{"id":"https://openalex.org/W3217392568","doi":"https://doi.org/10.1186/s40537-021-00544-5","title":"IDS-attention: an efficient algorithm for intrusion detection systems using attention mechanism","display_name":"IDS-attention: an efficient algorithm for intrusion detection systems using attention mechanism","publication_year":2021,"publication_date":"2021-11-29","ids":{"openalex":"https://openalex.org/W3217392568","doi":"https://doi.org/10.1186/s40537-021-00544-5","mag":"3217392568"},"language":"en","primary_location":{"id":"doi:10.1186/s40537-021-00544-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s40537-021-00544-5","pdf_url":"https://journalofbigdata.springeropen.com/counter/pdf/10.1186/s40537-021-00544-5","source":{"id":"https://openalex.org/S2737955091","display_name":"Journal Of Big Data","issn_l":"2196-1115","issn":["2196-1115"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Big Data","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journalofbigdata.springeropen.com/counter/pdf/10.1186/s40537-021-00544-5","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000237563","display_name":"FatimaEzzahra Laghrissi","orcid":"https://orcid.org/0000-0002-6490-3677"},"institutions":[{"id":"https://openalex.org/I99297268","display_name":"University of Hassan II Casablanca","ror":"https://ror.org/001q4kn48","country_code":"MA","type":"education","lineage":["https://openalex.org/I99297268"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"FatimaEzzahra Laghrissi","raw_affiliation_strings":["FSTM University Hassan II, Casablanca, Morocco"],"raw_orcid":"https://orcid.org/0000-0002-6490-3677","affiliations":[{"raw_affiliation_string":"FSTM University Hassan II, Casablanca, Morocco","institution_ids":["https://openalex.org/I99297268"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024601930","display_name":"Samira Douzi","orcid":"https://orcid.org/0000-0001-8240-660X"},"institutions":[{"id":"https://openalex.org/I126477371","display_name":"Mohammed V University","ror":"https://ror.org/00r8w8f84","country_code":"MA","type":"education","lineage":["https://openalex.org/I126477371"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Samira Douzi","raw_affiliation_strings":["FMPR University Mohammed V, Rabat, Morocco"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"FMPR University Mohammed V, Rabat, Morocco","institution_ids":["https://openalex.org/I126477371"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029130476","display_name":"Khadija Douzi","orcid":null},"institutions":[{"id":"https://openalex.org/I99297268","display_name":"University of Hassan II Casablanca","ror":"https://ror.org/001q4kn48","country_code":"MA","type":"education","lineage":["https://openalex.org/I99297268"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Khadija Douzi","raw_affiliation_strings":["FSTM University Hassan II, Casablanca, Morocco"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"FSTM University Hassan II, Casablanca, Morocco","institution_ids":["https://openalex.org/I99297268"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005836158","display_name":"Badr Hssina","orcid":null},"institutions":[{"id":"https://openalex.org/I99297268","display_name":"University of Hassan II Casablanca","ror":"https://ror.org/001q4kn48","country_code":"MA","type":"education","lineage":["https://openalex.org/I99297268"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Badr Hssina","raw_affiliation_strings":["FSTM University Hassan II, Casablanca, Morocco"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"FSTM University Hassan II, Casablanca, Morocco","institution_ids":["https://openalex.org/I99297268"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5000237563"],"corresponding_institution_ids":["https://openalex.org/I99297268"],"apc_list":{"value":1060,"currency":"GBP","value_usd":1300},"apc_paid":{"value":1060,"currency":"GBP","value_usd":1300},"fwci":7.2057,"has_fulltext":true,"cited_by_count":63,"citation_normalized_percentile":{"value":0.97298952,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8676306009292603},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7817142009735107},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.7412846684455872},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.47364652156829834},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.45492687821388245},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4126179814338684},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.41243934631347656},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3853667676448822},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3721392750740051},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.37046492099761963}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8676306009292603},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7817142009735107},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.7412846684455872},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.47364652156829834},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.45492687821388245},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4126179814338684},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.41243934631347656},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3853667676448822},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3721392750740051},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.37046492099761963},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s40537-021-00544-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s40537-021-00544-5","pdf_url":"https://journalofbigdata.springeropen.com/counter/pdf/10.1186/s40537-021-00544-5","source":{"id":"https://openalex.org/S2737955091","display_name":"Journal