{"id":"https://openalex.org/W4383905155","doi":"https://doi.org/10.3233/jifs-231758","title":"A novel attention-based feature learning and optimal deep learning approach for network intrusion detection","display_name":"A novel attention-based feature learning and optimal deep learning approach for network intrusion detection","publication_year":2023,"publication_date":"2023-07-11","ids":{"openalex":"https://openalex.org/W4383905155","doi":"https://doi.org/10.3233/jifs-231758"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-231758","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-231758","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020395708","display_name":"K. Sakthi","orcid":null},"institutions":[{"id":"https://openalex.org/I85461943","display_name":"Saveetha University","ror":"https://ror.org/0034me914","country_code":"IN","type":"education","lineage":["https://openalex.org/I85461943"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"K. Sakthi","raw_affiliation_strings":["Department of ECE, Saveetha Engineering College, Chennai, Tamilnadu, India"],"affiliations":[{"raw_affiliation_string":"Department of ECE, Saveetha Engineering College, Chennai, Tamilnadu, India","institution_ids":["https://openalex.org/I85461943"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103875369","display_name":"Padam Kumar","orcid":null},"institutions":[{"id":"https://openalex.org/I33585257","display_name":"Anna University, Chennai","ror":"https://ror.org/01qhf1r47","country_code":"IN","type":"education","lineage":["https://openalex.org/I33585257"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"P. Nirmal Kumar","raw_affiliation_strings":["Department of ECE, Anna University, Chennai, Tamilnadu, India"],"affiliations":[{"raw_affiliation_string":"Department of ECE, Anna University, Chennai, Tamilnadu, India","institution_ids":["https://openalex.org/I33585257"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5020395708"],"corresponding_institution_ids":["https://openalex.org/I85461943"],"apc_list":null,"apc_paid":null,"fwci":1.6229,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.84364588,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"45","issue":"3","first_page":"5123","last_page":"5140"},"is_retracted":true,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8616145849227905},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6610938906669617},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6231233477592468},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5975645184516907},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5548681020736694},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.5337399244308472},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.5216938853263855},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.44352462887763977},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4339175224304199},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.43108195066452026},{"id":"https://openalex.org/keywords/data-pre-processing","display_name":"Data pre-processing","score":0.42376238107681274}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8616145849227905},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6610938906669617},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6231233477592468},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5975645184516907},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5548681020736694},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.5337399244308472},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.5216938853263855},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.44352462887763977},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4339175224304199},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.43108195066452026},{"id":"https://openalex.org/C10551718","wikidata":"https://www.wikidata.org/wiki/Q5227332","display_name":"Data