{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T21:30:27Z","timestamp":1773869427332,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"20","license":[{"start":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T00:00:00Z","timestamp":1628553600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T00:00:00Z","timestamp":1628553600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1007\/s00500-021-06067-8","type":"journal-article","created":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T11:38:28Z","timestamp":1628595508000},"page":"12667-12683","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":49,"title":["Ensemble classification for intrusion detection via feature extraction based on deep Learning"],"prefix":"10.1007","volume":"25","author":[{"given":"Maryam","family":"Yousefnezhad","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6493-0539","authenticated-orcid":false,"given":"Javad","family":"Hamidzadeh","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Aliannejadi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,10]]},"reference":[{"key":"6067_CR1","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1016\/j.asoc.2015.10.011","volume":"38","author":"AA Aburomman","year":"2016","unstructured":"Aburomman AA, Reaz MB (2016) A novel SVM-kNN-PSO ensemble method for intrusion detection system. Appl. Soft Comput. 38:360\u2013372","journal-title":"Appl. Soft Comput."},{"key":"6067_CR2","doi-asserted-by":"crossref","unstructured":"Ahmed M, Mahmood AN, Hu J (2016) A survey of network anomaly detection techniques. J Netw Comput Appl 60:19\u201331","DOI":"10.1016\/j.jnca.2015.11.016"},{"key":"6067_CR3","doi-asserted-by":"publisher","unstructured":"Al-Enezi KA, Al-Shaikhli IF, Al-Kandari AR, Al-Tayyar LZ (2014) A survey of intrusion detection system using case study Kuwait governments entities. Int Conf Adv Comput Sci Appl Technol. https:\/\/doi.org\/10.1109\/ACSAT.2014.14","DOI":"10.1109\/ACSAT.2014.14"},{"issue":"5","key":"6067_CR4","doi-asserted-by":"publisher","first-page":"10549","DOI":"10.1007\/s10586-017-1109-8","volume":"22","author":"S Aljawarneh","year":"2019","unstructured":"Aljawarneh S, Yassein MB, Aljundi M (2019) An enhanced J48 classication algorithm for the anomaly intrusion detection systems. Clust. Comput. 22(5):10549\u201310565. https:\/\/doi.org\/10.1007\/s10586-017-1109-8","journal-title":"Clust. Comput."},{"key":"6067_CR5","doi-asserted-by":"publisher","unstructured":"Aloqaily M, Otoum S, Al Ridhawi I, Jararweh Y (2019) An Intrusion Detection System for Connected Vehicles in Smart Cities. In: Ad Hoc Networks. https:\/\/doi.org\/10.1016\/j.adhoc.2019.02.001","DOI":"10.1016\/j.adhoc.2019.02.001"},{"key":"6067_CR6","unstructured":"Anderson JP (1908) Computer security threat monitoring and surveillance. Int J Comput Sci Mob Comput"},{"key":"6067_CR7","doi-asserted-by":"crossref","unstructured":"Breiman L (2001) Random forests. In: Machine learning, Pages 5\u201332","DOI":"10.1023\/A:1010933404324"},{"key":"6067_CR8","doi-asserted-by":"publisher","DOI":"10.1201\/9781315139470","volume-title":"Classification and regression trees","author":"L Breiman","year":"2017","unstructured":"Breiman L (2017) Classification and regression trees. Routledge, NewYork"},{"key":"6067_CR9","unstructured":"CICIDS2017dataset2018. https:\/\/www.unb.ca\/cic\/datasets\/ids-2017.html\/.AccessedJanuary2,2019"},{"key":"6067_CR10","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TIT.1967.1053964","volume":"13","author":"T Cover","year":"1967","unstructured":"Cover T, Hart P (1967) Nearest neighbor pattern classification. EEE Trans Inf Theory 13:21\u201327. https:\/\/doi.org\/10.1109\/TIT.1967.1053964","journal-title":"EEE Trans Inf Theory"},{"key":"6067_CR11","unstructured":"Dem\u0161ar (2006) Statistical comparisons of classifiers over multiple data sets. J Mach Learn Res, Pages 1\u201330"},{"key":"6067_CR12","doi-asserted-by":"publisher","unstructured":"Elmasry W, Akbulut A, Zaim AH (2020) Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic. Comput Netw 168. https:\/\/doi.org\/10.1016\/j.comnet.2019. 