{"id":"https://openalex.org/W3046356280","doi":"https://doi.org/10.18280/isi.250313","title":"An Intrusion Detection Method for Enterprise Network Based on Backpropagation Neural Network","display_name":"An Intrusion Detection Method for Enterprise Network Based on Backpropagation Neural Network","publication_year":2020,"publication_date":"2020-06-30","ids":{"openalex":"https://openalex.org/W3046356280","doi":"https://doi.org/10.18280/isi.250313","mag":"3046356280"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.18280/isi.250313","pdf_url":"https://www.iieta.org/download/file/fid/37059","source":{"id":"https://openalex.org/S1757003","display_name":"Ing\u00e9nierie des syst\u00e8mes d information","issn_l":"1633-1311","issn":["1633-1311","2116-7125"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310311056","host_organization_name":"Lavoisier publishing","host_organization_lineage":["https://openalex.org/P4310311056"],"host_organization_lineage_names":["Lavoisier publishing"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://www.iieta.org/download/file/fid/37059","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100405359","display_name":"Fei Chen","orcid":"https://orcid.org/0000-0001-8132-539X"},"institutions":[{"id":"https://openalex.org/I153473198","display_name":"North China Electric Power University","ror":"https://ror.org/04qr5t414","country_code":"CN","type":"funder","lineage":["https://openalex.org/I153473198"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fei Chen","raw_affiliation_strings":["School of Electrical and Electronic Engineering, North China Electric Power University, Beijing 102206, China"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Electronic Engineering, North China Electric Power University, Beijing 102206, China","institution_ids":["https://openalex.org/I153473198"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101847496","display_name":"Rui Cheng","orcid":"https://orcid.org/0000-0002-0698-9302"},"institutions":[{"id":"https://openalex.org/I153473198","display_name":"North China Electric Power University","ror":"https://ror.org/04qr5t414","country_code":"CN","type":"funder","lineage":["https://openalex.org/I153473198"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rui Cheng","raw_affiliation_strings":["School of Electrical and Electronic Engineering, North China Electric Power University, Beijing 102206, China"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Electronic Engineering, North China Electric Power University, Beijing 102206, China","institution_ids":["https://openalex.org/I153473198"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086167119","display_name":"Yayun Zhu","orcid":"https://orcid.org/0000-0002-2934-8831"},"institutions":[{"id":"https://openalex.org/I153473198","display_name":"North China Electric Power University","ror":"https://ror.org/04qr5t414","country_code":"CN","type":"funder","lineage":["https://openalex.org/I153473198"]},{"id":"https://openalex.org/I4392738113","display_name":"China Electric Power Research Institute","ror":"https://ror.org/05ehpzy81","country_code":null,"type":"funder","lineage":["https://openalex.org/I17442442","https://openalex.org/I4392738113"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yayun Zhu","raw_affiliation_strings":["Information & Communication Department, China Electric Power Research Institute, Beijing 100192, China"],"affiliations":[{"raw_affiliation_string":"Information & Communication Department, China Electric Power Research Institute, Beijing 100192, China","institution_ids":["https://openalex.org/I153473198","https://openalex.org/I4392738113"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107092259","display_name":"Siwei Miao","orcid":null},"institutions":[{"id":"https://openalex.org/I4392738113","display_name":"China Electric Power Research Institute","ror":"https://ror.org/05ehpzy81","country_code":null,"type":"funder","lineage":["https://openalex.org/I17442442","https://openalex.org/I4392738113"]},{"id":"https://openalex.org/I153473198","display_name":"North China Electric Power University","ror":"https://ror.org/04qr5t414","country_code":"CN","type":"funder","lineage":["https://openalex.org/I153473198"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Siwei Miao","raw_affiliation_strings":["Information & Communication Department, China Electric Power Research Institute, Beijing 100192, China"],"affiliations":[{"raw_affiliation_string":"Information & Communication Department, China Electric Power Research Institute, Beijing 100192, China","institution_ids":["https://openalex.org/I4392738113","https://openalex.org/I153473198"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091548065","display_name":"Liang Zhou","orcid":"https://orcid.org/0000-0001-9939-4502"},"institutions":[{"id":"https://openalex.org/I4392738113","display_name":"China Electric Power Research Institute","ror":"https://ror.org/05ehpzy81","country_code":null,"type":"funder","lineage":["https://openalex.org/I17442442","https://openalex.org/I4392738113"]},{"id":"https://openalex.org/I153473198","display_name":"North China Electric Power University","ror":"https://ror.org/04qr5t414","country_code":"CN","type":"funder","lineage":["https://openalex.org/I153473198"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liang Zhou","raw_affiliation_strings":["Information & Communication