{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:18:37Z","timestamp":1766269117476,"version":"3.41.0"},"reference-count":50,"publisher":"Association for Computing Machinery (ACM)","issue":"3s","license":[{"start":{"date-parts":[[2023,2,24]],"date-time":"2023-02-24T00:00:00Z","timestamp":1677196800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61972412"],"award-info":[{"award-number":["61972412"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2023,10,31]]},"abstract":"<jats:p>In recent years, frequent network attacks have seriously threatened the interests and security of humankind. To address this threat, many detection methods have been studied, some of which have achieved good results. However, with the development of network interconnection technology, massive amounts of network data have been produced, and considerable redundant information has been generated. At the same time, the frequently changing types of cyberattacks result in great difficulty collecting samples, resulting in a serious imbalance in the sample size of each attack type in the dataset. These two problems seriously reduce the robustness of existing detection methods, and existing research methods do not provide a good solution. To address these two problems, we define an unbalanced index and an optimal feature index to directly reflect the performance of a detection method in terms of overall accuracy, feature subset optimization, and detection balance. Inspired by DNA computing, we propose intelligent attack detection based on DNA computing (ADDC). First, we design a set of regular encoding and decoding features based on DNA sequences and obtain a better subset of features through biochemical reactions. Second, nondominated ranking based on reference points is used to select individuals to form a new population to optimize the detection balance. Finally, a large number of experiments are carried out on four datasets to reflect real-world cyberattack situations. Experimental results show that compared with the most recent detection methods, our method can improve the overall accuracy of multiclass classification by up to 10%; the imbalance index decreased by 0.5, and 1.5 more attack types were detected on average; and the optimal index of the feature subset increased by 83.8%.<\/jats:p>","DOI":"10.1145\/3561057","type":"journal-article","created":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T12:21:39Z","timestamp":1662639699000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Towards Intelligent Attack Detection Using DNA Computing"],"prefix":"10.1145","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5329-0713","authenticated-orcid":false,"given":"Zengri","family":"Zeng","sequence":"first","affiliation":[{"name":"College of Computers, National University of Defense Technology, Changsha, Hunan, China and Information School, Hunan University of Humanities, Science and Technology, Hunan, Loudi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9200-9018","authenticated-orcid":false,"given":"Baokang","family":"Zhao","sequence":"additional","affiliation":[{"name":"College of Computers, National University of Defense Technology, Changsha, Hunan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3222-1708","authenticated-orcid":false,"given":"Han-Chieh","family":"Chao","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, National Dong Hwa University, Hualien, Taiwan, ROC"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0604-3445","authenticated-orcid":false,"given":"Ilsun","family":"You","sequence":"additional","affiliation":[{"name":"Department of Information Security, Cryptology, and Mathematics, Kookmin University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0598-761X","authenticated-orcid":false,"given":"Kuo-Hui","family":"Yeh","sequence":"additional","affiliation":[{"name":"National Dong Hwa University, Hualien, Taiwan, ROC"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4384-5786","authenticated-orcid":false,"given":"Weizhi","family":"Meng","sequence":"additional","affiliation":[{"name":"Technical University of Denmark (DTU), Denmark"}]}],"member":"320","published-online":{"date-parts":[[2023,2,24]]},"reference":[{"key":"e_1_3_1_2_2","first-page":"1","volume-title":"Soft Computing","author":"Mittal Meenakshi","year":"2022","unstructured":"Meenakshi Mittal, Krishan Kumar, and Sunny Behal. 