{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T08:52:16Z","timestamp":1775638336468,"version":"3.50.1"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Politecnico di Milano for providing Open Access within the CRUI CARE Agreement"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3503497","type":"journal-article","created":{"date-parts":[[2024,11,20]],"date-time":"2024-11-20T19:06:14Z","timestamp":1732129574000},"page":"178222-178236","source":"Crossref","is-referenced-by-count":17,"title":["Balanced Multi-Class Network Intrusion Detection Using Machine Learning"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-8388-1903","authenticated-orcid":false,"given":"Faraz Ahmad","family":"Khan","sequence":"first","affiliation":[{"name":"University of Engineering and Technology Mardan, Mardan, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0325-7579","authenticated-orcid":false,"given":"Asghar Ali","family":"Shah","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Beaconhouse International College, Islamabad, Pakistan"}]},{"given":"Nizal","family":"Alshammry","sequence":"additional","affiliation":[{"name":"Department of Computer Sciences, Faculty of Computing and Information Technology, Northern Border University, Arar, Saudi Arabia"}]},{"given":"Saifullah","family":"Saif","sequence":"additional","affiliation":[{"name":"University of Engineering and Technology Mardan, Mardan, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-8064-6547","authenticated-orcid":false,"given":"Wasim","family":"Khan","sequence":"additional","affiliation":[{"name":"University of Engineering and Technology Mardan, Mardan, Pakistan"}]},{"given":"Muhammad Osama","family":"Malik","sequence":"additional","affiliation":[{"name":"Collin College of Business, The University of Tulsa, Tulsa, OK, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7330-6129","authenticated-orcid":false,"given":"Zahid","family":"Ullah","sequence":"additional","affiliation":[{"name":"Dipartimento di Elettronica, Informazione e Bioingegneria, Politecnico di Milano, Milan, Italy"}]}],"member":"263","reference":[{"key":"ref1","first-page":"4","article-title":"Cyber security challenges in digital economy","volume-title":"Proc. World Congr. Eng.,","volume":"1","author":"Spremi\u0107"},{"key":"ref2","article-title":"A study of cyber security challenges and its emerging trends on latest technologies","author":"Reddy","year":"2014","journal-title":"arXiv:1402.1842"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/35.312843"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CSNT.2013.102"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22424-9_2"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEM51511.2021.9445322"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.819611"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.08.001"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1000\/1\/012049"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5120\/3399-4730"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.05.009"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/designs5010009"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICATCCT.2015.7456901"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1080\/1206212X.2021.1885150"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/iFUZZY46984.2019.9066223"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2016910764"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2018\/v11i48\/139802"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3991\/ijim.v13i01.9679"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C.2019.00090"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107840"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-021-01843-0"},{"key":"ref22","article-title":"A flow-based IDS using machine learning in eBPF","author":"Bachl","year":"2021","journal-title":"arXiv:2102.09980"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3313596"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3145002"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3274474"},{"key":"ref26","first-page":"1","article-title":"Survey of current network intrusion detection techniques","volume-title":"Proc. Washington Univ. St. Louis","author":"Kumar"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref28","first-page":"66","article-title":"C4. 5 and imbalanced data sets: Investigating the effect of sampling method, probabilistic estimate, and decision tree structure","volume-title":"Proc. ICML","volume":"3","author":"Chawla"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/bf00116251"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.29172\/7c2a6982-6d72-4cd8-bba6-2fccb06a7011"},{"issue":"22","key":"ref31","first-page":"41","article-title":"An empirical study of the naive Bayes classifier","volume-title":"Proc. Workshop Empirical Methods Artif. Intell.","volume":"3","author":"Rish"},{"key":"ref32","first-page":"1","article-title":"Logistic regression: A paradigm for dichotomous response data","volume":"3","author":"Ogunfiditimi","year":"2014","journal-title":"Int. J. Eng. Sci. Issue"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref34","article-title":"K-nearest neighbour classifiers: 2nd edition (with Python examples)","author":"Cunningham","year":"2020","journal-title":"arXiv:2004.04523"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41136-6_5"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11233950"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.21015\/vtse.v10i2.1017"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3390\/en14175364"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/mitp.2020.3031358"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICIC48496.2019.8966726"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.21015\/vtcs.v16i1.543"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8030322"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1192\/1\/012018"},{"key":"ref44","first-page":"1","article-title":"A novel framework design of network intrusion detection based on machine learning techniques","volume":"2021","author":"Zhang","year":"2021","journal-title":"Secur. Commun. Netw."},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.54153\/sjpas.2020.v2i3.86"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10758423.pdf?arnumber=10758423","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T17:43:02Z","timestamp":1749231782000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10758423\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3503497","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}