{"id":"https://openalex.org/W3165574415","doi":"https://doi.org/10.1109/access.2021.3082147","title":"A Hybrid Intrusion Detection System Based on Scalable K-Means+ Random Forest and Deep Learning","display_name":"A Hybrid Intrusion Detection System Based on Scalable K-Means+ Random Forest and Deep Learning","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3165574415","doi":"https://doi.org/10.1109/access.2021.3082147","mag":"3165574415"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3082147","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09437227.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09437227.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060845362","display_name":"Chao Liu","orcid":"https://orcid.org/0000-0002-3490-0512"},"institutions":[{"id":"https://openalex.org/I28813325","display_name":"Civil Aviation University of China","ror":"https://ror.org/03je71k37","country_code":"CN","type":"funder","lineage":["https://openalex.org/I28813325"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Liu","raw_affiliation_strings":["College of Safety Science and Engineering, Civil Aviation University of China, Tianjin, China","Information Security Evaluation Center, Civil Aviation University of China, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"College of Safety Science and Engineering, Civil Aviation University of China, Tianjin, China","institution_ids":["https://openalex.org/I28813325"]},{"raw_affiliation_string":"Information Security Evaluation Center, Civil Aviation University of China, Tianjin, China","institution_ids":["https://openalex.org/I28813325"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040254783","display_name":"Zhaojun Gu","orcid":"https://orcid.org/0000-0002-1972-0951"},"institutions":[{"id":"https://openalex.org/I28813325","display_name":"Civil Aviation University of China","ror":"https://ror.org/03je71k37","country_code":"CN","type":"funder","lineage":["https://openalex.org/I28813325"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhaojun Gu","raw_affiliation_strings":["College of Computer Science and Technology, Civil Aviation University of China, Tianjin, China","Information Security Evaluation Center, Civil Aviation University of China, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Civil Aviation University of China, Tianjin, China","institution_ids":["https://openalex.org/I28813325"]},{"raw_affiliation_string":"Information Security Evaluation Center, Civil Aviation University of China, Tianjin, China","institution_ids":["https://openalex.org/I28813325"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100677918","display_name":"Jialiang Wang","orcid":"https://orcid.org/0000-0002-2776-5703"},"institutions":[{"id":"https://openalex.org/I28813325","display_name":"Civil Aviation University of China","ror":"https://ror.org/03je71k37","country_code":"CN","type":"funder","lineage":["https://openalex.org/I28813325"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jialiang Wang","raw_affiliation_strings":["College of Computer Science and Technology, Civil Aviation University of China, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Civil Aviation University of China, Tianjin, China","institution_ids":["https://openalex.org/I28813325"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":14.017,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":109,"citation_normalized_percentile":{"value":0.999945,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"9","issue":null,"first_page":"75729","last_page":"75740"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9985,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9966,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spark","display_name":"SPARK (programming language)","score":0.5788462},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.41157043}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9038705},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7031758},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.692047},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.61478364},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5906865},{"id":"https://openalex.org/C2781215313","wikidata":"https://www.wikidata.org/wiki/Q3493345","display_name":"SPARK (programming language)","level":2,"score":0.5788462},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5660759},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.56036776},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5489689},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.47034386},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.45742074},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.43764418},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.41577423},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.41157043},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.10097191},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3082147","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09437227.