{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:29:15Z","timestamp":1760711355030,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031535543"},{"type":"electronic","value":"9783031535550"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-53555-0_46","type":"book-chapter","created":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T05:02:10Z","timestamp":1707800530000},"page":"480-491","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Comparative Analysis of\u00a01D-CNN and\u00a02D-CNN for\u00a0Network Intrusion Detection in\u00a0Software Defined Networks"],"prefix":"10.1007","author":[{"given":"Sami","family":"Alsaadi","sequence":"first","affiliation":[]},{"given":"Tertsegha J.","family":"Anande","sequence":"additional","affiliation":[]},{"given":"Mark S.","family":"Leeson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,14]]},"reference":[{"key":"46_CR1","doi-asserted-by":"publisher","unstructured":"Shan-Shan, J., Ya-Bin, X.: The APT detection method based on attack tree for SDN. In: Proceedings of the 2nd International Conference on Cryptography, Security and Privacy (2018). https:\/\/doi.org\/10.1145\/3199478.3199481","DOI":"10.1145\/3199478.3199481"},{"key":"46_CR2","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.comnet.2015.05.005","volume":"85","author":"C Yoon","year":"2015","unstructured":"Yoon, C., Park, T., Lee, S., et al.: Enabling security functions with SDN: a feasibility study. Comput. Netw. 85, 19\u201335 (2015). https:\/\/doi.org\/10.1016\/j.comnet.2015.05.005","journal-title":"Comput. Netw."},{"key":"46_CR3","doi-asserted-by":"publisher","unstructured":"Tang, T.A., Mhamdi, L., McLernon, D., et al.: Deep learning approach for network intrusion detection in software defined networking. In: 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM) (2016). https:\/\/doi.org\/10.1109\/wincom.2016.7777224","DOI":"10.1109\/wincom.2016.7777224"},{"key":"46_CR4","doi-asserted-by":"publisher","unstructured":"Park, Y., Kengalahalli, N.V., Chang, S.-Y.: Distributed security network functions against botnet attacks in software-defined networks. In: 2018 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN) (2018). https:\/\/doi.org\/10.1109\/nfv-sdn.2018.8725657","DOI":"10.1109\/nfv-sdn.2018.8725657"},{"key":"46_CR5","doi-asserted-by":"publisher","unstructured":"Le, D.-H., Tran, H.-A.: A novel machine learning-based network intrusion detection system for software-defined network. In: 2020 7th NAFOSTED Conference on Information and Computer Science (NICS) (2020). https:\/\/doi.org\/10.1109\/nics51282.2020.9335863","DOI":"10.1109\/nics51282.2020.9335863"},{"key":"46_CR6","unstructured":"Kumar, S.: Survey of current network intrusion detection techniques, pp. 1-18. Washington University in St. Louis (2007)"},{"key":"46_CR7","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/j.future.2021.06.047","volume":"125","author":"MP Novaes","year":"2021","unstructured":"Novaes, M.P., Carvalho, L.F., Lloret, J., Proen\u00e7a, M.L.: Adversarial deep learning approach detection and defense against DDoS attacks in SDN environments. Futur. Gener. Comput. Syst. 125, 156\u2013167 (2021). https:\/\/doi.org\/10.1016\/j.future.2021.06.047","journal-title":"Futur. Gener. Comput. Syst."},{"key":"46_CR8","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-019-40081-z","author":"Y Yang","year":"2019","unstructured":"Yang, Y., Xu, W., Hou, P., et al.: Improving maize grain yield by matching maize growth and solar radiation. Sci. Rep. (2019). https:\/\/doi.org\/10.1038\/s41598-019-40081-z","journal-title":"Sci. Rep."