{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T11:05:21Z","timestamp":1770030321114,"version":"3.49.0"},"reference-count":44,"publisher":"SAGE Publications","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2021,8,11]]},"abstract":"<jats:p>Intrusion Detection System (IDS) can reduce the losses caused by intrusion behaviors and protect users\u2019 information security. The effectiveness of IDS depends on the performance of the algorithm used in identifying intrusions. And traditional machine learning algorithms are limited to deal with the intrusion data with the characteristics of high-dimensionality, nonlinearity and imbalance. Therefore, this paper proposes an Intrusion Detection algorithm based on Image Enhanced Convolutional Neural Network (ID-IE-CNN). Firstly, based on the image processing technology of deep learning, oversampling method is used to increase the amount of original data to achieve data balance. Secondly, the one-dimensional data is converted into two-dimensional image data, the convolutional layer and the pooling layer are used to extract the main features of the image to reduce the data dimensionality. Thirdly, the Tanh function is introduced as an activation function to fit nonlinear data, a fully connected layer is used to integrate local information, and the generalization ability of the prediction model is improved by the Dropout method. Finally, the Softmax classifier is used to predict the behavior of intrusion detection. This paper uses the KDDCup99 data set and compares with other competitive algorithms. Both in the performance of binary classification and multi-classification, ID-IE-CNN is better than the compared algorithms, which verifies its superiority.<\/jats:p>","DOI":"10.3233\/jifs-210863","type":"journal-article","created":{"date-parts":[[2021,6,26]],"date-time":"2021-06-26T05:21:49Z","timestamp":1624684909000},"page":"2183-2194","source":"Crossref","is-referenced-by-count":9,"title":["Intrusion detection algorithm based on image enhanced convolutional neural network"],"prefix":"10.1177","volume":"41","author":[{"given":"Qian","family":"Wang","sequence":"first","affiliation":[{"name":"College of Information Science and Engineering, Yanshan University, Qinhuangdao, Hebei, China"},{"name":"Computer Virtual Technology and System Integration Laboratory of Hebei Province, China"}]},{"given":"Wenfang","family":"Zhao","sequence":"additional","affiliation":[{"name":"College of Information Science and Engineering, Yanshan University, Qinhuangdao, Hebei, China"},{"name":"Computer Virtual Technology and System Integration Laboratory of Hebei Province, China"}]},{"given":"Jiadong","family":"Ren","sequence":"additional","affiliation":[{"name":"College of Information Science and Engineering, Yanshan University, Qinhuangdao, Hebei, China"},{"name":"Computer Virtual Technology and System Integration Laboratory of Hebei Province, China"}]}],"member":"179","reference":[{"issue":"1","key":"10.3233\/JIFS-210863_ref1","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1504\/IJWGS.2020.106128","article-title":"An efficient algorithm and tool for detecting dangerous website vulnerabilities","volume":"16","author":"Long","year":"2020","journal-title":"International Journal of Web and Grid Services"},{"key":"10.3233\/JIFS-210863_ref2","first-page":"1","article-title":"Analysis of intrusion detection in cyber attacks using DEEP learning neural networks","volume":"6245","author":"Kumar","year":"2020","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"10.3233\/JIFS-210863_ref3","first-page":"37","article-title":"Analysis of network intrusion detection technology,(11)","author":"Xue","year":"2020","journal-title":"Network Security Technology & Application"},{"key":"10.3233\/JIFS-210863_ref4","first-page":"1","article-title":"Performance evaluation of Botnet DDoS attack detection using machine learning","volume":"13","author":"Tuan","year":"2019","journal-title":"Evolutionary Intelligence"},{"issue":"2","key":"10.3233\/JIFS-210863_ref5","doi-asserted-by":"crossref","first-page":"1275","DOI":"10.1007\/s11276-019-02151-y","article-title":"Modified zone based intrusion detection system for security enhancement in mobile ad-hoc networks","volume":"26","author":"Krishnan","year":"2020","journal-title":"Wireless Networks"},{"issue":"9","key":"10.3233\/JIFS-210863_ref6","first-page":"42","article-title":"Research on intrusion detection system based on principal component analysis and K-means clustering algorithm","volume":"39","author":"Lu","year":"2020","journal-title":"Journal of Wuyi University"},{"key":"10.3233\/JIFS-210863_ref7","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.knosys.2015.01.009","article-title":"CANN: An intrusion detection system based on combining cluster centers and nearest neighbors","volume":"78","author":"Lin","year":"2015","journal-title":"Knowledge-Based Systems"},{"issue":"3","key":"10.3233\/JIFS-210863_ref8","first-page":"614","article-title":"Two-level hybrid intrusion detection method based on feature