{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T17:45:04Z","timestamp":1777657504085,"version":"3.51.4"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030784584","type":"print"},{"value":"9783030784591","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-78459-1_7","type":"book-chapter","created":{"date-parts":[[2021,6,19]],"date-time":"2021-06-19T08:03:05Z","timestamp":1624089785000},"page":"91-104","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["The Role of CNN for Intrusion Detection Systems: An Improved CNN Learning Approach for SDNs"],"prefix":"10.1007","author":[{"given":"Mahmoud Said","family":"Elsayed","sequence":"first","affiliation":[]},{"given":"Hamed Z.","family":"Jahromi","sequence":"additional","affiliation":[]},{"given":"Muhammad Mohsin","family":"Nazir","sequence":"additional","affiliation":[]},{"given":"Anca Delia","family":"Jurcut","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,20]]},"reference":[{"issue":"7","key":"7_CR1","doi-asserted-by":"publisher","first-page":"2735","DOI":"10.1007\/s10489-018-01408-x","volume":"49","author":"\u00dc \u00c7avu\u015fo\u011flu","year":"2019","unstructured":"\u00c7avu\u015fo\u011flu, \u00dc.: A new hybrid approach for intrusion detection using machine learning methods. Appl. Intell. 49(7), 2735\u20132761 (2019). https:\/\/doi.org\/10.1007\/s10489-018-01408-x","journal-title":"Appl. Intell."},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Halimaa, A., Sundarakantham, K.: Machine learning based intrusion detection system. In: 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), pp. 916\u2013920. IEEE (2019)","DOI":"10.1109\/ICOEI.2019.8862784"},{"issue":"3","key":"7_CR3","doi-asserted-by":"publisher","first-page":"322","DOI":"10.3390\/electronics8030322","volume":"8","author":"R Abdulhammed","year":"2019","unstructured":"Abdulhammed, R., Musafer, H., Alessa, A., Faezipour, M., Abuzneid, A.: Features dimensionality reduction approaches for machine learning based network intrusion detection. Electronics 8(3), 322 (2019)","journal-title":"Electronics"},{"key":"7_CR4","unstructured":"Alkasassbeh, M., Almseidin, M.: Machine learning methods for network intrusion detection. arXiv preprint arXiv:1809.02610 (2018)"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Taher, K.A., Jisan, B.M.Y., Rahman, M.M.: Network intrusion detection using supervised machine learning technique with feature selection. In: 2019 International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), pp. 643\u2013646. IEEE (2019)","DOI":"10.1109\/ICREST.2019.8644161"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Elsayed, M.S., Le-Khac, N.-A., Jurcut, A.D.: InSDN: a novel SDN intrusion dataset. IEEE Access 8, 165 263\u2013165 284 (2020)","DOI":"10.1109\/ACCESS.2020.3022633"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Althubiti, S.A., Jones, E.M., Roy, K.: LSTM for anomaly-based network intrusion detection. In: 2018 28th International Telecommunication Networks and Applications Conference (ITNAC), pp. 1\u20133. IEEE (2018)","DOI":"10.1109\/ATNAC.2018.8615300"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Elsayed, M.S., Le-Khac, N.-A., Dev, S., Jurcut, A.D.: DDoSNet: a deep-learning model for detecting network attacks. In: 2020 IEEE 21st International Symposium on \u201cA World of Wireless, Mobile and Multimedia Networks\u201d (WoWMoM), pp. 391\u2013396. IEEE (2020)","DOI":"10.1109\/WoWMoM49955.2020.00072"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Elsayed, M.S., Le-Khac, N.-A., Jurcut, A.D.: Detecting abnormal traffic in large-scale networks. In: 2020 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1\u20137. IEEE (2020)","DOI":"10.1109\/ISNCC49221.2020.9297358"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Said Elsayed, M., Le-Khac, N.-A., Dev, S., Jurcut, A.D.: Network anomaly detection using LSTM based autoencoder. In: Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks, pp. 37\u201345 (2020)","DOI":"10.1145\/3416013.3426457"},{"issue":"1","key":"7_CR11","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/TETCI.2017.2772792","volume":"2","author":"N Shone","year":"2018","unstructured":"Shone, N., Ngoc, T.N., Phai, V.D., Shi, Q.: A deep learning approach to network intrusion detection. IEEE Trans. Emerg. Top. Comput. Intell. 2(1), 41\u201350 (2018)","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Al-Qatf, M., Lasheng, Y., Al-Habib, M., Al-Sabahi, K.: Deep learning approach combining sparse autoencoder with SVM for network intrusion detection. IEEE Access 6, 52 843\u201352 856 (2018)","DOI":"10.1109\/ACCESS.2018.2869577"},{"issue":"1","key":"7_CR13","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/MSEC.2020.3037448","volume":"19","author":"MS Elsayed","year":"2021","unstructured":"Elsayed, M.S., Le-Khac, N.-A., Jurcut, A.D.: Dealing with covid-19 network traffic spikes [cybercrime and forensics]. IEEE Secur. Priv. 19(1), 90\u201394 (2021)","journal-title":"IEEE Secur. Priv."