{"id":"https://openalex.org/W3158456479","doi":"https://doi.org/10.3390/fi13050111","title":"Designing a Network Intrusion Detection System Based on Machine Learning for Software Defined Networks","display_name":"Designing a Network Intrusion Detection System Based on Machine Learning for Software Defined Networks","publication_year":2021,"publication_date":"2021-04-28","ids":{"openalex":"https://openalex.org/W3158456479","doi":"https://doi.org/10.3390/fi13050111","mag":"3158456479"},"language":"en","primary_location":{"id":"doi:10.3390/fi13050111","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi13050111","pdf_url":"https://www.mdpi.com/1999-5903/13/5/111/pdf?version=1619678787","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1999-5903/13/5/111/pdf?version=1619678787","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113943368","display_name":"Abdulsalam O. Alzahrani","orcid":null},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Abdulsalam O. Alzahrani","raw_affiliation_strings":["Department of Computer Engineering, CCIS, King Saud University, Riyadh 11461, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0002-3308-7099","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, CCIS, King Saud University, Riyadh 11461, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075968009","display_name":"Mohammed J. F. Alenazi","orcid":"https://orcid.org/0000-0001-6593-112X"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Mohammed J. F. Alenazi","raw_affiliation_strings":["Department of Computer Engineering, CCIS, King Saud University, Riyadh 11461, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0001-6593-112X","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, CCIS, King Saud University, Riyadh 11461, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5075968009"],"corresponding_institution_ids":["https://openalex.org/I28022161"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":28.6746,"has_fulltext":true,"cited_by_count":251,"citation_normalized_percentile":{"value":0.99853124,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"13","issue":"5","first_page":"111","last_page":"111"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8925511837005615},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6461700201034546},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.6342210173606873},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.613450288772583},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.534065306186676},{"id":"https://openalex.org/keywords/benchmarking","display_name":"Benchmarking","score":0.5253245830535889},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.500877857208252},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.43947529792785645},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.43100452423095703},{"id":"https://openalex.org/keywords/data-pre-processing","display_name":"Data pre-processing","score":0.4178900718688965},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.2946379482746124},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1348097324371338}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8925511837005615},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6461700201034546},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.6342210173606873},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.613450288772583},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.534065306186676},{"id":"https://openalex.org/C86251818","wikidata":"https://www.wikidata.org/wiki/Q816754","display_name":"Benchmarking","level":2,"score":0.5253245830535889},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.500877857208252},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.43947529792785645},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.43100452423095703},{"id":"https://openalex.org/C10551718","wikidata":"https://www.wikidata.org/wiki/Q5227332","display_name":"Data pre-processing","level":2,"score":0.4178900718688965},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2946379482746124},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1348097324371338},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.3390/fi13050111","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi13050111","pdf_url":"https://www.mdpi.com/1999-5903/13/5/111/pdf?version=1619678787","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:gam:jftint:v:13:y:2021:i:5:p:111-:d:545095","is_oa":false,"landing_page_url":"https://www.mdpi.com/1999-5903/13/5/111/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:doaj.org/article:b21f583624134e4e8df3148def681419","is_oa":true,"landing_page_url":"https://doaj.org/article/b21f583624134e4e8df3148def681419","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet, Vol 13, Iss 5, p 111 (2021)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/1999-5903/13/5/111/","is_oa":true,"landing_page_url":"https://dx.doi.org/10.3390/fi13050111","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet; Volume 13; Issue 5; Pages: 111","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/fi13050111","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi13050111","pdf_url":"https://www.mdpi.com/1999-5903/13/5/111/pdf?version=1619678787","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G2196002719","display_name":null,"funder_award_id":"RG-1441-512","funder_id":"https://openalex.org/F4320335726","funder_display_name":"Deanship of Scientific Research, King Saud University"}],"funders":[{"id":"https://openalex.org/F4320321145","display_name":"King Saud University","ror":"https://ror.org/02f81g417"},{"id":"https://openalex.org/F4320335726","display_name":"Deanship of Scientific Research, King Saud