Department, China Electric Power Research Institute, Beijing 100192, China"],"affiliations":[{"raw_affiliation_string":"Information & Communication Department, China Electric Power Research Institute, Beijing 100192, China","institution_ids":["https://openalex.org/I4392738113","https://openalex.org/I153473198"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.255,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":2,"citation_normalized_percentile":{"value":0.587037,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":69,"max":73},"biblio":{"volume":"25","issue":"3","first_page":"377","last_page":"382"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9319,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9319,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backpropagation","display_name":"Backpropagation","score":0.8603598}],"concepts":[{"id":"https://openalex.org/C155032097","wikidata":"https://www.wikidata.org/wiki/Q798503","display_name":"Backpropagation","level":3,"score":0.8603598},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.73534703},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6705305},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.66163725},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5163035},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4202071},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36469206}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.18280/isi.250313","pdf_url":"https://www.iieta.org/download/file/fid/37059","source":{"id":"https://openalex.org/S1757003","display_name":"Ing\u00e9nierie des syst\u00e8mes d information","issn_l":"1633-1311","issn":["1633-1311","2116-7125"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310311056","host_organization_name":"Lavoisier publishing","host_organization_lineage":["https://openalex.org/P4310311056"],"host_organization_lineage_names":["Lavoisier publishing"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.18280/isi.250313","pdf_url":"https://www.iieta.org/download/file/fid/37059","source":{"id":"https://openalex.org/S1757003","display_name":"Ing\u00e9nierie des syst\u00e8mes d information","issn_l":"1633-1311","issn":["1633-1311","2116-7125"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310311056","host_organization_name":"Lavoisier publishing","host_organization_lineage":["https://openalex.org/P4310311056"],"host_organization_lineage_names":["Lavoisier publishing"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":21,"referenced_works":["https://openalex.org/W1506138208","https://openalex.org/W1543815398","https://openalex.org/W1597524601","https://openalex.org/W1642161394","https://openalex.org/W1884606608","https://openalex.org/W1978165510","https://openalex.org/W1982466846","https://openalex.org/W1988918299","https://openalex.org/W2002011878","https://openalex.org/W2024960538","https://openalex.org/W2052709244","https://openalex.org/W2108892092","https://openalex.org/W2112086364","https://openalex.org/W2112203433","https://openalex.org/W2114367267","https://openalex.org/W2145722235","https://openalex.org/W2146196597","https://openalex.org/W2265933595","https://openalex.org/W2732383329","https://openalex.org/W2993609794","https://openalex.org/W987648574"],"related_works":["https://openalex.org/W4387932263","https://openalex.org/W4239286941","https://openalex.org/W2894173309","https://openalex.org/W2371065793","https://openalex.org/W2364419519","https://openalex.org/W2360951146","https://openalex.org/W2360767377","https://openalex.org/W2157746493","https://openalex.org/W2088845016","https://openalex.org/W2017948608"],"abstract_inverted_index":{"Network":[0],"security,":[1],"as":[2],"the":[3,6,23,56,65,71,96,105,125,131],"prerequisite":[4],"for":[5,81],"normal":[7,103],"operation":[8],"of":[9,22,43,54,70,95],"enterprise":[10,34,82],"network,":[11,24,28],"should":[12],"not":[13],"focus":[14],"on":[15,64,85,99],"a":[16,114],"single":[17],"point,":[18],"but":[19],"all":[20],"aspects":[21],"ranging":[25],"from":[26,60,113],"physics,":[27],"system,":[29],"application":[30],"to":[31,46],"management.To":[32],"ensure":[33],"network":[35,39,57,83,88,132],"security":[36,133],"and":[37,58,90,117,135,138],"prevent":[38],"attacks,":[40],"it":[41],"is":[42],"great":[44],"importance":[45],"build":[47],"an":[48,77],"intrusion":[49,78],"detection":[50,79],"system":[51],"(IDS)":[52],"capable":[53],"protecting":[55],"computers":[59],"malicious":[61],"attacks":[62],"based":[63,84],"Internet":[66],"or":[67],"host.In":[68],"light":[69],"above,":[72],"this":[73],"paper":[74],"puts":[75],"forward":[76],"method":[80,98,127],"backpropagation":[86],"neural":[87],"(BPNN),":[89],"carries":[91],"out":[92],"Python":[93],"simulation":[94,121],"proposed":[97],"four":[100],"problems,":[101],"namely,":[102],"state,":[104],"SYN":[106],"flood":[107],"(denial-of-service":[108],"attack),":[109],"snoop":[110],"(unauthorized":[111],"access":[112],"remote":[115],"host),":[116],"saint":[118],"(reconnaissance":[119],"attack).The":[120],"results":[122],"show":[123],"that":[124],"BPNN-based":[126],"could":[128],"effectively":[129],"check":[130],"environment,":[134],"accurately":[136],"identify":[137],"detect":[139],"intrusions.":[140]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3046356280","counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-03-23T06:36:19.442785","created_date":"2020-08-07"}