{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:56:07Z","timestamp":1743080167813,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030442880"},{"type":"electronic","value":"9783030442897"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-44289-7_22","type":"book-chapter","created":{"date-parts":[[2020,3,23]],"date-time":"2020-03-23T11:03:35Z","timestamp":1584961415000},"page":"225-236","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Hybrid Approach for Improving Intrusion Detection Based on Deep Learning and Machine Learning Techniques"],"prefix":"10.1007","author":[{"given":"Merna","family":"Gamal","sequence":"first","affiliation":[]},{"given":"Hala","family":"Abbas","sequence":"additional","affiliation":[]},{"given":"Rowayda","family":"Sadek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,24]]},"reference":[{"issue":"02","key":"22_CR1","first-page":"9","volume":"05","author":"HS Milan","year":"2018","unstructured":"Milan, H.S., Singh, K.: Reducing false alarms in intrusion detection systems \u2013 a survey. Int. Res. J. Eng. Technol. (IRJET) 05(02), 9\u201312 (2018)","journal-title":"Int. Res. J. Eng. Technol. (IRJET)"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Abdullah, B., Abd-Alghafar, I., Salama, G.I., Abd-Alhafez, A.: Performance evaluation of a genetic algorithm based approach to network intrusion detection system. In: 13th International Conference on Aerospace Sciences and Aviation Technology (ASAT), 26\u201328 May 2009 (2009)","DOI":"10.21608\/asat.2009.23490"},{"issue":"1","key":"22_CR3","first-page":"1","volume":"2","author":"AS Ashoor","year":"2011","unstructured":"Ashoor, A.S., Gore, S.: Importance of intrusion detection system (IDS). Int. J. Sci. Eng. Res. 2(1), 1\u20134 (2011)","journal-title":"Int. J. Sci. Eng. Res."},{"issue":"3","key":"22_CR4","first-page":"1","volume":"73","author":"CN Modi","year":"2016","unstructured":"Modi, C.N., Acha, K.: Virtualization layer security challenges and intrusion detection\/prevention systems in cloud computing: a comprehensive review. J. Supercomput. 73(3), 1\u201343 (2016)","journal-title":"J. Supercomput."},{"issue":"5","key":"22_CR5","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1109\/MS.2016.114","volume":"33","author":"P Louridas","year":"2016","unstructured":"Louridas, P., Ebert, C.: Machine learning. IEEE Softw. 33(5), 110\u2013115 (2016)","journal-title":"IEEE Softw."},{"issue":"6245","key":"22_CR6","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1126\/science.aaa8415","volume":"349","author":"MI Jordan","year":"2015","unstructured":"Jordan, M.I., Mitchell, T.M.: Machine learning: trends, perspectives, and prospects. Science 349(6245), 255\u2013260 (2015)","journal-title":"Science"},{"issue":"7553","key":"22_CR7","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y Lecun","year":"2015","unstructured":"Lecun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521(7553), 436\u2013444 (2015)","journal-title":"Nature"},{"key":"22_CR8","unstructured":"Xin, Y., Kong, L., Liu, Z.: Machine learning and deep learning methods for cyber security. IEEE Access 1\u20139 (2017)"},{"issue":"1","key":"22_CR9","first-page":"412","volume":"201","author":"IM Coelho","year":"2017","unstructured":"Coelho, I.M., Coelho, V.N., Luz, E.J.D.: A GPU deep learning metaheuristic based model for time series forecasting. Elsevier 201(1), 412\u2013418 (2017)","journal-title":"Elsevier"},{"issue":"3","key":"22_CR10","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1561\/2000000039","volume":"7","author":"L Deng","year":"2014","unstructured":"Deng, L., Yu, D.: Deep learning: methods and applications. Found Trends\u00ae Signal Process 7(3), 197\u2013387 (2014)","journal-title":"Found Trends\u00ae Signal Process"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Vinayakumar, R., Soman, K.P.: Applying convolutional neural network for network intrusion detection. In: International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1222\u20131228 (2017)","DOI":"10.1109\/ICACCI.2017.8126009"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Kapoor, A.J., Fan, H.: Intelligent detection using convolutional neural network (ID-CNN). In: Earth and Environmental Science, pp. 1\u201310 (2019)","DOI":"10.1088\/1755-1315\/234\/1\/012061"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Liu, H., Lang, B.: Machine learning and deep learning methods for intrusion detection systems: a survey. In: Applied Sciences, PP. 1\u201328 (2019)","DOI":"10.3390\/app9204396"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Patgiri, R., Akutota, T.: An investigation on intrusion detection system using machine learning. In: IEEE Symposium Series on Computational Intelligence SSCI, pp. 1684\u20131691 (2018)","DOI":"10.1109\/SSCI.2018.8628676"},{"key":"22_CR15","unstructured":"Shon, T., Kim, Y., Lee, C., Moon, J.: A machine learning framework for network anomaly detection using SVM and GA. In: Proceedings of the IEEE, pp. 176\u2013183 (2005)"},{"key":"22_CR16","unstructured":"Liao, Y., Vemuri, R.V.: Use of k-nearest neighbor classifier for intrusion detection. In: ICACCI, pp. 1\u201310 (2016)"},{"issue":"3","key":"22_CR17","first-page":"2581","volume":"3","author":"HM Shirazi","year":"2009","unstructured":"Shirazi, H.M.: Anomaly intrusion detection using information theory, k-NN and KMC algorithms. Aust. J. Basic Appl. Sci. 3(3), 2581\u20132597 (2009)","journal-title":"Aust. J. Basic Appl. Sci."},{"issue":"10","key":"22_CR18","first-page":"13","volume":"171","author":"S Vishwakarma","year":"2017","unstructured":"Vishwakarma, S., Sharma, V., Tiwari, A.: An intrusion detection system using KNN-ACO algorithm. Int. J. Comput. Appl. 171(10), 13\u201323 (2017)","journal-title":"Int. J. Comput. Appl."},{"key":"22_CR19","first-page":"1","volume":"8","author":"EG Dada","year":"2017","unstructured":"Dada, E.G.: A hybridized SVM-KNN-pdAPSO approach to intrusion detection system. Fac. Semin. Ser. 8, 1\u20138 (2017)","journal-title":"Fac. Semin. Ser."},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"Tang, T.A., Mhamdi, L., McLernon, D., Zaidi, S.A.R., Ghogho, M.: Deep learning approach for network intrusion detection in software-defined networking. In: International Conference on Wireless Networks and Mobile Communications (WINCOM), pp. 1\u20136, October 2016","DOI":"10.1109\/WINCOM.2016.7777224"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Kokila, R.T., Selvi, S.T., Govindarajan, K.: DDoS detection and analysis in SDN-based environment using support vector machine classifier. In: Sixth International Conference on Advanced Computing, pp. 205\u2013210 (2015)","DOI":"10.1109\/ICoAC.2014.7229711"},{"key":"22_CR22","doi-asserted-by":"crossref","unstructured":"Chowdhury, M.M.U., Hammond, F., Konowicz, G.: A few-shot deep learning approach for improved intrusion detection. In: IEEE, pp. 456\u2013462 (2017)","DOI":"10.1109\/UEMCON.2017.8249084"},{"key":"22_CR23","doi-asserted-by":"crossref","unstructured":"Liu, Y., Liu, S.: Intrusion detection algorithm based on convolutional neural network. In: International Conference on Engineering Technology and Application, pp. 9\u201313 (2017)","DOI":"10.12783\/dtetr\/iceta2017\/19916"},{"key":"22_CR24","doi-asserted-by":"crossref","unstructured":"Meena, G., Choudhary, R.R.: A review paper on IDS classification using KDD 99 and NSL KDD dataset in WEKA. In: International Conference on Computer, Communications, and Electronics, pp. 553\u2013558 (2017)","DOI":"10.1109\/COMPTELIX.2017.8004032"},{"key":"22_CR25","unstructured":"http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the International Conference on Artificial Intelligence and Computer Vision (AICV2020)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-44289-7_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,14]],"date-time":"2020-04-14T13:05:25Z","timestamp":1586869525000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-44289-7_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030442880","9783030442897"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-44289-7_22","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"24 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}