2022. Deep learning approaches for detecting DDoS attacks: A systematic review. Soft Computing. 1\u201337."},{"key":"e_1_3_1_3_2","article-title":"Review and consensus recommendations on clinical APT-weighted imaging approaches at 3T: Application to brain tumors","author":"Zhou Jinyuan","year":"2022","unstructured":"Jinyuan Zhou et al. 2022. Review and consensus recommendations on clinical APT-weighted imaging approaches at 3T: Application to brain tumors. Magnetic Resonance in Medicine 88 (2022), 546--574.","journal-title":"Magnetic Resonance in Medicine"},{"key":"e_1_3_1_4_2","first-page":"137","article-title":"An emerging US (and world) threat: Cities wide open to cyber attacks","volume":"17","author":"Cerrudo Cesar","year":"2015","unstructured":"Cesar Cerrudo. 2015. An emerging US (and world) threat: Cities wide open to cyber attacks. Securing Smart Cities 17 (2017), 137\u2013151.","journal-title":"Securing Smart Cities"},{"issue":"3","key":"e_1_3_1_5_2","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1080\/02646811.2021.1943935","article-title":"Cybersecurity in the energy sector: Are we really prepared","volume":"39","author":"Smith D. C.","year":"2015","unstructured":"D. C. Smith. 2015. Cybersecurity in the energy sector: Are we really prepared. Journal of Energy & Natural Resources Law 39, 3 (2015), 265\u2013270.","journal-title":"Journal of Energy & Natural Resources Law"},{"key":"e_1_3_1_6_2","first-page":"107840","volume-title":"Computer Networks","author":"Kilincer Ilhan Firat","year":"2021","unstructured":"Ilhan Firat Kilincer, Fatih Ertam, and Abdulkadir Sengur. 2021. Machine learning methods for cyber security intrusion detection: Datasets and comparative study. Computer Networks 188 (2021), 107840."},{"key":"e_1_3_1_7_2","first-page":"107","volume-title":"Classification of Cyber Security Threats on Mobile Devices and Applications","author":"Almaiah Mohammed Amin","year":"2021","unstructured":"Mohammed Amin Almaiah. 2021. Classification of Cyber Security Threats on Mobile Devices and Applications. Artificial Intelligence and Blockchain for Future Cybersecurity Applications. Springer, Cham, 107\u2013123."},{"key":"e_1_3_1_8_2","volume-title":"Security and Communication Networks","author":"Zeng Zengri","year":"2021","unstructured":"Zengri Zeng, Wei Peng, and Baokang Zhao. 2021. Improving the accuracy of network intrusion detection with causal machine learning. Security and Communication Networks, Vol. 2021, Article ID 8986243, 18 pages."},{"volume-title":"Chinese Journal of Computers","year":"2003","key":"e_1_3_1_9_2","unstructured":"Cai Zhong Min Hong, Guan Xiao, et al. 2003. A new approach to intrusion detection based on rough set theory. Chinese Journal of Computers."},{"issue":"2","key":"e_1_3_1_10_2","doi-asserted-by":"crossref","DOI":"10.1109\/TNSM.2020.3014929","article-title":"Multi-stage optimized machine learning framework for network intrusion detection","volume":"18","author":"Injadat M. N.","year":"2020","unstructured":"M. N. Injadat, A. Moubayed, and A. B. Nassif. 2020. Multi-stage optimized machine learning framework for network intrusion detection. IEEE Transactions on Network and Service Management 18, 2 (2020).","journal-title":"IEEE Transactions on Network and Service Management"},{"issue":"3","key":"e_1_3_1_11_2","first-page":"59","article-title":"A survey on network intrusion detection based on deep learning","volume":"3","author":"Jianping X.","year":"2021","unstructured":"X. Jianping, L. Chun, Z. Jing, et al. 2021. A survey on network intrusion detection based on deep learning. Frontiers of Data and Computing 3, 3 (2021), 59\u201374.","journal-title":"Frontiers of Data and Computing"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-020-01886-y"},{"volume-title":"Proceedings of the 6th International Conference on Electrical, Control and Computer Engineering","key":"e_1_3_1_13_2","unstructured":"Soon Hui Fern, Amiza Amir, and Saidatul Norlyana Azemi. 