{"id":"https://openalex.org/W4396852861","doi":"https://doi.org/10.1145/3647444.3647874","title":"Transfer Learning Method for Handling The Intrusion Detection System with Zero Attacks Using Machine Learning and Deep Learning","display_name":"Transfer Learning Method for Handling The Intrusion Detection System with Zero Attacks Using Machine Learning and Deep Learning","publication_year":2023,"publication_date":"2023-11-23","ids":{"openalex":"https://openalex.org/W4396852861","doi":"https://doi.org/10.1145/3647444.3647874"},"language":"en","primary_location":{"id":"doi:10.1145/3647444.3647874","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3647444.3647874","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5094208569","display_name":"Talluri Upender","orcid":null},"institutions":[{"id":"https://openalex.org/I341451707","display_name":"Shri Jagdishprasad Jhabarmal Tibrewala University","ror":"https://ror.org/03gs0q910","country_code":"IN","type":"education","lineage":["https://openalex.org/I341451707"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Talluri Upender","raw_affiliation_strings":["Dept. of CSE, Shree JJT University, Jhunjhunu, Rajasthan, India"],"raw_orcid":"https://orcid.org/0009-0002-4306-6790","affiliations":[{"raw_affiliation_string":"Dept. of CSE, Shree JJT University, Jhunjhunu, Rajasthan, India","institution_ids":["https://openalex.org/I341451707"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021374414","display_name":"Bechoo Lal","orcid":"https://orcid.org/0000-0002-0225-1001"},"institutions":[{"id":"https://openalex.org/I341451707","display_name":"Shri Jagdishprasad Jhabarmal Tibrewala University","ror":"https://ror.org/03gs0q910","country_code":"IN","type":"education","lineage":["https://openalex.org/I341451707"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Bechoo Lal","raw_affiliation_strings":["Dept. of CSE, Shree JJT University, Jhunjhunu, Rajasthan, India"],"raw_orcid":"https://orcid.org/0000-0002-0225-1001","affiliations":[{"raw_affiliation_string":"Dept. of CSE, Shree JJT University, Jhunjhunu, Rajasthan, India","institution_ids":["https://openalex.org/I341451707"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111194448","display_name":"Regonda Nagaraju","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Regonda Nagaraju","raw_affiliation_strings":["Dept. of CSEAI&amp;ML, School of Engineering Mallareddy University, Hyderabad, Telangana, India, India"],"raw_orcid":"https://orcid.org/0000-0002-9850-1721","affiliations":[{"raw_affiliation_string":"Dept. of CSEAI&amp;ML, School of Engineering Mallareddy University, Hyderabad, Telangana, India, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5094208569"],"corresponding_institution_ids":["https://openalex.org/I341451707"],"apc_list":null,"apc_paid":null,"fwci":0.3908,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.65402753,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.982699990272522,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9747999906539917,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7243863344192505},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7057410478591919},{"id":"https://openalex.org/keywords/transfer-of-learning","display_name":"Transfer of learning","score":0.6993963718414307},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5888810157775879},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5272547006607056},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5140622854232788}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7243863344192505},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7057410478591919},{"id":"https://openalex.org/C150899416","wikidata":"https://www.wikidata.org/wiki/Q1820378","display_name":"Transfer of learning","level":2,"score":0.6993963718414307},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5888810157775879},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5272547006607056},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5140622854232788}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3647444.3647874","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3647444.3647874","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1589187224","https://openalex.org/W2056430968","https://openalex.org/W2083739193","https://openalex.org/W2101362067","https://openalex.org/W2141297004","https://openalex.org/W2338211929","https://openalex.org/W2365795845","https://openalex.org/W2395579298","https://openalex.org/W2402671357","https://openalex.org/W2516066574","https://openalex.org/W2734682423","https://openalex.org/W2757811711","https://openalex.org/W2767153057","https://openalex.org/W4206070770","https://openalex.org/W6643697779","https://openalex.org/W6727918611","https://openalex.org/W6746456079"],"related_works":["https://openalex.org/W2731899572","https://openalex.org/W2961085424","https://openalex.org/W3215138031","https://openalex.org/W4306674287","https://openalex.org/W3009