},{"key":"46_CR9","doi-asserted-by":"publisher","unstructured":"Said Elsayed, M., Le-Khac, N.A., Dev, S., Jurcut, A.D.: Network anomaly detection using LSTM based autoencoder. In: Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks (2020). https:\/\/doi.org\/10.1145\/3416013.3426457","DOI":"10.1145\/3416013.3426457"},{"key":"46_CR10","first-page":"2828","volume":"7","author":"K Rai","year":"2016","unstructured":"Rai, K., Devi, M.S., Guleria, A.: Decision tree based algorithm for intrusion detection. Int. J. Adv. Netw. Appl. 7, 2828\u20132834 (2016)","journal-title":"Int. J. Adv. Netw. Appl."},{"key":"46_CR11","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.procs.2016.06.047","volume":"89","author":"N Farnaaz","year":"2016","unstructured":"Farnaaz, N., Jabbar, M.A.: Random forest modeling for network intrusion detection system. Procedia Comput. Sci. 89, 213\u2013217 (2016). https:\/\/doi.org\/10.1016\/j.procs.2016.06.047","journal-title":"Procedia Comput. Sci."},{"key":"46_CR12","doi-asserted-by":"publisher","first-page":"103160","DOI":"10.1016\/j.jnca.2021.103160","volume":"191","author":"MS ElSayed","year":"2021","unstructured":"ElSayed, M.S., Le-Khac, N.-A., Albahar, M.A., Jurcut, A.: A novel hybrid model for intrusion detection systems in SDNS based on CNN and a new regularization technique. J. Netw. Comput. Appl. 191, 103160 (2021). https:\/\/doi.org\/10.1016\/j.jnca.2021.103160","journal-title":"J. Netw. Comput. Appl."},{"key":"46_CR13","first-page":"1074","volume":"7","author":"A Lateef","year":"2019","unstructured":"Lateef, A., Al-Janabi, S., Al-Khateeb, B.: Survey on intrusion detection systems based on deep learning. Periodic. Eng. Nat. Sci. 7, 1074\u20131095 (2019)","journal-title":"Periodic. Eng. Nat. Sci."},{"key":"46_CR14","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/msp.2012.2205597","volume":"29","author":"G Hinton","year":"2012","unstructured":"Hinton, G., Deng, L., Yu, D., et al.: Deep neural networks for acoustic modeling in speech recognition: the shared views of four research groups. IEEE Signal Process. Mag. 29, 82\u201397 (2012). https:\/\/doi.org\/10.1109\/msp.2012.2205597","journal-title":"IEEE Signal Process. Mag."},{"key":"46_CR15","first-page":"2493","volume":"12","author":"R Collobert","year":"2011","unstructured":"Collobert, R., Weston, J., Bottou, L., et al.: Natural language processing (almost) from scratch. J. Mach. Learn. Res. 12, 2493\u20132537 (2011)","journal-title":"J. Mach. Learn. Res."},{"key":"46_CR16","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/3065386","volume":"60","author":"A Krizhevsky","year":"2017","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. Commun. ACM 60, 84\u201390 (2017). https:\/\/doi.org\/10.1145\/3065386","journal-title":"Commun. ACM"},{"key":"46_CR17","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1016\/j.patcog.2017.10.013","volume":"77","author":"J Gu","year":"2018","unstructured":"Gu, J., Wang, Z., Kuen, J., et al.: Recent advances in convolutional neural networks. Pattern Recogn. 77, 354\u2013377 (2018). https:\/\/doi.org\/10.1016\/j.patcog.2017.10.013","journal-title":"Pattern Recogn."},{"key":"46_CR18","doi-asserted-by":"publisher","unstructured":"Lin, W.-H., et al.: Using convolutional neural networks to network intrusion detection for cyber threats. In: 2018 IEEE International Conference on Applied System Invention (ICASI) (2018). https:\/\/doi.org\/10.1109\/icasi.2018.8394474","DOI":"10.1109\/icasi.2018.8394474"},{"key":"46_CR19","doi-asserted-by":"publisher","first-page":"195741","DOI":"10.1109\/access.2020.3034015","volume":"8","author":"Z Hu","year":"2020","unstructured":"Hu, Z., Wang, L., Qi, L., et al.: A novel wireless network intrusion detection method based on adaptive synthetic sampling and an improved convolutional neural network. IEEE Access 8, 195741\u2013195751 (2020). https:\/\/doi.org\/10.1109\/access.2020.3034015","journal-title":"IEEE Access"},{"key":"46_CR20","doi-asserted-by":"publisher","unstructured":"Divekar, A., et al.: Benchmarking datasets for anomaly-based network intrusion