{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T01:05:53Z","timestamp":1770512753709,"version":"3.49.0"},"reference-count":65,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1007\/s10207-022-00616-4","type":"journal-article","created":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T18:03:47Z","timestamp":1665079427000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Intrusion detection system over real-time data traffic using machine learning methods with feature selection approaches"],"prefix":"10.1007","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2834-9998","authenticated-orcid":false,"given":"Gulab","family":"Sah","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1920-1913","authenticated-orcid":false,"given":"Subhasish","family":"Banerjee","sequence":"additional","affiliation":[]},{"given":"Sweety","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,6]]},"reference":[{"issue":"3","key":"616_CR1","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1353-4858(16)30026-5","volume":"2016","author":"D Larson","year":"2016","unstructured":"Larson, D.: Distributed denial of service attacks\u2013holding back the flood. Netw. Secur. 2016(3), 5\u20137 (2016)","journal-title":"Netw. Secur."},{"key":"616_CR2","doi-asserted-by":"crossref","unstructured":"Almseidin, M., Alzubi, M., Kovacs, S., Alkasassbeh, M.: Evaluation of machine learning algorithms for intrusion detection system. In: 2017 IEEE 15th International Symposium on Intelligent Systems and Informatics (SISY), pp. 000277\u2013000282. IEEE (2017)","DOI":"10.1109\/SISY.2017.8080566"},{"issue":"1","key":"616_CR3","first-page":"8","volume":"12","author":"SH Kok","year":"2019","unstructured":"Kok, S.H., Abdullah, A., Jhanjhi, N.Z., Supramaniam, M.: A review of intrusion detection system using machine learning approach. Int. J. Eng. Res. Technol. 12(1), 8\u201315 (2019)","journal-title":"Int. J. Eng. Res. Technol."},{"key":"616_CR4","doi-asserted-by":"crossref","unstructured":"Al-Jarrah, O.Y., Siddiqui, A., Elsalamouny, M., Yoo, P.D., Muhaidat, S., Kim, K.: Machine-learning-based feature selection techniques for large-scale network intrusion detection. In: 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 177\u2013181. IEEE (2014)","DOI":"10.1109\/ICDCSW.2014.14"},{"issue":"18","key":"616_CR5","doi-asserted-by":"publisher","first-page":"162633","DOI":"10.4108\/eai.13-7-2018.162633","volume":"6","author":"HN Thanh","year":"2019","unstructured":"Thanh, H.N., Van Lang, T.: An approach to reduce data dimension in building effective network intrusion detection systems. EAI Endorsed Trans. Context Aware Syst. Appl. 6(18), 162633 (2019)","journal-title":"EAI Endorsed Trans. Context Aware Syst. Appl."},{"key":"616_CR6","doi-asserted-by":"crossref","unstructured":"Chomboon, K., Chujai, P., Teerarassamee, P., Kerdprasop, K., Kerdprasop, N.: An empirical study of distance metrics for k-nearest neighbor algorithm. In: Proceedings of the 3rd International Conference on Industrial Application Engineering, pp. 280\u2013285 (2015)","DOI":"10.12792\/iciae2015.051"},{"issue":"1","key":"616_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.asoc.2009.06.019","volume":"10","author":"SX Wu","year":"2010","unstructured":"Wu, S.X., Banzhaf, W.: The use of computational intelligence in intrusion detection systems: a review. Appl. Soft Comput. 10(1), 1\u201335 (2010)","journal-title":"Appl. Soft Comput."},{"issue":"1","key":"616_CR8","doi-asserted-by":"publisher","first-page":"33","DOI":"10.3141\/1822-05","volume":"1822","author":"S Mukkamala","year":"2003","unstructured":"Mukkamala, S., Sung, A.H.: Feature selection for intrusion detection with neural networks and support vector machines. Transp. Res. Rec. 1822(1), 33\u201339 (2003)","journal-title":"Transp. Res. Rec."},{"issue":"9","key":"616_CR9","first-page":"1531","volume":"5","author":"F Fleuret","year":"2004","unstructured":"Fleuret, F.: Fast binary feature selection with conditional mutual information. J. Mach. Learn. Res. 5(9), 1531\u20131555 (2004)","journal-title":"J. Mach. Learn. Res."