{"id":"https://openalex.org/W2899365137","doi":"https://doi.org/10.1155/2018/9704672","title":"Machine-Learning Approach to Optimize SMOTE Ratio in Class Imbalance Dataset for Intrusion Detection","display_name":"Machine-Learning Approach to Optimize SMOTE Ratio in Class Imbalance Dataset for Intrusion Detection","publication_year":2018,"publication_date":"2018-11-01","ids":{"openalex":"https://openalex.org/W2899365137","doi":"https://doi.org/10.1155/2018/9704672","mag":"2899365137","pmid":"https://pubmed.ncbi.nlm.nih.gov/30515202"},"language":"en","primary_location":{"id":"doi:10.1155/2018/9704672","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/9704672","pdf_url":"https://downloads.hindawi.com/journals/cin/2018/9704672.pdf","source":{"id":"https://openalex.org/S72372694","display_name":"Computational Intelligence and Neuroscience","issn_l":"1687-5265","issn":["1687-5265","1687-5273"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computational Intelligence and Neuroscience","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj","pubmed"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/cin/2018/9704672.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029631923","display_name":"Jae-Hyun Seo","orcid":"https://orcid.org/0000-0002-1587-788X"},"institutions":[{"id":"https://openalex.org/I77079311","display_name":"Wonkwang University","ror":"https://ror.org/006776986","country_code":"KR","type":"education","lineage":["https://openalex.org/I77079311"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jae-Hyun Seo","raw_affiliation_strings":["Department of Computer Science and Engineering, Wonkwang University, 460 Iksandae-ro, Iksan-si, Jeonbuk 54649, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Wonkwang University, 460 Iksandae-ro, Iksan-si, Jeonbuk 54649, Republic of Korea","institution_ids":["https://openalex.org/I77079311"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046031351","display_name":"Yong-Hyuk Kim","orcid":"https://orcid.org/0000-0002-0492-0889"},"institutions":[{"id":"https://openalex.org/I161024014","display_name":"Kwangwoon University","ror":"https://ror.org/02e9zc863","country_code":"KR","type":"education","lineage":["https://openalex.org/I161024014"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Yong-Hyuk Kim","raw_affiliation_strings":["School of Software, Kwangwoon University, 20 Kwangwoon-ro, Nowon-gu, Seoul 01897, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"School of Software, Kwangwoon University, 20 Kwangwoon-ro, Nowon-gu, Seoul 01897, Republic of Korea","institution_ids":["https://openalex.org/I161024014"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5046031351"],"corresponding_institution_ids":["https://openalex.org/I161024014"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":5.853,"has_fulltext":true,"cited_by_count":81,"citation_normalized_percentile":{"value":0.96520317,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"2018","issue":null,"first_page":"1","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.767656147480011},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6236678957939148},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6133754253387451},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5672048926353455},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5561915040016174},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5532047748565674},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.5237274765968323},{"id":"https://openalex.org/keywords/tuple","display_name":"Tuple","score":0.5176185369491577},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.479045033454895},{"id":"https://openalex.org/keywords/oversampling","display_name":"Oversampling","score":0.42946815490722656},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.32796716690063477},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1930485963821411},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1749095916748047}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.767656147480011},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6236678957939148},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6133754253387451},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5672048926353455},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5561915040016174},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5532047748565674},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.5237274765968323},{"id":"https://openalex.org/C118930307","wikidata":"https://www.wikidata.org/wiki/Q600590","display_name":"Tuple","level":2,"score":0.5176185369491577},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.479045033454895},{"id":"https://openalex.org/C197323446","wikidata":"https://www.wikidata.org/wiki/Q331222","display_name":"Oversampling","level":3,"score":0.42946815490722656},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.32796716690063477},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1930485963821411},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1749095916748047},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.0},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.0}],"mesh":[{"descriptor_ui":"D000069550","descriptor_name":"Machine Learning","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D000069550","descriptor_name":"Machine Learning","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D000069550","descriptor_name":"Machine Learning","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D000465","descriptor_name":"Algorithms","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D000465","descriptor_name":"Algorithms","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D000465","descriptor_name":"Algorithms","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D002965","descriptor_name":"Classification","qualifier_ui":"Q000379","qualifier_name":"methods","is_major_topic":false},{"descriptor_ui":"D002965","descriptor_name":"Classification","qualifier_ui":"Q000379","qualifier_name":"methods","is_major_topic":false},{"descriptor_ui":"D002965","descriptor_name":"Classification","qualifier_ui":"Q000379","qualifier_name":"methods","is_major_topic":false},{"descriptor_ui":"D003198","descriptor_name":"Computer Simulation","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D003198","descriptor_name":"Computer Simulation","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D003198","descriptor_name":"Computer Simulation","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D006801","descriptor_name":"Humans","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D006801","descriptor_name":"Humans","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D006801","descriptor_name":"Humans","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D012372","descriptor_name":"ROC