107042","DOI":"10.1016\/j.comnet.2019"},{"key":"6067_CR13","doi-asserted-by":"publisher","unstructured":"El-Sappagh S, Mohammed AS, AlSheshtawy TA (2019) Classification procedures for intrusion detection based on KDD CUP 99 data set. Int J Netw Secur 11(3):41525\u201341550. https:\/\/doi.org\/10.5121\/ijnsa.2019.11302","DOI":"10.5121\/ijnsa.2019.11302"},{"key":"6067_CR14","doi-asserted-by":"crossref","unstructured":"Folino G, Pisani FS, Sabatino PA (2016) A distributed intrusion detection framework based on evolved specialized ensembles of classifiers. Appl Evol Comput 315\u2013331","DOI":"10.1007\/978-3-319-31204-0_21"},{"key":"6067_CR15","doi-asserted-by":"publisher","first-page":"82512","DOI":"10.1109\/ACCESS.2019.2923640","volume":"7","author":"X Gao","year":"2019","unstructured":"Gao X, Shan C, Hu C, Niu Z, Liu Z (2019) An adaptive ensemble machine learning model for intrusion detection. IEEE Access 7:82512\u201382521. https:\/\/doi.org\/10.1109\/ACCESS.2019.2923640","journal-title":"IEEE Access"},{"key":"6067_CR16","doi-asserted-by":"publisher","unstructured":"Gautam SK, Om H (2016) Anomaly detection system using entropy based technique. In: 1st international conference on next generation computing technologies (NGCT). https:\/\/doi.org\/10.1109\/NGCT.2015.7375219","DOI":"10.1109\/NGCT.2015.7375219"},{"key":"6067_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.mechatronics.2015.09.004","volume":"34","author":"J G\u00fcnther","year":"2016","unstructured":"G\u00fcnther J, Pilarski PM, Helfrich G, Shen H, Diepold K (2016) Intelligent laser welding through representation, prediction, and control learning: an architecture with deep neural networks and reinforcement learning. Nature 34:1\u201311. https:\/\/doi.org\/10.1016\/j.mechatronics.2015.09.004","journal-title":"Nature"},{"key":"6067_CR18","doi-asserted-by":"crossref","unstructured":"Hamidzadeh J, Monsefi R, Yazdi HS (2016) Large symmetric margin instance selection algorithm. Int J Mach Learn Cybernet 7.1:25\u201345","DOI":"10.1007\/s13042-014-0239-z"},{"key":"6067_CR19","doi-asserted-by":"crossref","unstructured":"Hamidzadeh J, Moslemnejad S (2019) Identification of uncertainty and decision boundary for SVM classification training using belief function. Appl Intel 49","DOI":"10.1007\/s10489-018-1374-0"},{"key":"6067_CR20","doi-asserted-by":"publisher","unstructured":"Javid M, Hamidzadeh J (2019) An active multi-class classifcation using privileged information and belief function. Int J Mach Learn Cybernet, 1\u201314. https:\/\/doi.org\/10.1007\/s13042-019-00991-w","DOI":"10.1007\/s13042-019-00991-w"},{"key":"6067_CR21","unstructured":"Kaushik SS, Deshmukh PR (2011) Detection of attacks in an intrusion detection system. Int J Comput Sci Inf Technol 2:982\u2013986"},{"key":"6067_CR22","doi-asserted-by":"crossref","unstructured":"Keramati A, Jafari-Marandi R, Aliannejadi M, Ahmadian I, Mozaffari M, Abbasi U (2014) Improved churn prediction in telecommunication industry using data mining techniques. Appl Soft Comput 24:994\u20131012","DOI":"10.1016\/j.asoc.2014.08.041"},{"issue":"3","key":"6067_CR23","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1080\/23742917.2019.1623475","volume":"3","author":"SR Khonde","year":"2019","unstructured":"Khonde SR, Ulagamuthalvi V (2019) Ensemble-based semi-supervised learning approach for a distributed intrusion detection system. J Cyber Secur Technol 3(3):163\u2013188. https:\/\/doi.org\/10.1080\/23742917.2019.1623475","journal-title":"J Cyber Secur Technol"},{"issue":"4","key":"6067_CR24","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1017\/S0269888998214044","volume":"13","author":"M Kubat","year":"1999","unstructured":"Kubat M (1999) Neural networks: a comprehensive foundation by Simon Haykin. The Knowl Eng Rev 13(4):409\u2013412. https:\/\/doi.org\/10.1017\/S0269888998214044","journal-title":"The Knowl Eng Rev"},{"key":"6067_CR25","doi-asserted-by":"publisher","unstructured":"Kumari VV, Varma PR (2017) A semi-supervised intrusion detection system using active learning SVM and fuzzy c-means clustering. Int Conf I- SMAC. https:\/\/doi.org\/10.1109\/I-SMAC.2017.8058397","DOI":"10.1109\/I-SMAC.2017.8058397"},{"key":"6067_CR26","doi-asserted-by":"crossref","unstructured":"LeCun Y, Bengio Y, Hinton G (2015) Deep learning. In: Nature, pages 436\u2013 444","DOI":"10.1038\/nature14539"},{"key":"6067_CR27","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.chaos.2018.03.010","volume":"110","author":"L