{"id":"https://openalex.org/W4404135857","doi":"https://doi.org/10.1145/3686540.3686543","title":"Optimisation of Machine Learning Based Data Mining Methods for Network Intrusion Detection","display_name":"Optimisation of Machine Learning Based Data Mining Methods for Network Intrusion Detection","publication_year":2024,"publication_date":"2024-05-29","ids":{"openalex":"https://openalex.org/W4404135857","doi":"https://doi.org/10.1145/3686540.3686543"},"language":"en","primary_location":{"id":"doi:10.1145/3686540.3686543","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3686540.3686543","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 6th International Conference on Big-data Service and Intelligent Computation","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086724640","display_name":"Mingxiao Li","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Mingxiao Li","raw_affiliation_strings":["Qinghai Minzu University, China"],"raw_orcid":"https://orcid.org/0009-0000-3502-2953","affiliations":[{"raw_affiliation_string":"Qinghai Minzu University, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ziqing Li","orcid":"https://orcid.org/0009-0007-5926-8537"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ziqing Li","raw_affiliation_strings":["Qinghai Minzu University, China"],"raw_orcid":"https://orcid.org/0009-0007-5926-8537","affiliations":[{"raw_affiliation_string":"Qinghai Minzu University, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108153273","display_name":"Chenlong Liu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chenlong Liu","raw_affiliation_strings":["Qinghai Minzu University, China"],"raw_orcid":"https://orcid.org/0009-0006-5832-7876","affiliations":[{"raw_affiliation_string":"Qinghai Minzu University, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":null,"display_name":"Wanqi Chen","orcid":"https://orcid.org/0009-0005-4445-106X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wanqi Chen","raw_affiliation_strings":["Qinghai Minzu University, China"],"raw_orcid":"https://orcid.org/0009-0005-4445-106X","affiliations":[{"raw_affiliation_string":"Qinghai Minzu University, China","institution_ids":[]}]},{"author_position":"last","author":{"id":null,"display_name":"Chaojie Ma","orcid":"https://orcid.org/0009-0007-5696-5759"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chaojie Ma","raw_affiliation_strings":["Qinghai Minzu University, China"],"raw_orcid":"https://orcid.org/0009-0007-5696-5759","affiliations":[{"raw_affiliation_string":"Qinghai Minzu University, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5086724640"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.3364,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.6251192,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"17","last_page":"25"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9896000027656555,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7661516666412354},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7467532157897949},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5355655550956726},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5062893629074097},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4381810426712036}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7661516666412354},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7467532157897949},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5355655550956726},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5062893629074097},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4381810426712036}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3686540.3686543","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3686540.3686543","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 6th International Conference on Big-data Service and Intelligent Computation","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W2087334400","https://openalex.org/W2090687173","https://openalex.org/W2107710541","https://openalex.org/W2156483112","https://openalex.org/W2327155619","https://openalex.org/W2437617937","https://openalex.org/W2524620548","https://openalex.org/W2800788706","https://openalex.org/W2918408501","https://openalex.org/W2921708219","https://openalex.org/W2946445608","https://openalex.org/W2990714382","https://openalex.org/W3007362259","https://openalex.org/W3018495625","https://openalex.org/W3090586341","https://openalex.org/W3109901447","https://openalex.org/W4210743106","https://openalex.org/W4250117065","https://openalex.org/W4385296325","https://openalex.org/W4385474536","https://openalex.org/W4390572779","https://openalex.org/W4391880447","https://openalex.org/W4394575840"],"related_works":["https://openalex.org/W2961085424","https://openalex.org/W4306674287","https://openalex.org/W3046775127","https://openalex.org/W4394896187","https://openalex.org/W3170094116","https://openalex.org/W4386462264","https://openalex.org/W3107602296","https://openalex.org/W4364306694","https://openalex.org/W4312192474","https://openalex.org/W4283697347"],"abstract_inverted_index":{"In":[0,61],"the":[1,72,120,136,145,179,182,194],"context":[2],"of":[3,147,159,181,198],"today's":[4],"big":[5],"data":[6,9,28,65,109,112,125],"era,":[7],"traditional":[8,37],"mining":[10,66],"techniques":[11],"often":[12],"rely":[13],"on":[14],"manual":[15],"feature":[16,115,127],"extraction,":[17],"which":[18],"limits":[19],"their":[20],"accuracy":[21],"and":[22,44,47,57,71,82,88,114,126,129,156,165],"generalization":[23,70],"capabilities.":[24],"Additionally,":[25],"handling":[26,123],"large-scale":[27,76],"poses":[29],"challenges,":[30],"especially":[31],"in":[32],"network":[33,49,86,104,140,199],"intrusion":[34,105,141],"detection,":[35],"where":[36],"methods":[38,67,100],"may":[39],"struggle":[40],"to":[41,54,74,101,134,170,191],"effectively":[42],"process":[43],"analyze":[45],"massive":[46],"complex":[48,80],"traffic":[50,106,200],"data,":[51,77,107],"thereby":[52],"failing":[53],"accurately":[55],"detect":[56],"prevent":[58],"potential":[59],"intrusions.":[60],"contrast,":[62],"machine":[63,98],"learning-based":[64],"offer":[68,187],"better":[69,90],"ability":[73],"handle":[75],"automatically":[78],"learning":[79,99],"patterns":[81],"relationships":[83],"within":[84],"extensive":[85],"traffic,":[87],"providing":[89],"interpretability.":[91],"Against":[92],"this":[93,95,148],"backdrop,":[94],"paper":[96],"employs":[97],"deeply":[102],"mine":[103],"encompassing":[108],"cleaning,":[110],"imbalanced":[111,124],"handling,":[113],"selection.":[116],"The":[117,174],"study":[118],"optimizes":[119],"modules":[121],"for":[122,139],"selection,":[128],"compares":[130],"different":[131],"classification":[132],"models":[133],"select":[135],"best":[137],"model":[138],"detection.":[142],"To":[143],"validate":[144],"effectiveness":[146,180],"approach,":[149],"evaluations":[150],"are":[151],"conducted":[152],"using":[153],"confusion":[154],"matrices":[155],"a":[157,188],"series":[158],"metrics":[160],"(accuracy,":[161],"precision,":[162],"recall,":[163],"F1-score,":[164],"AUC),":[166],"along":[167],"with":[168,193],"comparisons":[169],"previous":[171],"research":[172],"results.":[173],"results":[175],"not":[176],"only":[177],"confirm":[178],"proposed":[183],"method":[184],"but":[185],"also":[186],"reliable":[189],"solution":[190],"cope":[192],"continuously":[195],"growing":[196],"volume":[197],"data.":[201]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