pre-processing","level":2,"score":0.42376238107681274},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-231758","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-231758","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W2928016897","https://openalex.org/W2979563069","https://openalex.org/W2981025625","https://openalex.org/W3004777721","https://openalex.org/W3005805195","https://openalex.org/W3016987480","https://openalex.org/W3045661671","https://openalex.org/W3091379954","https://openalex.org/W3093410479","https://openalex.org/W3096927290","https://openalex.org/W3111390419","https://openalex.org/W3125294517","https://openalex.org/W3131088496","https://openalex.org/W3138465682","https://openalex.org/W3143021555","https://openalex.org/W3158456479","https://openalex.org/W3160455160","https://openalex.org/W3168771234","https://openalex.org/W3168793901","https://openalex.org/W3180336812","https://openalex.org/W3203436613","https://openalex.org/W3217115371","https://openalex.org/W3217748719","https://openalex.org/W4200292895","https://openalex.org/W4205243841","https://openalex.org/W4211114749","https://openalex.org/W4220982217","https://openalex.org/W4295346826","https://openalex.org/W4309569390","https://openalex.org/W4309737115","https://openalex.org/W6792219411"],"related_works":["https://openalex.org/W2989490741","https://openalex.org/W1629127207","https://openalex.org/W3092506759","https://openalex.org/W2367545121","https://openalex.org/W4248881655","https://openalex.org/W2482165163","https://openalex.org/W3010890513","https://openalex.org/W120741642","https://openalex.org/W138569904","https://openalex.org/W2390914021"],"abstract_inverted_index":{"Rapid":[0],"technological":[1],"advances":[2],"and":[3,27,68,120,138,216,222],"network":[4,59,94,104,107,212],"progress":[5],"has":[6,12,23],"occurred":[7],"in":[8,80],"recent":[9],"decades,":[10],"as":[11,214],"the":[13,19,62,128,142,149,157,164,180,184,188,191,203,211,227,232],"global":[14],"growth":[15],"of":[16,64,183,190],"services":[17],"via":[18],"Internet.":[20],"Consequently,":[21],"piracy":[22],"become":[24],"more":[25,78],"prevalent,":[26],"many":[28],"modern":[29],"systems":[30],"have":[31],"been":[32],"infiltrated,":[33],"making":[34],"it":[35],"vital":[36],"to":[37,42,155,178],"build":[38],"information":[39,54],"security":[40,55],"tools":[41],"identify":[43],"new":[44],"threats.":[45],"An":[46],"intrusion":[47,95],"detection":[48,96],"system":[49],"(IDS)":[50],"is":[51,146,194,205],"a":[52],"critical":[53],"technology":[56],"that":[57,226],"detects":[58],"fluctuations":[60],"with":[61,82,173],"help":[63],"machine":[65],"learning":[66,70],"(ML)":[67],"deep":[69,102],"(DL)":[71],"approaches.":[72],"However,":[73],"conventional":[74],"techniques":[75],"could":[76],"be":[77],"effective":[79],"dealing":[81],"advanced":[83],"attacks.":[84],"So,":[85],"this":[86],"paper":[87],"proposes":[88],"an":[89,99],"efficient":[90],"DL":[91],"approach":[92],"for":[93],"(NID)":[97],"using":[98,148,169,207],"optimal":[100],"weight-based":[101],"neural":[103],"(OWDNN).":[105],"The":[106,160],"traffic":[108,213],"data":[109,130,143],"was":[110,124],"initially":[111],"collected":[112,129],"from":[113,163],"three":[114],"openly":[115],"available":[116],"datasets:":[117],"NSL-KDD,":[118,220],"CSE-CIC-IDS2018":[119,221],"UNSW-NB15.":[121],"Then":[122],"preprocessing":[123],"carried":[125],"out":[126],"on":[127,132,197,219],"based":[131,196],"missing":[133],"values":[134],"imputation,":[135],"one-hot":[136],"encoding,":[137],"normalization.":[139],"After":[140,186],"that,":[141,187],"under-sampling":[144],"process":[145],"performed":[147],"butterfly-optimized":[150],"k-means":[151],"clustering":[152],"(BOKMC)":[153],"algorithm":[154],"balance":[156],"unbalanced":[158],"dataset.":[159],"relevant":[161],"features":[162],"balanced":[165],"dataset":[166],"are":[167],"selected":[168,192],"inception":[170],"version":[171],"3":[172],"multi-head":[174],"attention":[175],"(IV3MHA)":[176],"mechanism":[177],"reduce":[179],"computation":[181],"burden":[182],"classifier.":[185],"dimensionality":[189],"feature":[193],"reduced":[195],"principal":[198],"component":[199],"analysis":[200],"(PCA).":[201],"Finally,":[202],"classification":[204],"done":[206],"OWDNN,":[208],"which":[209],"classifies":[210],"normal":[215],"anomalous.":[217],"Experiments":[218],"UNSW-NB15":[223],"datasets":[224],"show":[225],"OWDNN":[228],"performs":[229],"better":[230],"than":[231],"other":[233],"ID":[234],"methods.":[235]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":2}],"updated_date":"2026-03-15T09:29:46.208133","created_date":"2025-10-10T00:00:00"}