Li","year":"2018","unstructured":"Li L, Zhang H, Peng H, Yang Y (2018) Nearest neighbors based density peaks approach to intrusion detection. Expert Syst Appl 110:33\u201340. https:\/\/doi.org\/10.1016\/j.chaos.2018.03.010","journal-title":"Expert Syst Appl"},{"issue":"5","key":"6067_CR28","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1016\/S0167-4048(02)00514-X","volume":"21","author":"Y Liao","year":"2002","unstructured":"Liao Y, Vemuri VR (2002) Use of k-nearest neighbor classifier for intrusion detection. Comput Secur 21(5):439\u2013448","journal-title":"Comput Secur"},{"key":"6067_CR29","doi-asserted-by":"crossref","unstructured":"Li W, Meng W, Kwok LF, Horace HS (2017) Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivitybased trust management model. J Netw Comput Appl 77:135\u2013145","DOI":"10.1016\/j.jnca.2016.09.014"},{"key":"6067_CR30","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.knosys.2015.01.009","volume":"78","author":"WC Lin","year":"2015","unstructured":"Lin WC, Ke SW, Tsai CF (2015) CANN. CANN: an intrusion detection system based on combining cluster centers and nearest neighbors. Knowledgebased Syst 78:13\u201321. https:\/\/doi.org\/10.1016\/j.knosys.2015.01.009","journal-title":"Knowledgebased Syst"},{"key":"6067_CR31","doi-asserted-by":"publisher","unstructured":"Ludwig SA (2019) Applying a Neural Network Ensemble to Intrusion Detection. J Artif Intel Soft Comput Res. https:\/\/doi.org\/10.2478\/jaiscr-2019-0002Openaccess","DOI":"10.2478\/jaiscr-2019-0002Openaccess"},{"key":"6067_CR32","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1016\/j.patcog.2016.07.004","volume":"60","author":"VH Moghaddam","year":"2016","unstructured":"Moghaddam VH, Hamidzadeh J (2016) New Hermite orthogonal polynomial kernel and combined kernels in support vector machine classifier. Pattern Recogn 60:921\u2013935","journal-title":"Pattern Recogn"},{"key":"6067_CR33","doi-asserted-by":"crossref","unstructured":"Moustafa N, Hu J, Slay J (2019) A holistic review of network anomaly detection systems: a comprehensive survey. J Netw Comput Appl 128:33\u201355","DOI":"10.1016\/j.jnca.2018.12.006"},{"key":"6067_CR34","unstructured":"Murphy KP (2006) Naive bayes classifiers. In: Security and privacy issues in sensor networks and IoT 18"},{"issue":"3","key":"6067_CR35","first-page":"482","volume":"5","author":"MR Naphade","year":"2016","unstructured":"Naphade MR, Raut MP, Dande AA (2016) A review of intrusion detection system basic concepts. Int J Comput Sci Mob Comput 5(3):482\u2013485","journal-title":"Int J Comput Sci Mob Comput"},{"key":"6067_CR36","doi-asserted-by":"publisher","unstructured":"Park TJ, Chang JH (2018) Dempster-Shafer D2 theory for enhanced statistical modelbased voice activity detection. Comput Speech Language 47(3):47\u201358. https:\/\/doi.org\/10.1016\/j.csl.2017.07.0012","DOI":"10.1016\/j.csl.2017.07.0012"},{"key":"6067_CR37","unstructured":"Platt J (1999) Probabilistic outputs for support vector machines and comparisons to regularized likelihood methods. In: Advances in large margin classifiers"},{"key":"6067_CR38","doi-asserted-by":"publisher","unstructured":"Saidi M, Bechar ME, Settouti N, Chikh MA (2018) Instances selection algorithm by ensemble margin. J Exp Theor Artif Intel 30(3):457\u2013478. https:\/\/doi.org\/10.1080\/0952813X.2017.1409283","DOI":"10.1080\/0952813X.2017.1409283"},{"key":"6067_CR39","doi-asserted-by":"crossref","unstructured":"Schapire RE, Freund Y, Bartlett P, Lee WS (1998) Boosting the margin: a new explanation for the effectiveness of voting methods. Ann Stat 265):1651\u20131686","DOI":"10.1214\/aos\/1024691352"},{"key":"6067_CR40","doi-asserted-by":"publisher","unstructured":"Schmidhuber J (2015) Deep learning in neural networks: an overview. Neural Netw 61:85\u2013117. https:\/\/doi.org\/10.1016\/j.neunet.2014.09.003","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"6067_CR41","doi-asserted-by":"publisher","DOI":"10.1515\/9780691214696","volume-title":"A mathematical theory of evidence","author":"G Shafer","year":"1976","unstructured":"Shafer G (1976) A mathematical theory of evidence. Princeton Universityy, London"},{"issue":"22","key":"6067_CR42","doi-asserted-by":"publisher","first-page":"8609","DOI":"10.1016\/j.eswa.2015.07.015","volume":"42","author":"R