},{"issue":"4","key":"616_CR10","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.cose.2004.09.008","volume":"24","author":"S Chebrolu","year":"2005","unstructured":"Chebrolu, S., Abraham, A., Thomas, J.P.: Feature deduction and ensemble design of intrusion detection systems. Comput. Secur. 24(4), 295\u2013307 (2005)","journal-title":"Comput. Secur."},{"issue":"3","key":"616_CR11","first-page":"196","volume":"4","author":"T-S Chou","year":"2008","unstructured":"Chou, T.-S., Yen, K.K., Luo, J.: Network intrusion detection design using feature selection of soft computing paradigms. Int. J. Comput. Intell. 4(3), 196\u2013208 (2008)","journal-title":"Int. J. Comput. Intell."},{"key":"616_CR12","doi-asserted-by":"crossref","unstructured":"Heba, F.E., Darwish, A., Hassanien, A.E., Abraham, A.: Principle components analysis and support vector machine based intrusion detection system. In: 2010 10th International Conference on Intelligent Systems Design and Applications, pp. 363\u2013367. IEEE (2010)","DOI":"10.1109\/ISDA.2010.5687239"},{"issue":"3","key":"616_CR13","first-page":"217","volume":"4","author":"A Zainal","year":"2009","unstructured":"Zainal, A., Maarof, M.A., Shamsuddin, S.M.: Ensemble classifiers for network intrusion detection system. J. Inf. Assur. Secur. 4(3), 217\u2013225 (2009)","journal-title":"J. Inf. Assur. Secur."},{"issue":"12","key":"616_CR14","first-page":"1848","volume":"2","author":"S Revathi","year":"2013","unstructured":"Revathi, S., Malathi, A.: A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. Int. J. Eng. Res. Technol. (IJERT) 2(12), 1848\u20131853 (2013)","journal-title":"Int. J. Eng. Res. Technol. (IJERT)"},{"issue":"4","key":"616_CR15","doi-asserted-by":"publisher","first-page":"1690","DOI":"10.1016\/j.eswa.2013.08.066","volume":"41","author":"G Kim","year":"2014","unstructured":"Kim, G., Lee, S., Kim, S.: A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Syst. Appl. 41(4), 1690\u20131700 (2014)","journal-title":"Expert Syst. Appl."},{"issue":"15","key":"616_CR16","doi-asserted-by":"publisher","first-page":"9731","DOI":"10.1007\/s00500-021-05893-0","volume":"25","author":"G Kocher","year":"2021","unstructured":"Kocher, G., Kumar, G.: Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges. Soft. Comput. 25(15), 9731\u20139763 (2021)","journal-title":"Soft. Comput."},{"issue":"4","key":"616_CR17","first-page":"33","volume":"11","author":"S Jo","year":"2015","unstructured":"Jo, S., Sung, H., Ahn, B.: A comparative study on the performance of intrusion detection using decision tree and artificial neural network models. J. Korea Soc. Digit. Ind. Inf. Manag. 11(4), 33\u201345 (2015)","journal-title":"J. Korea Soc. Digit. Ind. Inf. Manag."},{"issue":"5","key":"616_CR18","first-page":"12","volume":"15","author":"SA Jebur","year":"2015","unstructured":"Jebur, S.A., Nasereddin, H.O.: Enhanced solutions for misuse network intrusion detection system using sga and ssga. IJCSNS Int. J. Comput. Sci. Netw. Secur. 15(5), 12\u201318 (2015)","journal-title":"IJCSNS Int. J. Comput. Sci. Netw. Secur."},{"issue":"4","key":"616_CR19","doi-asserted-by":"publisher","first-page":"2909","DOI":"10.3233\/JIFS-169234","volume":"32","author":"P Mishra","year":"2017","unstructured":"Mishra, P., Pilli, E.S., Varadharajan, V., Tupakula, U.: PSI-NetVisor: program semantic aware intrusion detection at network and hypervisor layer in cloud. J. Intell. Fuzzy Syst. 32(4), 2909\u20132921 (2017)","journal-title":"J. Intell. Fuzzy Syst."