selection","volume":"41","author":"Jiang","year":"2020","journal-title":"Computer Engineering and Design"},{"issue":"7","key":"10.3233\/JIFS-210863_ref9","first-page":"1055","article-title":"Network intrusion detection model based on random forest and XGBoost","volume":"36","author":"Chen","year":"2020","journal-title":"Journal of Signal Processing"},{"key":"10.3233\/JIFS-210863_ref10","first-page":"1","article-title":"A hybrid nested Genetic-Fuzzy algorithm framework for intrusion detection and attacks","volume":"99","author":"Elhefnawy","year":"2020","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-210863_ref11","doi-asserted-by":"crossref","unstructured":"Yao H.P. , Wang Q.Y. , Wang L.Y. , et al., An intrusion detection framework based on hybrid Multi-Level data mining, 47(4) (2019), 740\u2013758.","DOI":"10.1007\/s10766-017-0537-7"},{"key":"10.3233\/JIFS-210863_ref12","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1016\/S1353-4858(20)30056-8","article-title":"Hybrid intrusion detection system using machine learning","volume":"5","author":"Meryem","year":"2020","journal-title":"Network Security"},{"key":"10.3233\/JIFS-210863_ref13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cose.2020.102037","article-title":"Recurrent neural network for detecting malware","volume":"99","author":"Jha","year":"2020","journal-title":"Computers & Security"},{"issue":"06","key":"10.3233\/JIFS-210863_ref14","first-page":"1117","article-title":"Situation, trends and prospects of deep learning applied to cyberspace security","volume":"55","author":"Zhang","year":"2018","journal-title":"Journal of Computer Research and Development"},{"key":"10.3233\/JIFS-210863_ref15","first-page":"528","article-title":"Deep Learning, Cambridge","author":"Goodfellow","year":"2016","journal-title":"Massachusetts: MIT Press"},{"issue":"S2","key":"10.3233\/JIFS-210863_ref16","first-page":"224","article-title":"Network intrusion detection method based on Auto Encoder and ResNet","volume":"37","author":"Zhou","year":"2020","journal-title":"Application Research of Computers"},{"key":"10.3233\/JIFS-210863_ref17","doi-asserted-by":"crossref","unstructured":"Sohi S.M. , Seifert J.P. , Ganji F. , RNNIDS: Enhancing network intrusion detection systems through deep learning, 102 (2021), 102.","DOI":"10.1016\/j.cose.2020.102151"},{"issue":"4","key":"10.3233\/JIFS-210863_ref18","doi-asserted-by":"crossref","first-page":"457","DOI":"10.18280\/ria.340410","article-title":"A deep learning approach to network intrusion detection using deep autoencoder","volume":"34","author":"Srikanthyadav","year":"2020","journal-title":"Revue d\u2019Intelligence Artificielle"},{"key":"10.3233\/JIFS-210863_ref19","first-page":"101","article-title":"Intrusion detection model based on feedforward neural network","volume":"9","author":"Feng","year":"2019","journal-title":"Netinfo Security"},{"issue":"8","key":"10.3233\/JIFS-210863_ref20","doi-asserted-by":"crossref","first-page":"168","DOI":"10.14569\/IJACSA.2019.0100822","article-title":"Non-linear dimensionality reduction-based intrusion detection using deep autoencoder","volume":"10","author":"Chakravarthi","year":"2019","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"10.3233\/JIFS-210863_ref21","doi-asserted-by":"crossref","first-page":"17265","DOI":"10.1007\/s00500-020-05017-0","article-title":"A deep learning approach for effective intrusion detection in wireless networks using CNN,(24)","author":"Riyaz","year":"2020","journal-title":"Soft Computing"},{"key":"10.3233\/JIFS-210863_ref22","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.neucom.2018.05.137","article-title":"Exploiting deep convolutional neural networks for a neural-based learning classifier system","volume":"354","author":"Kim","year":"2019","journal-title":"Neurocomputing"},{"issue":"1","key":"10.3233\/JIFS-210863_ref23","first-page":"44","article-title":"Intrusion detection method based on a deep convolutional neural network","volume":"59","author":"Zhang","year":"2019","journal-title":"Journal of Tsinghua University(Science and Technology)"},{"key":"10.3233\/JIFS-210863_ref24","first-page":"1","article-title":"An encrypted traffic classification method based on convolutional attention gated recurrent networks","volume":"4","author":"Zhang","year":"2021","journal-title":"Journal of Signal Processing"},{"issue":"03","key":"10.3233\/JIFS-210863_ref25","first-page":"516","article-title":"CGGA: Text classification model based on CNN and parallel gating mechanism","volume":"42","author":"Ma","year":"2021","journal-title":"Journal of Chinese Computer Systems"},{"issue":"04","key":"10.3233\/JIFS-210863_ref26","first-page":"126","article-title":"Fault diagnosis of rolling bearing based on GA-CNN","volume":"44","author":"Li","year":"2021","journal-title":"Electronic Measurement Technology"},{"issue":"01","key":"10.3233\/JIFS-210863_ref27","first-page":"16","article-title":"Convolutional neural network for facial expression recognition","volume":"36","author":"Lu","year":"2016","journal-title":"Journal of Nanjing University of Posts and Telecommunications (Natural