{"id":"https://openalex.org/W1913855765","doi":"https://doi.org/10.1002/sec.592","title":"Hybrid intelligent systems for detecting network intrusions","display_name":"Hybrid intelligent systems for detecting network intrusions","publication_year":2012,"publication_date":"2012-07-11","ids":{"openalex":"https://openalex.org/W1913855765","doi":"https://doi.org/10.1002/sec.592","mag":"1913855765"},"language":"en","primary_location":{"id":"doi:10.1002/sec.592","is_oa":false,"landing_page_url":"https://doi.org/10.1002/sec.592","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083747207","display_name":"Mrutyunjaya Panda","orcid":"https://orcid.org/0000-0001-5713-9220"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Mrutyunjaya Panda","raw_affiliation_strings":["Department of ECE Gandhi Institute for Technological Advancement  Bhubaneswar\u201054 India","Department of ECE, Gandhi Institute for Technological Advancement, Bhubaneswar-54, India#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of ECE Gandhi Institute for Technological Advancement  Bhubaneswar\u201054 India","institution_ids":[]},{"raw_affiliation_string":"Department of ECE, Gandhi Institute for Technological Advancement, Bhubaneswar-54, India#TAB#","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087542455","display_name":"Ajith Abraham","orcid":"https://orcid.org/0000-0002-0169-6738"},"institutions":[{"id":"https://openalex.org/I4210107658","display_name":"Machine Intelligence Research Labs","ror":"https://ror.org/013kgb629","country_code":"US","type":"facility","lineage":["https://openalex.org/I4210107658"]},{"id":"https://openalex.org/I142208455","display_name":"VSB - Technical University of Ostrava","ror":"https://ror.org/05x8mcb75","country_code":"CZ","type":"education","lineage":["https://openalex.org/I142208455"]}],"countries":["CZ","US"],"is_corresponding":false,"raw_author_name":"Ajith Abraham","raw_affiliation_strings":["Machine Intelligence Research Laboratory (MIR Labs), Scientific Network for Innovation and Research Excellence  WA USA","VSB\u2010Technical University of Ostrava Ostrava\u2010Poruba  Czech Republic"],"affiliations":[{"raw_affiliation_string":"Machine Intelligence Research Laboratory (MIR Labs), Scientific Network for Innovation and Research Excellence  WA USA","institution_ids":["https://openalex.org/I4210107658"]},{"raw_affiliation_string":"VSB\u2010Technical University of Ostrava Ostrava\u2010Poruba  Czech Republic","institution_ids":["https://openalex.org/I142208455"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085388539","display_name":"Manas Ranjan Patra","orcid":"https://orcid.org/0000-0002-7758-5452"},"institutions":[{"id":"https://openalex.org/I90752740","display_name":"Berhampur University","ror":"https://ror.org/03m3xkg41","country_code":"IN","type":"education","lineage":["https://openalex.org/I90752740"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Manas Ranjan Patra","raw_affiliation_strings":["Department of Computer Science Berhampur University  Berhampur India","Department of Computer Science Berhampur University Berhampur India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science Berhampur University  Berhampur India","institution_ids":["https://openalex.org/I90752740"]},{"raw_affiliation_string":"Department of Computer Science Berhampur University Berhampur India","institution_ids":["https://openalex.org/I90752740"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5083747207"],"corresponding_institution_ids":[],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":null,"fwci":1.0638,"has_fulltext":false,"cited_by_count":33,"citation_normalized_percentile":{"value":0.76692235,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"8","issue":"16","first_page":"2741","last_page":"2749"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8816275596618652},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6665931940078735},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6113506555557251},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.5952621102333069},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5717117190361023},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.5520140528678894},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.530029833316803},{"id":"https://openalex.org/keywords/pruning","display_name":"Pruning","score":0.47893935441970825},{"id":"https://openalex.org/keywords/tree-traversal","display_name":"Tree traversal","score":0.46724677085876465},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.464688777923584},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4539005160331726},{"id":"https://openalex.org/keywords/fast-fourier-transform","display_name":"Fast Fourier transform","score":0.4364355504512787},{"id":"https://openalex.org/keywords/adaboost","display_name":"AdaBoost","score":0.43545931577682495},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.35179394483566284},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.1826292872428894},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.14872819185256958}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8816275596618652},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6665931940078735},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6113506555557251},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.5952621102333069},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5717117190361023},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.5520140528678894},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.530029833316803},{"id":"https://openalex.org/C108010975","wikidata":"https://www.wikidata.org/wiki/Q500094","display_name":"Pruning","level":2,"score":0.47893935441970825},{"id":"https://openalex.org/C140745168","wikidata":"https://www.wikidata.org/wiki/Q1210082","display_name":"Tree