https://openalex.org/W2390124310","https://openalex.org/W2361650029","https://openalex.org/W2912153778","https://openalex.org/W2158220440","https://openalex.org/W4387163678","https://openalex.org/W1852121458","https://openalex.org/W2352199719"],"abstract_inverted_index":{"Abstract---Computer":[0],"networks":[1,27,32],"and":[2,73,96,162],"their":[3],"applications":[4],"have":[5,76,104],"changed":[6],"the":[7,31,44,81,91,97,112,119,136,169],"daily":[8],"aspects":[9],"of":[10,49,54,70,83,93,100,118,132,139,154,159,167],"human":[11],"life":[12],"considerably":[13],"be":[14],"it":[15,38],"business,":[16],"entertainment,":[17],"work":[18],"or":[19],"travelling":[20],"aspects.":[21],"However,":[22],"this":[23],"dependency":[24],"on":[25],"computer":[26,113],"has":[28],"also":[29],"made":[30],"prone":[33],"to":[34,42,64,141],"various":[35],"attacks.":[36],"Therefore,":[37],"becomes":[39],"very":[40],"important":[41],"secure":[43],"network":[45,65,114],"from":[46],"any":[47],"type":[48],"suspicious":[50],"activity.":[51],"In":[52],"place":[53],"securing":[55],"each":[56],"system":[57],"individually,":[58],"we":[59,103],"can":[60],"provide":[61],"security":[62],"solutions":[63],"traffic":[66,101,115],"data.":[67],"The":[68,127],"concepts":[69,95],"Deep":[71,120],"Learning":[72,75,121],"Machine":[74],"been":[77],"effectively":[78],"used":[79],"in":[80,111,144,177],"fields":[82],"image":[84],"processing,":[85],"pattern":[86],"recognition,":[87],"NLP,":[88],"etc.":[89],"Considering":[90],"advantages":[92],"these":[94],"sequential":[98],"nature":[99],"data,":[102],"proposed":[105,128,170],"a":[106,160,163],"solution":[107],"for":[108],"detecting":[109,178],"intrusions":[110,179],"using":[116],"one":[117],"approach":[122],"called":[123],"Long":[124],"Short-Term":[125],"Memory(LSTM).":[126],"model":[129,172],"makes":[130],"use":[131],"LSTM":[133,171],"combined":[134],"with":[135],"loss":[137],"function":[138],"SVM":[140],"detect":[142],"intrusion":[143],"Kyoto":[145,181],"University":[146,182],"Honeypot":[147],"Network":[148],"Traffic":[149],"Data.":[150],"With":[151],"an":[152],"accuracy":[153],"97.10%,":[155],"true":[156],"positive":[157,165],"rate":[158,166],"98.50%":[161],"false":[164],"5.21%,":[168],"outperforms":[173],"other":[174],"existing":[175],"models":[176],"over":[180],"Dataset.":[183]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
