{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T10:36:25Z","timestamp":1769942185043,"version":"3.49.0"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031299261","type":"print"},{"value":"9783031299278","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-29927-8_17","type":"book-chapter","created":{"date-parts":[[2023,4,7]],"date-time":"2023-04-07T12:02:50Z","timestamp":1680868970000},"page":"213-224","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Systematic Comparison on\u00a0Prevailing Intrusion Detection Models"],"prefix":"10.1007","author":[{"given":"Jianxuan","family":"Liu","sequence":"first","affiliation":[]},{"given":"Haotian","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Junfeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shuo","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Omar","family":"Dib","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,8]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Alkahtani, H., Aldhyani, T.H.: Intrusion detection system to advance internet of things infrastructure-based deep learning algorithms. Complexity 2021 (2021)","DOI":"10.1155\/2021\/5579851"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Aloqaily, M., Otoum, S., Al Ridhawi, I., Jararweh, Y.: An intrusion detection system for connected vehicles in smart cities. Ad Hoc Netw. 90, 101842 (2019)","DOI":"10.1016\/j.adhoc.2019.02.001"},{"issue":"4","key":"17_CR3","doi-asserted-by":"publisher","first-page":"79","DOI":"10.4236\/wet.2018.94007","volume":"9","author":"A Alshammari","year":"2018","unstructured":"Alshammari, A., Zohdy, M.A., Debnath, D., Corser, G.: Classification approach for intrusion detection in vehicle systems. Wirel. Eng. Technol. 9(4), 79\u201394 (2018)","journal-title":"Wirel. Eng. Technol."},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Aswal, K., Dobhal, D.C., Pathak, H.: Comparative analysis of machine learning algorithms for identification of bot attack on the internet of vehicles (IoV). In: 2020 International Conference on Inventive Computation Technologies (ICICT), pp. 312\u2013317. IEEE (2020)","DOI":"10.1109\/ICICT48043.2020.9112422"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Bala, R., Nagpal, R.: A review on KDD CUP99 and NSL NSL-KDD dataset. Int. J. Adv. Res. Comput. Sci. 10(2) (2019)","DOI":"10.26483\/ijarcs.v10i2.6395"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Basati, A., Faghih, M.M.: DFE: efficient IoT network intrusion detection using deep feature extraction. Neural Comput. Appl. 1\u201321 (2022)","DOI":"10.1007\/s00521-021-06826-6"},{"key":"17_CR7","doi-asserted-by":"publisher","unstructured":"Diallo, E.H., Dib, O., Agha, K.A.: The journey of blockchain inclusion in vehicular networks: a taxonomy. In: 2021 Third International Conference on Blockchain Computing and Applications (BCCA), pp. 135\u2013142 (2021). https:\/\/doi.org\/10.1109\/BCCA53669.2021.9657050","DOI":"10.1109\/BCCA53669.2021.9657050"},{"key":"17_CR8","doi-asserted-by":"publisher","unstructured":"Diallo, EH., Dib, O., Al Agha, K.: A blockchain-based approach to track traffic messages in vehicular networks. In: Gupta, G., Wang, L., Yadav, A., Rana, P., Wang, Z. (eds.) Proceedings of Academia-Industry Consortium for Data Science. AISC, vol. 1411, pp. 345\u2013362. Springer, Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-16-6887-6_28","DOI":"10.1007\/978-981-16-6887-6_28"},{"key":"17_CR9","unstructured":"Eggensperger, K., et al.: Towards an empirical foundation for assessing bayesian optimization of hyperparameters. In: NIPS workshop on Bayesian Optimization in Theory and Practice, vol. 10 (2013)"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Eggensperger, K., Hutter, F., Hoos, H., Leyton-Brown, K.: Efficient benchmarking of hyperparameter optimizers via surrogates. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 29 (2015)","DOI":"10.1609\/aaai.v29i1.9375"},{"key":"17_CR11","unstructured":"Falkner, S., Klein, A., Hutter, F.: BOHB: robust and efficient hyperparameter optimization at scale. In: International Conference on Machine Learning, pp. 1437\u20131446. PMLR (2018)"},{"key":"17_CR12","doi-asserted-by":"publisher","first-page":"154560","DOI":"10.1109\/ACCESS.2019.2948382","volume":"7","author":"Y Gao","year":"2019","unstructured":"Gao, Y., Wu, H., Song, B., Jin, Y., Luo, X., Zeng, X.: A distributed network intrusion detection system for distributed denial of service attacks in vehicular ad hoc network. IEEE Access 7, 154560\u2013154571 (2019)","journal-title":"IEEE Access"},{"key":"17_CR13","unstructured":"Hacking, Lab, C.R.: Can intrusion dataset (2017). http:\/\/ocslab.hksecurity.net\/Dataset\/CAN-intrusion-dataset"},{"issue":"2","key":"17_CR14","doi-asserted-by":"publisher","first-page":"1803","DOI":"10.1109\/TNSM.2020.3014929","volume":"18","author":"M Injadat","year":"2020","unstructured":"Injadat, M., Moubayed, A., Nassif, A.B., Shami, A.: Multi-stage optimized machine learning framework for network intrusion detection. IEEE Trans. Netw. Serv. Manag. 18(2), 1803\u20131816 (2020)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"4","key":"17_CR15","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1016\/S1389-1286(00)00139-0","volume":"34","author":"R Lippmann","year":"2000","unstructured":"Lippmann, R., Haines, J.W., Fried, D.J., Korba, J., Das, K.: The 1999 DARPA off-line intrusion detection evaluation. Comput. Netw. 34(4), 579\u2013595 (2000). https:\/\/doi.org\/10.1016\/S1389-1286(00)00139-0","journal-title":"Comput. Netw."