{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T01:41:00Z","timestamp":1768009260004,"version":"3.49.0"},"reference-count":43,"publisher":"Wiley","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["lzujbky-2017-192"],"award-info":[{"award-number":["lzujbky-2017-192"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["61602225"],"award-info":[{"award-number":["61602225"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["lzujbky-2017-192"],"award-info":[{"award-number":["lzujbky-2017-192"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602225"],"award-info":[{"award-number":["61602225"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Sensors"],"published-print":{"date-parts":[[2018]]},"abstract":"<jats:p>In order to protect computing systems from malicious attacks, network intrusion detection systems have become an important part in the security infrastructure. Recently, hybrid models that integrating several machine learning techniques have captured more attention of researchers. In this paper, a novel hybrid model was proposed with the purpose of detecting network intrusion effectively. In the proposed model, Gini index is used to select the optimal subset of features, the gradient boosted decision tree (GBDT) algorithm is adopted to detect network attacks, and the particle swarm optimization (PSO) algorithm is utilized to optimize the parameters of GBDT. The performance of the proposed model is experimentally evaluated in terms of accuracy, detection rate, precision, F1-score, and false alarm rate using the NSL-KDD dataset. Experimental results show that the proposed model is superior to the compared methods.<\/jats:p>","DOI":"10.1155\/2018\/1578314","type":"journal-article","created":{"date-parts":[[2018,3,26]],"date-time":"2018-03-26T23:30:37Z","timestamp":1522107037000},"page":"1-9","source":"Crossref","is-referenced-by-count":36,"title":["Towards Effective Network Intrusion Detection: A Hybrid Model Integrating Gini Index and GBDT with PSO"],"prefix":"10.1155","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5866-617X","authenticated-orcid":true,"given":"Longjie","family":"Li","sequence":"first","affiliation":[{"name":"School of Information Science & Engineering, Lanzhou University, Lanzhou 730000, China"},{"name":"China Information Technology Security Evaluation Center, Beijing 100085, China"}]},{"given":"Yang","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Information Science & Engineering, Lanzhou University, Lanzhou 730000, China"}]},{"given":"Shenshen","family":"Bai","sequence":"additional","affiliation":[{"name":"School of Information Science & Engineering, Lanzhou University, Lanzhou 730000, China"},{"name":"Department of Electronic and Information Engineering, Lanzhou Vocational Technical College, Lanzhou 730070, China"}]},{"given":"Jianjun","family":"Cheng","sequence":"additional","affiliation":[{"name":"School of Information Science & Engineering, Lanzhou University, Lanzhou 730000, China"}]},{"given":"Xiaoyun","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Information Science & Engineering, Lanzhou University, Lanzhou 730000, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2005.05.002"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.06.021"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.07.005"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2012.05.004"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/32.372146"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.05.029"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2005.06.003"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.01.028"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.08.066"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.10.011"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-006-0002-5"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.02.102"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2008.01.008"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.01.009"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.08.013"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.09.083"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.11.009"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1002\/int.20203"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.03.025"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1013203451"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.09.160"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.148"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2006.04.001"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/j.sste.2011.07.007"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/j.sste.2014.05.002"},{"key":"29","first-page":"77","volume":"14","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2015.02.019"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.07.015"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.03.031"},{"issue":"6","key":"35","first-page":"446","volume":"4","year":"2015","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-014-5473-9"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.04.019"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2009.06.019"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.11.003"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.08.070"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2440-0"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"44","year":"1993"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1994.1009"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2002.804221"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"}],"container-title":["Journal of Sensors"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/js\/2018\/1578314.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/js\/2018\/1578314.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/js\/2018\/1578314.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T05:54:16Z","timestamp":1589867656000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/js\/2018\/1578314\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":43,"alternative-id":["1578314","1578314"],"URL":"https:\/\/doi.org\/10.1155\/2018\/1578314","relation":{},"ISSN":["1687-725X","1687-7268"],"issn-type":[{"value":"1687-725X","type":"print"},{"value":"1687-7268","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}