{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:00:38Z","timestamp":1774368038218,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,1,2]],"date-time":"2021-01-02T00:00:00Z","timestamp":1609545600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,2]],"date-time":"2021-01-02T00:00:00Z","timestamp":1609545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s10586-020-03222-y","type":"journal-article","created":{"date-parts":[[2021,1,2]],"date-time":"2021-01-02T21:13:09Z","timestamp":1609621989000},"page":"1761-1779","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":130,"title":["Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2382-3347","authenticated-orcid":false,"given":"S.","family":"Krishnaveni","sequence":"first","affiliation":[]},{"given":"S.","family":"Sivamohan","sequence":"additional","affiliation":[]},{"given":"S. S.","family":"Sridhar","sequence":"additional","affiliation":[]},{"given":"S.","family":"Prabakaran","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,2]]},"reference":[{"key":"3222_CR1","doi-asserted-by":"publisher","unstructured":"Thidar, M., Win, M., Khaing, K. T.: Detection and Classification of Attacks in Unauthorized Accesses. pp. 345\u2013349 (2014) https:\/\/doi.org\/10.15242\/iie.e0314155","DOI":"10.15242\/iie.e0314155"},{"key":"3222_CR2","doi-asserted-by":"publisher","unstructured":"Pham, N. T., Foo, E., Suriadi, S., Jeffrey, H., Lahza, H. F. M.: Improving performance of intrusion detection system using ensemble methods and feature selection. In ACM International Conference Proceeding Series 1\u20136 (Association for Computing Machinery, 2018). https:\/\/doi.org\/10.1145\/3167918.3167951","DOI":"10.1145\/3167918.3167951"},{"key":"3222_CR3","doi-asserted-by":"publisher","first-page":"980","DOI":"10.1109\/TKDE.2004.29","volume":"16","author":"GI Webb","year":"2004","unstructured":"Webb, G.I., Zheng, Z.: Multistrategy ensemble learning: reducing error by combining ensemble learning techniques. IEEE Trans. Knowl. Data Eng. 16, 980\u2013991 (2004)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"3222_CR4","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.jnca.2004.01.003","volume":"1","author":"S Mukkamala","year":"2004","unstructured":"Mukkamala, S., Sung, A.H., Abraham, A.: Intrusion detection using an ensemble of intelligent paradigms. J. Netw. Comput. Appl. 1, 11 (2004). https:\/\/doi.org\/10.1016\/j.jnca.2004.01.003","journal-title":"J. Netw. Comput. Appl."},{"key":"3222_CR5","first-page":"8","volume":"99","author":"A Kumar Shrivas","year":"2014","unstructured":"Kumar Shrivas, A., Kumar Dewangan, A.: An ensemble model for classification of attacks with feature selection based on KDD99 and NSL-KDD data set. Int. J. Comput. Appl. 99, 8\u201313 (2014)","journal-title":"Int. J. Comput. Appl."},{"key":"3222_CR6","doi-asserted-by":"publisher","first-page":"1690","DOI":"10.1016\/j.eswa.2013.08.066","volume":"41","author":"G Kim","year":"2014","unstructured":"Kim, G., Lee, S., Kim, S.: A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Syst. Appl. 41, 1690\u20131700 (2014)","journal-title":"Expert Syst. Appl."},{"key":"3222_CR7","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1093\/comjnl\/bxt044","volume":"57","author":"P Gogoi","year":"2014","unstructured":"Gogoi, P., Bhattacharyya, D.K., Borah, B., Kalita, J.K.: MLH-IDS: A multi-level hybrid intrusion detection method. Comput. J. 57, 602\u2013623 (2014)","journal-title":"Comput. J."},{"key":"3222_CR8","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1080\/08839514.2014.883903","volume":"28","author":"C Sarkar","year":"2014","unstructured":"Sarkar, C., Cooley, S., Srivastava, J.: Robust feature selection technique using rank aggregation. Appl. Artif. Intell. 28, 243\u2013257 (2014)","journal-title":"Appl. Artif. Intell."},{"key":"3222_CR9","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/siu.2018.8404704","volume":"1","author":"AH Mirza","year":"2018","unstructured":"Mirza, A.H.: Computer network intrusion detection using various classifiers and ensemble learning. 