{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T20:38:58Z","timestamp":1773693538375,"version":"3.50.1"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031284502","type":"print"},{"value":"9783031284519","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-28451-9_34","type":"book-chapter","created":{"date-parts":[[2023,3,14]],"date-time":"2023-03-14T15:03:50Z","timestamp":1678806230000},"page":"392-403","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Machine Learning Anomaly-Based Network Intrusion Detection: Experimental Evaluation"],"prefix":"10.1007","author":[{"given":"Ahmed Ramzi","family":"Bahlali","sequence":"first","affiliation":[]},{"given":"Abdelmalik","family":"Bachir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,15]]},"reference":[{"key":"34_CR1","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1016\/j.ins.2017.11.023","volume":"429","author":"E Bigdeli","year":"2018","unstructured":"Bigdeli, E., Mohammadi, M., Raahemi, B., Matwin, S.: Incremental anomaly detection using two-layer cluster-based structure. Inf. Sci. 429, 315\u2013331 (2018)","journal-title":"Inf. Sci."},{"issue":"2","key":"34_CR2","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2016","unstructured":"Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153\u20131176 (2016)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"34_CR3","doi-asserted-by":"crossref","unstructured":"Diallo, A.F., Patras, P.: Adaptive clustering-based malicious traffic classification at the network edge. In: IEEE INFOCOM, pp. 1\u201310. IEEE (2021)","DOI":"10.1109\/INFOCOM42981.2021.9488690"},{"issue":"1","key":"34_CR4","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/TNSM.2016.2627340","volume":"14","author":"J Dromard","year":"2017","unstructured":"Dromard, J., Roudi\u00e8re, G., Owezarski, P.: Online and scalable unsupervised network anomaly detection method. IEEE Trans. Netw. Serv. Manag. 14(1), 34\u201347 (2017)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"3","key":"34_CR5","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1007\/s11235-018-0475-8","volume":"70","author":"G Fernandes","year":"2019","unstructured":"Fernandes, G., Rodrigues, J.J.P.C., Carvalho, L.F., Al-Muhtadi, J.F., Proen\u00e7a, M.L.: A comprehensive survey on network anomaly detection. Telecommun. Syst. 70(3), 447\u2013489 (2019). https:\/\/doi.org\/10.1007\/s11235-018-0475-8","journal-title":"Telecommun. Syst."},{"issue":"1\u20132","key":"34_CR6","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P Garc\u00eda-Teodoro","year":"2009","unstructured":"Garc\u00eda-Teodoro, P., D\u00edaz-Verdejo, J., Maci\u00e1-Fern\u00e1ndez, G., V\u00e1zquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1\u20132), 18\u201328 (2009)","journal-title":"Comput. Secur."},{"key":"34_CR7","unstructured":"Goodfellow, I.J., et al.: Generative adversarial networks (2014)"},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Guarino, I., Bovenzi, G., Di Monda, D., Aceto, G., Ciuonzo, D., Pescap\u00e9, A.: On the use of machine learning approaches for the early classification in network intrusion detection. In: IEEE M &N, pp. 1\u20136 (2022)","DOI":"10.1109\/MN55117.2022.9887775"},{"key":"34_CR9","unstructured":"Hettich, S., Bay, S.D.: KDD Cup 1999 Data"},{"key":"34_CR10","doi-asserted-by":"crossref","unstructured":"Ingre, B., Yadav, A.: Performance analysis of NSL-KDD dataset using ANN. IN: SPACES, pp. 92\u201396 (2015)","DOI":"10.1109\/SPACES.2015.7058223"},{"key":"34_CR11","doi-asserted-by":"crossref","unstructured":"Jeong, H., Yu, J., Lee, W.: Poster abstract: a semi-supervised approach for network intrusion detection using generative adversarial networks. IEEE Infocom, pp. 31\u201332 (2021)","DOI":"10.1109\/INFOCOMWKSHPS51825.2021.9484569"},{"key":"34_CR12","doi-asserted-by":"crossref","unstructured":"Kim, T., Suh, S.C., Kim, H., Kim, J., Kim, J.: An encoding technique for CNN-based network anomaly detection. In: Big Data, pp. 2960\u20132965 (2019)","DOI":"10.1109\/BigData.2018.8622568"},{"key":"34_CR13","doi-asserted-by":"crossref","unstructured":"Li, H., Chasaki, D.: Ensemble machine learning for intrusion detection in cyber-physical systems. In: INFOCOM WKSHPS, pp. 12\u201313. IEEE (2021)","DOI":"10.1109\/INFOCOMWKSHPS51825.2021.9484479"},{"key":"34_CR14","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.jnca.2012.09.004","volume":"1","author":"HJ Liao","year":"2013","unstructured":"Liao, H.J., Richard Lin, C.H., Lin, Y.C., Tung, K.Y.