2022. Multi-class imbalanced classification problems in network attack detections. In Proceedings of the 6th International Conference on Electrical, Control and Computer Engineering. Springer, Singapore, 1057--1069."},{"key":"e_1_3_1_14_2","first-page":"1","volume-title":"Journal of Intelligent & Fuzzy Systems","author":"Almseidin Mohammad","year":"2022","unstructured":"Mohammad Almseidin, Jamil Al-Sawwa, and Mouhammd Alkasassbeh. 2022. Generating a benchmark cyber multi-step attacks dataset for intrusion detection. Journal of Intelligent & Fuzzy Systems. Preprint, 1\u201315."},{"key":"e_1_3_1_15_2","first-page":"107894","volume-title":"Knowledge-Based Systems","author":"Moizuddin M. D.","year":"2022","unstructured":"M. D. Moizuddin and M. V. Jose. 2022. A bio-inspired hybrid deep learning model for network intrusion detection. Knowledge-Based Systems, 238 (2022), 107894."},{"key":"e_1_3_1_16_2","volume-title":"Applied Soft Computing","author":"Prasad M.","year":"2020","unstructured":"M. Prasad, S. Tripathi, and K. Dahal. 2020. An efficient feature selection-based Bayesian and Rough set approach for intrusion detection. Applied Soft Computing 87, Article ID105980."},{"issue":"4","key":"e_1_3_1_17_2","doi-asserted-by":"crossref","first-page":"1763","DOI":"10.1007\/s12065-020-00453-1","article-title":"DNAVS: An algorithm based on DNA-computing and vortex search algorithm for task scheduling problem","volume":"14","author":"Azayeri N.","year":"2020","unstructured":"N. Azayeri and H. Sajedi. 2020. DNAVS: An algorithm based on DNA-computing and vortex search algorithm for task scheduling problem. Evolutionary Intelligence 14, 4 (2020), 1763\u20131773.","journal-title":"Evolutionary Intelligence"},{"issue":"3","key":"e_1_3_1_18_2","article-title":"DNA computing-origination, motivation and goals","volume":"15","author":"Bollella P.","year":"2020","unstructured":"P. Bollella and E. Katz. 2020. DNA computing-origination, motivation and goals. International Journal of Unconventional Computing 15, 3 (2020).","journal-title":"International Journal of Unconventional Computing"},{"key":"e_1_3_1_19_2","first-page":"19306","volume-title":"IEEE Access","author":"Zhou J.","year":"2020","unstructured":"J. Zhou, X. Zhao, X. Zhang, et al. 2020. Task allocation for multi-agent systems based on distributed many-objective evolutionary algorithm and greedy algorithm. IEEE Access 8 (2020), 19306\u201319318."},{"key":"e_1_3_1_20_2","first-page":"1","volume-title":"Complexity","author":"Jing X.","year":"2018","unstructured":"X. Jing, L. Jing-Jing, and H. Xi-Xi. 2018. An improved MOEA\/D based on reference distance for software project portfolio optimization. Complexity (2018), 1\u201316."},{"key":"e_1_3_1_21_2","first-page":"108","volume-title":"International Conference on Information Systems Security and Privacy","author":"Sharafaldin I.","year":"2028","unstructured":"I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani. 2028. Toward generating a new intrusion detection dataset and intrusion traffic characterization. International Conference on Information Systems Security and Privacy. 1 (2028), 108\u2013116."},{"key":"e_1_3_1_22_2","first-page":"102095","volume-title":"Computers & Security","author":"Chen S.","year":"2021","unstructured":"S. Chen, B. Lang, and H. Liu. 2021. DNS covert channel detection method using the LSTM model. Computers & Security. 104 (2021), 102095."},{"key":"e_1_3_1_23_2","volume-title":"Journal of Information Security and Applications","author":"Mohamed Amine Ferrag","year":"2020","unstructured":"Ferrag, Mohamed Amine, et al. 2020. Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. Journal of Information Security and Applications 50 (2020), 102419."