{"id":"https://openalex.org/W2906111250","doi":"https://doi.org/10.3390/make1010017","title":"Multi-Layer Hidden Markov Model Based Intrusion Detection System","display_name":"Multi-Layer Hidden Markov Model Based Intrusion Detection System","publication_year":2018,"publication_date":"2018-12-25","ids":{"openalex":"https://openalex.org/W2906111250","doi":"https://doi.org/10.3390/make1010017","mag":"2906111250"},"language":"en","primary_location":{"id":"doi:10.3390/make1010017","is_oa":true,"landing_page_url":"https://doi.org/10.3390/make1010017","pdf_url":"https://www.mdpi.com/2504-4990/1/1/17/pdf?version=1545740205","source":{"id":"https://openalex.org/S4210213891","display_name":"Machine Learning and Knowledge Extraction","issn_l":"2504-4990","issn":["2504-4990"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Machine Learning and Knowledge Extraction","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2504-4990/1/1/17/pdf?version=1545740205","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070931006","display_name":"Wondimu Zegeye","orcid":"https://orcid.org/0000-0002-4921-4574"},"institutions":[{"id":"https://openalex.org/I83909951","display_name":"Morgan State University","ror":"https://ror.org/017d8gk22","country_code":"US","type":"education","lineage":["https://openalex.org/I83909951"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Wondimu K. Zegeye","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Morgan State University, Baltimore, MD 21251, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Morgan State University, Baltimore, MD 21251, USA","institution_ids":["https://openalex.org/I83909951"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043846225","display_name":"Richard A. Dean","orcid":"https://orcid.org/0000-0003-0000-5357"},"institutions":[{"id":"https://openalex.org/I83909951","display_name":"Morgan State University","ror":"https://ror.org/017d8gk22","country_code":"US","type":"education","lineage":["https://openalex.org/I83909951"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Richard A. Dean","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Morgan State University, Baltimore, MD 21251, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Morgan State University, Baltimore, MD 21251, USA","institution_ids":["https://openalex.org/I83909951"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062771961","display_name":"Farzad Moazzami","orcid":null},"institutions":[{"id":"https://openalex.org/I83909951","display_name":"Morgan State University","ror":"https://ror.org/017d8gk22","country_code":"US","type":"education","lineage":["https://openalex.org/I83909951"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Farzad Moazzami","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Morgan State University, Baltimore, MD 21251, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Morgan State University, Baltimore, MD 21251, USA","institution_ids":["https://openalex.org/I83909951"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5070931006"],"corresponding_institution_ids":["https://openalex.org/I83909951"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":2.2144,"has_fulltext":true,"cited_by_count":31,"citation_normalized_percentile":{"value":0.89341673,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":99},"biblio":{"volume":"1","issue":"1","first_page":"265","last_page":"286"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.808666467666626},{"id":"https://openalex.org/keywords/hidden-markov-model","display_name":"Hidden Markov model","score":0.7314935922622681},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6999240517616272},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5485856533050537},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5349496603012085},{"id":"https://openalex.org/keywords/curse-of-dimensionality","display_name":"Curse of dimensionality","score":0.5170919895172119},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4703369736671448},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4697846472263336},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.4277132451534271},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4263980984687805},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2687295973300934}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.808666467666626},{"id":"https://openalex.org/C23224414","wikidata":"https://www.wikidata.org/wiki/Q176769","display_name":"Hidden Markov model","level":2,"score":0.7314935922622681},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6999240517616272},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5485856533050537},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5349496603012085},{"id":"https://openalex.org/C111030470","wikidata":"https://www.wikidata.org/wiki/Q1430460","display_name":"Curse of