{"id":"https://openalex.org/W4401253454","doi":"https://doi.org/10.3233/idt-240185","title":"Design of network security monitoring system based on K-means clustering algorithm","display_name":"Design of network security monitoring system based on K-means clustering algorithm","publication_year":2024,"publication_date":"2024-08-02","ids":{"openalex":"https://openalex.org/W4401253454","doi":"https://doi.org/10.3233/idt-240185"},"language":"en","primary_location":{"id":"doi:10.3233/idt-240185","is_oa":false,"landing_page_url":"https://doi.org/10.3233/idt-240185","pdf_url":null,"source":{"id":"https://openalex.org/S119727669","display_name":"Intelligent Decision Technologies","issn_l":"1872-4981","issn":["1872-4981","1875-8843"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Decision Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113487431","display_name":"Lin Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210091712","display_name":"Zhengzhou University of Science and Technology","ror":"https://ror.org/00b3j7936","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210091712"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lin Yu*","raw_affiliation_strings":["Department of Health Management, Zhengzhou Shuqing Medical College, Zhengzhou, Henan, China"],"affiliations":[{"raw_affiliation_string":"Department of Health Management, Zhengzhou Shuqing Medical College, Zhengzhou, Henan, China","institution_ids":["https://openalex.org/I4210091712"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112708150","display_name":"Yujie Bai","orcid":null},"institutions":[{"id":"https://openalex.org/I4210091712","display_name":"Zhengzhou University of Science and Technology","ror":"https://ror.org/00b3j7936","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210091712"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yujie Bai","raw_affiliation_strings":["Department of Health Management, Zhengzhou Shuqing Medical College, Zhengzhou, Henan, China"],"affiliations":[{"raw_affiliation_string":"Department of Health Management, Zhengzhou Shuqing Medical College, Zhengzhou, Henan, China","institution_ids":["https://openalex.org/I4210091712"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5113487431"],"corresponding_institution_ids":["https://openalex.org/I4210091712"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12633729,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"18","issue":"4","first_page":"3105","last_page":"3118"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.8384724855422974},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7958210110664368},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.6552765369415283},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.6151900887489319},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.588723361492157},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5621964335441589},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.22223049402236938},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1877911388874054}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.8384724855422974},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7958210110664368},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6552765369415283},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.6151900887489319},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.588723361492157},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5621964335441589},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.22223049402236938},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1877911388874054}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/idt-240185","is_oa":false,"landing_page_url":"https://doi.org/10.3233/idt-240185","pdf_url":null,"source":{"id":"https://openalex.org/S119727669","display_name":"Intelligent Decision Technologies","issn_l":"1872-4981","issn":["1872-4981","1875-8843"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Decision Technologies","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2348831500","https://openalex.org/W2799312467","https://openalex.org/W2900774199","https://openalex.org/W2922301121","https://openalex.org/W2922628727","https://openalex.org/W2923817828","https://openalex.org/W2954674884","https://openalex.org/W2955088454","https://openalex.org/W3010139540","https://openalex.org/W3183715147","https://openalex.org/W4226340317","https://openalex.org/W4247444673","https://openalex.org/W4281767280","https://openalex.org/W4392295298","https://openalex.org/W4394606545"],"related_works":["https://openalex.org/W2364419519","https://openalex.org/W2360767377","https://openalex.org/W2017948608","https://openalex.org/W2360951146","https://openalex.org/W2061466315","https://openalex.org/W2376886931","https://openalex.org/W1992118813","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539"],"abstract_inverted_index":{"The":[0,83,131,161],"Network":[1],"Security":[2],"Monitoring":[3],"System":[4],"(NSMS)":[5],"can":[6,121,146,167],"use":[7],"Big":[8],"Data":[9],"(BD)":[10],"and":[11,22,42,61,76,105,145],"K-means":[12,95],"DT":[13,67,96],"(K-means":[14],"with":[15,155,169],"distance":[16],"threshold)":[17],"algorithms":[18,120],"to":[19,78],"automatically":[20],"learn":[21],"identify":[23],"abnormal":[24],"patterns":[25],"in":[26,137,164],"the":[27,30,53,88,114,124],"network,":[28],"improving":[29],"accuracy":[31,102,110,125],"of":[32,103,111,126,151],"network":[33,99,107,127,152,172],"threat":[34],"detection.":[35],"In":[36],"this":[37,138,165],"article,":[38],"KDD":[39,44],"Cup":[40],"1999":[41],"NSL":[43],"were":[45],"selected":[46],"as":[47],"NSMS":[48,162],"for":[49],"dataset":[50],"analysis.":[51],"Preprocess":[52],"data;":[54],"Extract":[55],"statistical":[56],"information,":[57,60],"time":[58],"series":[59],"traffic":[62],"distribution":[63],"characteristics.":[64],"Value":[65],"device":[66],"further":[68],"classifies":[69],"regular":[70],"attacks,":[71,75,154],"remote":[72],"location":[73],"(R2L)":[74],"user":[77],"root":[79],"(U2R)":[80],"permission":[81],"attacks.":[82],"experimental":[84],"results":[85],"show":[86],"that":[87],"hybrid":[89,132],"intrusion":[90,118,128,133,153],"detection":[91,101,109,119,129,134],"algorithm":[92],"based":[93],"on":[94,113,142],"achieves":[97],"a":[98,106],"attack":[100,108],"99.2%":[104],"98.9%":[112],"NSL-KDD":[115],"dataset.":[116],"Hybrid":[117],"effectively":[122,147],"improve":[123],"(NID).":[130],"system":[135],"proposed":[136],"article":[139,166],"performs":[140],"well":[141],"different":[143],"datasets":[144],"detect":[148],"various":[149],"types":[150],"better":[156],"performance":[157],"than":[158],"other":[159],"algorithms.":[160],"designed":[163],"cope":[168],"constantly":[170],"changing":[171],"threats.":[173]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