University","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3158456479.pdf","grobid_xml":"https://content.openalex.org/works/W3158456479.grobid-xml"},"referenced_works_count":46,"referenced_works":["https://openalex.org/W303022950","https://openalex.org/W1489073918","https://openalex.org/W1965865862","https://openalex.org/W2057282890","https://openalex.org/W2099940443","https://openalex.org/W2145091572","https://openalex.org/W2165313080","https://openalex.org/W2166199068","https://openalex.org/W2287408518","https://openalex.org/W2294957742","https://openalex.org/W2295598076","https://openalex.org/W2311807148","https://openalex.org/W2460037574","https://openalex.org/W2560162835","https://openalex.org/W2562908385","https://openalex.org/W2583602944","https://openalex.org/W2584217814","https://openalex.org/W2782735691","https://openalex.org/W2783741806","https://openalex.org/W2793500577","https://openalex.org/W2799843691","https://openalex.org/W2885565273","https://openalex.org/W2889109290","https://openalex.org/W2913330314","https://openalex.org/W2919358060","https://openalex.org/W2975370684","https://openalex.org/W2987183592","https://openalex.org/W2990368922","https://openalex.org/W2990914279","https://openalex.org/W3008195198","https://openalex.org/W3009091629","https://openalex.org/W3010704846","https://openalex.org/W3032931441","https://openalex.org/W3038010422","https://openalex.org/W3091314960","https://openalex.org/W3102476541","https://openalex.org/W3103106496","https://openalex.org/W3122396520","https://openalex.org/W3153065649","https://openalex.org/W3205138306","https://openalex.org/W4230647017","https://openalex.org/W4248237684","https://openalex.org/W4249387332","https://openalex.org/W6684407781","https://openalex.org/W6696151112","https://openalex.org/W6802458769"],"related_works":["https://openalex.org/W4238897586","https://openalex.org/W435179959","https://openalex.org/W2619091065","https://openalex.org/W2059640416","https://openalex.org/W1490753184","https://openalex.org/W2284465472","https://openalex.org/W2291782699","https://openalex.org/W2122022187","https://openalex.org/W2115529843","https://openalex.org/W2756012949"],"abstract_inverted_index":{"Software-defined":[0],"Networking":[1],"(SDN)":[2,101],"has":[3,26,102],"recently":[4],"developed":[5],"and":[6,13,23,30,46,57,75,119,135,177,187,202,268,277],"been":[7],"put":[8],"forward":[9],"as":[10,167],"a":[11,42,62,91,98,210,255],"promising":[12],"encouraging":[14],"solution":[15],"for":[16,138,157,200,213],"future":[17],"internet":[18],"architecture.":[19],"Managed,":[20],"the":[21,35,107,113,120,124,129,151,165,172,204,226,232,236,270],"centralized":[22],"controlled":[24],"network":[25,50,92,100,166],"become":[27],"more":[28,43],"flexible":[29],"visible":[31],"using":[32],"SDN.":[33],"On":[34],"other":[36,244],"hand,":[37],"these":[38],"advantages":[39],"bring":[40],"us":[41],"vulnerable":[44],"environment":[45],"dangerous":[47],"threats,":[48],"causing":[49],"breakdowns,":[51],"systems":[52,77],"paralysis,":[53],"online":[54],"banking":[55],"frauds":[56],"robberies.":[58],"These":[59],"issues":[60],"have":[61],"significantly":[63],"destructive":[64],"impact":[65],"on":[66,225],"organizations,":[67],"companies":[68],"or":[69],"even":[70],"economies.":[71],"Accuracy,":[72],"high":[73],"performance":[74],"real-time":[76],"are":[78,189,223],"essential":[79],"to":[80,160,191,230,243],"achieve":[81],"this":[82],"goal":[83],"successfully.":[84],"Extending":[85],"intelligent":[86],"machine":[87,125,154,180],"learning":[88,126,155,181],"algorithms":[89,127,156],"in":[90,106,123,164,171,217,228],"intrusion":[93],"detection":[94],"system":[95,137],"(NIDS)":[96],"through":[97],"software-defined":[99],"attracted":[103],"considerable":[104],"attention":[105],"last":[108],"decade.":[109],"Big":[110],"data":[111,116],"availability,":[112],"diversity":[114],"of":[115,131,142,153,169,235,250,253,272,282],"analysis":[117],"techniques,":[118,182],"massive":[121],"improvement":[122],"enable":[128],"building":[130],"an":[132,266,280],"effective,":[133],"reliable":[134],"dependable":[136],"detecting":[139,262],"different":[140],"types":[141],"attacks":[143],"that":[144],"frequently":[145],"target":[146],"networks.":[147],"This":[148],"study":[149],"demonstrates":[150],"use":[152],"traffic":[158],"monitoring":[159],"detect":[161],"malicious":[162],"behavior":[163],"part":[168],"NIDS":[170],"SDN":[173],"controller.":[174],"Different":[175],"classical":[176],"advanced":[178,220],"tree-based":[179],"Decision":[183],"Tree,":[184],"Random":[185],"Forest":[186],"XGBoost":[188],"chosen":[190],"demonstrate":[192],"attack":[193,267,273],"detection.":[194],"The":[195],"NSL-KDD":[196],"dataset":[197,212,227],"is":[198,208,259,265],"used":[199],"training":[201],"testing":[203],"proposed":[205],"methods;":[206],"it":[207],"considered":[209],"benchmarking":[211],"several":[214],"state-of-the-art":[215],"approaches":[216],"NIDS.":[218],"Several":[219],"preprocessing":[221],"techniques":[222],"performed":[224],"order":[229],"extract":[231],"best":[233],"form":[234],"data,":[237],"which":[238],"produces":[239],"outstanding":[240],"results":[241],"compared":[242],"systems.":[245],"Using":[246],"just":[247],"five":[248],"out":[249],"41":[251],"features":[252],"NSL-KDD,":[254],"multi-class":[256],"classification":[257],"task":[258],"conducted":[260],"by":[261],"whether":[263],"there":[264],"classifying":[269],"type":[271],"(DDoS,":[274],"PROBE,":[275],"R2L,":[276],"U2R),":[278],"accomplishing":[279],"accuracy":[281],"95.95%.":[283]},"counts_by_year":[{"year":2026,"cited_by_count":11},{"year":2025,"cited_by_count":61},{"year":2024,"cited_by_count":56},{"year":2023,"cited_by_count":60},{"year":2022,"cited_by_count":49},{"year":2021,"cited_by_count":14}],"updated_date":"2026-05-12T08:28:47.272897","created_date":"2021-05-10T00:00:00"}
