{"id":"https://openalex.org/W2941215571","doi":"https://doi.org/10.4018/ijdcf.2019070104","title":"A Comparative Analysis of Deep Learning Approaches for Network Intrusion Detection Systems (N-IDSs)","display_name":"A Comparative Analysis of Deep Learning Approaches for Network Intrusion Detection Systems (N-IDSs)","publication_year":2019,"publication_date":"2019-04-23","ids":{"openalex":"https://openalex.org/W2941215571","doi":"https://doi.org/10.4018/ijdcf.2019070104","mag":"2941215571"},"language":"en","primary_location":{"id":"doi:10.4018/ijdcf.2019070104","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijdcf.2019070104","pdf_url":null,"source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112825787","display_name":"R. Vinayakumar","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Vinayakumar R","raw_affiliation_strings":["Center for Computational Engineering and Networking (CEN), Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, India"],"affiliations":[{"raw_affiliation_string":"Center for Computational Engineering and Networking (CEN), Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112182829","display_name":"Soman KP","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Soman KP","raw_affiliation_strings":["Center for Computational Engineering and Networking (CEN), Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, India"],"affiliations":[{"raw_affiliation_string":"Center for Computational Engineering and Networking (CEN), Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029900047","display_name":"Prabaharan Poornachandran","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Prabaharan Poornachandran","raw_affiliation_strings":["Center for Cyber Security Systems and Networks, Amrita School of Engineering, Amritapuri, Amrita Vishwa Vidyapeetham, India"],"affiliations":[{"raw_affiliation_string":"Center for Cyber Security Systems and Networks, Amrita School of Engineering, Amritapuri, Amrita Vishwa Vidyapeetham, India","institution_ids":["https://openalex.org/I81556334"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5112825787"],"corresponding_institution_ids":["https://openalex.org/I81556334"],"apc_list":null,"apc_paid":null,"fwci":4.0673,"has_fulltext":false,"cited_by_count":60,"citation_normalized_percentile":{"value":0.9443442,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"11","issue":"3","first_page":"65","last_page":"89"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8954463005065918},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.719825267791748},{"id":"https://openalex.org/keywords/recurrent-neural-network","display_name":"Recurrent neural network","score":0.7112205624580383},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6711851954460144},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5012416839599609},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.46758270263671875},{"id":"https://openalex.org/keywords/network-architecture","display_name":"Network architecture","score":0.46071064472198486},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4293450117111206},{"id":"https://openalex.org/keywords/random-neural-network","display_name":"Random neural network","score":0.41795873641967773},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1712079644203186}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8954463005065918},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.719825267791748},{"id":"https://openalex.org/C147168706","wikidata":"https://www.wikidata.org/wiki/Q1457734","display_name":"Recurrent neural network","level":3,"score":0.7112205624580383},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6711851954460144},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5012416839599609},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.46758270263671875},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.46071064472198486},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4293450117111206},{"id":"https://openalex.org/C33010914","wikidata":"https://www.wikidata.org/wiki/Q7291980","display_name":"Random neural network","level":4,"score":0.41795873641967773},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1712079644203186}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4018/ijdcf.2019070104","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijdcf.2019070104","pdf_url":null,"source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Digital Crime and Forensics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","score":0.6800000071525574,"display_name":"Quality