{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T10:05:46Z","timestamp":1743501946750,"version":"3.40.3"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030164577"},{"type":"electronic","value":"9783030164584"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-16458-4_25","type":"book-chapter","created":{"date-parts":[[2019,4,14]],"date-time":"2019-04-14T23:02:19Z","timestamp":1555282939000},"page":"433-451","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Analysis of Neural Network Training and Cost Functions Impact on the Accuracy of IDS and SIEM Systems"],"prefix":"10.1007","author":[{"given":"Said","family":"El Hajji","sequence":"first","affiliation":[]},{"given":"Nabil","family":"Moukafih","sequence":"additional","affiliation":[]},{"given":"Ghizlane","family":"Orhanou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,28]]},"reference":[{"key":"25_CR1","unstructured":"Verizonent: 2018 Data Breach Investigations Report (p. 8) (2018). https:\/\/www.verizonenterprise.com"},{"key":"25_CR2","unstructured":"Mathews, L.: ThyssenKrupp Attackers Stole Trade Secrets In Massive Hack (2016). http:\/\/www.forbes.com\/sites\/leemathews\/2016\/12\/08\/thyssenkrupp-attackers-stole-trade-secrets-in-massive-hack\/LeeMathews,Lee. Accessed 12 Oct 2016"},{"key":"25_CR3","unstructured":"Schwartz, M.J.: Lockheed Martin Suffers Massive Cyberattack (2011). http:\/\/www.darkreading.com\/risk-management\/lockheed-martin-suffers-massive-cyberattack\/d\/d-id\/1098013. Accessed 2 Mar 2017"},{"key":"25_CR4","unstructured":"Markoff, J.: SecurID Company Suffers a Breach of Data Security (2011). http:\/\/www.nytimes.com\/2011\/03\/18\/technology\/18secure.html. Accessed 2 Mar 2017"},{"issue":"4","key":"25_CR5","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1093\/comjnl\/bxt044","volume":"57","author":"P Gogoi","year":"2013","unstructured":"Gogoi, P., Bhattacharyya, D.K., Borah, B., Kalita, J.K.: MLH-IDS: a multi-level hybrid intrusion detection method. Comput. J. 57(4), 602\u2013623 (2013). https:\/\/doi.org\/10.1093\/comjnl\/bxt044","journal-title":"Comput. J."},{"key":"25_CR6","doi-asserted-by":"publisher","unstructured":"Orhanou, G., Lakbabi, A., Moukafih, N., El Hajji, S. (n.d.): Network access control and collaborative security against APT and AET. In: Security and Privacy in Smart Sensor Networks, pp. 201\u2013230. IGI Global. https:\/\/doi.org\/10.4018\/978-1-5225-5736-4.ch010","DOI":"10.4018\/978-1-5225-5736-4.ch010"},{"issue":"1","key":"25_CR7","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/5.554205","volume":"85","author":"DL Hall","year":"1997","unstructured":"Hall, D.L., Llinas, J.: An introduction to multisensor data fusion. Proc. IEEE 85(1), 6\u201323 (1997). https:\/\/doi.org\/10.1109\/5.554205","journal-title":"Proc. IEEE"},{"key":"25_CR8","volume-title":"Introduction to Data Mining","author":"PN Tan","year":"2005","unstructured":"Tan, P.N., Steinbach, M., Kumar, V.: Introduction to Data Mining. Pearson Addison Wesley, Boston (2005)"},{"issue":"6","key":"25_CR9","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/j.patrec.2004.09.045","volume":"26","author":"C Zhang","year":"2005","unstructured":"Zhang, C., Jiang, J., Kamel, M.: Intrusion detection using hierarchical neural networks. Pattern Recognit. Lett. 26(6), 779\u2013791 (2005). https:\/\/doi.org\/10.1016\/j.patrec.2004.09.045","journal-title":"Pattern Recognit. Lett."