{"id":"https://openalex.org/W3215153877","doi":"https://doi.org/10.4018/ijisp.2022010112","title":"An Effective Intrusion Detection System Using Homogeneous Ensemble Techniques","display_name":"An Effective Intrusion Detection System Using Homogeneous Ensemble Techniques","publication_year":2021,"publication_date":"2021-10-27","ids":{"openalex":"https://openalex.org/W3215153877","doi":"https://doi.org/10.4018/ijisp.2022010112","mag":"3215153877"},"language":"en","primary_location":{"id":"doi:10.4018/ijisp.2022010112","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijisp.2022010112","pdf_url":null,"source":{"id":"https://openalex.org/S191782446","display_name":"International Journal of Information Security and Privacy","issn_l":"1930-1650","issn":["1930-1650","1930-1669"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security and Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042384505","display_name":"Faheem Masoodi","orcid":"https://orcid.org/0000-0002-1574-4884"},"institutions":[{"id":"https://openalex.org/I135388327","display_name":"University of Kashmir","ror":"https://ror.org/032xfst36","country_code":"IN","type":"education","lineage":["https://openalex.org/I135388327"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Faheem Syeed Masoodi","raw_affiliation_strings":["University of Kashmir, India"],"affiliations":[{"raw_affiliation_string":"University of Kashmir, India","institution_ids":["https://openalex.org/I135388327"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070088079","display_name":"Iram Abrar","orcid":null},"institutions":[{"id":"https://openalex.org/I135388327","display_name":"University of Kashmir","ror":"https://ror.org/032xfst36","country_code":"IN","type":"education","lineage":["https://openalex.org/I135388327"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Iram Abrar","raw_affiliation_strings":["University of Kashmir, India"],"affiliations":[{"raw_affiliation_string":"University of Kashmir, India","institution_ids":["https://openalex.org/I135388327"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042192633","display_name":"Alwi M. Bamhdi","orcid":"https://orcid.org/0000-0003-4428-2292"},"institutions":[{"id":"https://openalex.org/I199693650","display_name":"Umm al-Qura University","ror":"https://ror.org/01xjqrm90","country_code":"SA","type":"education","lineage":["https://openalex.org/I199693650"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Alwi M. Bamhdi","raw_affiliation_strings":["Umm Al Qura University, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Umm Al Qura University, Saudi Arabia","institution_ids":["https://openalex.org/I199693650"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5042384505"],"corresponding_institution_ids":["https://openalex.org/I135388327"],"apc_list":null,"apc_paid":null,"fwci":0.9169,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.76766284,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"16","issue":"1","first_page":"1","last_page":"18"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.835277795791626},{"id":"https://openalex.org/keywords/boosting","display_name":"Boosting (machine learning)","score":0.8079617023468018},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.6940261125564575},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6896455883979797},{"id":"https://openalex.org/keywords/majority-rule","display_name":"Majority rule","score":0.6344740986824036},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.6277602314949036},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6169047355651855},{"id":"https://openalex.org/keywords/homogeneous","display_name":"Homogeneous","score":0.5487823486328125},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.5376135110855103},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.5252242088317871},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.5234131813049316},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5061907172203064},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.48070937395095825},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.47300082445144653},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10462683439254761}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.835277795791626},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.8079617023468018},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.6940261125564575},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6896455883979797},{"id":"https://openalex.org/C153668964","wikidata":"https://www.wikidata.org/wiki/Q27636","display_name":"Majority