{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T13:01:55Z","timestamp":1773406915798,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T00:00:00Z","timestamp":1700524800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T00:00:00Z","timestamp":1700524800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1007\/s10207-023-00777-w","type":"journal-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T19:04:47Z","timestamp":1700593487000},"page":"1037-1054","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["An ensemble approach-based intrusion detection system utilizing ISHO-HBA and SE-ResNet152"],"prefix":"10.1007","volume":"23","author":[{"given":"Jalaiah","family":"Saikam","sequence":"first","affiliation":[]},{"given":"Koteswararao","family":"Ch","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"issue":"12","key":"777_CR1","doi-asserted-by":"publisher","first-page":"9310","DOI":"10.1109\/JIOT.2021.3130434","volume":"9","author":"X Zhou","year":"2021","unstructured":"Zhou, X., Liang, W., Li, W., Yan, K., Shimizu, S., Kevin, I., Wang, K.: Hierarchical adversarial attacks against graph-neural-network-based IoT network intrusion detection system. IEEE Internet Things J. 9(12), 9310\u20139319 (2021)","journal-title":"IEEE Internet Things J."},{"key":"777_CR2","doi-asserted-by":"crossref","unstructured":"Sarhan, M., Layeghy, S., Portmann, M.: Towards a standard feature set for network intrusion detection system datasets. In: Mobile Networks and Applications, pp. 1\u201314 (2022).","DOI":"10.1007\/s11036-021-01843-0"},{"issue":"5","key":"777_CR3","doi-asserted-by":"publisher","first-page":"111","DOI":"10.3390\/fi13050111","volume":"13","author":"AO Alzahrani","year":"2021","unstructured":"Alzahrani, A.O., Alenazi, M.J.: Designing a network intrusion detection system based on machine learning for software-defined networks. Future Internet 13(5), 111 (2021)","journal-title":"Future Internet"},{"key":"777_CR4","doi-asserted-by":"publisher","first-page":"5597","DOI":"10.1007\/s11227-019-02805-w","volume":"75","author":"H Choi","year":"2019","unstructured":"Choi, H., Kim, M., Lee, G., Kim, W.: Unsupervised learning approach for network intrusion detection system using autoencoders. J. Supercomput.Supercomput. 75, 5597\u20135621 (2019)","journal-title":"J. Supercomput.Supercomput."},{"key":"777_CR5","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/j.procs.2021.05.025","volume":"185","author":"L Ashiku","year":"2021","unstructured":"Ashiku, L., Dagli, C.: Network intrusion detection system using deep learning. Procedia Comput. Sci. 185, 239\u2013247 (2021)","journal-title":"Procedia Comput. Sci."},{"key":"777_CR6","doi-asserted-by":"publisher","first-page":"12499","DOI":"10.1007\/s00521-020-04708-x","volume":"32","author":"P Devan","year":"2020","unstructured":"Devan, P., Khare, N.: An efficient XGBoost\u2013DNN-based classification model for network intrusion detection system. Neural Comput. Appl.Comput. Appl. 32, 12499\u201312514 (2020)","journal-title":"Neural Comput. Appl.Comput. Appl."},{"key":"777_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102289","volume":"106","author":"J Liu","year":"2021","unstructured":"Liu, J., Gao, Y., Hu, F.: A fast network intrusion detection system using adaptive synthetic oversampling and LightGBM. Comput. Secur.. Secur. 106, 102289 (2021)","journal-title":"Comput. Secur.. Secur."},{"key":"777_CR8","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.future.2020.04.013","volume":"110","author":"M Pawlicki","year":"2020","unstructured":"Pawlicki, M., Chora\u015b, M., Kozik, R.: Defending network intrusion detection systems against adversarial evasion attacks. Futur. Gener. Comput. Syst.. Gener. Comput. Syst. 110, 148\u2013154 (2020)","journal-title":"Futur. Gener. Comput. Syst.. Gener. Comput. Syst."},{"key":"777_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115782","volume":"186","author":"E Alhajjar","year":"2021","unstructured":"Alhajjar, E., Maxwell, P., Bastian, N.: Adversarial machine learning in network intrusion detection systems. Expert Syst. Appl. 186, 115782 (2021)","journal-title":"Expert Syst. Appl."},{"issue":"6","key":"777_CR10","doi-asserted-by":"publisher","first-page":"7623","DOI":"10.3233\/JIFS-179833","volume":"38","author":"H Wang","year":"2020","unstructured":"Wang, H., Cao, Z., Hong, B.: A network intrusion detection system based on a convolutional neural network. J. Intell. Fuzzy Syst. 38(6), 7623\u20137637 (2020)","journal-title":"J. Intell. Fuzzy Syst."