26th IEEE Signal Process. Commun. Appl. Conf. SIU 2018 1, 11 (2018). https:\/\/doi.org\/10.1109\/siu.2018.8404704","journal-title":"26th IEEE Signal Process. Commun. Appl. Conf. SIU 2018"},{"key":"3222_CR10","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2016","unstructured":"Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18, 1153\u20131176 (2016)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"3222_CR11","first-page":"10","volume":"174","author":"Y Zhou","year":"2019","unstructured":"Zhou, Y., Cheng, G., Jiang, S., Dai, M.: Building an efficient intrusion detection system based on feature selection and ensemble classifier. Comput. Networks 174, 10\u2013247 (2019)","journal-title":"Comput. Networks"},{"key":"3222_CR12","volume-title":"Smart Innovation, Systems and Technologies","author":"D Gaikwad","year":"2016","unstructured":"Gaikwad, D., Thool, R.: DAREnsemble: Decision tree and rule learner based ensemble for network intrusion detection system. In: Gaikwad, D., Thool, R. (eds.) Smart Innovation, Systems and Technologies. Springer, New York (2016)"},{"key":"3222_CR13","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/4586875","author":"S Rajagopal","year":"2020","unstructured":"Rajagopal, S., Kundapur, P.P., Hareesha, K.S.: A stacking ensemble for network intrusion detection using heterogeneous datasets. Secur. Commun. Netw. (2020). https:\/\/doi.org\/10.1155\/2020\/4586875","journal-title":"Secur. Commun. Netw."},{"key":"3222_CR14","doi-asserted-by":"publisher","unstructured":"Wankhade, A., Chandrasekaran, K.: Distributed-Intrusion Detection System using combination of Ant Colony Optimization (ACO) and support vector machine (SVM). in Proceedings - 2016 International Conference on Micro-Electronics and Telecommunication Engineering, ICMETE 2016 pp. 646\u2013651 (Institute of Electrical and Electronics Engineers Inc., 2016). https:\/\/doi.org\/10.1109\/icmete.2016.94","DOI":"10.1109\/icmete.2016.94"},{"key":"3222_CR15","doi-asserted-by":"publisher","first-page":"955","DOI":"10.1007\/s00521-017-3128-z","volume":"31","author":"BA Tama","year":"2019","unstructured":"Tama, B.A., Rhee, K.H.: An in-depth experimental study of anomaly detection using gradient boosted machine. Neural Comput. Appl. 31, 955\u2013965 (2019)","journal-title":"Neural Comput. Appl."},{"key":"3222_CR16","first-page":"806","volume":"11","author":"I Ahmad","year":"2015","unstructured":"Ahmad, I.: Feature selection using particle swarm optimization in intrusion detection. Int. J. Distrib. Sens. Networks 11, 806 (2015)","journal-title":"Int. J. Distrib. Sens. Networks"},{"key":"3222_CR17","unstructured":"Prusti, D. An efficient intrusion detection model using ensemble methods. www.nitrkl.ac.in"},{"key":"3222_CR18","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1186\/s13638-016-0623-3","volume":"2016","author":"O Osanaiye","year":"2016","unstructured":"Osanaiye, O., et al.: Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing. Eurasip J. Wirel. Commun. Netw. 2016, 130 (2016)","journal-title":"Eurasip J. Wirel. Commun. Netw."},{"key":"3222_CR19","doi-asserted-by":"publisher","first-page":"1535","DOI":"10.3390\/app8091535","volume":"8","author":"F Zhao","year":"2018","unstructured":"Zhao, F., Zhao, J., Niu, X., Luo, S., Xin, Y.: A filter feature selection algorithm based on mutual information for intrusion detection. Appl. Sci. 8, 1535 (2018)","journal-title":"Appl. Sci."},{"key":"3222_CR20","doi-asserted-by":"publisher","first-page":"8309","DOI":"10.1007\/s10586-018-1755-5","volume":"22","author":"C Yang","year":"2019","unstructured":"Yang, C.: Anomaly network traffic detection algorithm based on information entropy measurement under the cloud computing environment. Clust. Comput. 22, 8309\u20138317 (2019)","journal-title":"Clust. Comput."},{"key":"3222_CR21","doi-asserted-by":"publisher","first-page":"106495","DOI":"10.1109\/ACCESS.2019.2929487","volume":"7","author":"A Binbusayyis","year":"2019","unstructured":"Binbusayyis, A., Vaiyapuri, T.: Identifying and benchmarking key features for cyber intrusion detection: an ensemble approach. IEEE Access 7, 106495\u2013106513 (2019)","journal-title":"IEEE Access"},{"key":"3222_CR22","doi-asserted-by":"crossref","unstructured":"Saeys, Y., Abeel, T., Van De Peer, Y.: Robust feature selection using ensemble feature selection techniques. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 5212 LNAI pp. 313\u2013325 (Springer, Berlin, 2008)","DOI":"10.1007\/978-3-540-87481-2_21"},{"key":"3222_CR23","first-page":"208","volume":"31","author":"SB Kotsiantis","year":"2007","unstructured":"Kotsiantis, S.B.: Supervised machine learning: a review of classification techniques. Informatica 31, 208 (2007)","journal-title":"Informatica"},{"key":"3222_CR24","doi-asserted-by":"publisher","first-page":"15587","DOI":"10.1109\/ACCESS.2018.2817022","volume":"6","author":"M Ali","year":"2018","unstructured":"Ali, M., et al.: a data-driven knowledge acquisition system: an end-to-end knowledge engineering process for generating production rules. IEEE Access 6, 15587\u201315607 (2018)","journal-title":"IEEE Access"},{"key":"3222_CR25","doi-asserted-by":"crossref","unstructured":"Muallem, A., Shetty, S., Hong, L., Pan, J. W.: TDDEHT: threat detection using distributed ensembles of Hoeffding trees on streaming cyber datasets. Proc. - IEEE Mil. Commun. Conf. MILCOM 2019, pp. 219\u2013224 (2019)","DOI":"10.1109\/MILCOM.2018.8599734"},{"key":"3222_CR26","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1016\/j.cose.2013.09.010","volume":"39","author":"Y-D Lin","year":"2013","unstructured":"Lin, Y.