dimensionality","level":2,"score":0.5170919895172119},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4703369736671448},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4697846472263336},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.4277132451534271},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4263980984687805},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2687295973300934},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/make1010017","is_oa":true,"landing_page_url":"https://doi.org/10.3390/make1010017","pdf_url":"https://www.mdpi.com/2504-4990/1/1/17/pdf?version=1545740205","source":{"id":"https://openalex.org/S4210213891","display_name":"Machine Learning and Knowledge Extraction","issn_l":"2504-4990","issn":["2504-4990"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Machine Learning and Knowledge Extraction","raw_type":"journal-article"},{"id":"pmh:oai:mdpi.com:/2504-4990/1/1/17/","is_oa":true,"landing_page_url":"http://dx.doi.org/10.3390/make1010017","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Machine Learning and Knowledge Extraction","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/make1010017","is_oa":true,"landing_page_url":"https://doi.org/10.3390/make1010017","pdf_url":"https://www.mdpi.com/2504-4990/1/1/17/pdf?version=1545740205","source":{"id":"https://openalex.org/S4210213891","display_name":"Machine Learning and Knowledge Extraction","issn_l":"2504-4990","issn":["2504-4990"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Machine Learning and Knowledge Extraction","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6899999976158142,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2906111250.pdf","grobid_xml":"https://content.openalex.org/works/W2906111250.grobid-xml"},"referenced_works_count":19,"referenced_works":["https://openalex.org/W9528604","https://openalex.org/W1563483395","https://openalex.org/W2007321142","https://openalex.org/W2102941975","https://openalex.org/W2105594594","https://openalex.org/W2125838338","https://openalex.org/W2133097426","https://openalex.org/W2150593711","https://openalex.org/W2150730101","https://openalex.org/W2151800451","https://openalex.org/W2157952723","https://openalex.org/W2160172778","https://openalex.org/W2732560875","https://openalex.org/W2763978449","https://openalex.org/W2768838716","https://openalex.org/W2789828921","https://openalex.org/W2890988085","https://openalex.org/W2982379385","https://openalex.org/W3104378004"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2053269318","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819","https://openalex.org/W2364370872","https://openalex.org/W3152891574"],"abstract_inverted_index":{"The":[0,162,224],"all":[1],"IP":[2],"nature":[3],"of":[4,16,35,82,105,134,143,150,157,178,182,217,220,226],"the":[5,29,128,132,141,215,221,234],"next":[6],"generation":[7],"(5G)":[8],"networks":[9],"is":[10],"going":[11,23],"to":[12,24,41,73,126,136,153,171,195],"open":[13],"a":[14,116,147,154],"lot":[15],"doors":[17],"for":[18,93],"new":[19,211],"vulnerabilities":[20,37],"which":[21,53,102,213],"are":[22,214],"be":[25,39,71,166],"challenging":[26],"in":[27,79,131],"preventing":[28],"risk":[30],"associated":[31],"with":[32,43],"them.":[33],"Majority":[34],"these":[36],"might":[38],"impossible":[40],"detect":[42],"simple":[44],"networking":[45],"traffic":[46,83],"monitoring":[47],"tools.":[48],"Intrusion":[49],"Detection":[50],"Systems":[51],"(IDS)":[52],"rely":[54],"on":[55],"machine":[56,106],"learning":[57,107],"and":[58,75,84,124,159,189,193,208],"artificial":[59],"intelligence":[60],"can":[61,70,165,184],"significantly":[62],"improve":[63],"network":[64,206],"defense":[65],"against":[66],"intruders.":[67],"This":[68,96,119],"technology":[69],"trained":[72],"learn":[74],"identify":[76,201],"uncommon":[77],"patterns":[78],"massive":[80],"volume":[81],"notify,":[85],"using":[86,115],"such":[87,109],"as":[88,110,140,205],"alert":[89],"flags,":[90],"system":[91],"administrators":[92],"additional":[94],"investigation.":[95],"paper":[97],"proposes":[98],"an":[99],"IDS":[100,137],"design":[101],"makes":[103],"use":[104],"algorithms":[108],"Hidden":[111],"Markov":[112],"Model":[113],"(HMM)":[114],"multi-layer":[117,163],"approach.":[118],"approach":[120,164,229],"has":[121,237],"been":[122,231,239],"developed":[123,232],"verified":[125],"resolve":[127,185],"common":[129],"flaws":[130],"application":[133],"HMM":[135],"commonly":[138],"referred":[139],"curse":[142],"dimensionality.":[144],"It":[145],"factors":[146],"huge":[148],"problem":[149],"immense":[151],"dimensionality":[152],"discrete":[155,202],"set":[156],"manageable":[158],"reliable":[160],"elements.":[161],"expanded":[167],"beyond":[168],"2":[169],"layers":[170,200,210],"capture":[172],"multi-phase":[173,218],"attacks":[174],"over":[175],"longer":[176],"spans":[177],"time.":[179],"A":[180],"pyramid":[181],"HMMs":[183],"disparate":[186],"digital":[187],"events":[188,203,219],"signatures":[190],"across":[191],"protocols":[192],"platforms":[194],"actionable":[196],"information":[197],"where":[198],"lower":[199,222],"(such":[204],"scan)":[207],"higher":[209],"states":[212],"result":[216],"layers.":[223],"concepts":[225],"this":[227],"novel":[228],"have":[230],"but":[233],"full":[235],"potential":[236],"not":[238],"demonstrated.":[240]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