Science Edition)"},{"issue":"05","key":"10.3233\/JIFS-210863_ref28","doi-asserted-by":"crossref","first-page":"741","DOI":"10.37188\/CJLCD.2020-0314","article-title":"Visual detection of liquid leakage based on convolutional neural network","volume":"36","author":"Li","year":"2021","journal-title":"Chinese Journal of Liquid Crystals and Displays"},{"issue":"22","key":"10.3233\/JIFS-210863_ref29","first-page":"4809","article-title":"Research of intrusion detection system dataset-KDD CUP99","volume":"31","author":"Zhang","year":"2010","journal-title":"Computer Engineering and Design"},{"key":"10.3233\/JIFS-210863_ref30","first-page":"1","article-title":"Intrusion detection approach based on optimised artificial neural network","author":"Micha\u0142","year":"2020","journal-title":"Neurocomputing"},{"key":"10.3233\/JIFS-210863_ref31","doi-asserted-by":"crossref","first-page":"32464","DOI":"10.1109\/ACCESS.2020.2973730","article-title":"Network intrusion detection combined hybrid sampling with deep hierarchical network","volume":"8","author":"Jiang","year":"2020","journal-title":"IEEE Access"},{"issue":"12","key":"10.3233\/JIFS-210863_ref32","first-page":"297","article-title":"Design and implementation of network intrusion detection model based on GR-CNN algorithm","volume":"36","author":"Chi","year":"2019","journal-title":"Computer Applications and Software"},{"key":"10.3233\/JIFS-210863_ref33","doi-asserted-by":"crossref","first-page":"21954","DOI":"10.1109\/ACCESS.2017.2762418","article-title":"A deep learning approach for intrusion detection using recurrent neural networks","volume":"5","author":"Yin","year":"2017","journal-title":"IEEE Access"},{"issue":"10","key":"10.3233\/JIFS-210863_ref34","first-page":"105","article-title":"Intrusion detection model based on principle component analysis and recurrent neural network","volume":"34","author":"Liu","year":"2020","journal-title":"Journal of Chinese Information Processing"},{"issue":"04","key":"10.3233\/JIFS-210863_ref35","first-page":"875","article-title":"Use improved grey wolf algorithm to optimize BP neural network intrusion detection","volume":"42","author":"Wang","year":"2021","journal-title":"Journal of Chinese Computer Systems"},{"issue":"04","key":"10.3233\/JIFS-210863_ref36","first-page":"324","article-title":"An intrusion detection algorithm based on deep CNN","volume":"37","author":"Li","year":"2020","journal-title":"Computer Applications and Software"},{"issue":"22","key":"10.3233\/JIFS-210863_ref37","first-page":"83","article-title":"Research on intrusion detection model based on DBN-XGBDT","volume":"56","author":"Chen","year":"2020","journal-title":"Computer Engineering and Applications"},{"key":"10.3233\/JIFS-210863_ref38","first-page":"1","article-title":"Intrusion detection algorithm based on LFKPCA-DWELM","author":"Shen","year":"2021","journal-title":"Computer Engineering and Applications"},{"key":"10.3233\/JIFS-210863_ref39","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jisa.2021.102804","article-title":"Attack classification of an intrusion detection system using deep learning and hyperparameter optimization","volume":"58","author":"Kunang","year":"2021","journal-title":"Journal of Information Security and Applications"},{"issue":"10","key":"10.3233\/JIFS-210863_ref40","first-page":"323","article-title":"An intrusion detection method based on convolutional neural network","volume":"37","author":"Shi","year":"2020","journal-title":"Computer Applications and Software"},{"key":"10.3233\/JIFS-210863_ref41","doi-asserted-by":"crossref","first-page":"714","DOI":"10.1016\/j.asoc.2016.10.001","article-title":"KNCM: Kernel neutrosophic c-Means clustering","volume":"52","author":"Akbulut","year":"2017","journal-title":"Applied Soft Computing"},{"key":"10.3233\/JIFS-210863_ref42","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/0098-3004(84)90020-7","article-title":"FCM: The fuzzy c-means clustering algorithm","volume":"10","author":"Bezdek","year":"1984","journal-title":"Computers & Geosciences"},{"issue":"3","key":"10.3233\/JIFS-210863_ref43","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1142\/S1793005708001082","article-title":"A new neutrosophic approach to image thresholding","volume":"499","author":"Cheng","year":"2009","journal-title":"New Math Nat Comput"},{"issue":"4","key":"10.3233\/JIFS-210863_ref44","doi-asserted-by":"crossref","first-page":"4223","DOI":"10.3233\/JIFS-190681","article-title":"A new method to classify malicious domain name using neutrosophic sets in DGA botnet detection","volume":"38","author":"Can","year":"2020","journal-title":"Journal of Intelligent & Fuzzy Systems"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-210863","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T00:48:37Z","timestamp":1769993317000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-210863"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,11]]},"references-count":44,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.3233\/jifs-210863","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,11]]}}}