{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:07:44Z","timestamp":1742990864306,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030727246"},{"type":"electronic","value":"9783030727253"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-72725-3_14","type":"book-chapter","created":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T18:02:46Z","timestamp":1617300166000},"page":"188-204","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Systematic Approach to Building Autoencoders for Intrusion Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6497-2659","authenticated-orcid":false,"given":"Youngrok","family":"Song","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2265-4518","authenticated-orcid":false,"given":"Sangwon","family":"Hyun","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6329-8439","authenticated-orcid":false,"given":"Yun-Gyung","family":"Cheong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,2]]},"reference":[{"key":"14_CR1","unstructured":"99 K.C.: KDD Cup 1999 Data (2007). http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html. Accessed Mar 2019"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Alom, M.Z., Bontupalli, V., Taha, T.: Intrusion detection using deep belief networks. In: 2015 National Aerospace and Electronics Conference (NAECON), pp. 339\u2013344 (2015)","DOI":"10.1109\/NAECON.2015.7443094"},{"issue":"10","key":"14_CR3","doi-asserted-by":"publisher","first-page":"2986","DOI":"10.1109\/TC.2016.2519914","volume":"65","author":"MA Ambusaidi","year":"2016","unstructured":"Ambusaidi, M.A., He, X., Nanda, P., Tan, Z.: Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans. Comput. 65(10), 2986\u20132998 (2016)","journal-title":"IEEE Trans. Comput."},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Aygun, R.C., Yavuz, A.G.: Network anomaly detection with stochastically improved autoencoder based models. In: 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 193\u2013198. IEEE (2017)","DOI":"10.1109\/CSCloud.2017.39"},{"issue":"2","key":"14_CR5","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2015","unstructured":"Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153\u20131176 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"14_CR6","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/j.cose.2014.06.006","volume":"45","author":"R Chitrakar","year":"2014","unstructured":"Chitrakar, R., Huang, C.: Selection of candidate support vectors in incremental SVM for network intrusion detection. Comput. Secur. 45, 231\u2013241 (2014)","journal-title":"Comput. Secur."},{"key":"14_CR7","unstructured":"Cyphort: Cyphort Data Sheet (2017). http:\/\/go.cyphort.com\/rs\/181-NTN-682\/images\/CYPHORT_DataSheet.pdf. Accessed Mar 2019"},{"issue":"1\u20132","key":"14_CR8","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P Garcia-Teodoro","year":"2009","unstructured":"Garcia-Teodoro, P., Diaz-Verdejo, J., Maci\u00e1-Fern\u00e1ndez, G., V\u00e1zquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1\u20132), 18\u201328 (2009)","journal-title":"Comput. Secur."},{"key":"14_CR9","unstructured":"Gharib, M., Mohammadi, B., Dastgerdi, S.H., Sabokrou, M.: AutoIDS: auto-encoder based method for intrusion detection system. arXiv abs\/1911.03306 (2019)"},{"key":"14_CR10","doi-asserted-by":"publisher","unstructured":"Javaid, A., Niyaz, Q., Sun, W., Alam, M.: A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (Formerly BIONETICS), BICT 2015, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), ICST, Brussels, Belgium, pp. 21\u201326 (2016). https:\/\/doi.org\/10.4108\/eai.3-12-2015.2262516","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Kaur, H., Singh, G., Minhas, J.: A review of machine learning based anomaly detection techniques. arXiv preprint arXiv:1307.7286 (2013)","DOI":"10.7753\/IJCATR0202.1020"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Kim, J., Kim, J., Thu, H.L.T., Kim, H.: Long short term memory recurrent neural network classifier for intrusion detection. In: 2016 International Conference on Platform Technology and Service (PlatCon), pp. 1\u20135. IEEE (2016)","DOI":"10.1109\/PlatCon.2016.7456805"},{"key":"14_CR13","unstructured":"Kuypers, M.A., Maillart, T., Pat\u00e9-Cornell, E.: An empirical analysis of cyber security incidents at a large organization. Department of Management Science and Engineering, Stanford University, School of Information, UC Berkeley (2016). http:\/\/fsi.stanford.edu\/sites\/default\/files\/kuypersweis_v7.pdf. Accessed 30 July 2020"},{"issue":"5","key":"14_CR14","first-page":"205","volume":"9","author":"Y Li","year":"2015","unstructured":"Li, Y., Ma, R., Jiao, R.: A hybrid malicious code detection method based on deep learning. Int. J. Softw. Eng. Appl. 9(5), 205\u2013216 (2015)","journal-title":"Int. J. Softw. Eng. Appl."