},{"key":"777_CR11","volume":"9","author":"JO Mebawondu","year":"2020","unstructured":"Mebawondu, J.O., Alowolodu, O.D., Mebawondu, J.O., Adetunmbi, A.O.: Network intrusion detection system using supervised learning paradigm. Sci. Afr. 9, e00497 (2020)","journal-title":"Sci. Afr."},{"key":"777_CR12","doi-asserted-by":"publisher","first-page":"154560","DOI":"10.1109\/ACCESS.2019.2948382","volume":"7","author":"Y Gao","year":"2019","unstructured":"Gao, Y., Wu, H., Song, B., Jin, Y., Luo, X., Zeng, X.: A distributed network intrusion detection system for distributed denial of service attacks in vehicular ad hoc networks. IEEE Access 7, 154560\u2013154571 (2019)","journal-title":"IEEE Access"},{"key":"777_CR13","doi-asserted-by":"publisher","first-page":"12361","DOI":"10.1007\/s00500-020-04678-1","volume":"24","author":"W Zhang","year":"2020","unstructured":"Zhang, W., Han, D., Li, K.C., Massetto, F.I.: Wireless sensor network intrusion detection system based on MK-ELM. Soft. Comput.Comput. 24, 12361\u201312374 (2020)","journal-title":"Soft. Comput.Comput."},{"issue":"3","key":"777_CR14","first-page":"22","volume":"11","author":"MM Sakr","year":"2019","unstructured":"Sakr, M.M., Tawfeeq, M.A., El-Sisi, A.B.: Network intrusion detection system based PSO-SVM for cloud computing. Int. J. Comput. Netw. Inf. Secur. 11(3), 22 (2019)","journal-title":"Int. J. Comput. Netw. Inf. Secur."},{"key":"777_CR15","doi-asserted-by":"publisher","first-page":"61024","DOI":"10.1109\/ACCESS.2021.3074664","volume":"9","author":"RV Mendon\u00e7a","year":"2021","unstructured":"Mendon\u00e7a, R.V., Teodoro, A.A., Rosa, R.L., Saadi, M., Melgarejo, D.C., Nardelli, P.H., Rodr\u00edguez, D.Z.: Intrusion detection system based on fast hierarchical deep convolutional neural network. IEEE Access 9, 61024\u201361034 (2021)","journal-title":"IEEE Access"},{"key":"777_CR16","doi-asserted-by":"publisher","first-page":"102593","DOI":"10.1109\/ACCESS.2021.3094365","volume":"9","author":"I Aliyu","year":"2021","unstructured":"Aliyu, I., Feliciano, M.C., Van Engelenburg, S., Kim, D.O., Lim, C.G.: A blockchain-based federated forest for SDN-enabled in-vehicle network intrusion detection system. IEEE Access 9, 102593\u2013102608 (2021)","journal-title":"IEEE Access"},{"key":"777_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/5557577","volume":"2021","author":"S Moualla","year":"2021","unstructured":"Moualla, S., Khorzom, K., Jafar, A.: Improving the performance of machine learning-based network intrusion detection systems on the UNSW-NB15 dataset. Comput. Intell. Neurosci.. Intell. Neurosci. 2021, 1\u201313 (2021)","journal-title":"Comput. Intell. Neurosci.. Intell. Neurosci."},{"issue":"2","key":"777_CR18","doi-asserted-by":"publisher","first-page":"259","DOI":"10.3390\/electronics9020259","volume":"9","author":"H Musafer","year":"2020","unstructured":"Musafer, H., Abuzneid, A., Faezipour, M., Mahmood, A.: An enhanced design of sparse autoencoder for latent features extraction based on trigonometric simplexes for network intrusion detection systems. Electronics 9(2), 259 (2020)","journal-title":"Electronics"},{"key":"777_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102151","volume":"102","author":"SM Sohi","year":"2021","unstructured":"Sohi, S.M., Seifert, J.P., Ganji, F.: RNNIDS: enhancing network intrusion detection systems through deep learning. Comput. Secur.. Secur. 102, 102151 (2021)","journal-title":"Comput. Secur.. Secur."},{"key":"777_CR20","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s00779-019-01332-y","volume":"25","author":"J Lee","year":"2021","unstructured":"Lee, J., Park, K.: GAN-based imbalanced data intrusion detection system. Pers. Ubiquit. Comput.Ubiquit. Comput. 25, 121\u2013128 (2021)","journal-title":"Pers. Ubiquit. Comput.Ubiquit. Comput."},{"key":"777_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102177","volume":"105","author":"S Huang","year":"2020","unstructured":"Huang, S., Lei, K.: IGAN-IDS: an imbalanced generative adversarial network towards intrusion detection system in ad-hoc networks. Ad Hoc Netw.Netw. 105, 102177 (2020)","journal-title":"Ad Hoc Netw.Netw."