{"id":"https://openalex.org/W1973196977","doi":"https://doi.org/10.5539/cis.v2n4p100","title":"Intrusion Detection Method Using Protocol Classification and Rough","display_name":"Intrusion Detection Method Using Protocol Classification and Rough","publication_year":2009,"publication_date":"2009-10-19","ids":{"openalex":"https://openalex.org/W1973196977","doi":"https://doi.org/10.5539/cis.v2n4p100","mag":"1973196977"},"language":"en","primary_location":{"id":"doi:10.5539/cis.v2n4p100","is_oa":true,"landing_page_url":"https://doi.org/10.5539/cis.v2n4p100","pdf_url":"https://ccsenet.org/journal/index.php/cis/article/download/4275/3721","source":{"id":"https://openalex.org/S2764452479","display_name":"Computer and Information Science","issn_l":"1913-8989","issn":["1913-8989","1913-8997"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310322531","host_organization_name":"Canadian Center of Science and Education","host_organization_lineage":["https://openalex.org/P4310322531"],"host_organization_lineage_names":["Canadian Center of Science and Education"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer and Information Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://ccsenet.org/journal/index.php/cis/article/download/4275/3721","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113551801","display_name":"Xunyi Ren","orcid":null},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xunyi Ren","raw_affiliation_strings":["College of Computer Science, Nanjing University of Post & Telecommunications"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Nanjing University of Post & Telecommunications","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109232005","display_name":"Ruchuan Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruchuan Wang","raw_affiliation_strings":["College of Computer Science, Nanjing University of Post & Telecommunications & State Key Lab. for Novel Software Technology, Nanjing University"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Nanjing University of Post & Telecommunications & State Key Lab. for Novel Software Technology, Nanjing University","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"last","author":{"id":null,"display_name":"Hejun Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hejun Zhou","raw_affiliation_strings":["College of Computer Science, Nanjing University of Post & Telecommunications"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Nanjing University of Post & Telecommunications","institution_ids":["https://openalex.org/I881766915"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5113551801"],"corresponding_institution_ids":["https://openalex.org/I881766915"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.1013157,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"2","issue":"4","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8407999873161316,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8407999873161316,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11063","display_name":"Rough Sets and Fuzzy Logic","score":0.8098000288009644,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13734","display_name":"Advanced Computational Techniques and Applications","score":0.7328000068664551,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8503334522247314},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.7866170406341553},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.7730661630630493},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.706662118434906},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.6434667110443115},{"id":"https://openalex.org/keywords/rough-set","display_name":"Rough set","score":0.6088552474975586},{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.5908771753311157},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5847718715667725},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.5016341209411621},{"id":"https://openalex.org/keywords/data-set","display_name":"Data set","score":0.4841797649860382},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4786316454410553},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.46994832158088684},{"id":"https://openalex.org/keywords/training-set","display_name":"Training set","score":0.4428146183490753},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.44163939356803894},{"id":"https://openalex.org/keywords/data-reduction","display_name":"Data reduction","score":0.4360677897930145},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.33947277069091797},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09130531549453735}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8503334522247314},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.7866170406341553},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.7730661630630493},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.706662118434906},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6434667110443115},{"id":"https://openalex.org/C111012933","wikidata":"https://www.wikidata.org/wiki/Q3137210","display_name":"Rough