{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T01:32:28Z","timestamp":1775698348358,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":33,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811680588","type":"print"},{"value":"9789811680595","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-8059-5_22","type":"book-chapter","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T13:03:12Z","timestamp":1638450192000},"page":"361-378","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Intrusion Detection Model for Imbalanced Dataset Using SMOTE and Random Forest Algorithm"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0490-5387","authenticated-orcid":false,"given":"Reem","family":"Alshamy","sequence":"first","affiliation":[]},{"given":"Mossa","family":"Ghurab","sequence":"additional","affiliation":[]},{"given":"Suad","family":"Othman","sequence":"additional","affiliation":[]},{"given":"Faisal","family":"Alshami","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,1]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Basgall, M.J., Naiouf, M., Fern\u00e1ndez, A.: FDR2-BD: a fast data reduction recommendation tool for tabular big data classification. Electronics 10 (2021)","DOI":"10.3390\/electronics10151757"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Ju, A., Guo, Y., Ye, Z., Li, T., Ma, J.: HeteMSD: a big data analytics framework for targeted cyber-attacks detection using heterogeneous multisource data. Secur. Commun. Netw. 2019 (2019)","DOI":"10.1155\/2019\/5483918"},{"key":"22_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1444-5","volume-title":"Network Intrusion Detection Using Deep Learning: A Feature Learning Approach","author":"K Kim","year":"2018","unstructured":"Kim, K., Aminanto, M.E., Tanuwidjaja, H.C.: Network Intrusion Detection Using Deep Learning: A Feature Learning Approach. Springer, Heidelberg (2018)"},{"key":"22_CR4","first-page":"62","volume":"8","author":"R Alshamy","year":"2020","unstructured":"Alshamy, R., Ghurab, M.: A review of big data in network intrusion detection system: challenges, approaches, datasets, and tools. J. Comput. Sci. Eng. 8, 62\u201375 (2020)","journal-title":"J. Comput. Sci. Eng."},{"key":"22_CR5","first-page":"444","volume":"7","author":"SM Othman","year":"2018","unstructured":"Othman, S.M., Alsohybe, N.T., Ba-Alwi, F.M., Zahary, A.T.: Survey on intrusion detection system types. Int. J. Cyber-Secur. Digit. Forensics 7, 444\u2013463 (2018)","journal-title":"Int. J. Cyber-Secur. Digit. Forensics"},{"key":"22_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.12785\/ijcds\/090101","volume":"9","author":"DMS Othman","year":"2020","unstructured":"Othman, D.M.S., Hicham, R., Zoulikha, M.M.: An efficient spark-based network anomaly detection. Int. J. Comput. Digit. Syst. 9, 1\u201311 (2020)","journal-title":"Int. J. Comput. Digit. Syst."},{"issue":"1","key":"22_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-018-0145-4","volume":"5","author":"SM Othman","year":"2018","unstructured":"Othman, S.M., Ba-Alwi, F.M., Alsohybe, N.T., Al-Hashida, A.Y.: Intrusion detection model using machine learning algorithm on Big Data environment. J. Big Data 5(1), 1\u201312 (2018). https:\/\/doi.org\/10.1186\/s40537-018-0145-4","journal-title":"J. Big Data"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Bandyopadhyay, S., Chowdhury, R., Banerjee, P., Dey, S.D., Saha, B.: A Decision Tree Based Intrusion Detection System for Identification of Malicious Web Attacks. Preprints.org. (2020)","DOI":"10.20944\/preprints202007.0191.v1"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Haggag, M., Tantawy, M.M., El-Soudani, M.M.S.: Implementing a deep learning model for intrusion detection on apache spark platform. IEEE Access (2020)","DOI":"10.1109\/ACCESS.2020.3019931"},{"issue":"16","key":"22_CR10","doi-asserted-by":"publisher","first-page":"12499","DOI":"10.1007\/s00521-020-04708-x","volume":"32","author":"P Devan","year":"2020","unstructured":"Devan, P., Khare, N.: An efficient XGBoost\u2013DNN-based classification model for network intrusion detection system. Neural Comput. Appl. 32(16), 12499\u201312514 (2020). https:\/\/doi.org\/10.1007\/s00521-020-04708-x","journal-title":"Neural Comput. Appl."},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Kanimozhi, V., Jacob, T.P.: Artificial intelligence based network intrusion detection with hyper-parameter optimization tuning on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing. In: 2019 International Conference on Communication and Signal Processing (ICCSP), pp. 0033\u20130036. IEEE (2019)","DOI":"10.1109\/ICCSP.2019.8698029"},{"key":"22_CR12","unstructured":"Saravanan, S.: Performance evaluation of classification algorithms in the design of apache spark based intrusion detection system. In: 2020 5th International Conference on Communication and Electronics Systems (ICCES), pp. 443\u2013447. IEEE (2020)"},{"key":"22_CR13","doi-asserted-by":"publisher","first-page":"82512","DOI":"10.1109\/ACCESS.2019.2923640","volume":"7","author":"X Gao","year":"2019","unstructured":"Gao, X., Shan, C., Hu, C., Niu, Z., Liu, Z.: An adaptive ensemble machine learning model for intrusion detection. IEEE Access 7, 82512\u201382521 (2019)","journal-title":"IEEE Access"},{"key":"22_CR14","unstructured":"Nanda, N.B., Parikh, A.: Network intrusion detection system: classification, techniques and datasets to implement. Int. J. Future Revol. Comput. Sci. Commun. Eng. 3, 106\u2013109 (2018)"},{"key":"22_CR15","doi-asserted-by":"publisher","first-page":"11897","DOI":"10.1109\/ACCESS.2018.2810267","volume":"6","author":"K Peng","year":"2018","unstructured":"Peng, K., Leung, V.C.M., Huang, Q.: Clustering approach based on mini batch kmeans for intrusion detection system over big data. IEEE Access 6, 11897\u201311906 (2018)","journal-title":"IEEE Access"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Manzoor, M.A., Morgan, Y.: Real-time support vector machine based network intrusion detection system using Apache Storm. In: 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), pp. 1\u20135. IEEE (2016)","DOI":"10.1109\/IEMCON.2016.7746264"},{"key":"22_CR17","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/978-3-642-39712-7_23","volume-title":"Machine Learning and Data Mining in Pattern Recognition","author":"S Suthaharan","year":"2013","unstructured":"Suthaharan, S.: A single-domain, representation-learning model for big data classification of network intrusion. In: Perner, P. (ed.) MLDM 2013. LNCS (LNAI), vol. 7988, pp. 296\u2013310. