{"id":"https://openalex.org/W4403717401","doi":"https://doi.org/10.1145/3690407.3690426","title":"Network Intrusion Detection Based on Balanced Data","display_name":"Network Intrusion Detection Based on Balanced Data","publication_year":2024,"publication_date":"2024-06-21","ids":{"openalex":"https://openalex.org/W4403717401","doi":"https://doi.org/10.1145/3690407.3690426"},"language":"en","primary_location":{"id":"doi:10.1145/3690407.3690426","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3690407.3690426","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 4th International Conference on Artificial Intelligence, Big Data and Algorithms","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101196340","display_name":"Xuecheng Yu","orcid":"https://orcid.org/0000-0001-8426-537X"},"institutions":[{"id":"https://openalex.org/I96908189","display_name":"Xinjiang University","ror":"https://ror.org/059gw8r13","country_code":"CN","type":"education","lineage":["https://openalex.org/I96908189"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xuecheng Yu","raw_affiliation_strings":["Xinjiang University, Urumqi, Xinjiang, China"],"affiliations":[{"raw_affiliation_string":"Xinjiang University, Urumqi, Xinjiang, China","institution_ids":["https://openalex.org/I96908189"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100684815","display_name":"Zhenhong Jia","orcid":"https://orcid.org/0000-0001-6671-0206"},"institutions":[{"id":"https://openalex.org/I96908189","display_name":"Xinjiang University","ror":"https://ror.org/059gw8r13","country_code":"CN","type":"education","lineage":["https://openalex.org/I96908189"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenhong Jia","raw_affiliation_strings":["The Autonomous University Key Laboratory of signal and Information Processing Laboratory, Xinjiang University, Urumqi, Xinjiang, China"],"affiliations":[{"raw_affiliation_string":"The Autonomous University Key Laboratory of signal and Information Processing Laboratory, Xinjiang University, Urumqi, Xinjiang, China","institution_ids":["https://openalex.org/I96908189"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025267437","display_name":"Xiaohui Huang","orcid":"https://orcid.org/0000-0003-1236-2060"},"institutions":[{"id":"https://openalex.org/I96908189","display_name":"Xinjiang University","ror":"https://ror.org/059gw8r13","country_code":"CN","type":"education","lineage":["https://openalex.org/I96908189"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaohui Huang","raw_affiliation_strings":["Xinjiang University, Urumqi, Xinjiang, China"],"affiliations":[{"raw_affiliation_string":"Xinjiang University, Urumqi, Xinjiang, China","institution_ids":["https://openalex.org/I96908189"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101433707","display_name":"Sensen Song","orcid":"https://orcid.org/0000-0002-1495-8610"},"institutions":[{"id":"https://openalex.org/I96908189","display_name":"Xinjiang University","ror":"https://ror.org/059gw8r13","country_code":"CN","type":"education","lineage":["https://openalex.org/I96908189"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sensen Song","raw_affiliation_strings":["Xinjiang University, Urumqi, Xinjiang, China"],"affiliations":[{"raw_affiliation_string":"Xinjiang University, Urumqi, Xinjiang, China","institution_ids":["https://openalex.org/I96908189"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100394310","display_name":"Jiajia Wang","orcid":"https://orcid.org/0000-0002-0219-4051"},"institutions":[{"id":"https://openalex.org/I96908189","display_name":"Xinjiang University","ror":"https://ror.org/059gw8r13","country_code":"CN","type":"education","lineage":["https://openalex.org/I96908189"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiajia Wang","raw_affiliation_strings":["Xinjiang University, Urumqi, Xinjiang, China"],"affiliations":[{"raw_affiliation_string":"Xinjiang University, Urumqi, Xinjiang, China","institution_ids":["https://openalex.org/I96908189"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100294970","display_name":"Gang Zhou","orcid":"https://orcid.org/0000-0002-7448-6635"},"institutions":[{"id":"https://openalex.org/I96908189","display_name":"Xinjiang University","ror":"https://ror.org/059gw8r13","country_code":"CN","type":"education","lineage":["https://openalex.org/I96908189"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gang Zhou","raw_affiliation_strings":["Xinjiang University, Urumqi, Xinjiang, China"],"affiliations":[{"raw_affiliation_string":"Xinjiang University, Urumqi, Xinjiang, China","institution_ids":["https://openalex.org/I96908189"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040977916","display_name":"Fei Shi","orcid":"https://orcid.org/0000-0002-1144-6564"},"institutions":[{"id":"https://openalex.org/I96908189","display_name":"Xinjiang