{"id":"https://openalex.org/W4399418582","doi":"https://doi.org/10.1145/3651671.3651673","title":"A Survey of Novel Framework of Anomaly-Based Intrusion Detection Systems in Computer Networks Using Ensemble Feature Integration with Deep Learning Techniques","display_name":"A Survey of Novel Framework of Anomaly-Based Intrusion Detection Systems in Computer Networks Using Ensemble Feature Integration with Deep Learning Techniques","publication_year":2024,"publication_date":"2024-02-02","ids":{"openalex":"https://openalex.org/W4399418582","doi":"https://doi.org/10.1145/3651671.3651673"},"language":"en","primary_location":{"id":"doi:10.1145/3651671.3651673","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3651671.3651673","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 16th International Conference on Machine Learning and Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5099043640","display_name":"Srinivas Akkepalli","orcid":"https://orcid.org/0009-0004-2248-6344"},"institutions":[{"id":"https://openalex.org/I8975392","display_name":"Osmania University","ror":"https://ror.org/030sjb889","country_code":"IN","type":"education","lineage":["https://openalex.org/I8975392"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Srinivas Akkepalli","raw_affiliation_strings":["Computer Science and Engineering, Osmania University, India and \rComputer science and Engineering, Osmania University, India"],"raw_orcid":"https://orcid.org/0009-0004-2248-6344","affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, Osmania University, India and \rComputer science and Engineering, Osmania University, India","institution_ids":["https://openalex.org/I8975392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001741510","display_name":"K. Sagar","orcid":"https://orcid.org/0000-0002-1679-8657"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"SAGAR K","raw_affiliation_strings":["Computer Science and Engineering, Sreyas Institute of Engineering and Technology, JNTUH., India"],"raw_orcid":"https://orcid.org/0000-0002-1679-8657","affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, Sreyas Institute of Engineering and Technology, JNTUH., India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5099043640"],"corresponding_institution_ids":["https://openalex.org/I8975392"],"apc_list":null,"apc_paid":null,"fwci":1.0092,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.76355778,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"200","last_page":"205"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.763536274433136},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7455268502235413},{"id":"https://openalex.org/keywords/anomaly-based-intrusion-detection-system","display_name":"Anomaly-based intrusion detection system","score":0.6514018774032593},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6088991165161133},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5704087018966675},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5521185398101807},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.49232327938079834},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4662543535232544},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.459532767534256},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3943234980106354},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3232841491699219}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.763536274433136},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7455268502235413},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.6514018774032593},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6088991165161133},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5704087018966675},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5521185398101807},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.49232327938079834},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4662543535232544},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.459532767534256},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3943234980106354},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3232841491699219},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3651671.3651673","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3651671.3651673","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 16th International Conference on Machine Learning and Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W2087334400","https://openalex.org/W2090687173","https://openalex.org/W2142286226","https://openalex.org/W2319011228","https://openalex.org/W2327155619","https://openalex.org/W2777704017","https://openalex.org/W2903452648","https://openalex.org/W2926701059","https://openalex.org/W2952066300","https://openalex.org/W2958489519","https://openalex.org/W2979998718","https://openalex.org/W2990268365","https://openalex.org/W3005630930","https://openalex.org/W3007238289","https://openalex.org/W3033675321","https://openalex.org/W3089329725","https://openalex.org/W3092771185","https://openalex.org/W3116401423","https://openalex.org/W3118808706","https://openalex.org/W3164999323","https://openalex.org/W3168771234","https://openalex.org/W3193327991","https://openalex.org/W4224932126","https://openalex.org/W4225133798","https://openalex.org/W4230014050","https://openalex.org/W4285227013","https://openalex.org/W4306827119","https://openalex.org/W4313459364","https://openalex.org/W4318320799","https://openalex.org/W4320008781","https://openalex.org/W4323362877","https://openalex.org/W4361010174","https://openalex.org/W4378976213","https://openalex.org/W4384787750","https://openalex.org/W4385793014"],"related_works":["https://openalex.org/W2337148208","https://openalex.org/W3004832009","https://openalex.org/W3036013726","https://openalex.org/W1971929717","https://openalex.org/W2061466315","https://openalex.org/W2355532322","https://openalex.org/W2368329025","https://openalex.org/W3157271777","https://openalex.org/W2534684341","https://openalex.org/W1485296229"],"abstract_inverted_index":{"Today's":[0],"internet":[1],"is":[2,22,74,98,102,211],"made":[3],"up":[4],"of":[5,43,87,119,137,179,205,208,237,248,270,296],"nearly":[6],"half":[7],"a":[8,23,39,108,141],"million":[9],"different":[10,27],"networks.":[11],"In":[12],"any":[13],"network":[14,44,88,96,123,135,142,170,181,244],"connection,":[15],"identifying":[16],"the":[17,120,134,206,212,220,234,278,297],"attacks":[18,28],"by":[19,132,239],"their":[20,34],"types":[21],"difficult":[24],"task":[25],"as":[26,90,92,151,163,230],"may":[29,36],"have":[30],"various":[31],"connections,":[32],"and":[33,60,68,78,100,153,173,305],"number":[35],"vary":[37],"from":[38,277],"few":[40],"to":[41,58,64,106,162,196,266,284,289],"hundreds":[42],"connections.":[45],"To":[46],"solve":[47],"this":[48],"problem,":[49],"IDS-based":[50],"on":[51,243,302],"machine":[52,303],"learning":[53,304,307],"(ML)":[54],"has":[55,104],"been":[56],"developed":[57],"monitor":[59],"analyze":[61],"data":[62,182],"packets":[63],"detect":[65,128],"abnormal":[66],"behaviors":[67,131],"new":[69,268,286],"attacks.":[70,287],"Security":[71],"in":[72,140],"cyberspace":[73],"currently":[75],"receiving":[76],"more":[77,79],"attention.":[80],"Making":[81],"efficient":[82,292],"defenses":[83],"against":[84],"many":[85],"sorts":[86],"attacks,":[89],"well":[91],"making":[93],"sure":[94],"that":[95,183,218],"equipment":[97],"safe":[99],"information":[101],"secure,":[103],"grown":[105],"be":[107,149,253],"major":[109],"issue.":[110],"Network":[111],"intrusion":[112,224],"detection":[113,145,225,257],"systems":[114,146,210,226],"(NIDSs)":[115],"are":[116,194],"critical":[117],"components":[118],"architecture":[121],"for":[122,175,214,246],"security":[124],"protection":[125],"because":[126],"they":[127,193],"harmful":[129],"attack":[130,186,221],"examining":[133],"traffic":[136,171,245],"key":[138],"nodes":[139],"[1,2].":[143],"Intrusion":[144],"(IDSs)":[147],"can":[148,252],"classified":[150],"signature-based,":[152],"anomaly-based":[154],"methods":[155],"[3].":[156],"Signature-based":[157],"IDS":[158],"(SIDS),":[159],"often":[160],"referred":[161],"Rule-based":[164],"or":[165,177,259],"Misuse":[166],"IDS,":[167],"perform":[168],"ongoing":[169],"monitoring":[172],"look":[174],"sequences":[176],"patterns":[178],"incoming":[180],"resemble":[184],"an":[185,215,241,291],"signature.":[187],"By":[188],"keeping":[189,240],"error":[190],"rates":[191],"low,":[192],"able":[195],"identify":[197],"potential":[198],"invasions":[199],"with":[200],"high":[201],"accuracy":[202],"rates.":[203],"One":[204],"weaknesses":[207],"these":[209],"demand":[213],"updated":[216],"database":[217],"contains":[219],"signatures.":[222],"Anomaly-based":[223,272],"(AIDS),":[227],"also":[228],"known":[229],"behavior-based":[231],"detection,":[232],"examine":[233],"typical":[235],"behavior":[236],"networks":[238],"eye":[242],"signs":[247],"anomalous":[249],"activity.":[250],"AIDS":[251],"taught":[254],"using":[255,261],"anomaly":[256],"algorithms":[258],"self-taught":[260],"self-learning":[262],"algorithms,":[263],"allowing":[264],"them":[265],"recognize":[267],"kinds":[269],"intrusions.":[271],"approach":[273,280],"distinguishes":[274],"itself":[275],"significantly":[276],"signature-based":[279],"when":[281],"it":[282],"comes":[283],"recognizing":[285],"Essence":[288],"develop":[290],"NIDS":[293],"The":[294],"majority":[295],"most":[298],"recent":[299],"IDSs":[300],"rely":[301],"deep":[306],"techniques":[308],"[4-6].":[309]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