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":false,"landing_page_url":"https://doaj.org/article/8fe5a55698174f1f8dc68886a6a446f0","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3082147","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09437227.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"score":0.59,"id":"https://metadata.un.org/sdg/15","display_name":"Life on land"}],"grants":[{"funder":"https://openalex.org/F4320321565","funder_display_name":"Civil Aviation University of China","award_id":"3122020064"}],"datasets":[],"versions":[],"referenced_works_count":39,"referenced_works":["https://openalex.org/W111228695","https://openalex.org/W2090524453","https://openalex.org/W2100154172","https://openalex.org/W2284098035","https://openalex.org/W2342408547","https://openalex.org/W2557450880","https://openalex.org/W2559165864","https://openalex.org/W2746802549","https://openalex.org/W2760154395","https://openalex.org/W2763070548","https://openalex.org/W2772317693","https://openalex.org/W2775103799","https://openalex.org/W2789828921","https://openalex.org/W2795106634","https://openalex.org/W2805221961","https://openalex.org/W2874136421","https://openalex.org/W2888898286","https://openalex.org/W2891214000","https://openalex.org/W2896752973","https://openalex.org/W2900293028","https://openalex.org/W2905724129","https://openalex.org/W2911171945","https://openalex.org/W2922628727","https://openalex.org/W2926701059","https://openalex.org/W2937220155","https://openalex.org/W2941215571","https://openalex.org/W2954564595","https://openalex.org/W2954996676","https://openalex.org/W2968378480","https://openalex.org/W2980115220","https://openalex.org/W2991507433","https://openalex.org/W2995026345","https://openalex.org/W3033728179","https://openalex.org/W3036351926","https://openalex.org/W3039274670","https://openalex.org/W3082296606","https://openalex.org/W3100991983","https://openalex.org/W3136238191","https://openalex.org/W3143021555"],"related_works":["https://openalex.org/W4386815338","https://openalex.org/W4297051394","https://openalex.org/W3131327266","https://openalex.org/W3013693939","https://openalex.org/W2803255133","https://openalex.org/W2752972570","https://openalex.org/W2734887215","https://openalex.org/W2566616303","https://openalex.org/W2159052453","https://openalex.org/W2145836866"],"abstract_inverted_index":{"Digital":[0],"assets":[1],"have":[2],"come":[3],"under":[4],"various":[5],"network":[6,105],"security":[7,17],"threats":[8],"in":[9,61,196,202],"the":[10,31,41,45,67,70,76,88,102,116,140,152,155,163,185,197,203],"digital":[11,21],"age.":[12],"As":[13],"a":[14],"kind":[15],"of":[16,82,154,171,187],"equipment":[18],"to":[19,91,138,150],"protect":[20],"assets,":[22],"intrusion":[23,49],"detection":[24,50],"system":[25],"(IDS)":[26],"is":[27,33,38,59,85,136],"less":[28,180],"efficient":[29],"if":[30,40],"alert":[32],"not":[34],"timely":[35],"and":[36,69,79,96,111,145,178,200],"IDS":[37],"useless":[39],"accuracy":[42,186],"cannot":[43],"meet":[44],"requirements.":[46],"Therefore,":[47],"an":[48],"model":[51,65,165],"that":[52,162],"combines":[53],"machine":[54],"learning":[55,58,114],"with":[56],"deep":[57,113],"proposed":[60,156,164],"this":[62,130],"paper.":[63],"The":[64,143,158],"uses":[66],"k-means":[68],"random":[71],"forest":[72],"(RF)":[73],"algorithms":[74,84],"for":[75,169],"binary":[77],"classification,":[78],"distributed":[80],"computing":[81],"these":[83],"implemented":[86],"on":[87],"Spark":[89],"platform":[90],"quickly":[92],"classify":[93],"normal":[94],"events":[95,117],"attack":[97,126,172],"events.":[98],"Then,":[99],"by":[100],"using":[101],"convolutional":[103],"neural":[104],"(CNN),":[106],"long":[107],"short-term":[108],"memory":[109],"(LSTM),":[110],"other":[112],"algorithms,":[115],"judged":[118],"as":[119,192,194],"abnormal":[120],"are":[121,148],"further":[122],"classified":[123],"into":[124],"different":[125],"types":[127],"finally.":[128],"At":[129],"stage,":[131],"adaptive":[132],"synthetic":[133],"sampling":[134],"(ADASYN)":[135],"adopted":[137],"solve":[139],"unbalanced":[141],"dataset.":[142,205],"NSL-KDD":[144,198],"CIS-IDS2017":[146],"datasets":[147],"used":[149],"evaluate":[151],"performance":[153],"model.":[157],"experimental":[159],"results":[160],"show":[161],"has":[166],"better":[167],"TPR":[168],"most":[170],"events,":[173],"faster":[174],"data":[175],"preprocessing":[176],"speed,":[177],"potentially":[179],"training":[181],"time.":[182],"In":[183],"particular,":[184],"multi-target":[188],"classification":[189],"can":[190],"reach":[191],"high":[193],"85.24%":[195],"dataset":[199],"99.91%":[201],"CIC-IDS2017":[204]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3165574415","counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":39},{"year":2023,"cited_by_count":34},{"year":2022,"cited_by_count":31},{"year":2021,"cited_by_count":2}],"updated_date":"2025-02-19T11:13:36.066508","created_date":"2021-06-07"}