{"id":"https://openalex.org/W4396682638","doi":"https://doi.org/10.1145/3645279.3645299","title":"Simulation Design of a Network Security Intrusion Detection Model for Cloud Computing Based on Neural Network Model","display_name":"Simulation Design of a Network Security Intrusion Detection Model for Cloud Computing Based on Neural Network Model","publication_year":2023,"publication_date":"2023-11-17","ids":{"openalex":"https://openalex.org/W4396682638","doi":"https://doi.org/10.1145/3645279.3645299"},"language":"en","primary_location":{"id":"doi:10.1145/3645279.3645299","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3645279.3645299","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 International Conference on Big Data Mining and Information Processing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012021378","display_name":"Jing Zeng","orcid":"https://orcid.org/0009-0001-9536-942X"},"institutions":[{"id":"https://openalex.org/I17442442","display_name":"State Grid Corporation of China (China)","ror":"https://ror.org/05twwhs70","country_code":"CN","type":"company","lineage":["https://openalex.org/I17442442"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jing Zeng","raw_affiliation_strings":["State Grid Jibei Information &amp; Telecommunication Company, China"],"affiliations":[{"raw_affiliation_string":"State Grid Jibei Information &amp; Telecommunication Company, China","institution_ids":["https://openalex.org/I17442442"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061412375","display_name":"Shuo Li","orcid":"https://orcid.org/0009-0009-2243-3193"},"institutions":[{"id":"https://openalex.org/I17442442","display_name":"State Grid Corporation of China (China)","ror":"https://ror.org/05twwhs70","country_code":"CN","type":"company","lineage":["https://openalex.org/I17442442"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuo Li","raw_affiliation_strings":["State Grid Jibei Information &amp; Telecommunication Company, China"],"affiliations":[{"raw_affiliation_string":"State Grid Jibei Information &amp; Telecommunication Company, China","institution_ids":["https://openalex.org/I17442442"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034367816","display_name":"Xiangsen Xu","orcid":"https://orcid.org/0009-0000-8805-3884"},"institutions":[{"id":"https://openalex.org/I17442442","display_name":"State Grid Corporation of China (China)","ror":"https://ror.org/05twwhs70","country_code":"CN","type":"company","lineage":["https://openalex.org/I17442442"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangsen Xu","raw_affiliation_strings":["State Grid Jibei Information &amp; Telecommunication Company, China"],"affiliations":[{"raw_affiliation_string":"State Grid Jibei Information &amp; Telecommunication Company, China","institution_ids":["https://openalex.org/I17442442"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5012021378"],"corresponding_institution_ids":["https://openalex.org/I17442442"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.27707923,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"111","last_page":"115"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8439937233924866},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8430368900299072},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.7018110752105713},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6595486402511597},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5273652672767639},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5202873349189758},{"id":"https://openalex.org/keywords/recurrent-neural-network","display_name":"Recurrent neural network","score":0.44546404480934143},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4139108657836914},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.4102880358695984},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.29854071140289307},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.25479066371917725},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.23644787073135376},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07424169778823853}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8439937233924866},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8430368900299072},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.7018110752105713},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6595486402511597},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5273652672767639},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5202873349189758},{"id":"https://openalex.org/C147168706","wikidata":"https://www.wikidata.org/wiki/Q1457734","display_name":"Recurrent neural network","level":3,"score":0.44546404480934143},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4139108657836914},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.4102880358695984},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.29854071140289307},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.25479066371917725},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.23644787073135376},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07424169778823853}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3645279.3645299","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3645279.3645299","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 International Conference on Big Data Mining and Information Processing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1992041624","https://openalex.org/W2113311546","https://openalex.org/W2401501243","https://openalex.org/W2529866846","https://openalex.org/W2884903929","https://openalex.org/W3013357301","https://openalex.org/W3159344146","https://openalex.org/W3168771234","https://openalex.org/W4200572601","https://openalex.org/W4212879593","https://openalex.org/W4214939221","https://openalex.org/W7139033639"],"related_works":["https://openalex.org/W2376886931","https://openalex.org/W2061466315","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W1495178644","https://openalex.org/W2185594426","https://openalex.org/W2377372927"],"abstract_inverted_index":{"Malicious":[0],"attacks":[1,111],"and":[2,11,26,137,142,151,160],"data":[3,74,88,97],"loss":[4],"in":[5,42,56,78,86],"cloud":[6,30,43,64],"computing":[7,44,65],"are":[8],"becoming":[9],"more":[10,12],"serious,":[13],"which":[14,172],"has":[15,134,187],"brought":[16],"serious":[17],"economic":[18],"losses":[19],"to":[20,118,146],"users.":[21],"Based":[22],"on":[23,71],"the":[24,35,57,82,90,95,99,107,119,126,162,176,185],"characteristics":[25,100],"security":[27,67],"requirements":[28],"of":[29,101,109,121,140,166,178],"computing,":[31],"this":[32],"paper":[33],"studies":[34],"distributed":[36],"IDS":[37,122,167],"(intrusion":[38],"detection":[39,123],"system)":[40],"model":[41,69],"environment.":[45],"This":[46],"article":[47],"employs":[48],"an":[49],"enhanced":[50],"CNN":[51,83,133,169],"(Convolutional":[52],"Neural":[53,154],"Network)":[54],"algorithm":[55,186],"Intrusion":[58],"Detection":[59],"(ID)":[60],"module,":[61,84],"introducing":[62],"a":[63],"network":[66,102,110],"ID":[68,189],"based":[70],"CNN.":[72],"The":[73,128],"undergoes":[75],"sequential":[76],"processing":[77],"each":[79],"layer":[80],"using":[81,168],"resulting":[85],"classified":[87,96],"through":[89],"excitation":[91],"process.":[92],"By":[93],"comparing":[94],"with":[98,158],"attack":[103],"behavior":[104],"or":[105,112],"patterns,":[106],"presence":[108],"abnormalities":[113],"can":[114],"be":[115],"determined,":[116],"leading":[117],"retrieval":[120],"results":[124,130],"for":[125],"data.":[127],"simulation":[129],"show":[131],"that":[132,184],"higher":[135],"precision":[136],"recall":[138],"rates":[139],"97.988%":[141],"94.99%,":[143],"respectively,":[144],"compared":[145,157],"BPNN":[147],"(BP":[148],"neural":[149],"network)":[150],"RNN":[152],"(Recurrent":[153],"Network).":[155],"Moreover,":[156],"BPNN(8.809%)":[159],"RNN(5.124%),":[161],"false":[163],"negative":[164],"rate":[165],"is":[170,182],"smaller,":[171],"will":[173],"greatly":[174],"reduce":[175],"number":[177],"undetected":[179],"attacks.":[180],"It":[181],"verified":[183],"high":[188],"performance.":[190]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