},{"key":"14_CR15","doi-asserted-by":"publisher","first-page":"1967","DOI":"10.3390\/s17091967","volume":"17","author":"ML Mart\u00edn","year":"2017","unstructured":"Mart\u00edn, M.L., Carro, B., S\u00e1nchez-Esguevillas, A., Lloret, J.: Conditional variational autoencoder for prediction and feature recovery applied to intrusion detection in IoT. Sensors (Basel, Switzerland) 17, 1967 (2017)","journal-title":"Sensors (Basel, Switzerland)"},{"key":"14_CR16","unstructured":"Mirsky, Y., Doitshman, T., Elovici, Y., Shabtai, A.: Kitsune: an ensemble of autoencoders for online network intrusion detection. In: 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, 18\u201321 February 2018. The Internet Society (2018). http:\/\/wp.internetsociety.org\/ndss\/wp-content\/uploads\/sites\/25\/2018\/02\/ndss2018_03A-3_Mirsky_paper.pdf"},{"key":"14_CR17","unstructured":"Petersen, R.: Data mining for network intrusion detection: a comparison of data mining algorithms and an analysis of relevant features for detecting cyber-attacks (2015)"},{"key":"14_CR18","unstructured":"RSA: RSA Netwitness Logs and Packets (2017). https:\/\/www.rsa.com\/content\/dam\/en\/data-sheet\/rsa-netwitness-logs-and-packets.pdf. Accessed Mar 2019"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Sahu, S., Mehtre, B.M.: Network intrusion detection system using j48 decision tree. In: 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2023\u20132026. IEEE (2015)","DOI":"10.1109\/ICACCI.2015.7275914"},{"key":"14_CR20","series-title":"Advances in Intelligent and Soft Computing","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-642-20505-7_26","volume-title":"Soft computing in industrial applications","author":"MA Salama","year":"2011","unstructured":"Salama, M.A., Eid, H.F., Ramadan, R.A., Darwish, A., Hassanien, A.E.: Hybrid intelligent intrusion detection scheme. In: Gaspar-Cunha, A., Takahashi, R., Schaefer, G., Costa, L. (eds.) Soft computing in industrial applications. AINSC, vol. 96, pp. 293\u2013303. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20505-7_26"},{"key":"14_CR21","unstructured":"Sapre, S., Ahmadi, P., Islam, K.R.: A robust comparison of the KDDCup99 and NSL-KDD IoT network intrusion detection datasets through various machine learning algorithms. arXiv abs\/1912.13204 (2019)"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A., Ghorbani, A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSP (2018)","DOI":"10.5220\/0006639801080116"},{"key":"14_CR23","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MC.2018.2888764","volume":"52","author":"K Siddique","year":"2019","unstructured":"Siddique, K., Akhtar, Z., Khan, F.A., Kim, Y.: KDD Cup 99 data sets: a perspective on the role of data sets in network intrusion detection research. Computer 52, 41\u201351 (2019)","journal-title":"Computer"},{"issue":"2","key":"14_CR24","doi-asserted-by":"publisher","first-page":"20","DOI":"10.3390\/info7020020","volume":"7","author":"X Tao","year":"2016","unstructured":"Tao, X., Kong, D., Wei, Y., Wang, Y.: A big network traffic data fusion approach based on fisher and deep auto-encoder. Information 7(2), 20 (2016)","journal-title":"Information"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.: A detailed analysis of the KDD CUP 99 data set. 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1\u20136 (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"14_CR26","doi-asserted-by":"publisher","first-page":"108346","DOI":"10.1109\/ACCESS.2020.3001350","volume":"8","author":"S Zavrak","year":"2020","unstructured":"Zavrak, S., \u0130skefiyeli, M.: Anomaly-based intrusion detection from network flow features using variational autoencoder. IEEE Access 8, 108346\u2013108358 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3001350","journal-title":"IEEE Access"},{"key":"14_CR27","doi-asserted-by":"crossref","unstructured":"Zhang, B., Yu, Y., Li, J.: Network intrusion detection based on stacked sparse autoencoder and binary tree ensemble method. In: 2018 IEEE International Conference on Communications Workshops (ICC Workshops). IEEE (2018)","DOI":"10.1109\/ICCW.2018.8403759"}],"container-title":["Communications in Computer and Information Science","Silicon Valley Cybersecurity Conference"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-72725-3_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T21:04:52Z","timestamp":1619298292000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-72725-3_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030727246","9783030727253"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-72725-3_14","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"2 April 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SVCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Silicon Valley Cybersecurity Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"San Jose, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"svcc2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/svcc2020.svcsi.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic the conference was held in a fully virtual format.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}