University","ror":"https://ror.org/059gw8r13","country_code":"CN","type":"education","lineage":["https://openalex.org/I96908189"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fei Shi","raw_affiliation_strings":["Xinjiang University, Urumqi, Xinjiang, China"],"affiliations":[{"raw_affiliation_string":"Xinjiang University, Urumqi, Xinjiang, China","institution_ids":["https://openalex.org/I96908189"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5101196340"],"corresponding_institution_ids":["https://openalex.org/I96908189"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20708144,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"113","last_page":"118"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7471473217010498},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7034820318222046},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.4712158739566803},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3300071656703949}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7471473217010498},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7034820318222046},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.4712158739566803},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3300071656703949}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3690407.3690426","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3690407.3690426","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 4th International Conference on Artificial Intelligence, Big Data and Algorithms","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5099999904632568,"display_name":"Climate action","id":"https://metadata.un.org/sdg/13"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2512871042","https://openalex.org/W3215290057","https://openalex.org/W4285032544","https://openalex.org/W4318148022","https://openalex.org/W4321243213","https://openalex.org/W4385336169","https://openalex.org/W4391352083","https://openalex.org/W4391489066","https://openalex.org/W6861010389","https://openalex.org/W6863723245"],"related_works":["https://openalex.org/W2364419519","https://openalex.org/W2392603527","https://openalex.org/W2360767377","https://openalex.org/W2017948608","https://openalex.org/W2360951146","https://openalex.org/W2390009783","https://openalex.org/W2348767155","https://openalex.org/W2388497169","https://openalex.org/W3120393658","https://openalex.org/W4283700121"],"abstract_inverted_index":{"Network":[0],"intrusion":[1,28,61,71,167,212],"detection":[2,29,40,52,62,88,151,168,213,216],"is":[3,44,81,90,97,191],"a":[4,14,46,113,170],"kind":[5],"of":[6,16,21,25,36,66,103,125,138,149,152,165],"network":[7,27,60,70,95,166,176,211],"security":[8],"measures.":[9],"The":[10],"current":[11,38],"Internet":[12],"presents":[13],"lot":[15],"information":[17],"characteristics,":[18],"continuous":[19],"growth":[20],"traffic,":[22],"uneven":[23],"distribution":[24],"features,":[26],"puts":[30],"forward":[31],"higher":[32],"requirements.":[33],"In":[34,161],"view":[35],"the":[37,59,64,73,101,110,119,123,136,139,147,150,158,162,188,192,196,201,205],"existing":[39],"methods":[41],"in":[42,63],"there":[43],"still":[45],"high":[47],"leakage":[48],"rate":[49],"and":[50,78,106,127,173,208,229],"low":[51],"accuracy":[53,89,148,159],"problems,":[54],"this":[55],"paper":[56],"carries":[57],"out":[58],"study":[65],"balanced":[67,141,206],"data.":[68],"For":[69],"detection,":[72,184],"difference":[74],"between":[75],"malicious":[76,86],"traffic":[77,80,87,154],"normal":[79],"too":[82],"large,":[83],"making":[84],"some":[85],"low.":[91],"A":[92],"generative":[93],"adversarial":[94],"model":[96,111,140,177,202],"proposed":[98],"based":[99],"on":[100],"improvement":[102],"bidirectional":[104,171],"long":[105,172],"short-term":[107,174],"memory":[108,175],"network,":[109],"has":[112,214],"very":[114],"strong":[115],"ability":[116],"to":[117,132,219],"restore":[118],"real":[120],"data":[121],"distribution,":[122],"use":[124,137],"generators":[126],"discriminators":[128],"can":[129,144],"be":[130],"generated":[131],"simulate":[133],"real-world":[134],"data,":[135],"dataset,":[142,195],"which":[143],"significantly":[145],"improve":[146],"abnormal":[153],"as":[155,157,185,187],"well":[156,186],"rate.":[160],"classification":[163],"phase":[164],"using":[169,204],"that":[178,200],"incorporates":[179],"multiple":[180],"convolutional":[181],"layers":[182],"for":[183],"dataset":[189,207],"used":[190],"CIC-IDS":[193],"2017":[194],"final":[197],"results":[198,217],"show":[199],"trained":[203],"then":[209],"performing":[210],"better":[215],"compared":[218],"other":[220],"models,":[221],"i.e.,":[222],"99.3%":[223],"accuracy,":[224],"99.35%":[225],"precision,":[226],"99.34%":[227],"recall,":[228],"99.29%":[230],"F1-score.":[231]},"counts_by_year":[],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
