{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T13:40:46Z","timestamp":1753882846964,"version":"3.41.2"},"reference-count":23,"publisher":"World Scientific Pub Co Pte Ltd","issue":"05","funder":[{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"publisher","award":["2019YFB1704100"],"award-info":[{"award-number":["2019YFB1704100"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Patt. Recogn. Artif. Intell."],"published-print":{"date-parts":[[2022,4]]},"abstract":"<jats:p> Recently, information networks are becoming a significant part of daily life, so keeping the system\u2019s security is necessary for security tools, such as firewalls and encryption. However, because of the weaknesses of the existing tools, the Intrusion Detection System (IDS) has been implemented to solve the problem. In the application of IDS, feature classification and data analysis are the two most important steps. In this paper, by using the Logit regression model, we attempt to search for the optimal cutting value based on the relationship between cutting value and accuracy index and put forward an input-output port crossed (IOPC) classification for IDS to distinguish the new intrusion features. First, we discuss whole features and propose a taxonomy of IOPC classification for CIC-IDS2017 that is different from other former studies, which can reduce the data space. Second, we compute the distribution curve of cutting values varied with the accuracy index, the purpose of which is to search for the optimal cutting values. Finally, utilizing IOPC classification, the difference between the distribution of the cutting values under the attacks of distributed denial of service (DDoS) and PortScan in CIC-IDS2017 is discussed, which highlights the characteristic that cutting values besieged the attack by PortScan has a conditional distribution compared with DDoS. <\/jats:p>","DOI":"10.1142\/s0218001422500239","type":"journal-article","created":{"date-parts":[[2022,2,21]],"date-time":"2022-02-21T14:02:18Z","timestamp":1645452138000},"source":"Crossref","is-referenced-by-count":1,"title":["Network Intrusion Logit Detection Model with IO Port Cross-Classification"],"prefix":"10.1142","volume":"36","author":[{"given":"Jingchun","family":"Sun","sequence":"first","affiliation":[{"name":"School of Management, Xi\u2019an Jiaotong University, China"},{"name":"The Key Laboratory of the Ministry of Education for Process Control and Efficiency Engineering, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9448-5496","authenticated-orcid":false,"given":"Fei","family":"Deng","sequence":"additional","affiliation":[{"name":"School of Management, Xi\u2019an Jiaotong University, China"},{"name":"College of Information Engineering, Kunming University, China"},{"name":"Key Laboratory of Data Governance and Intelligent, Decision in Universities of Yunnan, China"}]},{"given":"Qin","family":"Su","sequence":"additional","affiliation":[{"name":"School of Management, Xi\u2019an Jiaotong University, China"},{"name":"The Key Laboratory of the Ministry of Education for Process Control and Efficiency Engineering, China"}]}],"member":"219","published-online":{"date-parts":[[2022,4,1]]},"reference":[{"key":"S0218001422500239BIB001","doi-asserted-by":"publisher","DOI":"10.22581\/muet1982.2101.19"},{"issue":"3","key":"S0218001422500239BIB002","first-page":"193","volume":"30","author":"Chan L.","year":"2001","journal-title":"Adv. Math."},{"key":"S0218001422500239BIB003","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2012.04.020"},{"key":"S0218001422500239BIB005","first-page":"102564","volume":"54","author":"D\u2019hooge L.","year":"2020","journal-title":"J. Inf. Secur. Appl."},{"key":"S0218001422500239BIB006","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107251"},{"key":"S0218001422500239BIB007","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8875404"},{"key":"S0218001422500239BIB008","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102767"},{"key":"S0218001422500239BIB009","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2012.09.004"},{"key":"S0218001422500239BIB010","doi-asserted-by":"publisher","DOI":"10.1080\/10962247.2013.831799"},{"key":"S0218001422500239BIB012","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.02.034"},{"key":"S0218001422500239BIB013","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107183"},{"key":"S0218001422500239BIB014","doi-asserted-by":"publisher","DOI":"10.1109\/ICCI-CC.2014.6921448"},{"key":"S0218001422500239BIB015","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2019.8767194"},{"key":"S0218001422500239BIB016","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-0394.2012.00642.x"},{"key":"S0218001422500239BIB017","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2010.06.014"},{"key":"S0218001422500239BIB018","doi-asserted-by":"publisher","DOI":"10.4135\/9781412984805"},{"first-page":"108","volume-title":"4th Int. Conf. Information Systems Security and Privacy (ICISSP)","author":"Sharafaldin I.","key":"S0218001422500239BIB019"},{"key":"S0218001422500239BIB020","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25109-3_9"},{"key":"S0218001422500239BIB021","doi-asserted-by":"publisher","DOI":"10.3390\/fi12100167"},{"key":"S0218001422500239BIB022","doi-asserted-by":"publisher","DOI":"10.5849\/sjaf.10-022"},{"key":"S0218001422500239BIB023","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"key":"S0218001422500239BIB024","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107247"},{"key":"S0218001422500239BIB025","doi-asserted-by":"publisher","DOI":"10.1109\/ICECT.2009.97"}],"container-title":["International Journal of Pattern Recognition and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218001422500239","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T09:28:42Z","timestamp":1652779722000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0218001422500239"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4]]},"references-count":23,"journal-issue":{"issue":"05","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["10.1142\/S0218001422500239"],"URL":"https:\/\/doi.org\/10.1142\/s0218001422500239","relation":{},"ISSN":["0218-0014","1793-6381"],"issn-type":[{"type":"print","value":"0218-0014"},{"type":"electronic","value":"1793-6381"}],"subject":[],"published":{"date-parts":[[2022,4]]},"article-number":"2250023"}}