{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T10:23:32Z","timestamp":1743157412497,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031083327"},{"type":"electronic","value":"9783031083334"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-08333-4_10","type":"book-chapter","created":{"date-parts":[[2022,6,16]],"date-time":"2022-06-16T15:52:13Z","timestamp":1655394733000},"page":"116-131","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["HEDL-IDS: A Hybrid Ensemble Deep Learning Approach for Cyber Intrusion Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3779-6754","authenticated-orcid":false,"given":"Anastasios Panagiotis","family":"Psathas","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6404-1528","authenticated-orcid":false,"given":"Lazaros","family":"Iliadis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0545-7638","authenticated-orcid":false,"given":"Antonios","family":"Papaleonidas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3280-6554","authenticated-orcid":false,"given":"Dimitris","family":"Bountas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,10]]},"reference":[{"key":"10_CR1","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-981-15-6648-6_10","volume-title":"Computing Science, Communication and Security","author":"H Alqahtani","year":"2020","unstructured":"Alqahtani, H., Sarker, I.H., Kalim, A., Hossain, S.M.M., Ikhlaq, S., Hossain, S.: Cyber intrusion detection using machine learning classification techniques. In: Chaubey, N., Parikh, S., Amin, K. (eds.) COMS2 2020. CCIS, vol. 1235, pp. 121\u2013131. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-6648-6_10"},{"issue":"1","key":"10_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-020-00318-5","volume":"7","author":"IH Sarker","year":"2020","unstructured":"Sarker, I.H., Kayes, A.S.M., Badsha, S., Alqahtani, H., Watters, P., Ng, A.: Cybersecurity data science: an overview from machine learning perspective. J. Big Data 7(1), 1\u201329 (2020). https:\/\/doi.org\/10.1186\/s40537-020-00318-5","journal-title":"J. Big Data"},{"key":"10_CR3","first-page":"80","volume":"44","author":"S Mohammadi","year":"2019","unstructured":"Mohammadi, S., Mirvaziri, H., Ghazizadeh-Ahsaee, M., Karimipour, H.: Cyber intrusion detection by combined feature selection algorithm. J. Inf. Secur. Appl. 44, 80\u201388 (2019)","journal-title":"J. Inf. Secur. Appl."},{"issue":"5","key":"10_CR4","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1109\/TSMCC.2010.2048428","volume":"40","author":"M Tavallaee","year":"2010","unstructured":"Tavallaee, M., Stakhanova, N., Ghorbani, A.A.: Toward credible evaluation of anomaly-based intrusion-detection methods. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 40(5), 516\u2013524 (2010)","journal-title":"IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.)"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Ahmim, A., Maglaras, L., Ferrag, M.A., Derdour, M., Janicke, H.: A novel hierarchical intrusion detection system based on decision tree and rules-based models. In: 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), pp. 228\u2013233. IEEE, May 2019","DOI":"10.1109\/DCOSS.2019.00059"},{"issue":"2","key":"10_CR6","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2015","unstructured":"Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153\u20131176 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10_CR7","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1016\/j.future.2017.01.029","volume":"79","author":"E Kabir","year":"2018","unstructured":"Kabir, E., Hu, J., Wang, H., Zhuo, G.: A novel statistical technique for intrusion detection systems. Futur. Gener. Comput. Syst. 79, 303\u2013318 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"1","key":"10_CR8","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/TDSC.2007.9","volume":"4","author":"K Hwang","year":"2007","unstructured":"Hwang, K., Cai, M., Chen, Y., Qin, M.: Hybrid intrusion detection with weighted signature generation over anomalous internet episodes. IEEE Trans. Dependable Secure Comput. 