238340","https://openalex.org/W4321369474","https://openalex.org/W4360585206","https://openalex.org/W4206357785","https://openalex.org/W4281381188","https://openalex.org/W3192840557"],"abstract_inverted_index":{"Due":[0],"to":[1,72,83,119,160,169,177,215,224,266,307,327,391,440,473],"the":[2,28,42,85,97,103,115,124,133,149,156,235,245,254,267,273,313,335,339,348,360,370,377,393,401,405,408,448],"fast":[3],"advancement":[4],"of":[5,18,30,44,49,55,87,105,126,132,151,199,247,275,282,288,294,341,351,364,373,379,395,404,410,415,419,456,461],"technology,":[6],"cybercrime":[7,45],"is":[8,58,67,81,196,212,221,242,259,319,325,389,451,471],"also":[9,219],"increasing":[10],"in":[11,53,60,231,305,334,407,427],"frequency":[12],"and":[13,25,35,38,145,218,253,291],"complexity.":[14],"Since":[15],"a":[16,141,162,197,301,329,343,365,432],"variety":[17],"attacks":[19,93,204,207,228,421,458],"evolves":[20],"regularly":[21],"with":[22,89,140,208],"complex":[23],"patterns":[24],"varied":[26],"signatures":[27,423,455],"task":[29],"securing":[31],"cyberspace":[32],"becomes":[33],"more":[34,36],"difficult":[37,214],"challenging.":[39],"To":[40,311],"minimize":[41],"impact":[43],"through":[46,479],"early":[47,286,349],"detection":[48,100,165,187,281,287,293,333,378],"intrusions,":[50],"network":[51,56],"activity":[52],"terms":[54],"traffic,":[57],"monitored":[59],"real-time":[61],"thus":[62],"accumulating":[63],"huge":[64],"data":[65,90,117,139],"which":[66,173],"sometimes":[68],"erroneous.":[69],"In":[70,123,338],"order":[71,306],"create":[73,120,170],"efficient":[74,280],"security":[75],"algorithms":[76],"for":[77,148,154,331,347,376,386,459,468],"attack":[78,121,240,367],"detection,":[79],"it":[80,211,220,445],"crucial":[82],"combine":[84],"principles":[86],"cybersecurity":[88],"analytics.":[91],"Known":[92],"are":[94,174,205,229,272,417,424],"detected":[95],"by":[96,400],"signature-based":[98],"intrusion":[99,164,186,332],"systems":[101,107,188],"but":[102,321],"success":[104],"these":[106],"heavily":[108],"depends":[109],"on":[110,114],"feature":[111,397],"engineering":[112],"performed":[113],"training":[116],"used":[118],"signatures.":[122],"context":[125,340],"Intrusion":[127,249],"Detection":[128,250],"Systems":[129],"(IDS)":[130],"most":[131,414],"standard":[134,182],"datasets":[135],"have":[136],"predominantly":[137],"numeric":[138],"few":[142,157,361],"categorical":[143,158],"features":[144,159],"hence":[146],"calls":[147],"exploration":[150],"appropriate":[152],"methods":[153],"handling":[155],"develop":[161],"successful":[163],"system.":[166],"Intruders":[167],"aim":[168],"zero-day":[171,192,203,268,295,309,462],"attacks,":[172,284,290],"entirely":[175],"unheard-of,":[176],"avoid":[178],"being":[179],"discovered.":[180],"The":[181,297,354],"machine":[183],"learning":[184,303,318,324,345,357,436,443,454],"based":[185],"won't":[189],"initially":[190],"catch":[191],"assaults":[193],"since":[194],"there":[195,258],"dearth":[198],"labelled":[200],"data.":[201],"Since,":[202,413],"unknown":[206],"ever-volving":[209],"nature,":[210],"very":[213],"identify":[216],"them,":[217],"highly":[222],"desirable":[223],"stop":[225],"them.":[226],"Zero-day":[227],"handled":[230],"two":[232],"different":[233,402],"scenarios;":[234],"first":[236,314],"scenario":[237,256],"wherein":[238,257],"minimal":[239],"information":[241,262],"shared":[243,368],"among":[244,369],"nodes":[246,372,403],"an":[248,374],"Network":[251],"(IDN)":[252],"second":[255,336],"no":[260],"labeled":[261,362],"at":[263],"all":[264],"related":[265],"attack.Three":[269],"security-related":[270],"concerns":[271],"focus":[274],"this":[276,428],"research":[277,298],"project:":[278],"(i)":[279],"existing":[283,420],"(ii)":[285],"novel":[289],"(iii)":[292],"attacks.":[296,381,463],"suggests":[299],"using":[300],"transfer":[302,317,323,344,356,435,442,447,474],"strategy":[304],"counter":[308],"assaults.":[310,353],"handle":[312],"case,":[315],"inductive":[316],"necessary,":[320],"transductive":[322,434],"needed":[326],"provide":[328],"framework":[330,346,358,437],"scenario.":[337],"IDN,":[342],"identification":[350],"new":[352,366,380],"proposed":[355,472],"leverages":[359],"examples":[363],"collaborative":[371,411],"IDN":[375,406],"Supervised":[382],"Manifold":[383,465],"Alignment":[384,466],"methodology":[385,467],"Domain":[387,469],"Unification":[388,470],"applied":[390],"circumvent":[392],"problem":[394],"heterogeneous":[396],"spaces":[398],"maintained":[399],"process":[409],"learning.":[412],"them":[416],"variants":[418],"whose":[422],"already":[425],"recognized,":[426],"thesis":[429],"authors":[430],"proposes":[431],"Deep":[433],"that":[438,450],"aims":[439],"apply":[441],"as":[444],"can":[446],"knowledge":[449,475],"acquired":[452],"while":[453],"known":[457],"detecting":[460],"Unsupervised":[464],"from":[476],"source":[477],"domain":[478],"cluster":[480],"correspondence.":[481]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2025-10-10T00:00:00"}
