{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T11:06:07Z","timestamp":1774263967716,"version":"3.50.1"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031303326","type":"print"},{"value":"9783031303333","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-30333-3_17","type":"book-chapter","created":{"date-parts":[[2023,4,28]],"date-time":"2023-04-28T06:02:45Z","timestamp":1682661765000},"page":"131-140","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":38,"title":["Machine Learning Techniques for Anomaly-Based Detection System on CSE-CIC-IDS2018 Dataset"],"prefix":"10.1007","author":[{"given":"Abdussalam","family":"Elhanashi","sequence":"first","affiliation":[]},{"given":"Kaouther","family":"Gasmi","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Begni","sequence":"additional","affiliation":[]},{"given":"Pierpaolo","family":"Dini","sequence":"additional","affiliation":[]},{"given":"Qinghe","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Sergio","family":"Saponara","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,29]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Cerullo, G., et al.: Iot and sensor networks security. In: Security and Resilience in Intelligent Data-Centric Systems and Communication Networks, pp. 77\u2013101. Academic Press, Cambridge (2018)","DOI":"10.1016\/B978-0-12-811373-8.00004-5"},{"key":"17_CR2","doi-asserted-by":"publisher","first-page":"74993","DOI":"10.1109\/ACCESS.2018.2884672","volume":"6","author":"S Tu","year":"2018","unstructured":"Tu, S., et al.: Security in fog computing: A novel technique to tackle an impersonation attack. IEEE Access 6, 74993\u201375001 (2018)","journal-title":"IEEE Access"},{"issue":"4","key":"17_CR3","doi-asserted-by":"publisher","first-page":"165","DOI":"10.33851\/JMIS.2019.6.4.165","volume":"6","author":"J Kim","year":"2019","unstructured":"Kim, J., Shin, Y., Choi, E.: An intrusion detection model based on a convolutional neural network. J. Multimedia Inf. Syst. 6(4), 165\u2013172 (2019)","journal-title":"J. Multimedia Inf. Syst."},{"key":"17_CR4","doi-asserted-by":"publisher","first-page":"167455","DOI":"10.1109\/ACCESS.2019.2953451","volume":"7","author":"L D\u2019hooge","year":"2019","unstructured":"D\u2019hooge, L., et al.: Classification hardness for supervised learners on 20 years of intrusion detection data. IEEE Access 7, 167455\u2013167469 (2019)","journal-title":"IEEE Access"},{"key":"17_CR5","doi-asserted-by":"publisher","first-page":"132911","DOI":"10.1109\/ACCESS.2020.3009843","volume":"8","author":"D Stiawan","year":"2020","unstructured":"Stiawan, D., et al.: CICIDS-2017 dataset feature analysis with information gain for anomaly detection. IEEE Access 8, 132911\u2013132921 (2020)","journal-title":"IEEE Access"},{"issue":"3","key":"17_CR6","first-page":"438","volume":"21","author":"A Guezzaz","year":"2019","unstructured":"Guezzaz, A., et al.: A global intrusion detection system using pcapsocks sniffer and multilayer perceptron classifier. Int. J. Netw. Security. 21(3), 438\u2013450 (2019)","journal-title":"Int. J. Netw. Security."},{"key":"17_CR7","unstructured":"Thaseen, I.S., Poorva, B., Ushasree, P.S.: Network intrusion detection using machine learning techniques. In: 2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE). IEEE (2020)"},{"issue":"2","key":"17_CR8","first-page":"81","volume":"17","author":"R Beghdad","year":"2007","unstructured":"Beghdad, R.: Training all the KDD data set to classify and detect attacks. Neural Netw. World 17(2), 81 (2007)","journal-title":"Neural Netw. World"},{"key":"17_CR9","doi-asserted-by":"publisher","first-page":"636","DOI":"10.1016\/j.procs.2020.03.330","volume":"167","author":"A Thakkar","year":"2020","unstructured":"Thakkar, A., Lohiya, R.: A review of the advancement in intrusion detection datasets. Procedia Comput. Sci. 167, 636\u2013645 (2020)","journal-title":"Procedia Comput. Sci."},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Yulianto, A., Sukarno, P., Suwastika, N.A.: Improving adaboost- based intrusion detection system (IDS) performance on CIC IDS 2017 dataset. J. Phys.: Conf. Ser. 1192(1) (2019)","DOI":"10.1088\/1742-6596\/1192\/1\/012018"},{"key":"17_CR11","doi-asserted-by":"publisher","first-page":"132911","DOI":"10.1109\/ACCESS.2020.3009843","volume":"8","author":"DS Kurniabudi","year":"2020","unstructured":"Kurniabudi, D.S., Darmawijoyo, M.Y.B., Bamhdi, A.M., Budiarto, R.: CICIDS-2017 dataset feature analysis with information gain for anomaly detection. IEEE Access 8, 132911\u2013132921 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3009843","journal-title":"IEEE Access"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Kanimozhi, V., Jacob, T.P.: Artificial intelligence-based network intrusion detection with hyper-parameter optimization tuning on the