traversal","level":2,"score":0.46724677085876465},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.464688777923584},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4539005160331726},{"id":"https://openalex.org/C75172450","wikidata":"https://www.wikidata.org/wiki/Q623950","display_name":"Fast Fourier transform","level":2,"score":0.4364355504512787},{"id":"https://openalex.org/C141404830","wikidata":"https://www.wikidata.org/wiki/Q2823869","display_name":"AdaBoost","level":3,"score":0.43545931577682495},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.35179394483566284},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.1826292872428894},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.14872819185256958},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/sec.592","is_oa":false,"landing_page_url":"https://doi.org/10.1002/sec.592","pdf_url":null,"source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W91862604","https://openalex.org/W141002133","https://openalex.org/W1480347468","https://openalex.org/W1570448133","https://openalex.org/W1581039515","https://openalex.org/W1588091815","https://openalex.org/W1591480890","https://openalex.org/W1670263352","https://openalex.org/W1873654256","https://openalex.org/W1981777694","https://openalex.org/W1988918299","https://openalex.org/W1991520194","https://openalex.org/W1993426957","https://openalex.org/W2016244926","https://openalex.org/W2024454892","https://openalex.org/W2030553727","https://openalex.org/W2037024690","https://openalex.org/W2055820261","https://openalex.org/W2095979141","https://openalex.org/W2099940443","https://openalex.org/W2109894153","https://openalex.org/W2112709201","https://openalex.org/W2120520366","https://openalex.org/W2135703295","https://openalex.org/W2146257637","https://openalex.org/W2155461860","https://openalex.org/W2160598920","https://openalex.org/W2327975452","https://openalex.org/W2499223697","https://openalex.org/W2771879111","https://openalex.org/W2914982603","https://openalex.org/W2963786907","https://openalex.org/W2966207845","https://openalex.org/W3105682467","https://openalex.org/W3105918328","https://openalex.org/W4242001932","https://openalex.org/W4295678738","https://openalex.org/W6824181969"],"related_works":["https://openalex.org/W2003125512","https://openalex.org/W3033216196","https://openalex.org/W2355809385","https://openalex.org/W2382568009","https://openalex.org/W4205958290","https://openalex.org/W2363105058","https://openalex.org/W2364419519","https://openalex.org/W2129864758","https://openalex.org/W2078868204","https://openalex.org/W4375930479"],"abstract_inverted_index":{"Abstract":[0],"This":[1],"paper":[2],"intends":[3],"to":[4,35,41,53,64,72,82],"develop":[5],"some":[6],"novel":[7],"hybrid":[8,61,86,177],"intelligent":[9],"systems":[10],"by":[11,20],"combining":[12,21],"na\u00efve":[13],"Bayes":[14],"with":[15,79,105,109,167,179],"decision":[16],"trees":[17],"(NBDT)":[18],"and":[19,26,94],"non\u2010nested":[22],"generalized":[23],"exemplar":[24],"(NNge)":[25],"extended":[27],"repeated":[28],"incremental":[29],"pruning":[30],"(JRip)":[31],"rule\u2010based":[32],"classifiers":[33],"(NNJR)":[34],"construct":[36],"a":[37,66,157,168],"multiple":[38],"classifier":[39],"system":[40],"efficiently":[42],"detect":[43],"network":[44,104],"intrusions.":[45],"We":[46],"also":[47],"use":[48,101],"ensemble":[49],"design":[50],"using":[51,152],"AdaBoost":[52],"enhance":[54],"the":[55,59,118,134,173,183],"detection":[56,113,120,186],"rate":[57,187],"of":[58,117,160],"proposed":[60,143],"system.":[62],"Further,":[63],"have":[65],"better":[67,112],"overall":[68],"detection,":[69],"we":[70,100,137],"propose":[71],"combine":[73],"farthest":[74],"first":[75],"traversal":[76],"(FFT)":[77],"clustering":[78,180],"classification":[80,140,178],"techniques":[81],"obtain":[83],"another":[84],"two":[85],"methods":[87],"such":[88],"as":[89],"DTFF":[90,181],"(DT":[91],"+":[92,97],"FFT)":[93],"FFNN":[95],"(NNge":[96],"FFT).":[98],"Finally,":[99,164],"Bayesian":[102],"belief":[103],"Tabu":[106],"search":[107],"combined":[108],"NNge":[110],"for":[111,141,171],"rate.":[114],"Because":[115],"most":[116],"anomaly":[119,126,185],"uses":[121],"binary":[122],"labels,":[123],"that":[124,176],"is,":[125],"or":[127],"normal,":[128],"without":[129],"discussing":[130],"more":[131],"details":[132],"about":[133],"attack":[135],"types,":[136],"perform":[138],"two\u2010class":[139],"our":[142],"methodologies":[144],"in":[145],"this":[146],"paper.":[147],"Substantial":[148],"experiments":[149],"are":[150],"conducted":[151],"NSL\u2010KDD":[153],"dataset,":[154],"which":[155],"is":[156],"modified":[158],"version":[159],"KDD99":[161],"intrusion":[162],"dataset.":[163],"empirical":[165],"results":[166],"detailed":[169],"analysis":[170],"all":[172,189],"approaches":[174],"show":[175],"provides":[182],"best":[184],"among":[188],"others.":[190],"Copyright":[191],"\u00a9":[192],"2012":[193],"John":[194],"Wiley":[195],"&amp;":[196],"Sons,":[197],"Ltd.":[198]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
