{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T21:51:27Z","timestamp":1766267487926,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":14,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811506369"},{"type":"electronic","value":"9789811506376"}],"license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-0637-6_40","type":"book-chapter","created":{"date-parts":[[2019,12,2]],"date-time":"2019-12-02T12:09:32Z","timestamp":1575288572000},"page":"471-479","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Deep Learning Approach for IDS"],"prefix":"10.1007","author":[{"given":"Zhiqiang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Mohi-Ud-Din","family":"Ghulam","sequence":"additional","affiliation":[]},{"given":"Ye","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Xuanlin","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Lifang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zejun","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Jianchao","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,1]]},"reference":[{"key":"40_CR1","unstructured":"S. Chung, K. Kim, A heuristic approach to enhance the performance of intrusion detection system using machine learning algorithms, in Proceedings of the Korea Institutes of Information Security and Cryptology Conference (CISC-W\u201915) (2015)"},{"key":"40_CR2","unstructured":"N. Gao, L. Gao, Q. Gao, H. Wang, An intrusion detection model based on deep belief networks, in 2014 Second International Conference on Advanced Cloud and Big Data (CBD) (2014), pp. 247\u2013252"},{"issue":"2","key":"40_CR3","first-page":"277","volume":"41","author":"D Shin","year":"2016","unstructured":"D. Shin, K. Choi, S. Chune, H. Choi, Malicious traffic detection using K-means. J. Korean Inst. Commun. Inf. Sci. 41(2), 277\u2013284 (2016)","journal-title":"J. Korean Inst. Commun. Inf. Sci."},{"key":"40_CR4","doi-asserted-by":"crossref","unstructured":"S. Jo, H. Sung, B. Ahn, A comparative study on the performance of SVM and an artificial neural network in intrusion detection. J. Korea Acad.-Ind. Cooperation Soc. 17(2), 703\u2013711 (2016)","DOI":"10.5762\/KAIS.2016.17.2.703"},{"key":"40_CR5","doi-asserted-by":"crossref","unstructured":"P. Laskov, P. Dssel, C. Schfer, K. Rieck, Learning intrusion detection: supervised or unsupervised?\u2019 in Proceedings of the 13th International Conference on Image Analysis and Processing (ICIAP), Cagliari, Italy, ed. by F. Roli, S. Vitulano (Springer, Berlin, 2005), pp. 50\u201357","DOI":"10.1007\/11553595_6"},{"key":"40_CR6","doi-asserted-by":"crossref","unstructured":"A. Solanas, A. Martinez-Balleste, Advances in Artificial Intelligence for Privacy Protection and Security (Intelligent Information Systems) (World Scientific, Hackensack, NJ, 2010) (Online)","DOI":"10.1142\/6707"},{"key":"40_CR7","doi-asserted-by":"publisher","DOI":"10.1201\/b15088","volume-title":"Network Anomaly Detection: A Machine Learning Perspective","author":"DK Bhattacharyya","year":"2013","unstructured":"D.K. Bhattacharyya, J.K. Kalita, Network Anomaly Detection: A Machine Learning Perspective (CRC Press, Boca Raton, FL, 2013)"},{"key":"40_CR8","unstructured":"M. Tahir, W. Hassan, A. Md Said, N. Zakaria, N. Katuk, N. Kabir, M. Omar, O. Ghazali, N. Yahya, Hybrid machine learning technique for intrusion detection system, in 5th International Conference on Computing and Informatics (ICOCI) (2015)"},{"key":"40_CR9","doi-asserted-by":"publisher","first-page":"1792","DOI":"10.1109\/ACCESS.2017.2780250","volume":"6","author":"W Wang","year":"2018","unstructured":"W. Wang et al., HAST-IDS: learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection. IEEE Access 6, 1792\u20131806 (2018)","journal-title":"IEEE Access"},{"key":"40_CR10","doi-asserted-by":"crossref","unstructured":"W. McCulloch, W. Pitts, A logical calculus of the ideas immanent in nervous activity. Bull. Math. Biophys. 5(4), 115\u2013133 (1943)","DOI":"10.1007\/BF02478259"},{"key":"40_CR11","doi-asserted-by":"crossref","unstructured":"W. McCulloch, W. Pitts, Results of the KDD\u201999 classifier learning. ACM SIGKDD Explor. Newsl. 1(2), 63\u201364 (2000)","DOI":"10.1145\/846183.846199"},{"key":"40_CR12","doi-asserted-by":"crossref","unstructured":"O. AI-Jarrah, A. Arafat, Network intrusion detection system using neural network classification of attack behavior. J. Adv. Inf. Technol. 6(1) (2015)","DOI":"10.12720\/jait.6.1.1-8"},{"key":"40_CR13","unstructured":"G. Dahl, T. Sainath, G. Hinton, Improving deep neural networks for LVCSR using rectified linear units and dropout, in 2013 IEEE International Conference on Acoustics, Speech and Signal Processing (2013), pp. 8609\u20138613"},{"key":"40_CR14","unstructured":"D. Kingma, J. Ba Adam, A Method for Stochastic Optimization, arXiv preprint \narXiv:1412.6980\n\n (2014)"}],"container-title":["Advances in Intelligent Systems and Computing","Fourth International Congress on Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-0637-6_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,3]],"date-time":"2020-04-03T05:09:12Z","timestamp":1585890552000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-0637-6_40"}},"subtitle":["Using DNN for Network Anomaly Detection"],"short-title":[],"issued":{"date-parts":[[2019,12,1]]},"ISBN":["9789811506369","9789811506376"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-0637-6_40","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,12,1]]},"assertion":[{"value":"1 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}