{"id":"https://openalex.org/W4415918206","doi":"https://doi.org/10.1504/ijcnds.2025.149479","title":"TPOT-IDSDN: an AutoML-based model optimisation for intrusion detection system against cyber threats in software defined-networking","display_name":"TPOT-IDSDN: an AutoML-based model optimisation for intrusion detection system against cyber threats in software defined-networking","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4415918206","doi":"https://doi.org/10.1504/ijcnds.2025.149479"},"language":"en","primary_location":{"id":"doi:10.1504/ijcnds.2025.149479","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijcnds.2025.149479","pdf_url":null,"source":{"id":"https://openalex.org/S156554173","display_name":"International Journal of Communication Networks and Distributed Systems","issn_l":"1754-3916","issn":["1754-3916","1754-3924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Communication Networks and Distributed Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092533908","display_name":"D. Sendil Vadivu","orcid":"https://orcid.org/0009-0004-7858-9721"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"D. Sendil Vadivu","raw_affiliation_strings":["Department of Computer Science and Engineering, National Institute of Technology Puducherry, Karaikal, 609609, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, National Institute of Technology Puducherry, Karaikal, 609609, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115832652","display_name":"Aswin Valsaraj","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Aswin Valsaraj","raw_affiliation_strings":["Department of Computer Science and Engineering, National Institute of Technology Puducherry, Karaikal, 609609, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, National Institute of Technology Puducherry, Karaikal, 609609, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014344060","display_name":"Ashwin Santhosh","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ashwin Santhosh","raw_affiliation_strings":["Department of Computer Science and Engineering, National Institute of Technology Puducherry, Karaikal, 609609, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, National Institute of Technology Puducherry, Karaikal, 609609, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115832651","display_name":"Kaustub Pavagada","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kaustub Pavagada","raw_affiliation_strings":["Department of Computer Science and Engineering, National Institute of Technology Puducherry, Karaikal, 609609, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, National Institute of Technology Puducherry, Karaikal, 609609, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020361373","display_name":"Narendran Rajagopalan","orcid":"https://orcid.org/0000-0002-1829-9587"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Narendran Rajagopalan","raw_affiliation_strings":["Department of Computer Science and Engineering, National Institute of Technology Puducherry, Karaikal, 609609, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, National Institute of Technology Puducherry, Karaikal, 609609, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5092533908"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.4024731,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"31","issue":"6","first_page":"614","last_page":"648"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.5224999785423279,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.5224999785423279,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.38359999656677246,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.017899999395012856,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.637499988079071},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6360999941825867},{"id":"https://openalex.org/keywords/hyperparameter","display_name":"Hyperparameter","score":0.6320000290870667},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5313000082969666},{"id":"https://openalex.org/keywords/binary-classification","display_name":"Binary classification","score":0.41339999437332153},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.4041999876499176},{"id":"https://openalex.org/keywords/multiclass-classification","display_name":"Multiclass classification","score":0.400299996137619},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.39969998598098755}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8931000232696533},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.637499988079071},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6360999941825867},{"id":"https://openalex.org/C8642999","wikidata":"https://www.wikidata.org/wiki/Q4171168","display_name":"Hyperparameter","level":2,"score":0.6320000290870667},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6121000051498413},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5313000082969666},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5113999843597412},{"id":"https://openalex.org/C66905080","wikidata":"https://www.wikidata.org/wiki/Q17005494","display_name":"Binary classification","level":3,"score":0.41339999437332153},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.4041999876499176},{"id":"https://openalex.org/C123860398","wikidata":"https://www.wikidata.org/wiki/Q6934605","display_name":"Multiclass classification","level":3,"score":0.400299996137619},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.39969998598098755},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3734999895095825},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.36800000071525574},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.35429999232292175},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.33219999074935913},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.31839999556541443},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.31700000166893005},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2872999906539917},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.28209999203681946},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.2797999978065491},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.26969999074935913},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.2678000032901764},{"id":"https://openalex.org/C136389625","wikidata":"https://www.wikidata.org/wiki/Q334384","display_name":"Supervised learning","level":3,"score":0.25999999046325684},{"id":"https://openalex.org/C93959086","wikidata":"https://www.wikidata.org/wiki/Q6888345","display_name":"Model selection","level":2,"score":0.25769999623298645},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.25029999017715454}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1504/ijcnds.2025.149479","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijcnds.2025.149479","pdf_url":null,"source":{"id":"https://openalex.org/S156554173","display_name":"International Journal of Communication Networks and Distributed Systems","issn_l":"1754-3916","issn":["1754-3916","1754-3924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Communication Networks and Distributed Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,80],"architectural":[1],"shift":[2],"of":[3,15,33,113,133],"software":[4],"defined":[5],"networks":[6],"(SDN)":[7],"creates":[8],"new":[9],"security":[10],"concerns,":[11],"necessitating":[12],"the":[13,23,30,77,84,89,93,124,130,135],"creation":[14],"robust":[16],"intrusion":[17],"detection":[18,141],"systems":[19],"(IDS)":[20],"to":[21,57,70],"protect":[22],"network":[24],"infrastructure.":[25],"This":[26],"paper":[27],"focuses":[28],"on":[29],"essential":[31],"challenge":[32],"selecting":[34],"classifiers":[35,119,137],"for":[36,76,86,96],"anomaly-based":[37],"IDS":[38,131],"in":[39,129],"an":[40],"SDN":[41],"environment.":[42],"An":[43],"automated":[44],"machine":[45,116],"learning":[46,117],"(AutoML)":[47],"framework":[48,82,132],"called":[49],"tree-based":[50],"pipeline":[51],"optimisation":[52],"tool":[53],"(TPOT)":[54],"was":[55],"used":[56],"speed":[58],"up":[59],"this":[60],"procedure":[61],"substantially.":[62],"TPOT":[63,81,121],"automates":[64],"model":[65],"selection":[66],"and":[67,88,107],"hyperparameter":[68],"optimisation,":[69],"decide":[71],"a":[72,139],"best":[73,125],"classifier":[74,95],"suited":[75],"given":[78],"dataset.":[79],"selected":[83,136],"ExtraTreesClassifier":[85],"multiclass":[87],"XGB":[90],"stacked":[91],"with":[92,99],"BernoulliNB":[94],"binary":[97],"class":[98],"lower":[100],"execution":[101],"time":[102],"(26.91":[103],"s,":[104],"11.29":[105],"s)":[106],"100%":[108,140],"accuracy.":[109],"A":[110],"comprehensive":[111],"examination":[112],"standard":[114],"nine":[115],"(ML)":[118],"confirmed":[120],"has":[122],"provided":[123],"model.":[126],"When":[127],"deployed":[128],"SDN,":[134],"showed":[138],"rate":[142],"that":[143],"outperformed":[144],"other":[145],"existing":[146],"approaches.":[147]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-05T00:00:00"}