set","level":2,"score":0.6088552474975586},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.5908771753311157},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5847718715667725},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.5016341209411621},{"id":"https://openalex.org/C58489278","wikidata":"https://www.wikidata.org/wiki/Q1172284","display_name":"Data set","level":2,"score":0.4841797649860382},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4786316454410553},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.46994832158088684},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.4428146183490753},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.44163939356803894},{"id":"https://openalex.org/C153914771","wikidata":"https://www.wikidata.org/wiki/Q5227343","display_name":"Data reduction","level":2,"score":0.4360677897930145},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.33947277069091797},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09130531549453735},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5539/cis.v2n4p100","is_oa":true,"landing_page_url":"https://doi.org/10.5539/cis.v2n4p100","pdf_url":"https://ccsenet.org/journal/index.php/cis/article/download/4275/3721","source":{"id":"https://openalex.org/S2764452479","display_name":"Computer and Information Science","issn_l":"1913-8989","issn":["1913-8989","1913-8997"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310322531","host_organization_name":"Canadian Center of Science and Education","host_organization_lineage":["https://openalex.org/P4310322531"],"host_organization_lineage_names":["Canadian Center of Science and Education"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer and Information Science","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.5539/cis.v2n4p100","is_oa":true,"landing_page_url":"https://doi.org/10.5539/cis.v2n4p100","pdf_url":"https://ccsenet.org/journal/index.php/cis/article/download/4275/3721","source":{"id":"https://openalex.org/S2764452479","display_name":"Computer and Information Science","issn_l":"1913-8989","issn":["1913-8989","1913-8997"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310322531","host_organization_name":"Canadian Center of Science and Education","host_organization_lineage":["https://openalex.org/P4310322531"],"host_organization_lineage_names":["Canadian Center of Science and Education"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer and Information Science","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1973196977.pdf"},"referenced_works_count":6,"referenced_works":["https://openalex.org/W2021191744","https://openalex.org/W2120617515","https://openalex.org/W2123636872","https://openalex.org/W2147684166","https://openalex.org/W2162275200","https://openalex.org/W4206686222"],"related_works":["https://openalex.org/W2392963705","https://openalex.org/W2107349454","https://openalex.org/W2382278777","https://openalex.org/W2167403502","https://openalex.org/W2353240132","https://openalex.org/W1587347718","https://openalex.org/W2375932290","https://openalex.org/W1964260090","https://openalex.org/W2133389611","https://openalex.org/W2381005486"],"abstract_inverted_index":{"In":[0,57,109],"order":[1],"to":[2,118,129,143],"improve":[3],"the":[4,17,58,68,83,88,98,107,110,113,124,137,144,155,158,163,170],"efficiency":[5],"of":[6,60,90],"support":[7,45,91],"vector":[8,46,92],"intrusion":[9,18,35],"detection,":[10],"we":[11,32,62],"first":[12,63],"do":[13,64,73],"protocol":[14,39,65,119,130,174],"Classification":[15],"for":[16,67,94],"data,":[19,70],"then":[20,72,122],"refine":[21],"its":[22],"characteristic":[23],"by":[24],"rough":[25,42,74],"set":[26,43,75],"reduction.":[27],"By":[28],"using":[29,38,136,173,177],"these":[30],"procedures,":[31],"propose":[33],"an":[34],"detection":[36,164],"method":[37,49,156,159],"classification":[40,66,120,175],"and":[41,54,71,86,121,162,176],"based":[44,149],"machine.":[47],"The":[48,77,146],"is":[50,115,157,160,166],"divided":[51],"into":[52],"training":[53,69,99],"testing":[55,111],"processes.":[56],"process":[59],"training,":[61,97],"refinement.":[76],"refined":[78],"characteristics":[79,125],"are":[80],"stored":[81,103],"as":[82],"pre-defined":[84],"process,":[85,112],"finally":[87],"usage":[89],"machine":[93],"data":[95,114,152],"reduction":[96,126],"model":[100],"will":[101],"be":[102],"in":[104],"accordance":[105],"with":[106,169],"agreement.":[108,145],"classified":[116],"according":[117,128],"start":[123],"procedure":[127],"classification.":[131],"Finally,":[132],"make":[133],"a":[134],"decision":[135],"Support":[138],"Vector":[139],"Machines":[140],"that":[141,154],"corresponding":[142],"experimental":[147],"results":[148],"on":[150],"KDDCUP'99":[151],"show":[153],"faster":[161],"accuracy":[165],"comparable":[167],"compared":[168],"SVM":[171],"without":[172],"all":[178],"characteristic.":[179]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":2}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