},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Jahromi, H.Z., Hines, A., Delaney, D.T.: Towards application-aware networking: ML-based end-to-end application KPI\/QoE metrics characterization in SDN. In: 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN), pp. 126\u2013131. IEEE (2018)","DOI":"10.1109\/ICUFN.2018.8436625"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Jahromi, H.Z., Delaney, D.T.: An application awareness framework based on SDN and machine learning: defining the roadmap and challenges. In: 2018 10th International Conference on Communication Software and Networks (ICCSN), pp. 411\u2013416. IEEE (2018)","DOI":"10.1109\/ICCSN.2018.8488328"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Scott-Hayward, S., O\u2019Callaghan, G., Sezer, S.: SDN security: a survey. In: 2013 IEEE SDN for Future Networks and Services (SDN4FNS), pp. 1\u20137. IEEE (2013)","DOI":"10.1109\/SDN4FNS.2013.6702553"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Vedaldi, A., Lenc, K.: MatConvNet: convolutional neural networks for MATLAB. In: Proceedings of the 23rd ACM International Conference on Multimedia, pp. 689\u2013692 (2015)","DOI":"10.1145\/2733373.2807412"},{"key":"7_CR18","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.jnca.2018.05.004","volume":"116","author":"D Zhou","year":"2018","unstructured":"Zhou, D., Yan, Z., Fu, Y., Yao, Z.: A survey on network data collection. J. Netw. Comput. Appl. 116, 9\u201323 (2018)","journal-title":"J. Netw. Comput. Appl."},{"issue":"4","key":"7_CR19","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1007\/s13244-018-0639-9","volume":"9","author":"R Yamashita","year":"2018","unstructured":"Yamashita, R., Nishio, M., Do, R.K.G., Togashi, K.: Convolutional neural networks: an overview and application in radiology. Insights Imaging 9(4), 611\u2013629 (2018). https:\/\/doi.org\/10.1007\/s13244-018-0639-9","journal-title":"Insights Imaging"},{"issue":"7","key":"7_CR20","doi-asserted-by":"publisher","first-page":"1527","DOI":"10.1162\/neco.2006.18.7.1527","volume":"18","author":"GE Hinton","year":"2006","unstructured":"Hinton, G.E., Osindero, S., Teh, Y.-W.: A fast learning algorithm for deep belief nets. Neural Comput. 18(7), 1527\u20131554 (2006)","journal-title":"Neural Comput."},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Khan, R.U., Zhang, X., Alazab, M., Kumar, R.: An improved convolutional neural network model for intrusion detection in networks. In: 2019 Cybersecurity and Cyberforensics Conference (CCC), pp. 74\u201377. IEEE (2019)","DOI":"10.1109\/CCC.2019.000-6"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Yong, L., Bo, Z.: An intrusion detection model based on multi-scale CNN. In: 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), pp. 214\u2013218. IEEE (2019)","DOI":"10.1109\/ITNEC.2019.8729261"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Hu, Z., Wang, L., Qi, L., Li, Y., Yang, W.: A novel wireless network intrusion detection method based on adaptive synthetic sampling and an improved convolutional neural network. IEEE Access 8, 195 741\u2013195 751 (2020)","DOI":"10.1109\/ACCESS.2020.3034015"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Xiao, Y., Xing, C., Zhang, T., Zhao, Z.: An intrusion detection model based on feature reduction and convolutional neural networks. IEEE Access 7, 42 210\u201342 219 (2019)","DOI":"10.1109\/ACCESS.2019.2904620"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Jiang, K., Wang, W., Wang, A., Wu, H.: Network intrusion detection combined hybrid sampling with deep hierarchical network. IEEE Access 8, 32 464\u201332 476 (2020)","DOI":"10.1109\/ACCESS.2020.2973730"},{"key":"7_CR26","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1016\/j.patcog.2017.10.013","volume":"77","author":"J Gu","year":"2018","unstructured":"Gu, J., et al.: Recent advances in convolutional neural networks. Pattern Recogn. 77, 354\u2013377 (2018)","journal-title":"Pattern Recogn."},{"issue":"8","key":"7_CR27","doi-asserted-by":"publisher","first-page":"5455","DOI":"10.1007\/s10462-020-09825-6","volume":"53","author":"A Khan","year":"2020","unstructured":"Khan, A., Sohail, A., Zahoora, U., Qureshi, A.S.: A survey of the recent architectures of deep convolutional neural networks. Artif. Intell. Rev. 53(8), 5455\u20135516 (2020). https:\/\/doi.org\/10.1007\/s10462-020-09825-6","journal-title":"Artif. Intell. Rev."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Future Access Enablers for Ubiquitous and Intelligent Infrastructures"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-78459-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,15]],"date-time":"2021-07-15T17:32:02Z","timestamp":1626370322000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-78459-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030784584","9783030784591"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-78459-1_7","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"20 June 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FABULOUS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Future Access Enablers of Ubiquitous and Intelligent Infrastructures","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 May 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 May 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fabulous2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/fabulous-conf.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EAI Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}