Curve","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D012372","descriptor_name":"ROC Curve","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D012372","descriptor_name":"ROC Curve","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D057225","descriptor_name":"Data Mining","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D057225","descriptor_name":"Data Mining","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D057225","descriptor_name":"Data Mining","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true}],"locations_count":5,"locations":[{"id":"doi:10.1155/2018/9704672","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/9704672","pdf_url":"https://downloads.hindawi.com/journals/cin/2018/9704672.pdf","source":{"id":"https://openalex.org/S72372694","display_name":"Computational Intelligence and Neuroscience","issn_l":"1687-5265","issn":["1687-5265","1687-5273"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computational Intelligence and Neuroscience","raw_type":"journal-article"},{"id":"pmid:30515202","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/30515202","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computational intelligence and neuroscience","raw_type":null},{"id":"pmh:oai:doaj.org/article:322dc3e5561b44cc84909526ee610aab","is_oa":true,"landing_page_url":"https://doaj.org/article/322dc3e5561b44cc84909526ee610aab","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computational Intelligence and Neuroscience, Vol 2018 (2018)","raw_type":"article"},{"id":"pmh:oai:europepmc.org:5243532","is_oa":true,"landing_page_url":"http://europepmc.org/pmc/articles/PMC6236522","pdf_url":null,"source":{"id":"https://openalex.org/S4306400806","display_name":"Europe PMC (PubMed Central)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1303153112","host_organization_name":"European Bioinformatics Institute","host_organization_lineage":["https://openalex.org/I1303153112"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"pmh:oai:pubmedcentral.nih.gov:6236522","is_oa":true,"landing_page_url":"https://www.ncbi.nlm.nih.gov/pmc/articles/6236522","pdf_url":null,"source":{"id":"https://openalex.org/S2764455111","display_name":"PubMed Central","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Comput Intell Neurosci","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.1155/2018/9704672","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/9704672","pdf_url":"https://downloads.hindawi.com/journals/cin/2018/9704672.pdf","source":{"id":"https://openalex.org/S72372694","display_name":"Computational Intelligence and Neuroscience","issn_l":"1687-5265","issn":["1687-5265","1687-5273"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computational Intelligence and Neuroscience","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.4000000059604645}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321310","display_name":"Wonkwang University","ror":"https://ror.org/006776986"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2899365137.pdf","grobid_xml":"https://content.openalex.org/works/W2899365137.grobid-xml"},"referenced_works_count":24,"referenced_works":["https://openalex.org/W1556024794","https://openalex.org/W1563938718","https://openalex.org/W1811853421","https://openalex.org/W1941659294","https://openalex.org/W1964357740","https://openalex.org/W1965334909","https://openalex.org/W1995126785","https://openalex.org/W2008056655","https://openalex.org/W2032620230","https://openalex.org/W2059682003","https://openalex.org/W2067594023","https://openalex.org/W2088476668","https://openalex.org/W2092627177","https://openalex.org/W2096945460","https://openalex.org/W2103806672","https://openalex.org/W2119191234","https://openalex.org/W2136903812","https://openalex.org/W2148143831","https://openalex.org/W2150772902","https://openalex.org/W2403153566","https://openalex.org/W2551087083","https://openalex.org/W2598684549","https://openalex.org/W2598811698","https://openalex.org/W2767203245"],"related_works":["https://openalex.org/W2766503024","https://openalex.org/W2781247653","https://openalex.org/W4206637278","https://openalex.org/W4386005305","https://openalex.org/W4386214543","https://openalex.org/W3082051559","https://openalex.org/W2387580700","https://openalex.org/W2746581472","https://openalex.org/W60934498","https://openalex.org/W2899285606"],"abstract_inverted_index":{"The":[0,29,149,176,187],"KDD":[1,33],"CUP":[2,34],"1999":[3,35],"intrusion":[4],"detection":[5],"dataset":[6,36,166],"was":[7,153],"introduced":[8],"at":[9],"the":[10,62,67,80,93,97,100,110,114,142,146,157,164,168,172,184,190],"third":[11],"international":[12],"knowledge":[13],"discovery":[14],"and":[15,20,54,70,119,170,201],"data":[16],"mining":[17],"tools":[18],"competition,":[19],"it":[21],"has":[22],"been":[23],"widely":[24],"used":[25,134,154],"for":[26,113,140],"many":[27],"studies.":[28],"attack":[30],"types":[31],"of":[32,51,79,96,126,128,145,198],"are":[37,74],"divided":[38],"into":[39],"four":[40],"categories:":[41],"user":[42],"to":[43,47,91,108,135,155,167],"root":[44],"(U2R),":[45],"remote":[46],"local":[48],"(R2L),":[49],"denial":[50],"service":[52],"(DoS),":[53],"Probe.":[55],"We":[56,65,159],"use":[57],"five":[58],"classes":[59,116],"by":[60],"adding":[61],"normal":[63],"class.":[64],"define":[66],"U2R,":[68],"R2L,":[69,118],"Probe":[71],"classes,":[72],"which":[73],"each":[75,161],"less":[76],"than":[77,196],"1%":[78],"total":[81],"dataset,":[82],"as":[83],"rare":[84,115,147],"classes.":[85,148],"In":[86],"this":[87],"study,":[88],"we":[89,106],"attempt":[90],"mitigate":[92],"class":[94],"imbalance":[95],"dataset.":[98],"Using":[99],"synthetic":[101],"minority":[102],"oversampling":[103],"technique":[104],"(SMOTE),":[105],"attempted":[107],"optimize":[109],"SMOTE":[111,129,143,174],"ratios":[112,144],"(U2R,":[117],"Probe).":[120],"After":[121],"randomly":[122],"generating":[123],"a":[124,137],"number":[125],"tuples":[127,132],"ratios,":[130],"these":[131],"were":[133,181,193],"create":[136,156],"numerical":[138],"model":[139,169],"optimizing":[141],"support":[150],"vector":[151],"regression":[152],"model.":[158],"assigned":[160],"instance":[162],"in":[163],"test":[165],"chose":[171],"best":[173,185],"ratios.":[175,186],"experiments":[177],"using":[178,183,189],"machine-learning":[179],"techniques":[180],"conducted":[182],"results":[188],"proposed":[191],"method":[192],"significantly":[194],"better":[195],"those":[197],"previous":[199],"approach":[200],"other":[202],"related":[203],"work.":[204]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":20},{"year":2023,"cited_by_count":18},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":19},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