},{"key":"e_1_3_1_24_2","volume-title":"Computers & Security.","author":"Zhang Jianwu","year":"2020","unstructured":"Jianwu Zhang et al. 2020. Model of the intrusion detection system based on the integration of spatial-temporal features. Computers & Security. 89, 101681."},{"key":"e_1_3_1_25_2","first-page":"1","volume-title":"Security and Communication Networks","author":"Yan B.","year":"2028","unstructured":"B. Yan and G. Han. 2028. LA-GRU: Building combined intrusion detection model based on imbalanced learning and gated recurrent unit neural network. Security and Communication Networks (2018), 1\u201313."},{"key":"e_1_3_1_26_2","first-page":"1","volume-title":"Microsystem Technologies","author":"Jadwal Pankaj Kumar","unstructured":"Pankaj Kumar Jadwal et al. Improved resampling algorithm through a modified oversampling approach based on spectral clustering and SMOTE. In Microsystem Technologies. 1\u20139."},{"key":"e_1_3_1_27_2","first-page":"1","volume-title":"IEEE Access","author":"Liu L.","year":"2020","unstructured":"L. Liu, P. Wang, and J. Lin. 2020. Intrusion detection of imbalanced network traffic based on machine learning and deep learning. IEEE Access 99 (2020), 1\u20131."},{"issue":"1","key":"e_1_3_1_28_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/LSENS.2018.2879990","article-title":"Deep and machine learning approaches for anomaly-based intrusion detection of imbalanced network traffic","volume":"3","author":"Abdulhammed R.","year":"2018","unstructured":"R. Abdulhammed, M. Faezipour, and A. Abuzneid. 2018. Deep and machine learning approaches for anomaly-based intrusion detection of imbalanced network traffic. IEEE Sensors Letters 3, 1 (2018), 1\u20134.","journal-title":"IEEE Sensors Letters"},{"key":"e_1_3_1_29_2","first-page":"780","volume-title":"Procedia Computer Science","author":"Bedi P.","year":"2020","unstructured":"P. Bedi, N. Gupta, and V. Jindal. 2020. Siam-IDS: Handling class imbalance problem in intrusion detection systems using Siamese neural network. Procedia Computer Science 171 (2020), 780\u2013789."},{"key":"e_1_3_1_30_2","volume-title":"DNA Computing: New Computing Paradigms","author":"Paun G.","year":"2005","unstructured":"G. Paun, G. Rozenberg, and A. Salomaa. 2005. DNA Computing: New Computing Paradigms. Springer Science & Business Media."},{"key":"e_1_3_1_31_2","volume-title":"DNA Computing and Soft Computing","author":"Ding Y. S.","year":"2001","unstructured":"Y. S. Ding, L. H. Ren, and S. H. Shao. 2001. DNA Computing and Soft Computing. Acta Simulata Systematica Sinica."},{"key":"e_1_3_1_32_2","first-page":"465","volume-title":"Future Generation Computer Systems","author":"Zang W.","year":"2018","unstructured":"W. Zang, L. Ren, W. Zhang, et al. 2018. A cloud model-based DNA genetic algorithm for numerical optimization problems. Future Generation Computer Systems 81 (2018), 465\u2013477."},{"key":"e_1_3_1_33_2","first-page":"185","volume-title":"Future Generation Computer Systems","author":"Jatoth C.","year":"2019","unstructured":"C. Jatoth, G. R. Gangadharan, and R. Buyya. 2019. Optimal fitness aware cloud service composition using an adaptive genotypes evolution based genetic algorithm. Future Generation Computer Systems 94 (2019), 185\u2013198."},{"key":"e_1_3_1_34_2","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1109\/ABLAZE.2015.7154916","volume-title":"2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE)","author":"Shukla A.","year":"2015","unstructured":"A. Shukla, H. M. Pandey, and D. Mehrotra. 2015. Comparative review of selection techniques in genetic algorithm. 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE). IEEE, 515\u2013519."},{"key":"e_1_3_1_35_2","unstructured":"Computers in Biology and Medicine"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6940-7_15"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2013.2281535"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"key":"e_1_3_1_39_2","first-page":"106047","volume-title":"Applied Soft Computing","author":"Aguilar-Rivera A.","year":"2020","unstructured":"A. Aguilar-Rivera. 