},{"key":"25_CR10","unstructured":"Yamaguchi, F., Lindner, F., Rieck, K.: Vulnerability extrapolation: assisted discovery of vulnerabilities using machine learning. In: Proceedings of the 5th USENIX Conference on Offensive Technologies (2011)"},{"issue":"5","key":"25_CR11","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1145\/1095430.1081754","volume":"30","author":"B Livshits","year":"2005","unstructured":"Livshits, B., Zimmermann, T.: DynaMine. ACM SIGSOFT Softw. Eng. Notes 30(5), 296 (2005). https:\/\/doi.org\/10.1145\/1095430.1081754","journal-title":"ACM SIGSOFT Softw. Eng. Notes"},{"issue":"4","key":"25_CR12","doi-asserted-by":"publisher","first-page":"639","DOI":"10.3233\/JCS-2010-0410","volume":"19","author":"K Rieck","year":"2011","unstructured":"Rieck, K., Trinius, P., Willems, C., Holz, T.: Automatic analysis of malware behavior using machine learning. J. Comput. Secur. 19(4), 639\u2013668 (2011)","journal-title":"J. Comput. Secur."},{"key":"25_CR13","first-page":"2721","volume":"7","author":"JZ Kotler","year":"2006","unstructured":"Kotler, J.Z., Maloof, M.A.: Learning to detect and classify malicious executables in the wild. J. Mach. Learn. Res. 7, 2721\u20132744 (2006)","journal-title":"J. Mach. Learn. Res."},{"key":"25_CR14","unstructured":"Anderson, J.P.: Computer security threat monitoring and surveillance, vol. 17. Technical report, James P. Anderson Company, Fort Washington, Pennsylvania (1980)"},{"key":"25_CR15","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.cose.2018.01.023","volume":"75","author":"Z Chiba","year":"2018","unstructured":"Chiba, Z., Abghour, N., Moussaid, K., El Omri, A., Rida, M.: A novel architecture combined with optimal parameters for back propagation neural networks applied to anomaly network intrusion detection. Comput. Secur. 75, 36\u201358 (2018). https:\/\/doi.org\/10.1016\/j.cose.2018.01.023","journal-title":"Comput. Secur."},{"key":"25_CR16","doi-asserted-by":"publisher","unstructured":"Sen, R., Chattopadhyay, M., Sen, N.: An efficient approach to develop an intrusion detection system based on multi layer backpropagation neural network algorithm. In: Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research - SIGMIS-CPR 2015. ACM Press (2015). https:\/\/doi.org\/10.1145\/2751957.2751979","DOI":"10.1145\/2751957.2751979"},{"issue":"8","key":"25_CR17","first-page":"3237","volume":"8","author":"F Kuang","year":"2012","unstructured":"Kuang, F., Xu, W., Zhang, S., Wang, Y., Liu, K.: A novel approach of KPCA and SVM for intrusion detection. J. Comput. Inf. Syst. 8(8), 3237\u20133244 (2012)","journal-title":"J. Comput. Inf. Syst."},{"key":"25_CR18","doi-asserted-by":"publisher","unstructured":"Devaraju, S., Ramakrishnan, S.: Performance analysis of intrusion detection system using various neural network classifiers. In: 2011 International Conference on Recent Trends in Information Technology (ICRTIT). IEEE (2011). https:\/\/doi.org\/10.1109\/icrtit.2011.5972289","DOI":"10.1109\/icrtit.2011.5972289"},{"key":"25_CR19","doi-asserted-by":"publisher","unstructured":"Ussath, M., Jaeger, D., Cheng, F., Meinel, C.: Identifying suspicious user behavior with neural networks. In: 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud). IEEE (2017). https:\/\/doi.org\/10.1109\/cscloud.2017.10","DOI":"10.1109\/cscloud.2017.10"},{"key":"25_CR20","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.inffus.2013.04.009","volume":"21","author":"G Suarez-Tangil","year":"2015","unstructured":"Suarez-Tangil, G., Palomar, E., Ribagorda, A., Sanz, I.: Providing SIEM systems with self-adaptation. Inf. Fusion 21, 145\u2013158 (2015). https:\/\/doi.org\/10.1016\/j.inffus.2013.04.009","journal-title":"Inf. Fusion"},{"key":"25_CR21","unstructured":"Rayan, J., Meng-Jang, L., Risto, M.: Intrusion Detection with Neural Networks. AAAI Technical Report WS-97-07 (1997)"},{"issue":"1","key":"25_CR22","doi-asserted-by":"publisher","first-page":"31","DOI":"10.9790\/0661-16123135","volume":"16","author":"B