{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T11:14:56Z","timestamp":1772190896142,"version":"3.50.1"},"reference-count":34,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2020,12,22]],"date-time":"2020-12-22T00:00:00Z","timestamp":1608595200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>As the rapid development of information and communication technology systems offers limitless access to data, the risk of malicious violations increases. A network intrusion detection system (NIDS) is used to prevent violations, and several algorithms, such as shallow machine learning and deep neural network (DNN), have previously been explored. However, intrusion detection with imbalanced data has usually been neglected. In this paper, a cost-sensitive neural network based on focal loss, called the focal loss network intrusion detection system (FL-NIDS), is proposed to overcome the imbalanced data problem. FL-NIDS was applied using DNN and convolutional neural network (CNN) to evaluate three benchmark intrusion detection datasets that suffer from imbalanced distributions: NSL-KDD, UNSW-NB15, and Bot-IoT. The results showed that the proposed algorithm using FL-NIDS in DNN and CNN architecture increased the detection of intrusions in imbalanced datasets compared to vanilla DNN and CNN in both binary and multiclass classifications.<\/jats:p>","DOI":"10.3390\/sym13010004","type":"journal-article","created":{"date-parts":[[2020,12,22]],"date-time":"2020-12-22T20:39:29Z","timestamp":1608669569000},"page":"4","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":96,"title":["Effectiveness of Focal Loss for Minority Classification in Network Intrusion Detection Systems"],"prefix":"10.3390","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3487-1221","authenticated-orcid":false,"given":"Mulyanto","family":"Mulyanto","sequence":"first","affiliation":[{"name":"Department of Electronic and Computer Engineering, National Taiwan University of Science and Technology, Taipei 10607, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9135-5864","authenticated-orcid":false,"given":"Muhamad","family":"Faisal","sequence":"additional","affiliation":[{"name":"Department of Electronic and Computer Engineering, National Taiwan University of Science and Technology, Taipei 10607, Taiwan"}]},{"given":"Setya Widyawan","family":"Prakosa","sequence":"additional","affiliation":[{"name":"Department of Electronic and Computer Engineering, National Taiwan University of Science and Technology, Taipei 10607, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7197-9912","authenticated-orcid":false,"given":"Jenq-Shiou","family":"Leu","sequence":"additional","affiliation":[{"name":"Department of Electronic and Computer Engineering, National Taiwan University of Science and Technology, Taipei 10607, Taiwan"}]}],"member":"1968","published-online":{"date-parts":[[2020,12,22]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Zaman, M., and Lung, C.H. (2018, January 23\u201327). Evaluation of machine learning techniques for network intrusion detection. Proceedings of the NOMS IEEE\/IFIP Network Operations and Management SymposiumTaipei, Taiwan.","DOI":"10.1109\/NOMS.2018.8406212"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Chang, Y., Li, W., and Yang, Z. (2017, January 21\u201324). Network intrusion detection based on random forest and support vector machine. Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), Guangzhou, China.","DOI":"10.1109\/CSE-EUC.2017.118"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Jianhong, H. (2015, January 19\u201320). Network intrusion detection algorithm based on improved support vector machine. Proceedings of the 2015 International Conference on Intelligent Transportation, Big Data and Smart City, Halong Bay, Vietnam.","DOI":"10.1109\/ICITBS.2015.135"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Vinayakumar, R., Soman, K.P., and Poornachandran, P. (2017, January 13\u201316). Applying convolutional neural network for network intrusion detection. Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI), Udupi, India.","DOI":"10.1109\/ICACCI.2017.8126009"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/TETCI.2017.2772792","article-title":"A Deep learning approach to network intrusion detection","volume":"2","author":"Shone","year":"2018","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"41525","DOI":"10.1109\/ACCESS.2019.2895334","article-title":"Deep learning approach for intelligent intrusion detection system","volume":"7","author":"Vinayakumar","year":"2019","journal-title":"IEEE Access"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Vinayakumar, R., Soman, K.P., and Poornachandran, P. (2017, January 13\u201316). Evaluating effectiveness of shallow and deep networks to intrusion detection system. Proceedings of the 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Udupi, India.","DOI":"10.1109\/ICACCI.2017.8126018"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Kwon, D., Natarajan, K., Suh, S.C., Kim, H., and Kim, J. (2018, January 2\u20136). An empirical study on network anomaly detection using convolutional neural networks. Proceedings of the IEEE 38th International Conference on Distributed Computing Systems (ICDCS), Vienna, Austria.","DOI":"10.1109\/ICDCS.2018.00178"},{"key":"ref_9","unstructured":"Hodo, E., Bellekens, X., Hamilton, A., Tachtatzis, C., and Atkinson, R. (2017). Shallow and deep networks intrusion detection system: A taxonomy and survey. arXiv."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1263","DOI":"10.1109\/TKDE.2008.239","article-title":"Learning from imbalanced data","volume":"21","author":"He","year":"2009","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"687","DOI":"10.1142\/S0218001409007326","article-title":"Classification of imbalanced data: A review","volume":"23","author":"Sun","year":"2009","journal-title":"Int. J. Pattern Recognit. Artif. Intell."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., and Ghorbani, A.A. (2009, January 8\u201310). A detailed analysis of the KDD CUP 99 data set. Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, ON, Canada.","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Moustafa, N., and Slay, J. (2015, January 10\u201312). UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). Proceedings of the 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia.","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","article-title":"Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset","volume":"100","author":"Koroniotis","year":"2019","journal-title":"Futur. Gener. Comput. Syst."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"7940","DOI":"10.1109\/ACCESS.2016.2619719","article-title":"Comparing oversampling techniques to handle the class imbalance problem: A customer churn prediction case study","volume":"4","author":"Amin","year":"2016","journal-title":"IEEE Access"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Aditsania, A., and Saonard, A.L. (2017, January 25\u201326). Handling imbalanced data in churn prediction using ADASYN and backpropagation algorithm. Proceedings of the 3rd International Conference on Science in Information Technology (ICSITech), Bandung, Indonesia.","DOI":"10.1109\/ICSITech.2017.8257170"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1119","DOI":"10.1109\/TSMCB.2012.2187280","article-title":"Multiclass Imbalance Problems: Analysis and Potential Solutions","volume":"42","author":"Wang","year":"2012","journal-title":"IEEE Trans. Syst. Man Cybern. Part B"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"3573","DOI":"10.1109\/TNNLS.2017.2732482","article-title":"Cost-sensitive learning of deep feature representations from imbalanced data","volume":"29","author":"Khan","year":"2018","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"ref_19","unstructured":"More, A. (2016). Survey of resampling techniques for improving classification performance in unbalanced datasets. arXiv."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Nguyen, H.M., Cooper, E.W., Kamei, K., and Kamei, K. (2012, January 20\u201324). A comparative study on sampling techniques for handling class imbalance in streaming data. Proceedings of the 6th International Conference on Soft Computing and Intelligent Systems, Kobe, Japan.","DOI":"10.1109\/SCIS-ISIS.2012.6505291"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1613\/jair.953","article-title":"SMOTE: Synthetic minority over-sampling technique","volume":"16","author":"Chawla","year":"2002","journal-title":"J. Artif. Intell. Res."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1007730.1007733","article-title":"Editorial: Special issue on learning from imbalanced data sets","volume":"6","author":"Chawla","year":"2004","journal-title":"ACM SIGKDD Explor. Newsl."},{"key":"ref_23","unstructured":"Kukar, M., and Kononenko, I. Cost-sensitive learning with neural networks. Proceedings of the 13th European Conference Artificial Intelligence, Available online: https:\/\/eurai.org\/library\/ECAI_proceedings."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1367","DOI":"10.1109\/TPAMI.2018.2832629","article-title":"Imbalanced deep learning by minority class incremental rectification","volume":"41","author":"Dong","year":"2019","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"2402","DOI":"10.1109\/TCYB.2014.2372060","article-title":"Diversified sensitivity-based undersampling for imbalance classification problems","volume":"45","author":"Ng","year":"2015","journal-title":"IEEE Trans. Cybern."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Cui, Y., Jia, M., Lin, T.-Y., Song, Y., and Belongie, S. (2019, January 15\u201321). Class-balanced loss based on effective number of samples. Proceedings of the 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Long Beach, CA, USA.","DOI":"10.1109\/CVPR.2019.00949"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Lin, T.-Y., Goyal, P., Girshick, R., He, K., and Dollar, P. (2017, January 22\u201329). Focal loss for dense object detection. Proceedings of the IEEE International Conference on Computer Vision (ICCV), Venice, Italy.","DOI":"10.1109\/ICCV.2017.324"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Tian, X., Wu, D., Wang, R., and Cao, X. (2018, January 7\u201310). Focal text: An accurate text detection with focal loss. Proceedings of the 25th IEEE International Conference on Image Processing (ICIP), Athens, Greece.","DOI":"10.1109\/ICIP.2018.8451241"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Nemoto, K., Hamaguchi, R., Imaizumi, T., and Hikosaka, S. (2018, January 22\u201327). Classification of rare building change using CNN with multi-class focal loss. Proceedings of the IGARSS, IEEE International Geoscience and Remote Sensing Symposium, Valencia, Spain.","DOI":"10.1109\/IGARSS.2018.8517563"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Cheng, Z., and Chai, S. (2020, January 27\u201329). A cyber intrusion detection method based on focal loss neural network. Proceedings of the 39th Chinese Control Conference, Shenyang, China.","DOI":"10.23919\/CCC50068.2020.9189108"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Roopak, M., Tian, G.Y., and Chambers, J. (2019, January 7\u20139). Deep learning models for cyber security in IoT networks. Proceedings of the IEEE 9th Annual Computing and Communication Workshop and Conference, Las Vegas, NV, USA.","DOI":"10.1109\/CCWC.2019.8666588"},{"key":"ref_32","unstructured":"Elkan, C. (2001, January 4\u201310). The foundations of cost-sensitive learning. Proceedings of the International Joint Conference on Artificial Intelligence, Seattle, WA, USA."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Wang, S., Liu, W., Wu, J., Cao, L., Meng, Q., and Kennedy, P.J. (2016, January 24\u201329). Training deep neural networks on imbalanced data sets. Proceedings of the 2016 International Joint Conference on Neural Networks, Vancouver, BC, Canada.","DOI":"10.1109\/IJCNN.2016.7727770"},{"key":"ref_34","unstructured":"Van Asch, V. (2013). Macro-and Micro-Averaged Evaluation Measures [[BASIC DRAFT]], CLiPS."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/13\/1\/4\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:48:21Z","timestamp":1760179701000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/13\/1\/4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,22]]},"references-count":34,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2021,1]]}},"alternative-id":["sym13010004"],"URL":"https:\/\/doi.org\/10.3390\/sym13010004","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12,22]]}}}