},{"key":"616_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01596-5","author":"SM Mousavi","year":"2019","unstructured":"Mousavi, S.M., Majidnezhad, V., Naghipour, A.: A new intelligent intrusion detector based on ensemble of decision trees. J. Ambient Intell. Humaniz. Comput. (2019). https:\/\/doi.org\/10.1007\/s12652-019-01596-5","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"616_CR21","doi-asserted-by":"crossref","unstructured":"Sah, G., Banerjee, S.: Feature reduction and classifications techniques for intrusion detection system. In: 2020 International Conference on Communication and Signal Processing (ICCSP), pp. 1543\u20131547. IEEE (2020)","DOI":"10.1109\/ICCSP48568.2020.9182216"},{"issue":"1","key":"616_CR22","doi-asserted-by":"publisher","first-page":"1249","DOI":"10.1007\/s12652-020-02167-9","volume":"12","author":"A Thakkar","year":"2021","unstructured":"Thakkar, A., Lohiya, R.: Attack classification using feature selection techniques: a comparative study. J. Ambient. Intell. Humaniz. Comput. 12(1), 1249\u20131266 (2021). https:\/\/doi.org\/10.1007\/s12652-020-02167-9","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"616_CR23","doi-asserted-by":"publisher","first-page":"102158","DOI":"10.1016\/j.cose.2020.102158","volume":"103","author":"J Gu","year":"2021","unstructured":"Gu, J., Shan, Lu.: An effective intrusion detection approach using SVM with na\u00efve Bayes feature embedding. Comput. Secur. 103, 102158 (2021)","journal-title":"Comput. Secur."},{"key":"616_CR24","unstructured":"https:\/\/www.unb.ca\/cic\/datasets\/nsl.html"},{"key":"616_CR25","unstructured":"Intrusion Detection Evaluation Dataset (CICIDS2017) (2017). https:\/\/www.unb.ca\/cic\/datasets\/ids-2017.html"},{"key":"616_CR26","doi-asserted-by":"crossref","unstructured":"Engelen, G., Rimmer, V., Joosen, W.: Troubleshooting an intrusion detection dataset: the CICIDS2017 case study. In: 2021 IEEE Security and Privacy Workshops (SPW), pp. 7\u201312. IEEE (2021)","DOI":"10.1109\/SPW53761.2021.00009"},{"issue":"3.24","key":"616_CR27","first-page":"479","volume":"7","author":"R Panigrahi","year":"2018","unstructured":"Panigrahi, R., Borah, S.: A detailed analysis of CICIDS2017 dataset for designing intrusion detection systems. Int. J. Eng. Technol. 7(3.24), 479\u2013482 (2018)","journal-title":"Int. J. Eng. Technol."},{"issue":"10","key":"616_CR28","doi-asserted-by":"publisher","first-page":"4802","DOI":"10.1109\/TNNLS.2017.2771290","volume":"29","author":"S Wang","year":"2018","unstructured":"Wang, S., Minku, L.L., Yao, X.: A systematic study of online class imbalance learning with concept drift. IEEE Trans. Neural Netw. Learn. Syst. 29(10), 4802\u20134821 (2018). https:\/\/doi.org\/10.1109\/TNNLS.2017.2771290","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"616_CR29","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.jnca.2018.12.006","volume":"128","author":"N Moustafa","year":"2019","unstructured":"Moustafa, N., Jiankun, Hu., Slay, J.: A holistic review of network anomaly detection systems: a comprehensive survey. J. Netw. Comput. Appl. 128, 33\u201355 (2019)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1\u20133","key":"616_CR30","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1080\/19393555.2015.1125974","volume":"25","author":"N Moustafa","year":"2016","unstructured":"Moustafa, N., Slay, J.: The evaluation of network anomaly detection systems: statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inf. Secur. J. Glob. Perspect. 25(1\u20133), 18\u201331 (2016)","journal-title":"Inf. Secur. J. Glob. Perspect."},{"key":"616_CR31","doi-asserted-by":"crossref","unstructured":"Xanthopoulos, P., Pardalos, P.M., Trafalis, T.B. Principal component analysis. In: Robust Data Mining, pp. 21\u201326. Springer, New York, NY (2013)","DOI":"10.1007\/978-1-4419-9878-1_3"},{"key":"616_CR32","doi-asserted-by":"crossref","unstructured":"Saeys, Y., Abeel, T., Van de PeerY.: \"Robust feature selection using ensemble feature selection techniques. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp. 313\u2013325. Springer, Berlin (2008)","DOI":"10.1007\/978-3-540-87481-2_21"},{"key":"616_CR33","doi-asserted-by":"crossref","unstructured":"Doan, D.M., Jeong, D.H., Ji, S.