Of Big Data","issn_l":"2196-1115","issn":["2196-1115"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Big Data","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:43294da0d6c24bb7957af3fd39148911","is_oa":true,"landing_page_url":"https://doaj.org/article/43294da0d6c24bb7957af3fd39148911","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Big Data, Vol 8, Iss 1, Pp 1-21 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s40537-021-00544-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s40537-021-00544-5","pdf_url":"https://journalofbigdata.springeropen.com/counter/pdf/10.1186/s40537-021-00544-5","source":{"id":"https://openalex.org/S2737955091","display_name":"Journal Of Big Data","issn_l":"2196-1115","issn":["2196-1115"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Big Data","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.800000011920929,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3217392568.pdf","grobid_xml":"https://content.openalex.org/works/W3217392568.grobid-xml"},"referenced_works_count":32,"referenced_works":["https://openalex.org/W2006407062","https://openalex.org/W2064675550","https://openalex.org/W2099940443","https://openalex.org/W2150847526","https://openalex.org/W2766882809","https://openalex.org/W2889326414","https://openalex.org/W2918854598","https://openalex.org/W2970252335","https://openalex.org/W2984419450","https://openalex.org/W3003391301","https://openalex.org/W3004690717","https://openalex.org/W3005630930","https://openalex.org/W3016470706","https://openalex.org/W3081055701","https://openalex.org/W3082278665","https://openalex.org/W3115242022","https://openalex.org/W3116162736","https://openalex.org/W3116325402","https://openalex.org/W3117043094","https://openalex.org/W3117835026","https://openalex.org/W3117906366","https://openalex.org/W3127491696","https://openalex.org/W3129893846","https://openalex.org/W3131783792","https://openalex.org/W3135165465","https://openalex.org/W3137691240","https://openalex.org/W3153954332","https://openalex.org/W3159260746","https://openalex.org/W3160455160","https://openalex.org/W3161112073","https://openalex.org/W3201481350","https://openalex.org/W4300906944"],"related_works":["https://openalex.org/W2061466315","https://openalex.org/W2376886931","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W3157271777","https://openalex.org/W2377372927","https://openalex.org/W1495178644"],"abstract_inverted_index":{"Abstract":[0],"Network":[1],"attacks":[2,40],"are":[3,52,88],"illegal":[4],"activities":[5],"on":[6,111,123,128,168,201],"digital":[7],"resources":[8],"within":[9],"an":[10,33,226],"organizational":[11],"network":[12,39,159],"with":[13,212,218],"the":[14,53,112,124,135,154,198,202,222],"express":[15],"intention":[16],"of":[17,158,228],"compromising":[18],"systems.":[19],"A":[20,104],"cyber":[21],"attack":[22],"can":[23,98],"be":[24,91,100],"directed":[25],"by":[26],"individuals,":[27],"communities,":[28],"states":[29],"or":[30,44,72,83,102],"even":[31],"from":[32],"anonymous":[34],"source.":[35],"Hackers":[36],"commonly":[37],"conduct":[38],"to":[41,62,78,90],"alter,":[42],"damage,":[43],"steal":[45],"private":[46],"data.":[47],"Intrusion":[48],"detection":[49,107,119,165],"systems":[50],"(IDS)":[51],"best":[54,223],"and":[55,96,139,156,173,191,215,230,234],"most":[56],"effective":[57],"techniques":[58],"when":[59],"it":[60],"comes":[61],"tackle":[63],"these":[64,144],"threats.":[65],"An":[66],"IDS":[67],"is":[68,109,121,176],"a":[69,116,147,164],"software":[70],"application":[71],"hardware":[73],"device":[74],"that":[75,209],"monitors":[76],"traffic":[77],"search":[79],"for":[80,232],"malevolent":[81],"activity":[82],"policy":[84],"breaches.":[85],"Moreover,":[86],"IDSs":[87,126],"designed":[89],"deployed":[92],"in":[93,134],"different":[94],"environments,":[95],"they":[97],"either":[99],"host-based":[101,105],"network-based.":[103],"intrusion":[106,118],"system":[108,120],"installed":[110],"client":[113],"computer,":[114],"while":[115],"network-based":[117],"located":[122],"network.":[125],"based":[127,167],"deep":[129],"learning":[130],"have":[131],"been":[132],"used":[133,180],"past":[136],"few":[137],"years":[138],"proved":[140],"their":[141],"effectiveness.":[142],"However,":[143],"approaches":[145,200],"produce":[146],"big":[148],"false":[149],"negative":[150],"rate,":[151],"which":[152],"impacts":[153],"performance":[155],"potency":[157],"security.":[160],"In":[161,194],"this":[162],"paper,":[163],"model":[166],"long":[169],"short-term":[170],"memory":[171],"(LSTM)":[172],"Attention":[174,211],"mechanism":[175],"proposed.":[177],"Furthermore,":[178],"we":[179,196],"four":[181],"reduction":[182],"algorithms,":[183],"namely:":[184],"Chi-Square,":[185],"UMAP,":[186],"Principal":[187],"Components":[188],"Analysis":[189],"(PCA),":[190],"Mutual":[192],"information.":[193],"addition,":[195],"evaluated":[197],"proposed":[199],"NSL-KDD":[203],"dataset.":[204],"The":[205],"experimental":[206],"results":[207],"demonstrate":[208],"using":[210,216],"all":[213],"features":[214],"PCA":[217],"03":[219],"components":[220],"had":[221],"performance,":[224],"reaching":[225],"accuracy":[227],"99.09%":[229],"98.49%":[231],"binary":[233],"multiclass":[235],"classification,":[236],"respectively.":[237]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":15},{"year":2024,"cited_by_count":22},{"year":2023,"cited_by_count":16},{"year":2022,"cited_by_count":7}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
