{"id":"https://openalex.org/W3097494778","doi":"https://doi.org/10.3390/fi12110180","title":"Ensemble Classifiers for Network Intrusion Detection Using a Novel Network Attack Dataset","display_name":"Ensemble Classifiers for Network Intrusion Detection Using a Novel Network Attack Dataset","publication_year":2020,"publication_date":"2020-10-26","ids":{"openalex":"https://openalex.org/W3097494778","doi":"https://doi.org/10.3390/fi12110180","mag":"3097494778"},"language":"en","primary_location":{"id":"doi:10.3390/fi12110180","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi12110180","pdf_url":"https://www.mdpi.com/1999-5903/12/11/180/pdf?version=1603705958","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1999-5903/12/11/180/pdf?version=1603705958","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006562407","display_name":"Ahmed Mahfouz","orcid":"https://orcid.org/0000-0001-8601-2149"},"institutions":[{"id":"https://openalex.org/I94658018","display_name":"University of Memphis","ror":"https://ror.org/01cq23130","country_code":"US","type":"education","lineage":["https://openalex.org/I94658018"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ahmed Mahfouz","raw_affiliation_strings":["Department of Computer Science, University of Memphis, Memphis, TN 38152, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Memphis, Memphis, TN 38152, USA","institution_ids":["https://openalex.org/I94658018"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085123980","display_name":"Abdullah Abuhussein","orcid":"https://orcid.org/0000-0002-1350-6719"},"institutions":[{"id":"https://openalex.org/I173963315","display_name":"St. Cloud State University","ror":"https://ror.org/016czhx14","country_code":"US","type":"education","lineage":["https://openalex.org/I173963315","https://openalex.org/I91221267"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Abdullah Abuhussein","raw_affiliation_strings":["Department of Information Systems, St. Cloud State University, St. Cloud, MN 56301, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems, St. Cloud State University, St. Cloud, MN 56301, USA","institution_ids":["https://openalex.org/I173963315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103421781","display_name":"Deepak Venugopal","orcid":"https://orcid.org/0000-0001-7466-5417"},"institutions":[{"id":"https://openalex.org/I94658018","display_name":"University of Memphis","ror":"https://ror.org/01cq23130","country_code":"US","type":"education","lineage":["https://openalex.org/I94658018"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Deepak Venugopal","raw_affiliation_strings":["Department of Computer Science, University of Memphis, Memphis, TN 38152, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Memphis, Memphis, TN 38152, USA","institution_ids":["https://openalex.org/I94658018"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012148704","display_name":"Sajjan G. Shiva","orcid":"https://orcid.org/0000-0002-3996-7484"},"institutions":[{"id":"https://openalex.org/I94658018","display_name":"University of Memphis","ror":"https://ror.org/01cq23130","country_code":"US","type":"education","lineage":["https://openalex.org/I94658018"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sajjan Shiva","raw_affiliation_strings":["Department of Computer Science, University of Memphis, Memphis, TN 38152, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Memphis, Memphis, TN 38152, USA","institution_ids":["https://openalex.org/I94658018"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5006562407"],"corresponding_institution_ids":["https://openalex.org/I94658018"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":9.7039,"has_fulltext":true,"cited_by_count":95,"citation_normalized_percentile":{"value":0.98321665,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"12","issue":"11","first_page":"180","last_page":"180"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9036842584609985},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.8051716685295105},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5824238061904907},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5777638554573059},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5515522360801697},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5377758741378784},{"id":"https://openalex.org/keywords/constant-false-alarm-rate","display_name":"Constant false alarm rate","score":0.529558002948761},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4416922926902771},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.44007161259651184},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3293658494949341}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9036842584609985},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.8051716685295105},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5824238061904907},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5777638554573059},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5515522360801697},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5377758741378784},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.529558002948761},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4416922926902771},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.44007161259651184},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3293658494949341}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.3390/fi12110180","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi12110180","pdf_url":"https://www.mdpi.com/1999-5903/12/11/180/pdf?version=1603705958","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:gam:jftint:v:12:y:2020:i:11:p:180-:d:434713","is_oa":false,"landing_page_url":"https://www.mdpi.com/1999-5903/12/11/180/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:doaj.org/article:9af0c704e5144aa689c15cd7859e13cb","is_oa":true,"landing_page_url":"https://doaj.org/article/9af0c704e5144aa689c15cd7859e13cb","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet, Vol 12, Iss 11, p 180 (2020)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/1999-5903/12/11/180/","is_oa":true,"landing_page_url":"https://dx.doi.org/10.3390/fi12110180","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet; Volume 12; Issue 11; Pages: 180","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/fi12110180","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi12110180","pdf_url":"https://www.mdpi.com/1999-5903/12/11/180/pdf?version=1603705958","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6800000071525574}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3097494778.pdf","grobid_xml":"https://content.openalex.org/works/W3097494778.grobid-xml"},"referenced_works_count":70,"referenced_works":["https://openalex.org/W65242977","https://openalex.org/W122356390","https://openalex.org/W124367838","https://openalex.org/W213977334","https://openalex.org/W607505555","https://openalex.org/W788122210","https://openalex.org/W1480235938","https://openalex.org/W1490094820","https://openalex.org/W1619226191","https://openalex.org/W1847381862","https://openalex.org/W1848473654","https://openalex.org/W2004076523","https://openalex.org/W2006020859","https://openalex.org/W2012905273","https://openalex.org/W2017337590","https://openalex.org/W2038180045","https://openalex.org/W2061517920","https://openalex.org/W2091576221","https://openalex.org/W2099940443","https://openalex.org/W2100734569","https://openalex.org/W2105779206","https://openalex.org/W2118937875","https://openalex.org/W2122646361","https://openalex.org/W2128965734","https://openalex.org/W2135293965","https://openalex.org/W2136520147","https://openalex.org/W2140404878","https://openalex.org/W2141577524","https://openalex.org/W2148143831","https://openalex.org/W2160038532","https://openalex.org/W2165313080","https://openalex.org/W2181808011","https://openalex.org/W2287654067","https://openalex.org/W2315968915","https://openalex.org/W2318645799","https://openalex.org/W2343828539","https://openalex.org/W2399941526","https://openalex.org/W2401501243","https://openalex.org/W2516066574","https://openalex.org/W2544098645","https://openalex.org/W2591712613","https://openalex.org/W2605307741","https://openalex.org/W2617931713","https://openalex.org/W2626468835","https://openalex.org/W2737181000","https://openalex.org/W2738792436","https://openalex.org/W2781517838","https://openalex.org/W2785605040","https://openalex.org/W2789828921","https://openalex.org/W2791468589","https://openalex.org/W2791738704","https://openalex.org/W2799758613","https://openalex.org/W2899365137","https://openalex.org/W2900853407","https://openalex.org/W2911184415","https://openalex.org/W2968153557","https://openalex.org/W2970465829","https://openalex.org/W2975040691","https://openalex.org/W2981978050","https://openalex.org/W3122864121","https://openalex.org/W4231628141","https://openalex.org/W4236362309","https://openalex.org/W4290890850","https://openalex.org/W6680365914","https://openalex.org/W6685555776","https://openalex.org/W6699061645","https://openalex.org/W6707162994","https://openalex.org/W6713357761","https://openalex.org/W6793873754","https://openalex.org/W6885037841"],"related_works":["https://openalex.org/W2376886931","https://openalex.org/W2061466315","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W1495178644","https://openalex.org/W2185594426","https://openalex.org/W2377372927"],"abstract_inverted_index":{"Due":[0],"to":[1,40,49,86,99,108,154,185,214],"the":[2,14,33,156,159,168,187,190],"extensive":[3],"use":[4,207],"of":[5,18,36,121,158,178,189,211],"computer":[6],"networks,":[7],"new":[8,27,136],"risks":[9],"have":[10,30],"arisen,":[11],"and":[12,16,112,143,150,173,192,203,206],"improving":[13],"speed":[15],"accuracy":[17,191],"security":[19,28,53,65],"mechanisms":[20],"has":[21],"become":[22],"a":[23,42,61,96,118,135,163,208],"critical":[24],"need.":[25],"Although":[26],"tools":[29,54],"been":[31],"developed,":[32],"fast":[34],"growth":[35],"malicious":[37],"activities":[38],"continues":[39],"be":[41,152],"pressing":[43],"issue":[44,188],"that":[45,146],"creates":[46],"severe":[47],"threats":[48],"network":[50,77,89,130],"security.":[51],"Classical":[52],"such":[55,88],"as":[56,60],"firewalls":[57,68],"are":[58],"used":[59,153],"first-line":[62],"defense":[63],"against":[64],"problems.":[66],"However,":[67],"do":[69],"not":[70],"entirely":[71],"or":[72],"perfectly":[73],"eliminate":[74],"intrusions.":[75],"Thus,":[76],"administrators":[78],"rely":[79],"heavily":[80],"on":[81,104],"intrusion":[82,90,100],"detection":[83,101],"systems":[84],"(IDSs)":[85],"detect":[87],"activities.":[91],"Machine":[92],"learning":[93,183],"(ML)":[94],"is":[95],"practical":[97],"approach":[98],"that,":[102],"based":[103],"data,":[105],"learns":[106],"how":[107],"differentiate":[109],"between":[110],"abnormal":[111],"regular":[113],"traffic.":[114,131],"This":[115],"paper":[116,169],"provides":[117],"comprehensive":[119,209],"analysis":[120],"some":[122],"existing":[123],"ML":[124,160],"classifiers":[125,161,180,199],"for":[126],"identifying":[127],"intrusions":[128],"in":[129,162,196],"It":[132],"also":[133],"produces":[134],"reliable":[137],"dataset":[138],"called":[139],"GTCS":[140],"(Game":[141],"Theory":[142],"Cyber":[144],"Security)":[145],"matches":[147],"real-world":[148],"criteria":[149],"can":[151],"assess":[155],"performance":[157],"detailed":[164],"experimental":[165],"evaluation.":[166],"Finally,":[167],"proposes":[170],"an":[171],"ensemble":[172],"adaptive":[174],"classifier":[175],"model":[176],"composed":[177],"multiple":[179],"with":[181],"different":[182],"paradigms":[184],"address":[186],"false":[193],"alarm":[194],"rate":[195],"IDSs.":[197],"Our":[198],"show":[200],"high":[201],"precision":[202],"recall":[204],"rates":[205],"set":[210],"features":[212],"compared":[213],"previous":[215],"work.":[216]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":15},{"year":2024,"cited_by_count":18},{"year":2023,"cited_by_count":21},{"year":2022,"cited_by_count":30},{"year":2021,"cited_by_count":9}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
