{"id":"https://openalex.org/W4310511492","doi":"https://doi.org/10.1145/3565477.3569152","title":"Flow-based network intrusion detection based on BERT masked language model","display_name":"Flow-based network intrusion detection based on BERT masked language model","publication_year":2022,"publication_date":"2022-12-01","ids":{"openalex":"https://openalex.org/W4310511492","doi":"https://doi.org/10.1145/3565477.3569152"},"language":"en","primary_location":{"id":"doi:10.1145/3565477.3569152","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3565477.3569152","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International CoNEXT Student Workshop","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2306.04920","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039327444","display_name":"Loc Gia Nguyen","orcid":null},"institutions":[{"id":"https://openalex.org/I85922643","display_name":"Nagaoka University of Technology","ror":"https://ror.org/00ys1hz88","country_code":"JP","type":"education","lineage":["https://openalex.org/I85922643"]},{"id":"https://openalex.org/I119806805","display_name":"Nagaoka University","ror":"https://ror.org/02rcadd38","country_code":"JP","type":"education","lineage":["https://openalex.org/I119806805"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Loc Gia Nguyen","raw_affiliation_strings":["Nagaoka University of Technology, Nagaoka, Niigata, Japan"],"affiliations":[{"raw_affiliation_string":"Nagaoka University of Technology, Nagaoka, Niigata, Japan","institution_ids":["https://openalex.org/I119806805","https://openalex.org/I85922643"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020753132","display_name":"Kohei Watabe","orcid":"https://orcid.org/0000-0002-9246-9740"},"institutions":[{"id":"https://openalex.org/I119806805","display_name":"Nagaoka University","ror":"https://ror.org/02rcadd38","country_code":"JP","type":"education","lineage":["https://openalex.org/I119806805"]},{"id":"https://openalex.org/I85922643","display_name":"Nagaoka University of Technology","ror":"https://ror.org/00ys1hz88","country_code":"JP","type":"education","lineage":["https://openalex.org/I85922643"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kohei Watabe","raw_affiliation_strings":["Nagaoka University of Technology, Nagaoka, Niigata, Japan"],"affiliations":[{"raw_affiliation_string":"Nagaoka University of Technology, Nagaoka, Niigata, Japan","institution_ids":["https://openalex.org/I119806805","https://openalex.org/I85922643"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5039327444"],"corresponding_institution_ids":["https://openalex.org/I119806805","https://openalex.org/I85922643"],"apc_list":null,"apc_paid":null,"fwci":2.5686,"has_fulltext":true,"cited_by_count":19,"citation_normalized_percentile":{"value":0.89963993,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"7","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8280706405639648},{"id":"https://openalex.org/keywords/domain-adaptation","display_name":"Domain adaptation","score":0.8001171946525574},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7162303924560547},{"id":"https://openalex.org/keywords/transformer","display_name":"Transformer","score":0.6153115630149841},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5560827255249023},{"id":"https://openalex.org/keywords/adaptation","display_name":"Adaptation (eye)","score":0.5483669638633728},{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.529490053653717},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5119665861129761},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4646569788455963},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.4327506124973297},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.36263805627822876},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09465700387954712},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.07844522595405579},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.0704641342163086}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8280706405639648},{"id":"https://openalex.org/C2776434776","wikidata":"https://www.wikidata.org/wiki/Q19246213","display_name":"Domain adaptation","level":3,"score":0.8001171946525574},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7162303924560547},{"id":"https://openalex.org/C66322947","wikidata":"https://www.wikidata.org/wiki/Q11658","display_name":"Transformer","level":3,"score":0.6153115630149841},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5560827255249023},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.5483669638633728},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.529490053653717},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5119665861129761},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4646569788455963},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.4327506124973297},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36263805627822876},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09465700387954712},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.07844522595405579},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0704641342163086},{"id":"https://openalex.org/C165801399","wikidata":"https://www.wikidata.org/wiki/Q25428","display_name":"Voltage","level":2,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3565477.3569152","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3565477.3569152","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International CoNEXT Student Workshop","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2306.04920","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2306.04920","pdf_url":"https://arxiv.org/pdf/2306.04920","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2306.04920","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2306.04920","pdf_url":"https://arxiv.org/pdf/2306.04920","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1069223013","display_name":null,"funder_award_id":"JSPS KAKENHI","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G3459562248","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G3555937599","display_name":"Development of a Fake Data Generation Platform to Overcome the Monopolization Problem of Communication Data","funder_award_id":"20H04172","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G4434433561","display_name":null,"funder_award_id":"20H0417","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G4636223006","display_name":null,"funder_award_id":"JSPS KAK","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G7041810208","display_name":null,"funder_award_id":"JP20H04172","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G8430481527","display_name":null,"funder_award_id":"Number","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"}],"funders":[{"id":"https://openalex.org/F4320334764","display_name":"Japan Society for the Promotion of Science","ror":"https://ror.org/00hhkn466"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4310511492.pdf","grobid_xml":"https://content.openalex.org/works/W4310511492.grobid-xml"},"referenced_works_count":4,"referenced_works":["https://openalex.org/W2963341956","https://openalex.org/W3034863102","https://openalex.org/W3093410479","https://openalex.org/W3163315201"],"related_works":["https://openalex.org/W4390516098","https://openalex.org/W2357468538","https://openalex.org/W2181948922","https://openalex.org/W1577110157","https://openalex.org/W2384362569","https://openalex.org/W2355007334","https://openalex.org/W4206178588","https://openalex.org/W3094491777","https://openalex.org/W3214715529","https://openalex.org/W4287635093"],"abstract_inverted_index":{"A":[0],"Network":[1],"Intrusion":[2],"Detection":[3],"System":[4],"(NIDS)":[5],"is":[6,61],"an":[7],"important":[8],"tool":[9],"that":[10],"identifies":[11],"potential":[12,31],"threats":[13],"to":[14,33,50,62],"a":[15],"network.":[16],"Recently,":[17],"different":[18,101],"flow-based":[19],"NIDS":[20],"designs":[21],"utilizing":[22],"Machine":[23],"Learning":[24],"(ML)":[25],"algorithms":[26],"have":[27,41],"been":[28],"proposed":[29,91],"as":[30],"solutions":[32],"detect":[34],"intrusions":[35],"efficiently.":[36],"However,":[37],"conventional":[38],"ML-based":[39],"classifiers":[40],"not":[42],"seen":[43],"widespread":[44],"adoption":[45],"in":[46],"the":[47,64,68],"real-world":[48],"due":[49],"their":[51],"poor":[52],"domain":[53,69],"adaptation":[54,70],"capability.":[55],"In":[56],"this":[57],"research,":[58],"our":[59],"goal":[60],"explore":[63],"possibility":[65],"of":[66,72],"improve":[67],"capability":[71],"NIDS.":[73],"Our":[74],"proposal":[75],"employs":[76],"Natural":[77],"Language":[78],"Processing":[79],"(NLP)":[80],"techniques":[81],"and":[82],"Bidirectional":[83],"Encoder":[84],"Representations":[85],"from":[86,100],"Transformers":[87],"(BERT)":[88],"framework.":[89],"The":[90],"method":[92],"achieved":[93],"positive":[94],"results":[95],"when":[96],"tested":[97],"on":[98],"data":[99],"domains.":[102]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":5}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2022-12-11T00:00:00"}