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39712-7_23"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1\u20136. IEEE (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"22_CR19","doi-asserted-by":"publisher","first-page":"14","DOI":"10.9734\/ajrcos\/2021\/v7i430185","volume":"7","author":"M Ghurab","year":"2021","unstructured":"Ghurab, M., Gaphari, G., Alshami, F., Alshamy, R., Othman, S.: A detailed analysis of benchmark datasets for network intrusion detection system. Asian J. Res. Comput. Sci. 7, 14\u201333 (2021)","journal-title":"Asian J. Res. Comput. Sci."},{"key":"22_CR20","unstructured":"NSL-KDD dataset. https:\/\/www.unb.ca\/cic\/datasets\/nsl.html. Accessed 16 Dec 2020"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Ferrag, M.A., Maglaras, L., Moschoyiannis, S., Janicke, H.: Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J. Inf. Secur. Appl. 50 (2020)","DOI":"10.1016\/j.jisa.2019.102419"},{"key":"22_CR22","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1007\/978-981-33-6835-4_37","volume-title":"Advances in Cyber Security","author":"AN Jaber","year":"2021","unstructured":"Jaber, A.N., Anwar, S., Khidzir, N.Z.B., Anbar, M.: A detailed analysis on intrusion identification mechanism in cloud computing and datasets. In: Anbar, M., Abdullah, N., Manickam, S. (eds.) ACeS 2020. CCIS, vol. 1347, pp. 550\u2013573. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-33-6835-4_37"},{"key":"22_CR23","unstructured":"Tunduny, T.K.: A HIV\/AIDS viral load prediction system using artificial neural networks (2017)"},{"key":"22_CR24","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321\u2013357 (2002). https:\/\/doi.org\/10.1613\/jair.953","journal-title":"J. Artif. Intell. Res."},{"key":"22_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-020-00349-y","volume":"7","author":"J Tanha","year":"2020","unstructured":"Tanha, J., Abdi, Y., Samadi, N., Razzaghi, N., Asadpour, M.: Boosting methods for multi-class imbalanced data classification: an experimental review. J. Big Data 7, 1\u201347 (2020)","journal-title":"J. Big Data"},{"key":"22_CR26","doi-asserted-by":"crossref","unstructured":"Patil, A., Framewala, A., Kazi, F.: Explainability of SMOTE based oversampling for imbalanced dataset problems. In: 2020 3rd International Conference on Information and Computer Technologies (ICICT), pp. 41\u201345. IEEE (2020)","DOI":"10.1109\/ICICT50521.2020.00015"},{"key":"22_CR27","doi-asserted-by":"crossref","unstructured":"Brown, G.: Ensemble Learning. Encyclopedia of Machine Learning, vol. 312 (2010)","DOI":"10.1007\/978-0-387-30164-8_252"},{"key":"22_CR28","unstructured":"Araar, A., Bouslama, R.: A comparative study of classification models for detection in IP networks intrusions. J. Theor. Appl. Inf. Technol. 64 (2014)"},{"key":"22_CR29","unstructured":"Breiman, L., Friedman, J., Stone, C.J., Olshen, R.A.: Classification and Regression Trees. CRC Press (1984)"},{"key":"22_CR30","doi-asserted-by":"crossref","unstructured":"Obeidat, I., Hamadneh, N., Alkasassbeh, M., Almseidin, M., AlZubi, M.: Intensive pre-processing of KDD Cup 99 for network intrusion classification using machine learning techniques. International Association of Online Engineering (2019)","DOI":"10.3991\/ijim.v13i01.9679"},{"key":"22_CR31","doi-asserted-by":"crossref","unstructured":"Ye, K.: Key feature recognition algorithm of network intrusion signal based on neural network and support vector machine. Symmetry 3 (2019)","DOI":"10.3390\/sym11030380"},{"key":"22_CR32","doi-asserted-by":"publisher","first-page":"52843","DOI":"10.1109\/ACCESS.2018.2869577","volume":"6","author":"M Al-Qatf","year":"2018","unstructured":"Al-Qatf, M., Lasheng, Y., Al-Habib, M., Al-Sabahi, K.: Deep learning approach combining sparse autoencoder with SVM for network intrusion detection. IEEE Access 6, 52843\u201352856 (2018)","journal-title":"IEEE Access"},{"key":"22_CR33","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/TETCI.2017.2772792","volume":"2","author":"N Shone","year":"2018","unstructured":"Shone, N., Ngoc, T.N., Phai, V.D., Shi, Q.: A deep learning approach to network intrusion detection. IEEE Trans. Emerg. Top. Comput. Intell. 2, 41\u201350 (2018)","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."}],"container-title":["Communications in Computer and Information Science","Advances in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-8059-5_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T14:08:33Z","timestamp":1699884513000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-8059-5_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811680588","9789811680595"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-8059-5_22","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACeS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Penang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aces2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.aces.usm.my\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"92","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}