-Y.: Designing a feature selection technique for analyzing mixed data. In: 2020 10th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0046\u20130052. IEEE (2020)","DOI":"10.1109\/CCWC47524.2020.9031193"},{"key":"616_CR34","unstructured":"Powell, A., Bates, D., Van Wyk, C., de Abreu, D.: A cross-comparison of feature selection algorithms on multiple cyber security data-sets. In: FAIR, pp. 196\u2013207 (2019)"},{"key":"616_CR35","doi-asserted-by":"crossref","unstructured":"Chen, X., Jeong, J.C.: Enhanced recursive feature elimination. In: Sixth International Conference on Machine Learning and Applications (ICMLA 2007), pp. 429\u2013435. IEEE (2007)","DOI":"10.1109\/ICMLA.2007.35"},{"issue":"1","key":"616_CR36","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1023\/A:1012487302797","volume":"46","author":"I Guyon","year":"2002","unstructured":"Guyon, I., Weston, J., Barnhill, S., Vapnik, V.: Gene selection for cancer classification using support vector machines. Mach. Learn. 46(1), 389\u2013422 (2002)","journal-title":"Mach. Learn."},{"issue":"3","key":"616_CR37","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/21.97458","volume":"21","author":"SR Safavian","year":"1991","unstructured":"Safavian, S.R., Landgrebe, D.: A survey of decision tree classifier methodology. IEEE Trans. Syst. Man Cybern. 21(3), 660\u2013674 (1991)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"issue":"13","key":"616_CR38","doi-asserted-by":"publisher","first-page":"4579","DOI":"10.3390\/s21134579","volume":"21","author":"M Alwateer","year":"2021","unstructured":"Alwateer, M., Almars, A.M., Areed, K.N., Elhosseini, M.A., Haikal, A.Y., Badawy, M.: Ambient healthcare approach with hybrid whale optimization algorithm and Na\u00efve Bayes classifier. Sensors 21(13), 4579 (2021)","journal-title":"Sensors"},{"key":"616_CR39","doi-asserted-by":"crossref","unstructured":"Sen, P.C., Hajra, M., Ghosh, M.: Supervised classification algorithms in machine learning: a survey and review. In: Emerging Technology in Modelling and Graphics, pp. 99\u2013111. Springer, Singapore (2020)","DOI":"10.1007\/978-981-13-7403-6_11"},{"issue":"9","key":"616_CR40","doi-asserted-by":"publisher","first-page":"3014","DOI":"10.1016\/j.asoc.2012.04.020","volume":"12","author":"YY Chung","year":"2012","unstructured":"Chung, Y.Y., Wahid, N.: A hybrid network intrusion detection system using simplified swarm optimization (SSO). Appl. Soft. Comput. 12(9), 3014\u20133022 (2012)","journal-title":"Appl. Soft. Comput."},{"key":"616_CR41","doi-asserted-by":"crossref","unstructured":"Esp\u00edndola, R.P., Ebecken, N.F.F.: On extending f-measure and g-mean metrics to multi-class problems. WIT Trans. Inf. Commun. Technol. 35 (2005)","DOI":"10.2495\/DATA050031"},{"issue":"2S","key":"616_CR42","doi-asserted-by":"publisher","first-page":"645","DOI":"10.35940\/ijitee.B1104.1292S19","volume":"9","author":"G Sah","year":"2019","unstructured":"Sah, G., Goswami, R.S., Nandi, S.K.: Machine learning methods for predicting the popularity of forthcoming objects. Int. J. Innov. Technol. Explor. Eng. (IJITEE) 9(2S), 645\u2013652 (2019)","journal-title":"Int. J. Innov. Technol. Explor. Eng. (IJITEE)"},{"key":"616_CR43","doi-asserted-by":"publisher","first-page":"22351","DOI":"10.1109\/ACCESS.2021.3056614","volume":"9","author":"ZK Maseer","year":"2021","unstructured":"Maseer, Z.K., Yusof, R., Bahaman, N., Mostafa, S.A., Foozy, C.F.M.: Benchmarking of machine learning for anomaly based intrusion detection systems in the CICIDS2017 dataset. IEEE Access 9, 22351\u201322370 (2021)","journal-title":"IEEE Access"},{"key":"616_CR44","unstructured":"Scikit-Learn (2010). http:\/\/scikit-learn.org\/stable\/index.html. Accessed January 2020"},{"key":"616_CR45","doi-asserted-by":"crossref","unstructured":"Zhang, F., Wang, D.: An effective feature selection approach for network intrusion detection. In: 2013 IEEE Eighth International Conference on Networking, Architecture and Storage, pp. 307\u2013311. IEEE (2013)","DOI":"10.1109\/NAS.2013.49"},{"issue":"9","key":"616_CR46","first-page":"21","volume":"3","author":"A Javaid","year":"2015","unstructured":"Javaid, A., Niyaz, Q., Sun, W., Alam, M.: A deep learning approach for network intrusion detection system. 