2020. A GPU fully vectorized approach to accelerate performance of NSGA-2 based on stochastic non-domination sorting and grid-crowding. Applied Soft Computing 88 (2020), 106047."},{"key":"e_1_3_1_40_2","first-page":"124","volume-title":"The International Conference on Emerging Applications and Technologies for Industry 4.0","author":"Usman A. M.","year":"2020","unstructured":"A. M. Usman, U. K. Yusof, and S. Naim. 2020. Multi-objective wrapper-based feature selection using binary cuckoo optimisation algorithm: A comparison between NSGAII and NSGAIII. The International Conference on Emerging Applications and Technologies for Industry 4.0. Springer, Cham, 124\u2013136."},{"key":"e_1_3_1_41_2","unstructured":"Knowledge-Based Systems"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.7973651"},{"key":"e_1_3_1_43_2","unstructured":"Computers & Mathematics with Applications"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.5555\/2188385.2188395"},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1137\/s1052623496307510"},{"key":"e_1_3_1_46_2","first-page":"140","volume-title":"Applied Mechanics and Materials","author":"Prada A.","year":"2019","unstructured":"A. Prada, A. Gasparella, and P. A. Baggio. 2019. Comparison of three evolutionary algorithms for the optimization of building design. Applied Mechanics and Materials 887 (2019), 140\u2013147."},{"key":"e_1_3_1_47_2","first-page":"1","volume-title":"2019 International Carnahan Conference on Security Technology (ICCST\u201919)","author":"Sharafaldin Iman","year":"2019","unstructured":"Iman Sharafaldin et al. 2019. Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. 2019 International Carnahan Conference on Security Technology (ICCST\u201919). 1\u20138."},{"key":"e_1_3_1_48_2","volume-title":"5th IEEE Cyber Science and Technology Congress","author":"MontazeriShatoori Mohammadreza","year":"2020","unstructured":"Mohammadreza MontazeriShatoori, Logan Davidson, and Gurdip Kaur. 2020. Detection of DoH tunnels using time-series classification of encrypted traffic. 2020. 5th IEEE Cyber Science and Technology Congress, Calgary, Alberta, Canada."},{"issue":"1","key":"e_1_3_1_49_2","first-page":"107","article-title":"Comparison study for intrusion database (KDD99, NSL-KDD) based on self-organization map (SOM) artificial neural network","volume":"8","author":"Ibrahim L. M.","year":"2013","unstructured":"L. M. Ibrahim, D. T. Basheer, and M. S. A. Mahmod. 2013. Comparison study for intrusion database (KDD99, NSL-KDD) based on self-organization map (SOM) artificial neural network. Journal of Engineering Science and Technology 8, 1 (2013), 107\u2013119.","journal-title":"Journal of Engineering Science and Technology"},{"key":"e_1_3_1_50_2","doi-asserted-by":"crossref","first-page":"105992","DOI":"10.1016\/j.knosys.2020.105992","volume":"200","year":"2020","unstructured":"Systematic ensemble model selection approach for educational data mining. 2020. Knowledge-Based Systems 200 (2020), 105992.","journal-title":"Knowledge-Based Systems"},{"key":"e_1_3_1_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/3136625"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3561057","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3561057","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:15Z","timestamp":1750182555000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3561057"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,24]]},"references-count":50,"journal-issue":{"issue":"3s","published-print":{"date-parts":[[2023,10,31]]}},"alternative-id":["10.1145\/3561057"],"URL":"https:\/\/doi.org\/10.1145\/3561057","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"type":"print","value":"1551-6857"},{"type":"electronic","value":"1551-6865"}],"subject":[],"published":{"date-parts":[[2023,2,24]]},"assertion":[{"value":"2022-02-20","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-08-24","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-02-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}