},{"issue":"6","key":"777_CR22","doi-asserted-by":"publisher","first-page":"898","DOI":"10.3390\/electronics11060898","volume":"11","author":"Y Fu","year":"2022","unstructured":"Fu, Y., Du, Y., Cao, Z., Li, Q., Xiang, W.: A deep learning model for network intrusion detection with imbalanced data. Electronics 11(6), 898 (2022)","journal-title":"Electronics"},{"key":"777_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107315","volume":"177","author":"H Zhang","year":"2020","unstructured":"Zhang, H., Huang, L., Wu, C.Q., Li, Z.: An effective convolutional neural network based on SMOTE and Gaussian mixture model for intrusion detection in imbalanced dataset. Comput. Netw.. Netw. 177, 107315 (2020)","journal-title":"Comput. Netw.. Netw."},{"issue":"1","key":"777_CR24","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/s10489-022-03361-2","volume":"53","author":"J Cui","year":"2023","unstructured":"Cui, J., Zong, L., Xie, J., Tang, M.: A novel multi-module integrated intrusion detection system for high-dimensional imbalanced data. Appl. Intell.Intell. 53(1), 272\u2013288 (2023)","journal-title":"Appl. Intell.Intell."},{"issue":"4","key":"777_CR25","doi-asserted-by":"publisher","first-page":"2576","DOI":"10.3390\/app13042576","volume":"13","author":"KS Babu","year":"2023","unstructured":"Babu, K.S., Rao, Y.N.: MCGAN: modified conditional generative adversarial network (MCGAN) for class imbalance problems in network intrusion detection system. Appl. Sci. 13(4), 2576 (2023)","journal-title":"Appl. Sci."},{"key":"777_CR26","doi-asserted-by":"publisher","first-page":"32464","DOI":"10.1109\/ACCESS.2020.2973730","volume":"8","author":"K Jiang","year":"2020","unstructured":"Jiang, K., Wang, W., Wang, A., Wu, H.: Network intrusion detection combined hybrid sampling with the deep hierarchical network. IEEE Access 8, 32464\u201332476 (2020)","journal-title":"IEEE Access"},{"key":"777_CR27","first-page":"102804","volume":"58","author":"YN Kunang","year":"2021","unstructured":"Kunang, Y.N., Nurmaini, S., Stiawan, D., Suprapto, B.Y.: Attack classification of an intrusion detection system using deep learning and hyperparameter optimization. J. Inf. Secur. Appl. 58, 102804 (2021)","journal-title":"J. Inf. Secur. Appl."},{"issue":"4","key":"777_CR28","doi-asserted-by":"publisher","first-page":"3603","DOI":"10.1007\/s11277-022-09726-7","volume":"125","author":"PJ Prakash","year":"2022","unstructured":"Prakash, P.J., Lalitha, B.: Optimized ensemble classifier based network intrusion detection system for RPL-based internet of things. Wireless Pers. Commun.Commun. 125(4), 3603\u20133626 (2022)","journal-title":"Wireless Pers. Commun.Commun."},{"issue":"1","key":"777_CR29","doi-asserted-by":"publisher","first-page":"550","DOI":"10.3390\/s23010550","volume":"23","author":"YN Rao","year":"2023","unstructured":"Rao, Y.N., Suresh Babu, K.: An imbalanced generative adversarial network-based approach for network intrusion detection in an imbalanced dataset. Sensors 23(1), 550 (2023)","journal-title":"Sensors"},{"key":"777_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2021.100462","volume":"16","author":"AS Dina","year":"2021","unstructured":"Dina, A.S., Manivannan, D.: Intrusion detection based on machine learning techniques in computer networks. Internet Things 16, 100462 (2021)","journal-title":"Internet Things"},{"issue":"4","key":"777_CR31","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1016\/j.jksus.2018.03.018","volume":"31","author":"M Mazini","year":"2019","unstructured":"Mazini, M., Shirazi, B., Mahdavi, I.: Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms. J. King Saud Univ. Comput. Inf. Sci. 31(4), 541\u2013553 (2019)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"777_CR32","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1016\/j.future.2022.01.026","volume":"131","author":"H Ding","year":"2022","unstructured":"Ding, H., Chen, L., Dong, L., Fu, Z., Cui, X.: Imbalanced data classification: A KNN and generative adversarial networks-based hybrid approach for intrusion detection. Futur. Gener. Comput. Syst.. Gener. Comput. Syst. 131, 240\u2013254 (2022)","journal-title":"Futur. Gener. Comput. Syst.. Gener. Comput. Syst."},{"key":"777_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/1230593","volume":"2021","author":"A Guezzaz","year":"2021","unstructured":"Guezzaz, A., Benkirane, S., Azrour, M., Khurram, S.: A reliable network intrusion detection approach using a decision tree with enhanced data quality. Secur. Commun. Netw. 2021, 1\u20138 (2021)","journal-title":"Secur. Commun. Netw."