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 1, 16\u201324 (2013)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"34_CR15","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1109\/COMST.2018.2847722","volume":"21","author":"P Mishra","year":"2019","unstructured":"Mishra, P., Varadharajan, V., Tupakula, U., Pilli, E.S.: A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Commun. Surv. Tutor. 21(1), 686\u2013728 (2019)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"34_CR16","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: MilCIS, pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"issue":"1\u20133","key":"34_CR17","first-page":"18","volume":"25","author":"N Moustafa","year":"2016","unstructured":"Moustafa, N., Slay, J.: The evaluation of Network Anomaly Detection Systems: statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inf. Secur. J. 25(1\u20133), 18\u201331 (2016)","journal-title":"Inf. Secur. J."},{"key":"34_CR18","unstructured":"Odena, A.: Semi-supervised learning with generative adversarial networks. arXiv preprint arXiv:1606.01583 (2016)"},{"key":"34_CR19","unstructured":"Salimans, T., et al.: Improved techniques for training GANs, vol. 29. Curran Associates, Inc. (2016)"},{"key":"34_CR20","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSP 2018 (Cic), pp. 108\u2013116 (2018)","DOI":"10.5220\/0006639801080116"},{"key":"34_CR21","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.cose.2011.12.012","volume":"3","author":"A Shiravi","year":"2012","unstructured":"Shiravi, A., Shiravi, H., Tavallaee, M., Ghorbani, A.A.: Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 3, 357\u2013374 (2012)","journal-title":"Comput. Secur."},{"issue":"56","key":"34_CR22","first-page":"136","volume":"56","author":"RC Staudemeyer","year":"2015","unstructured":"Staudemeyer, R.C.: Applying long short-term memory recurrent neural networks to intrusion detection. S. Afr. Comput. J. 56(56), 136\u2013154 (2015)","journal-title":"S. Afr. Comput. J."},{"key":"34_CR23","doi-asserted-by":"crossref","unstructured":"\u0160vihrov\u00e1, R., Lettner, C.: A semi-supervised approach for network intrusion detection. In: ACM International Conference Proceeding Series (2020)","DOI":"10.1145\/3407023.3407073"},{"key":"34_CR24","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1\u20136 (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"34_CR25","unstructured":"Tool, I.P.: https:\/\/www.keysight.com\/fr\/en\/products\/network-test\/network-test-hardware\/perfectstorm.html"},{"issue":"3","key":"34_CR26","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1109\/TSA.2005.845806","volume":"13","author":"S Tsakalidis","year":"2005","unstructured":"Tsakalidis, S., Doumpiotis, V., Byrne, W.: Discriminative linear transforms for feature normalization and speaker adaptation in HMM estimation. IEEE Trans. Speech Audio Process. 13(3), 367\u2013376 (2005)","journal-title":"IEEE Trans. Speech Audio Process."},{"key":"34_CR27","doi-asserted-by":"publisher","first-page":"41525","DOI":"10.1109\/ACCESS.2019.2895334","volume":"7","author":"R Vinayakumar","year":"2019","unstructured":"Vinayakumar, R., Alazab, M., Soman, K.P., Poornachandran, P., Al-Nemrat, A., Venkatraman, S.: Deep learning approach for intelligent intrusion detection system. IEEE Access 7, 41525\u201341550 (2019)","journal-title":"IEEE Access"},{"key":"34_CR28","doi-asserted-by":"publisher","first-page":"21954","DOI":"10.1109\/ACCESS.2017.2762418","volume":"5","author":"C Yin","year":"2017","unstructured":"Yin, C., Zhu, Y., Fei, J., He, X.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954\u201321961 (2017)","journal-title":"IEEE Access"},{"key":"34_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-9326-7","volume-title":"Ensemble Machine Learning","author":"C Zhang","year":"2012","unstructured":"Zhang, C., Ma, Y.: Ensemble Machine Learning. Springer, New York (2012). https:\/\/doi.org\/10.1007\/978-1-4419-9326-7"}],"container-title":["Lecture Notes in Networks and Systems","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-28451-9_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T06:31:24Z","timestamp":1681885884000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-28451-9_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031284502","9783031284519"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-28451-9_34","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"15 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Juiz de Fora","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Brazil","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 March 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 March 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"37","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}