Singh","year":"2015","unstructured":"Singh R, Kumar H, Singla RK (2015) An intrusion detection system using network traffic profiling and online sequential extreme learning machine. Exp Syst Appl 42(22):8609\u20138624","journal-title":"Exp Syst Appl"},{"key":"6067_CR43","doi-asserted-by":"crossref","unstructured":"Swami R, Dave M, Ranga V (2020) Voting-based intrusion detection framework for securing software-defined networks. In: Concurrency and computation: practice and experience","DOI":"10.36227\/techrxiv.12720362"},{"key":"6067_CR44","doi-asserted-by":"publisher","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. In: IEEE symposium on computational intelligence for security and defense applications, pages 53\u201358. https:\/\/doi.org\/10.1109\/CISDA.2009.53565284","DOI":"10.1109\/CISDA.2009.53565284"},{"key":"6067_CR45","unstructured":"UNSW-NB15dataset2017. https:\/\/www.unsw.adfa.edu.au\/unsw-canberra-cyber\/cybersecurity\/ADFA-NB15-Datasets\/.AccessedOctober19 (2018)"},{"key":"6067_CR46","doi-asserted-by":"publisher","unstructured":"Vinayakumar R, Alazab M, Soman KP, Poornachandran P, Al-Nemrat A, Venkatraman S (2019) Deep learning approach for intelligent intrusion detection system. IEEE Access 7:41525\u201341550. https:\/\/doi.org\/10.1109\/ACCESS.2019.2895334","DOI":"10.1109\/ACCESS.2019.2895334"},{"key":"6067_CR47","unstructured":"Vincent P, Larochelle H, Lajoie I, Bengio Y, Manzagol PA (2010) Stacked denoising autoencoders: learning useful representations in a deep network with a local denoising criterion. J Mach Learn Res, 3371\u20133408"},{"key":"6067_CR48","doi-asserted-by":"publisher","unstructured":"Zabihi M, Jahan MV, Hamidzadeh J (2014) A density based clustering approach for web robot detection. In: 4th international conference on computer and knowledge engineering (ICCKE). https:\/\/doi.org\/10.1109\/ICCKE.2014.6993362","DOI":"10.1109\/ICCKE.2014.6993362"},{"key":"6067_CR49","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.ress.2010.07.012","volume":"96","author":"K Zaman","year":"2011","unstructured":"Zaman K, Rangavajhala S, McDonald MP, Mahadevan SA (2011) A probabilistic approach for representation of interval uncertainty. Reliab Eng Syst Saf 96:117\u2013130. https:\/\/doi.org\/10.1016\/j.ress.2010.07.012","journal-title":"Reliab Eng Syst Saf"},{"key":"6067_CR50","doi-asserted-by":"publisher","unstructured":"Zarpel\u00e3o BB, Miani RS, Kawakani CT, de Alvarenga SC (2017) A survey of intrusion detection in internet of things. J Netw Comput Appl 84:25\u201337. https:\/\/doi.org\/10.1016\/j.jnca.2017.02.009","DOI":"10.1016\/j.jnca.2017.02.009"},{"key":"6067_CR51","doi-asserted-by":"crossref","unstructured":"Zhang H, Huang L, Wu CQ, Li Z (2020) An effective convolutional neural network based on SMOTE and Gaussian mixture model for intrusion detection in imbalanced dataset. Comput Netw","DOI":"10.1016\/j.comnet.2020.107315"},{"key":"6067_CR52","doi-asserted-by":"crossref","unstructured":"Zhang Y, Liu B, Cai J, Zhang S (2017) Ensemble weighted extreme learning machine for imbalanced data classification based on differential evolution. Neur Comput Appl 28:259\u2013267","DOI":"10.1007\/s00521-016-2342-4"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-021-06067-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-021-06067-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-021-06067-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,23]],"date-time":"2021-09-23T10:03:01Z","timestamp":1632391381000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-021-06067-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,10]]},"references-count":52,"journal-issue":{"issue":"20","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["6067"],"URL":"https:\/\/doi.org\/10.1007\/s00500-021-06067-8","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-591679\/v1","asserted-by":"object"}]},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,10]]},"assertion":[{"value":"22 July 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 August 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All Authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors. Informed consent was obtained from all individual participants included in the study.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}