},{"key":"777_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.116545","volume":"194","author":"PR Kanna","year":"2022","unstructured":"Kanna, P.R., Santhi, P.: Hybrid intrusion detection using mapreduce based black widow optimized convolutional long short-term memory neural networks. Expert Syst. Appl. 194, 116545 (2022)","journal-title":"Expert Syst. Appl."},{"issue":"5","key":"777_CR35","doi-asserted-by":"publisher","first-page":"834","DOI":"10.3390\/pr9050834","volume":"9","author":"MA Khan","year":"2021","unstructured":"Khan, M.A.: HCRNNIDS: Hybrid convolutional recurrent neural network-based network intrusion detection system. Processes 9(5), 834 (2021)","journal-title":"Processes"},{"key":"777_CR36","doi-asserted-by":"crossref","unstructured":"Bu, S.J., Cho, S.B.: Genetic algorithm-based deep learning ensemble for detecting database intrusion via insider attack. In: Hybrid Artificial Intelligent Systems: 14th International Conference, HAIS 2019, Le\u00f3n, Spain, September 4\u20136, 2019, Proceedings 14 (pp. 145\u2013156). Springer (2019).","DOI":"10.1007\/978-3-030-29859-3_13"},{"issue":"3","key":"777_CR37","doi-asserted-by":"publisher","first-page":"59","DOI":"10.3390\/computers8030059","volume":"8","author":"AUH Qureshi","year":"2019","unstructured":"Qureshi, A.U.H., Larijani, H., Mtetwa, N., Javed, A., Ahmad, J.: RNN-ABC: a new swarm optimization-based technique for anomaly detection. Computers 8(3), 59 (2019)","journal-title":"Computers"},{"key":"777_CR38","doi-asserted-by":"crossref","unstructured":"Althubiti, S.A., Jones, E.M., Roy, K.: LSTM for anomaly-based network intrusion detection. In: 2018 28th International Telecommunication Networks and Applications Conference (ITNAC), pp. 1\u20133. IEEE (2018).","DOI":"10.1109\/ATNAC.2018.8615300"},{"key":"777_CR39","doi-asserted-by":"crossref","unstructured":"Liu, X., Li, K., Wang, W., Yan, Y., Sha, Y., Chen, J., Qin, J.: Improved RBF network intrusion detection model based on edge computing with multi-algorithm fusion. Int. J. Comput. Commun. Control 16(4) (2021).","DOI":"10.15837\/ijccc.2021.4.4232"},{"key":"777_CR40","doi-asserted-by":"publisher","first-page":"195741","DOI":"10.1109\/ACCESS.2020.3034015","volume":"8","author":"Z Hu","year":"2020","unstructured":"Hu, Z., Wang, L., Qi, L., Li, Y., Yang, W.: A novel wireless network intrusion detection method based on adaptive synthetic sampling and an improved convolutional neural network. IEEE Access 8, 195741\u2013195751 (2020)","journal-title":"IEEE Access"},{"key":"777_CR41","doi-asserted-by":"publisher","first-page":"94497","DOI":"10.1109\/ACCESS.2019.2928048","volume":"7","author":"BA Tama","year":"2019","unstructured":"Tama, B.A., Comuzzi, M., Rhee, K.H.: TSE-IDS: A two-stage classifier ensemble for intelligent anomaly-based intrusion detection system. IEEE Access 7, 94497\u201394507 (2019)","journal-title":"IEEE Access"},{"key":"777_CR42","doi-asserted-by":"publisher","first-page":"1559","DOI":"10.1007\/s12652-020-02228-z","volume":"12","author":"M Safaldin","year":"2021","unstructured":"Safaldin, M., Otair, M., Abualigah, L.: Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks. J. Ambient. Intell. Humaniz. Comput.Intell. Humaniz. Comput. 12, 1559\u20131576 (2021)","journal-title":"J. Ambient. Intell. Humaniz. Comput.Intell. Humaniz. Comput."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00777-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00777-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00777-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,27]],"date-time":"2024-03-27T07:39:03Z","timestamp":1711525143000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00777-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,21]]},"references-count":42,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["777"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00777-w","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,21]]},"assertion":[{"value":"20 October 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 November 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This material is the author's original work, which has not been published elsewhere. The paper reflects the author's research and analysis truthfully and completely.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}}]}}