},{"key":"17_CR16","doi-asserted-by":"publisher","unstructured":"Nan, Z., Wang, X., Dib, O.: Metaheuristic enhancement with identified elite genes by machine learning. In: Chen, J., Hashimoto, T., Tang, X., Wu, J. (eds.) Knowledge and Systems Sciences. KSS 2022. CCIS, vol. 1592, pp. 34\u201349. Springer, Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-19-3610-4_3","DOI":"10.1007\/978-981-19-3610-4_3"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Nematzadeh, S., Kiani, F., Torkamanian-Afshar, M., Aydin, N.: Tuning hyperparameters of machine learning algorithms and deep neural networks using metaheuristics: a bioinformatics study on biomedical and biological cases. Comput. Biol. Chem. 97, 107619 (2022)","DOI":"10.1016\/j.compbiolchem.2021.107619"},{"key":"17_CR18","unstructured":"Nour, M., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: IEEE Military Communications and Information Systems Conference (MilCIS), pp. 1\u20136 (2015)"},{"key":"17_CR19","unstructured":"Panigrahi, R., Borah, S.: A detailed analysis of cicids2017 dataset for designing intrusion detection systems. Int. J. Eng. Technol. 7(3.24), 479\u2013482 (2018)"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Rashid, M., Kamruzzaman, J., Imam, T., Wibowo, S., Gordon, S.: A tree-based stacking ensemble technique with feature selection for network intrusion detection. Appl. Intell. 1\u201314 (2022)","DOI":"10.1007\/s10489-021-02968-1"},{"key":"17_CR21","doi-asserted-by":"publisher","unstructured":"Senliol, B., Gulgezen, G., Yu, L., Cataltepe, Z.: Fast correlation based filter (FCBF) with a different search strategy. In: 2008 23rd International Symposium on Computer and Information Sciences, pp. 1\u20134 (2008). https:\/\/doi.org\/10.1109\/ISCIS.2008.4717949","DOI":"10.1109\/ISCIS.2008.4717949"},{"key":"17_CR22","doi-asserted-by":"publisher","unstructured":"Sharafaldin, I., Habibi Lashkari, A., Ghorbani, A.A.: A detailed analysis of the CICIDS2017 data set. In: Mori, P., Furnell, S., Camp, O. (eds.) Information Systems Security and Privacy. ICISSP 2018. CCIS, vol. 977, pp. 172\u2013188. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-25109-3_9","DOI":"10.1007\/978-3-030-25109-3_9"},{"key":"17_CR23","first-page":"108","volume":"1","author":"I Sharafaldin","year":"2018","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1, 108\u2013116 (2018)","journal-title":"ICISSp"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1\u20136. IEEE (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"17_CR25","doi-asserted-by":"crossref","unstructured":"Thakkar, A., Lohiya, R.: A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions. Artif. Intell. Rev. 1\u2013111 (2021)","DOI":"10.1007\/s10462-021-10037-9"},{"key":"17_CR26","doi-asserted-by":"publisher","unstructured":"Ullah, I., Mahmoud, Q.H.: A scheme for generating a dataset for anomalous activity detection in IoT networks. In: Goutte, C., Zhu, X. (eds.) Advances in Artificial Intelligence. Canadian AI 2020. LNCS, vol. 12109, pp. 508\u2013520. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-47358-7_52","DOI":"10.1007\/978-3-030-47358-7_52"},{"key":"17_CR27","doi-asserted-by":"publisher","first-page":"103906","DOI":"10.1109\/ACCESS.2021.3094024","volume":"9","author":"I Ullah","year":"2021","unstructured":"Ullah, I., Mahmoud, Q.H.: Design and development of a deep learning-based model for anomaly detection in iot networks. IEEE Access 9, 103906\u2013103926 (2021)","journal-title":"IEEE Access"},{"issue":"1","key":"17_CR28","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1109\/JIOT.2021.3084796","volume":"9","author":"L Yang","year":"2021","unstructured":"Yang, L., Moubayed, A., Shami, A.: MTH-IDS: a multitiered hybrid intrusion detection system for internet of vehicles. IEEE Internet Things J. 9(1), 616\u2013632 (2021)","journal-title":"IEEE Internet Things J."},{"key":"17_CR29","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.neucom.2020.07.061","volume":"415","author":"L Yang","year":"2020","unstructured":"Yang, L., Shami, A.: On hyperparameter optimization of machine learning algorithms: theory and practice. Neurocomputing 415, 295\u2013316 (2020)","journal-title":"Neurocomputing"},{"key":"17_CR30","doi-asserted-by":"crossref","unstructured":"Yang, L., Shami, A.: A transfer learning and optimized CNN based intrusion detection system for internet of vehicles. arXiv preprint arXiv:2201.11812 (2022)","DOI":"10.1109\/ICC45855.2022.9838780"}],"container-title":["Lecture Notes in Computer Science","Parallel and Distributed Computing, Applications and Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-29927-8_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,7]],"date-time":"2023-04-07T12:06:36Z","timestamp":1680869196000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-29927-8_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031299261","9783031299278"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-29927-8_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"8 April 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PDCAT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Parallel and Distributed Computing: Applications and Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sendai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pdcat2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.hpc.is.tohoku.ac.jp\/pdcat2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Open","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"95","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}