-D., Lai, Y.-C., Ho, C.-Y., Tai, W.-H., Tai, W.-H.: Creditability-based weighted voting for reducing false positives and negatives in intrusion detection. Comput. Secur. 39, 460\u2013474 (2013)","journal-title":"Comput. Secur."},{"key":"3222_CR27","doi-asserted-by":"publisher","first-page":"2956","DOI":"10.1166\/jctn.2018.7572","volume":"15","author":"S Krishnaveni","year":"2018","unstructured":"Krishnaveni, S., Prabakaran, S., Sivamohan, S.: A survey on honeypot and honeynet systems for intrusion detection in cloud environment. J. Comput. Theor. Nanosci. 15, 2956\u20132960 (2018)","journal-title":"J. Comput. Theor. Nanosci."},{"key":"3222_CR28","doi-asserted-by":"publisher","unstructured":"Pervez, M. S., Farid, D. M.: Feature selection and intrusion classification in NSL-KDD cup 99 dataset employing SVMs. In SKIMA 2014 - 8th International Conference on Software, Knowledge, Information Management and Applications (Institute of Electrical and Electronics Engineers Inc., 2014). https:\/\/doi.org\/10.1109\/skima.2014.7083539","DOI":"10.1109\/skima.2014.7083539"},{"key":"3222_CR29","doi-asserted-by":"publisher","unstructured":"Song, J. et al.: Statistical analysis of honeypot data and building of Kyoto 2006\u2009+\u2009dataset for NIDS evaluation. In: Proc. 1st Work. Build. Anal. Datasets Gather. Exp. Returns Secur. BADGERS 2011 29\u201336 (2011) https:\/\/doi.org\/10.1145\/1978672.1978676","DOI":"10.1145\/1978672.1978676"},{"key":"3222_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s20092559","volume":"20","author":"C Iwendi","year":"2020","unstructured":"Iwendi, C., et al.: The use of ensemble models for multiple class and binary class classification for improving intrusion detection systems. Sensors 20, 1\u201337 (2020)","journal-title":"Sensors"},{"key":"3222_CR31","doi-asserted-by":"publisher","first-page":"2341","DOI":"10.1007\/s10586-018-1841-8","volume":"22","author":"H Kim","year":"2019","unstructured":"Kim, H., Kim, J., Kim, Y., Kim, I., Kim, K.J.: Design of network threat detection and classification based on machine learning on cloud computing. Clust. Comput. 22, 2341\u20132350 (2019)","journal-title":"Clust. Comput."},{"key":"3222_CR32","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.cose.2019.02.008","volume":"83","author":"F Gottwalt","year":"2019","unstructured":"Gottwalt, F., Chang, E., Dillon, T.: CorrCorr: a feature selection method for multivariate correlation network anomaly detection techniques. Comput. Secur. 83, 234\u2013245 (2019)","journal-title":"Comput. Secur."},{"key":"3222_CR33","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.1109\/ACCESS.2018.2883142","volume":"7","author":"W Wang","year":"2019","unstructured":"Wang, W., Du, X., Wang, N.: Building a cloud IDS using an efficient feature selection method and SVM. IEEE Access 7, 1345\u20131354 (2019)","journal-title":"IEEE Access"},{"key":"3222_CR34","doi-asserted-by":"publisher","first-page":"3961","DOI":"10.1007\/s10586-018-2557-5","volume":"22","author":"M Manickam","year":"2019","unstructured":"Manickam, M., Rajagopalan, S.P.: A hybrid multi-layer intrusion detection system in cloud. Clust. Comput. 22, 3961\u20133969 (2019)","journal-title":"Clust. Comput."},{"key":"3222_CR35","doi-asserted-by":"publisher","first-page":"2986","DOI":"10.1109\/TC.2016.2519914","volume":"65","author":"MA Ambusaidi","year":"2016","unstructured":"Ambusaidi, M.A., He, X., Nanda, P., Tan, Z.: Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans. Comput. 65, 2986\u20132998 (2016)","journal-title":"IEEE Trans. Comput."},{"key":"3222_CR36","doi-asserted-by":"publisher","unstructured":"Krishnaveni, S., Prabakaran, S.: Ensemble approach for network threat detection and classification on cloud computing. In Concurrency Computation (Wiley, Hoboken, 2019). https:\/\/doi.org\/10.1002\/cpe.5272","DOI":"10.1002\/cpe.5272"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-020-03222-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-020-03222-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-020-03222-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,10]],"date-time":"2022-12-10T08:03:15Z","timestamp":1670659395000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-020-03222-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,2]]},"references-count":36,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["3222"],"URL":"https:\/\/doi.org\/10.1007\/s10586-020-03222-y","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,2]]},"assertion":[{"value":"12 February 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 October 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}