2016 Eai Endorsed Trans. Secur. Saf. 3(9), 21\u201326 (2015)","journal-title":"2016 Eai Endorsed Trans. Secur. Saf."},{"issue":"6","key":"616_CR47","doi-asserted-by":"publisher","first-page":"2235","DOI":"10.1007\/s11227-016-1727-6","volume":"72","author":"S Masarat","year":"2016","unstructured":"Masarat, S., Sharifian, S., Taheri, H.: Modified parallel random forest for intrusion detection systems. J. Supercomput. 72(6), 2235\u20132258 (2016)","journal-title":"J. Supercomput."},{"issue":"2","key":"616_CR48","doi-asserted-by":"publisher","first-page":"133","DOI":"10.20532\/cit.2016.1002701","volume":"24","author":"ST Ikram","year":"2016","unstructured":"Ikram, S.T., Cherukuri, A.K.: Improving accuracy of intrusion detection model using PCA and optimized SVM. J. Comput. Inf. Technol. 24(2), 133\u2013148 (2016)","journal-title":"J. Comput. Inf. Technol."},{"issue":"6","key":"616_CR49","first-page":"446","volume":"4","author":"L Dhanabal","year":"2015","unstructured":"Dhanabal, L., Shantharajah, S.P.: A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. Int. J. Adv. Res. Comput. Commun. Eng. 4(6), 446\u2013452 (2015)","journal-title":"Int. J. Adv. Res. Comput. Commun. Eng."},{"issue":"3","key":"616_CR50","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.icte.2016.08.003","volume":"2","author":"V Jyothsna","year":"2016","unstructured":"Jyothsna, V., Rama Prasad, V.V.: FCAAIS: anomaly based network intrusion detection through feature correlation analysis and association impact scale. ICT Express 2(3), 103\u2013116 (2016)","journal-title":"ICT Express"},{"key":"616_CR51","doi-asserted-by":"crossref","unstructured":"Subba, B., Biswas, S., Karmakar, S.: Enhancing performance of anomaly based intrusion detection systems through dimensionality reduction using principal component analysis. In: 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/ANTS.2016.7947776"},{"issue":"5","key":"616_CR52","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1080\/19393555.2017.1358779","volume":"26","author":"S Mohammadi","year":"2017","unstructured":"Mohammadi, S., Mirvaziri, H., Ghazizadeh-Ahsaee, M.: Multivariate correlation coefficient and mutual information-based feature selection in intrusion detection. Inf. Secur. J. Glob. Perspect. 26(5), 229\u2013239 (2017)","journal-title":"Inf. Secur. J. Glob. Perspect."},{"issue":"48","key":"616_CR53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17485\/ijst\/2016\/v9i48\/105827","volume":"9","author":"V Chahar","year":"2017","unstructured":"Chahar, V., Chhikara, R., Gigras, Y., Singh, L.: Significance of hybrid feature selection technique for intrusion detection systems. Indian J. Sci. Technol. 9(48), 1\u20137 (2017)","journal-title":"Indian J. Sci. Technol."},{"key":"616_CR54","doi-asserted-by":"crossref","unstructured":"Mehmod, T., Md Rais, H.B.: Ant colony optimization and feature selection for intrusion detection. In: Advances in machine learning and signal processing, pp. 305\u2013312. Springer, Cham (2016)","DOI":"10.1007\/978-3-319-32213-1_27"},{"issue":"3","key":"616_CR55","first-page":"8","volume":"11","author":"S Gurung","year":"2019","unstructured":"Gurung, S., Ghose, M.K., Subedi, A.: Deep learning approach on network intrusion detection system using NSL-KDD dataset. Int. J. Comput. Netw. Inf. Secur. 11(3), 8\u201314 (2019)","journal-title":"Int. J. Comput. Netw. Inf. Secur."},{"issue":"5","key":"616_CR56","doi-asserted-by":"publisher","first-page":"1194","DOI":"10.1007\/s10766-016-0456-z","volume":"45","author":"P Natesan","year":"2017","unstructured":"Natesan, P., Rajalaxmi, R.R., Gowrison, G., Balasubramanie, P.: Hadoop based parallel binary bat algorithm for network intrusion detection. Int. J. Parallel Prog. 45(5), 1194\u20131213 (2017)","journal-title":"Int. J. Parallel Prog."