rule","level":2,"score":0.6344740986824036},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.6277602314949036},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6169047355651855},{"id":"https://openalex.org/C66882249","wikidata":"https://www.wikidata.org/wiki/Q169336","display_name":"Homogeneous","level":2,"score":0.5487823486328125},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.5376135110855103},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.5252242088317871},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.5234131813049316},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5061907172203064},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.48070937395095825},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.47300082445144653},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10462683439254761},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4018/ijisp.2022010112","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijisp.2022010112","pdf_url":null,"source":{"id":"https://openalex.org/S191782446","display_name":"International Journal of Information Security and Privacy","issn_l":"1930-1650","issn":["1930-1650","1930-1669"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security and Privacy","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.800000011920929}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W782506017","https://openalex.org/W836876797","https://openalex.org/W1995678176","https://openalex.org/W2008868972","https://openalex.org/W2040884411","https://openalex.org/W2043579154","https://openalex.org/W2099454382","https://openalex.org/W2120685459","https://openalex.org/W2135703295","https://openalex.org/W2191006491","https://openalex.org/W2418891196","https://openalex.org/W2504658994","https://openalex.org/W2556301080","https://openalex.org/W2724268118","https://openalex.org/W2753358932","https://openalex.org/W2767153057","https://openalex.org/W2769497021","https://openalex.org/W2790513427","https://openalex.org/W2807319534","https://openalex.org/W2883288263","https://openalex.org/W2893262342","https://openalex.org/W2905156999","https://openalex.org/W2963786907","https://openalex.org/W2970405700","https://openalex.org/W2981297965","https://openalex.org/W2981929856","https://openalex.org/W2997751246","https://openalex.org/W3006206203","https://openalex.org/W3009939354","https://openalex.org/W3034541875","https://openalex.org/W3035735617","https://openalex.org/W3042930735","https://openalex.org/W3092565864","https://openalex.org/W3113826220","https://openalex.org/W3118338054"],"related_works":["https://openalex.org/W2905156999","https://openalex.org/W3108206494","https://openalex.org/W4229460275","https://openalex.org/W2739726746","https://openalex.org/W4242380336","https://openalex.org/W4296079469","https://openalex.org/W1987518466","https://openalex.org/W2141272333","https://openalex.org/W2122022187","https://openalex.org/W3023033471"],"abstract_inverted_index":{"In":[0],"this":[1],"work,":[2],"homogeneous":[3],"ensemble":[4],"techniques,":[5],"namely":[6],"bagging":[7,62],"and":[8,55,96,116,140,153],"boosting":[9],"were":[10,35,57,91,120],"employed":[11,69],"for":[12,70,134],"intrusion":[13],"detection":[14,46],"to":[15,41,84,114],"determine":[16],"the":[17,24,45,102,117,130,145],"intrusive":[18,136],"activities":[19],"in":[20,44,59],"network":[21,25],"by":[22],"monitoring":[23],"traffic.":[26],"Simultaneously,":[27],"model":[28,74,131],"diversity":[29],"was":[30,75,81,104,132],"enhanced":[31],"as":[32],"numerous":[33],"algorithms":[34],"taken":[36],"into":[37,106],"account,":[38],"thereby":[39],"leading":[40],"an":[42,149],"increase":[43],"rate":[47],"Several":[48],"classifiers,":[49],"i.e.,":[50],"SVM,":[51],"KNN,":[52],"RF,":[53],"ETC":[54,139],"MLP)":[56],"used":[58],"case":[60],"of":[61,151],"approach.":[63],"Likewise,":[64],"tree-based":[65],"classifiers":[66,147],"have":[67],"been":[68],"boosting.":[71],"The":[72],"proposed":[73],"tested":[76],"on":[77,123],"NSL-KDD":[78],"dataset":[79,103],"that":[80,129],"initially":[82],"subjected":[83,113],"preprocessing.":[85],"Accordingly,":[86],"ten":[87],"most":[88],"significant":[89],"features":[90],"identified":[92],"using":[93],"decision":[94],"tree":[95],"recursive":[97],"feature":[98],"elimination":[99],"method.":[100],"Furthermore,":[101],"divided":[105],"five":[107],"subsets,":[108],"each":[109],"one":[110],"them":[111],"being":[112],"training,":[115],"final":[118],"results":[119,127],"obtained":[121],"based":[122],"majority":[124],"voting.":[125],"Experimental":[126],"proved":[128],"effective":[133],"detecting":[135],"activities.":[137],"Bagged":[138],"boosted":[141],"RF":[142],"outperformed":[143],"all":[144],"other":[146],"with":[148],"accuracy":[150],"99.123%":[152],"99.309%,":[154],"respectively.":[155]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