detection: KDD Cup 99 alternatives. In: 2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS) (2018). https:\/\/doi.org\/10.1109\/cccs.2018.8586840","DOI":"10.1109\/cccs.2018.8586840"},{"key":"46_CR21","doi-asserted-by":"publisher","first-page":"42210","DOI":"10.1109\/access.2019.2904620","volume":"7","author":"Y Xiao","year":"2019","unstructured":"Xiao, Y., Xing, C., Zhang, T., Zhao, Z.: An intrusion detection model based on feature reduction and convolutional neural networks. IEEE Access 7, 42210\u201342219 (2019). https:\/\/doi.org\/10.1109\/access.2019.2904620","journal-title":"IEEE Access"},{"key":"46_CR22","doi-asserted-by":"publisher","unstructured":"Komar, M., et al.: High performance adaptive system for cyber attacks detection. In: 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS) (2017). https:\/\/doi.org\/10.1109\/idaacs.2017.8095208","DOI":"10.1109\/idaacs.2017.8095208"},{"key":"46_CR23","doi-asserted-by":"publisher","first-page":"117938","DOI":"10.1016\/j.eswa.2022.117938","volume":"207","author":"A Koivu","year":"2022","unstructured":"Koivu, A., Kakko, J.-P., M\u00e4ntyniemi, S., Sairanen, M.: Quality of randomness and node dropout regularization for fitting neural networks. Expert Syst. Appl. 207, 117938 (2022). https:\/\/doi.org\/10.1016\/j.eswa.2022.117938","journal-title":"Expert Syst. Appl."},{"key":"46_CR24","doi-asserted-by":"publisher","first-page":"165263","DOI":"10.1109\/access.2020.3022633","volume":"8","author":"MS Elsayed","year":"2020","unstructured":"Elsayed, M.S., Le-Khac, N.-A., Jurcut, A.D.: INSDN: a novel SDN intrusion dataset. IEEE Access 8, 165263\u2013165284 (2020). https:\/\/doi.org\/10.1109\/access.2020.3022633","journal-title":"IEEE Access"},{"key":"46_CR25","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.cose.2019.06.005","volume":"86","author":"M Ring","year":"2019","unstructured":"Ring, M., et al.: A survey of network-based intrusion detection data sets. Comput. Secur. 86, 147\u2013167 (2019). https:\/\/doi.org\/10.1016\/j.cose.2019.06.005","journal-title":"Comput. Secur."},{"key":"46_CR26","doi-asserted-by":"publisher","first-page":"90603","DOI":"10.1109\/access.2021.3090957","volume":"9","author":"T Zoppi","year":"2021","unstructured":"Zoppi, T., Ceccarelli, A., Bondavalli, A.: Unsupervised algorithms to detect zero-day attacks: strategy and application. IEEE Access 9, 90603\u201390615 (2021). https:\/\/doi.org\/10.1109\/access.2021.3090957","journal-title":"IEEE Access"},{"key":"46_CR27","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/s10462-021-10037-9","volume":"55","author":"A Thakkar","year":"2021","unstructured":"Thakkar, A., Lohiya, R.: A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions. Artif. Intell. Rev. 55, 453\u2013563 (2021). https:\/\/doi.org\/10.1007\/s10462-021-10037-9","journal-title":"Artif. Intell. Rev."}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Internet, Data &amp; Web Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-53555-0_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T05:09:01Z","timestamp":1707800941000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-53555-0_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031535543","9783031535550"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-53555-0_46","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"14 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EIDWT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Emerging Internet, Data & Web Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Naples","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 February 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 February 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eidwt12024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/eidwt\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}