realistic cyber dataset CSE-CIC- IDS2018 using cloud computing. In: 2019 international conference on communication and signal processing (ICCSP). IEEE (2019)","DOI":"10.1109\/ICCSP.2019.8698029"},{"issue":"6","key":"17_CR13","doi-asserted-by":"publisher","first-page":"916","DOI":"10.3390\/electronics9060916","volume":"9","author":"J Kim","year":"2020","unstructured":"Kim, J., et al.: CNN-based network intrusion detection against denial-of-service attacks. Electronics 9(6), 916 (2020)","journal-title":"Electronics"},{"key":"17_CR14","doi-asserted-by":"publisher","first-page":"10784","DOI":"10.1016\/j.comnet.2021.107840","volume":"188","author":"IF Kilincer","year":"2021","unstructured":"Kilincer, I.F., Ertam, F., Sengur, A.: Machine learning methods for cyber security intrusion detection: datasets and comparative study. Comput. Netw. 188, 10784 (2021)","journal-title":"Comput. Netw."},{"key":"17_CR15","doi-asserted-by":"publisher","first-page":"20255","DOI":"10.1109\/ACCESS.2018.2820092","volume":"6","author":"MH Ali","year":"2018","unstructured":"Ali, M.H., et al.: A new intrusion detection system based on fast learning network and particle swarm optimization. IEEE Access 6, 20255\u201320261 (2018)","journal-title":"IEEE Access"},{"issue":"1","key":"17_CR16","doi-asserted-by":"publisher","first-page":"9","DOI":"10.3390\/designs5010009","volume":"5","author":"P Dini","year":"2021","unstructured":"Dini, P., Saponara, S.: Analysis, design, and comparison of machine-learning techniques for networking intrusion detection. Designs 5(1), 9 (2021)","journal-title":"Designs"},{"issue":"6","key":"17_CR17","doi-asserted-by":"publisher","first-page":"e91","DOI":"10.1002\/spy2.91","volume":"2","author":"S Bagui","year":"2019","unstructured":"Bagui, S., et al.: Using machine learning techniques to identify rare cyber-attacks on the UNSW-NB15 dataset. Security and Privacy 2(6), e91 (2019)","journal-title":"Security and Privacy"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Aboueata, N., et al.: Supervised machine learning techniques for efficient network intrusion detection. In: 2019 28th International Conference on Computer Communication and Networks (ICCCN). IEEE (2019)","DOI":"10.1109\/ICCCN.2019.8847179"},{"key":"17_CR19","doi-asserted-by":"publisher","first-page":"165","DOI":"10.33851\/JMIS.2019.6.4.165","volume":"6","author":"J Kim","year":"2019","unstructured":"Kim, J., Shin, Y., Choi, E.: An intrusion detection model based on a convolutional neural network. J. Multimed. Inf. Syst. 6, 165\u2013172 (2019)","journal-title":"J. Multimed. Inf. Syst."},{"key":"17_CR20","doi-asserted-by":"crossref","first-page":"16","DOI":"10.29304\/jqcm.2020.12.3.706","volume":"12","author":"RI Farhan","year":"2020","unstructured":"Farhan, R.I., Abeer, T.M., Nidaa, F.H.: Optimized deep learning with binary PSO for intrusion detection on CSE-CIC-IDS2018 dataset. J. Al Qadisiyah Comput. Sci. Math. 12, 16 (2020)","journal-title":"J. Al Qadisiyah Comput. Sci. Math."},{"key":"17_CR21","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-030-23502-4_12","volume-title":"Cloud Computing \u2013 CLOUD 2019: 12th International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25\u201330, 2019, Proceedings","author":"P Lin","year":"2019","unstructured":"Lin, P., Ye, K., Cheng-Zhong, X.: Dynamic network anomaly detection system by using deep learning techniques. In: Da Silva, D., Wang, Q., Zhang, L.-J. (eds.) Cloud Computing \u2013 CLOUD 2019: 12th International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25\u201330, 2019, Proceedings, pp. 161\u2013176. Springer International Publishing, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-23502-4_12"}],"container-title":["Lecture Notes in Electrical Engineering","Applications in Electronics Pervading Industry, Environment and Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-30333-3_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,11]],"date-time":"2023-12-11T17:09:57Z","timestamp":1702314597000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-30333-3_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031303326","9783031303333"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-30333-3_17","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"value":"1876-1100","type":"print"},{"value":"1876-1119","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"29 April 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ApplePies","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applications in Electronics Pervading Industry, Environment and Society","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Genoa","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"applepies2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/applepies.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}