4(1), 41\u201355 (2007)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10_CR9","unstructured":"The UNSW-NB15 Dataset. https:\/\/research.unsw.edu.au\/projects\/unsw-nb15-dataset"},{"issue":"1","key":"10_CR10","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1016\/j.eswa.2011.07.032","volume":"39","author":"Y Li","year":"2012","unstructured":"Li, Y., Xia, J., Zhang, S., Yan, J., Ai, X., Dai, K.: An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Syst. Appl. 39(1), 424\u2013430 (2012)","journal-title":"Expert Syst. Appl."},{"issue":"18","key":"10_CR11","doi-asserted-by":"publisher","first-page":"13492","DOI":"10.1016\/j.eswa.2012.07.009","volume":"39","author":"L Koc","year":"2012","unstructured":"Koc, L., Mazzuchi, T.A., Sarkani, S.: A network intrusion detection system based on a Hidden Na\u00efve Bayes multiclass classifier. Expert Syst. Appl. 39(18), 13492\u201313500 (2012)","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"10_CR12","first-page":"5","volume":"173","author":"H Shapoorifard","year":"2017","unstructured":"Shapoorifard, H., Shamsinejad, P.: Intrusion detection using a novel hybrid method incorporating an improved KNN. Int. J. Comput. Appl 173(1), 5\u20139 (2017)","journal-title":"Int. J. Comput. Appl"},{"issue":"1","key":"10_CR13","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1007\/s10586-017-0971-8","volume":"21","author":"AJ Malik","year":"2018","unstructured":"Malik, A.J., Khan, F.A.: A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection. Cluster Comput. 21(1), 667\u2013680 (2018)","journal-title":"Cluster Comput."},{"issue":"5","key":"10_CR14","doi-asserted-by":"publisher","first-page":"754","DOI":"10.3390\/sym12050754","volume":"12","author":"IH Sarker","year":"2020","unstructured":"Sarker, I.H., Abushark, Y.B., Alsolami, F., Khan, A.I.: Intrudtree: a machine learning based cyber security intrusion detection model. Symmetry 12(5), 754 (2020)","journal-title":"Symmetry"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Kim, J., Kim, J., Thu, H.L.T., Kim, H.: Long short term memory recurrent neural network classifier for intrusion detection. In: 2016 International Conference on Platform Technology and Service (PlatCon), pp. 1\u20135. IEEE, February 2016","DOI":"10.1109\/PlatCon.2016.7456805"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Zhou, X., Zhang, X., Wang, L., Wang, P.: A model based on convolutional neural network for online transaction fraud detection. Secur. Commun. Netw. 2018 (2018)","DOI":"10.1155\/2018\/5680264"},{"key":"10_CR17","doi-asserted-by":"publisher","first-page":"690","DOI":"10.1016\/j.ijepes.2018.11.013","volume":"107","author":"S Basumallik","year":"2019","unstructured":"Basumallik, S., Ma, R., Eftekharnejad, S.: Packet-data anomaly detection in PMU-based state estimator using convolutional neural network. Int. J. Electr. Power Energy Syst. 107, 690\u2013702 (2019)","journal-title":"Int. J. Electr. Power Energy Syst."},{"issue":"9","key":"10_CR18","doi-asserted-by":"publisher","first-page":"1977","DOI":"10.3390\/s19091977","volume":"19","author":"G Thamilarasu","year":"2019","unstructured":"Thamilarasu, G., Chawla, S.: Towards deep-learning-driven intrusion detection for the internet of things. Sensors 19(9), 1977 (2019)","journal-title":"Sensors"},{"key":"10_CR19","doi-asserted-by":"publisher","first-page":"30373","DOI":"10.1109\/ACCESS.2019.2899721","volume":"7","author":"FA Khan","year":"2019","unstructured":"Khan, F.A., Gumaei, A., Derhab, A., Hussain, A.: A novel two-stage deep learning model for efficient network intrusion detection. IEEE Access 7, 30373\u201330385 (2019)","journal-title":"IEEE Access"},{"issue":"23","key":"10_CR20","doi-asserted-by":"publisher","first-page":"17361","DOI":"10.1007\/s00521-020-05189-8","volume":"32","author":"K Demertzis","year":"2020","unstructured":"Demertzis, K., Iliadis, L., Tziritas, N., Kikiras, P.: Anomaly detection via blockchained deep learning smart contracts in industry 4.0. Neural Comput. Appl. 32(23), 17361\u201317378 (2020). https:\/\/doi.org\/10.1007\/s00521-020-05189-8","journal-title":"Neural Comput. Appl."},{"key":"10_CR21","series-title":"Proceedings of the International Neural Networks Society","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-030-80568-5_3","volume-title":"Proceedings of the 22nd Engineering Applications of Neural Networks Conference","author":"AP Psathas","year":"2021","unstructured":"Psathas, A.P., Iliadis, L., Papaleonidas, A., Bountas, D.: A hybrid deep learning ensemble for cyber intrusion detection. In: Iliadis, L., Macintyre, J., Jayne, C., Pimenidis, E. (eds.) EANN 2021. PINNS, vol. 3, pp. 27\u201341. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-80568-5_3"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1\u20136. IEEE, November 2015","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"10_CR23","unstructured":"The IXIA PerfectStorm tool. http:\/\/www.ixiacom.com\/products\/perfectstorm"},{"key":"10_CR24","unstructured":"CVE. https:\/\/cve.mitre.org\/"},{"issue":"5","key":"10_CR25","doi-asserted-by":"publisher","first-page":"978","DOI":"10.1109\/TNNLS.2015.2431251","volume":"27","author":"DS Yeung","year":"2015","unstructured":"Yeung, D.S., Li, J.C., Ng, W.W., Chan, P.P.: MLPNN training via a multiobjective optimization of training error and stochastic sensitivity. IEEE Trans. Neural Netw. Learn. Syst. 27(5), 978\u2013992 (2015)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"5","key":"10_CR26","doi-asserted-by":"publisher","first-page":"1657","DOI":"10.3390\/app10051657","volume":"10","author":"J Baek","year":"2020","unstructured":"Baek, J., Choi, Y.: Deep neural network for predicting ore production by truck-haulage systems in open-pit mines. Appl. Sci. 10(5), 1657 (2020)","journal-title":"Appl. Sci."},{"key":"10_CR27","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.neucom.2016.12.038","volume":"234","author":"W Liu","year":"2017","unstructured":"Liu, W., Wang, Z., Liu, X., Zeng, N., Liu, Y., Alsaadi, F.E.: A survey of deep neural network architectures and their applications. Neurocomputing 234, 11\u201326 (2017)","journal-title":"Neurocomputing"},{"key":"10_CR28","unstructured":"O\u2019Shea, K., Nash, R.: An introduction to convolutional neural networks. arXiv preprint arXiv:1511.08458 (2015)"},{"key":"10_CR29","unstructured":"Martin, E., Cundy, C.: Parallelizing linear recurrent neural nets over sequence length. arXiv preprint arXiv:1709.04057 (2017)"},{"key":"10_CR30","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.neucom.2019.02.056","volume":"347","author":"S Mahdavifar","year":"2019","unstructured":"Mahdavifar, S., Ghorbani, A.A.: Application of deep learning to cybersecurity: a survey. Neurocomputing 347, 149\u2013176 (2019)","journal-title":"Neurocomputing"},{"issue":"7","key":"10_CR31","doi-asserted-by":"publisher","first-page":"1387","DOI":"10.3390\/w11071387","volume":"11","author":"XH Le","year":"2019","unstructured":"Le, X.H., Ho, H.V., Lee, G., Jung, S.: Application of long short-term memory (LSTM) neural network for flood forecasting. Water 11(7), 1387 (2019)","journal-title":"Water"},{"key":"10_CR32","doi-asserted-by":"crossref","unstructured":"Ketkar, N.: Introduction to keras. In: Deep Learning with Python, pp. 97\u2013111. Apress, Berkeley (2017)","DOI":"10.1007\/978-1-4842-2766-4_7"},{"key":"10_CR33","unstructured":"Dillon, J.V., et al.: Tensorflow distributions. arXiv preprint arXiv:1711.10604 (2017)"},{"key":"10_CR34","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321\u2013357 (2002)","journal-title":"J. Artif. Intell. Res."}],"container-title":["IFIP Advances in Information and Communication Technology","Artificial Intelligence Applications and Innovations"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-08333-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,16]],"date-time":"2022-06-16T16:03:23Z","timestamp":1655395403000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-08333-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031083327","9783031083334"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-08333-4_10","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"10 June 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AIAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Artificial Intelligence Applications and Innovations","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hersonissos","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 June 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aiai2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ifipaiai.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}