},{"key":"616_CR57","doi-asserted-by":"publisher","first-page":"165607","DOI":"10.1109\/ACCESS.2019.2953095","volume":"7","author":"J Lee","year":"2019","unstructured":"Lee, J., Kim, J., Kim, I., Han, K.: Cyber threat detection based on artificial neural networks using event profiles. IEEE Access 7, 165607\u2013165626 (2019)","journal-title":"IEEE Access"},{"key":"616_CR58","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2016\/1075648","volume":"2016","author":"\u00d6 Cepheli","year":"2016","unstructured":"Cepheli, \u00d6., B\u00fcy\u00fck\u00e7orak, S., Kurt, G.K.: Hybrid intrusion detection system for ddos attacks. J. Electr. Comput. Eng. 2016, 1\u20138 (2016)","journal-title":"J. Electr. Comput. Eng."},{"issue":"4","key":"616_CR59","doi-asserted-by":"publisher","first-page":"1285","DOI":"10.1109\/TEM.2019.2922936","volume":"67","author":"MA Ferrag","year":"2019","unstructured":"Ferrag, M.A., Maglaras, L.: DeepCoin: a novel deep learning and blockchain-based energy exchange framework for smart grids. IEEE Trans. Eng. Manag. 67(4), 1285\u20131297 (2019)","journal-title":"IEEE Trans. Eng. Manag."},{"issue":"3","key":"616_CR60","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1007\/s12530-019-09317-1","volume":"12","author":"S Hosseini","year":"2021","unstructured":"Hosseini, S., Seilani, H.: Anomaly process detection using negative selection algorithm and classification techniques. Evol. Syst. 12(3), 769\u2013778 (2021)","journal-title":"Evol. Syst."},{"key":"616_CR61","doi-asserted-by":"crossref","unstructured":"Singh Panwar, S., Raiwani, Y.P., Singh Panwar, L.: \"Evaluation of network intrusion detection with features selection and machine learning algorithms on CICIDS-2017 dataset. In: International Conference on Advances in Engineering Science Management & Technology (ICAESMT)-2019, Uttaranchal University, Dehradun, India (2019)","DOI":"10.2139\/ssrn.3394103"},{"key":"616_CR62","doi-asserted-by":"crossref","unstructured":"Alrowaily, M., Alenezi, F., Lu, Z.: Effectiveness of machine learning based intrusion detection systems. In: International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, pp. 277\u2013288. Springer, Cham (2019)","DOI":"10.1007\/978-3-030-24907-6_21"},{"issue":"3","key":"616_CR63","first-page":"49","volume":"1","author":"AA Abdulrahman","year":"2018","unstructured":"Abdulrahman, A.A., Ibrahem, M.K.: Evaluation of DDoS attacks detection in a CICIDS2017 dataset based on classification algorithms. Iraqi J. Inf. Commun. Technol. (IJICT) 1(3), 49\u201355 (2018)","journal-title":"Iraqi J. Inf. Commun. Technol. (IJICT)"},{"issue":"5","key":"616_CR64","doi-asserted-by":"publisher","first-page":"151","DOI":"10.23919\/JCC.2020.05.013","volume":"17","author":"L Chen","year":"2020","unstructured":"Chen, L., Gao, S., Liu, B., Zhigang, Lu., Jiang, Z.: FEW-NNN: a fuzzy entropy weighted natural nearest neighbor method for flow-based network traffic attack detection. China Commun. 17(5), 151\u2013167 (2020)","journal-title":"China Commun."},{"key":"616_CR65","doi-asserted-by":"crossref","unstructured":"Wanjau, S.K., Wambugu, G.M., Kamau, G.N.: SSH-brute force attack detection model based on deep learning (2021)","DOI":"10.7753\/IJCATR1001.1008"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-022-00616-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-022-00616-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-022-00616-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,28]],"date-time":"2023-11-28T15:11:21Z","timestamp":1701184281000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-022-00616-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,6]]},"references-count":65,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["616"],"URL":"https:\/\/doi.org\/10.1007\/s10207-022-00616-4","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,6]]},"assertion":[{"value":"14 September 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 October 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"This article does not contain any studies with human participants.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}