Sharma","year":"2014","unstructured":"Sharma, B., Venugopalan, K.: Comparison of neural network training functions for hematoma classification in brain CT images. IOSR J. Comput. Eng. (IOSR-JCE) 16(1), 31\u201335 (2014)","journal-title":"IOSR J. Comput. Eng. (IOSR-JCE)"},{"issue":"4","key":"25_CR23","first-page":"185","volume":"7","author":"K Hesam","year":"2018","unstructured":"Hesam, K., Sharareh, R.N., Reza, S.: Comparison of neural network training algorithms for classification of heart diseases. IAES Int. J. Artif. Intell. (IJ-AI) 7(4), 185\u2013189 (2018)","journal-title":"IAES Int. J. Artif. Intell. (IJ-AI)"},{"key":"25_CR24","doi-asserted-by":"publisher","unstructured":"Kumari, V.V., Varma, P.R.K.: A semi-supervised intrusion detection system using active learning SVM and fuzzy c-means clustering. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). IEEE (2017). https:\/\/doi.org\/10.1109\/i-smac.2017.8058397","DOI":"10.1109\/i-smac.2017.8058397"},{"key":"25_CR25","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-981-287-936-3_25","volume-title":"Soft Computing in Data Science","author":"WL Al-Yaseen","year":"2015","unstructured":"Al-Yaseen, W.L., Othman, Z.A., Nazri, M.Z.A.: Intrusion detection system based on modified K-means and multi-level support vector machines. In: Berry, M.W., Mohamed, A.H., Wah, Y.B. (eds.) SCDS 2015. CCIS, vol. 545, pp. 265\u2013274. Springer, Singapore (2015). https:\/\/doi.org\/10.1007\/978-981-287-936-3_25"},{"key":"25_CR26","unstructured":"Baceand, R., Mell, P.: NIST Special Publication on Intrusion Detection Systems (2011). www.dtic.mil\/dtic\/tr\/fulltext\/u2\/a393326.pdf. Accessed Mar 10 2018"},{"key":"25_CR27","doi-asserted-by":"publisher","unstructured":"Intrusion Detection and Correlation: Advances in Information Security. Kluwer Academic Publishers (2005). https:\/\/doi.org\/10.1007\/b101493","DOI":"10.1007\/b101493"},{"key":"25_CR28","doi-asserted-by":"publisher","unstructured":"Moukafih, N., Sabir, S., Lakbabi, A., Orhanou, G.: SIEM selection criteria for an efficient contextual security. In: 2017 International Symposium on Networks, Computers and Communications (ISNCC). IEEE (2017). https:\/\/doi.org\/10.1109\/isncc.2017.8072035","DOI":"10.1109\/isncc.2017.8072035"},{"key":"25_CR29","volume-title":"Security Information and Event Management (SIEM) Implementation","author":"D Miller","year":"2011","unstructured":"Miller, D.: Security Information and Event Management (SIEM) Implementation. McGraw-Hill, New York (2011)"},{"key":"25_CR30","volume-title":"Artificial Intelligence: A Modern Approach","author":"S Russell","year":"2010","unstructured":"Russell, S., Norvig, P., Davis, E.: Artificial Intelligence: A Modern Approach. Prentice Hall, Upper Saddle River (2010)"},{"issue":"2","key":"25_CR31","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.asoc.2004.12.002","volume":"6","author":"S Ali","year":"2006","unstructured":"Ali, S., Smith, K.A.: On learning algorithm selection for classification. Appl. Soft Comput. 6(2), 119\u2013138 (2006). https:\/\/doi.org\/10.1016\/j.asoc.2004.12.002","journal-title":"Appl. Soft Comput."},{"key":"25_CR32","unstructured":"Sutton, R.S.: Two problems with backpropagation and other steepest-descent learning procedures for networks. In: Proceedings of the Eighth Annual Conference of the Cognitive Science Society. Erlbaum, Hillsdale, NJ (1986)"},{"key":"25_CR33","doi-asserted-by":"publisher","unstructured":"Riedmiller, M., Braun, H.: A direct adaptive method for faster backpropagation learning: the RPROP algorithm. In: IEEE International Conference on Neural Networks. IEEE (1993) https:\/\/doi.org\/10.1109\/icnn.1993.298623","DOI":"10.1109\/icnn.1993.298623"},{"key":"25_CR34","unstructured":"Shewchuk, J.R.: An introduction to the conjugate gradient method without the agonizing pain. School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 (1994)"},{"key":"25_CR35","doi-asserted-by":"publisher","unstructured":"M\u00f8ller, M.F.: A scaled conjugate gradient algorithm for fast supervised learning. Neural Netw. 6(4), 525\u2013533 (1993). https:\/\/doi.org\/10.1016\/s0893-6080(05)80056-5","DOI":"10.1016\/s0893-6080(05)80056-5"},{"issue":"2","key":"25_CR36","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1093\/comjnl\/7.2.1494","volume":"7","author":"R Fletcher","year":"1964","unstructured":"Fletcher, R.: Function minimization by conjugate gradients. Comput. J. 7(2), 149\u2013154 (1964). https:\/\/doi.org\/10.1093\/comjnl\/7.2.1494","journal-title":"Comput. J."},{"issue":"3","key":"25_CR37","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1016\/s0890-6955(00)00073-0","volume":"41","author":"DT Pham","year":"2001","unstructured":"Pham, D.T., Sagiroglu, S.: Training multilayered perceptrons for pattern recognition: a comparative study of four training algorithms. Int. J. Mach. Tools Manuf. 41(3), 419\u2013430 (2001). https:\/\/doi.org\/10.1016\/s0890-6955(00)00073-0","journal-title":"Int. J. Mach. Tools Manuf."},{"key":"25_CR38","unstructured":"KDD CUP 99 dataset. http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html. Accessed 23 Oct 2018"},{"key":"25_CR39","unstructured":"NSL-KDD dataset available. https:\/\/github.com\/defcom17\/NSL_KDD. Accessed 23 Oct 2018"},{"key":"25_CR40","doi-asserted-by":"publisher","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications. IEEE (2009). https:\/\/doi.org\/10.1109\/cisda.2009.5356528","DOI":"10.1109\/cisda.2009.5356528"},{"key":"25_CR41","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1007\/978-981-10-7605-3_74","volume-title":"Advances in Computer Science and Ubiquitous Computing","author":"H Ji","year":"2018","unstructured":"Ji, H., Kim, D., Shin, D., Shin, D.: A study on comparison of KDD CUP 99 and NSL-KDD using artificial neural network. In: Park, J.J., Loia, V., Yi, G., Sung, Y. (eds.) CUTE\/CSA -2017. LNEE, vol. 474, pp. 452\u2013457. Springer, Singapore (2018). https:\/\/doi.org\/10.1007\/978-981-10-7605-3_74"},{"key":"25_CR42","doi-asserted-by":"publisher","unstructured":"Ingre, B., Yadav, A.: Performance analysis of NSL-KDD dataset using ANN. In: 2015 International Conference on Signal Processing and Communication Engineering Systems. IEEE (2015). https:\/\/doi.org\/10.1109\/spaces.2015.7058223","DOI":"10.1109\/spaces.2015.7058223"}],"container-title":["Lecture Notes in Computer Science","Codes, Cryptology and Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-16458-4_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T13:49:26Z","timestamp":1710251366000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-16458-4_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030164577","9783030164584"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-16458-4_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"28 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"C2SI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Codes, Cryptology, and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rabat","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 April 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 April 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"c2si2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.c2si-conference.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"90","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5 invited papers and 3 workshop papers are included.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}