Education"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W135902891","https://openalex.org/W196761320","https://openalex.org/W1545764953","https://openalex.org/W1551469486","https://openalex.org/W1591480890","https://openalex.org/W1665214252","https://openalex.org/W1800356822","https://openalex.org/W1815076433","https://openalex.org/W1851171594","https://openalex.org/W1959547409","https://openalex.org/W2016589492","https://openalex.org/W2057653135","https://openalex.org/W2064675550","https://openalex.org/W2098454077","https://openalex.org/W2099825894","https://openalex.org/W2099940443","https://openalex.org/W2102941975","https://openalex.org/W2110485445","https://openalex.org/W2117646649","https://openalex.org/W2125281248","https://openalex.org/W2126121673","https://openalex.org/W2130676130","https://openalex.org/W2130802299","https://openalex.org/W2132111557","https://openalex.org/W2134641333","https://openalex.org/W2150847526","https://openalex.org/W2157331557","https://openalex.org/W2187089797","https://openalex.org/W2252143850","https://openalex.org/W2262045390","https://openalex.org/W2296509296","https://openalex.org/W2334853001","https://openalex.org/W2548243888","https://openalex.org/W2576897537","https://openalex.org/W2598811698","https://openalex.org/W2919115771","https://openalex.org/W2962851944","https://openalex.org/W4250545072","https://openalex.org/W4285719527","https://openalex.org/W6608133726"],"related_works":["https://openalex.org/W4225394202","https://openalex.org/W4298287631","https://openalex.org/W2953061907","https://openalex.org/W3032952384","https://openalex.org/W3034302643","https://openalex.org/W1847088711","https://openalex.org/W3036642985","https://openalex.org/W2964335273","https://openalex.org/W1889624880","https://openalex.org/W3008584592"],"abstract_inverted_index":{"Recently,":[0],"due":[1],"to":[2,52,61,78,153,168,216,232,244],"the":[3,13,59,63,67,155,170,178,194,233,246],"advance":[4],"and":[5,21,135,166,172,200,260],"impressive":[6],"results":[7,226],"of":[8,15,117,143,157,196,205,210,227,235,248,257],"deep":[9,49,106,187,211,249],"learning":[10,107],"techniques":[11,51],"in":[12,37,65,99,176],"fields":[14],"image":[16],"recognition,":[17],"natural":[18],"language":[19],"processing":[20],"speech":[22],"recognition":[23],"for":[24,185],"various":[25,197],"long-standing":[26],"artificial":[27],"intelligence":[28],"(AI)":[29],"tasks,":[30],"there":[31],"has":[32],"been":[33],"a":[34,86,100,104],"great":[35],"interest":[36,150],"applying":[38,47],"towards":[39],"security":[40],"tasks":[41],"too.":[42],"This":[43],"article":[44,81],"focuses":[45],"on":[46,192,237,254],"these":[48],"taxonomy":[50],"network":[53,68,83,113,126,183,198,201],"intrusion":[54],"detection":[55],"system":[56],"(N-IDS)":[57],"with":[58,103],"aim":[60],"enhance":[62],"performance":[64,156,195,234],"classifying":[66],"connections":[69],"as":[70,85,110,122,164],"either":[71],"good":[72],"or":[73],"bad.":[74],"To":[75],"substantiate":[76],"this":[77,80],"NIDS,":[79],"models":[82,188,212],"traffic":[84],"time":[87],"series":[88],"data,":[89],"specifically":[90],"transmission":[91],"control":[92],"protocol":[93,96],"/":[94],"internet":[95],"(TCP/IP)":[97],"packets":[98],"predefined":[101],"time-window":[102],"supervised":[105],"methods":[108],"such":[109,163,206],"recurrent":[111,124,137],"neural":[112,125],"(RNN),":[114],"identity":[115,123],"matrix":[116],"initialized":[118],"values":[119],"typically":[120],"termed":[121],"(IRNN),":[127],"long":[128],"short-term":[129],"memory":[130],"(LSTM),":[131],"clock-work":[132],"RNN":[133,158],"(CWRNN)":[134],"gated":[136],"unit":[138],"(GRU),":[139],"utilizing":[140],"connection":[141],"records":[142],"KDDCup-99":[144,238],"challenge":[145],"data":[146,240],"set.":[147,241],"The":[148,181,203,224],"main":[149],"is":[151,189],"given":[152],"evaluate":[154],"over":[159],"newly":[160],"introduced":[161],"method":[162],"LSTM":[165,236],"IRNN":[167,228],"alleviate":[169],"vanishing":[171],"exploding":[173],"gradient":[174],"problem":[175],"memorizing":[177],"long-term":[179],"dependencies.":[180],"efficient":[182,208],"architecture":[184],"all":[186],"chosen":[190,207],"based":[191],"comparing":[193],"topologies":[199],"parameters.":[202],"experiments":[204],"configurations":[209],"were":[213],"run":[214],"up":[215],"1,000":[217],"epochs":[218],"by":[219],"varying":[220],"learning-rates":[221],"between":[222],"0.01-05.":[223],"observed":[225],"are":[229,252],"relatively":[230],"close":[231],"NIDS":[239,265],"In":[242],"addition":[243],"KDDCup-99,":[245],"effectiveness":[247],"model":[250],"architectures":[251],"evaluated":[253],"refined":[255],"version":[256],"KDDCup-99:":[258],"NSL-KDD":[259],"most":[261],"recent":[262],"one,":[263],"UNSW-NB15":[264],"datasets.":[266]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":16},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":8}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
