{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T15:44:49Z","timestamp":1778168689984,"version":"3.51.4"},"reference-count":86,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,2,2]],"date-time":"2022-02-02T00:00:00Z","timestamp":1643760000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,2,2]],"date-time":"2022-02-02T00:00:00Z","timestamp":1643760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s11042-021-11747-6","type":"journal-article","created":{"date-parts":[[2022,2,2]],"date-time":"2022-02-02T21:02:42Z","timestamp":1643835762000},"page":"8499-8518","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":45,"title":["Effective network intrusion detection by addressing class imbalance with deep neural networks multimedia tools and applications"],"prefix":"10.1007","volume":"81","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6149-2174","authenticated-orcid":false,"given":"Manisha","family":"Rani","sequence":"first","affiliation":[]},{"family":"Gagandeep","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,2]]},"reference":[{"key":"11747_CR1","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.comnet.2018.07.025","volume":"144","author":"T Aldwairi","year":"2018","unstructured":"Aldwairi T, Perera D, Novotny MA (2018) An evaluation of the performance of Restricted Boltzmann Machines as a model for anomaly network intrusion detection. Comput Networks 144:111\u2013119","journal-title":"Comput Networks"},{"issue":"1","key":"11747_CR2","first-page":"711","volume":"16","author":"AM Aleesa","year":"2021","unstructured":"Aleesa AM, Younis M, Mohammed AA, Sahar N (2021) Deep-Intrusion Detection System with Enhanced Unsw-Nb15 Dataset Based on Deep Learning Techniques. J Eng Sci Technol 16(1):711\u2013727","journal-title":"J Eng Sci Technol"},{"key":"11747_CR3","doi-asserted-by":"crossref","unstructured":"Almi\u2019ani M, Ghazleh AA, Al-Rahayfeh A, Razaque A (2018) Intelligent intrusion detection system using clustered self organized map,\u201d in 2018 Fifth international conference on software defined systems (SDS), pp. 138\u2013144.","DOI":"10.1109\/SDS.2018.8370435"},{"key":"11747_CR4","doi-asserted-by":"publisher","first-page":"52843","DOI":"10.1109\/ACCESS.2018.2869577","volume":"6","author":"M Al-Qatf","year":"2018","unstructured":"Al-Qatf M, Lasheng Y, Al-Habib M, Al-Sabahi K (2018) Deep learning approach combining sparse autoencoder with SVM for network intrusion detection. IEEE Access 6:52843\u201352856","journal-title":"IEEE Access"},{"key":"11747_CR5","doi-asserted-by":"crossref","unstructured":"Alsaadi HS, Hedjam R, Touzene A, Abdessalem A (2020) Fast Binary Network Intrusion Detection based on Matched Filter Optimization, in 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), pp. 195\u2013199","DOI":"10.1109\/ICIoT48696.2020.9089659"},{"key":"11747_CR6","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1016\/j.ins.2016.04.019","volume":"378","author":"RAR Ashfaq","year":"2017","unstructured":"Ashfaq RAR, Wang X-Z, Huang JZ, Abbas H, He Y-L (2017) Fuzziness based semi-supervised learning approach for intrusion detection system. Inf Sci (Ny) 378:484\u2013497","journal-title":"Inf Sci (Ny)"},{"key":"11747_CR7","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/j.procs.2021.05.025","volume":"185","author":"L Ashiku","year":"2021","unstructured":"Ashiku L, Dagli C (2021) Network Intrusion Detection System using Deep Learning. Procedia Comput Sci 185:239\u2013247","journal-title":"Procedia Comput Sci"},{"key":"11747_CR8","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.neunet.2018.07.011","volume":"106","author":"M Buda","year":"2018","unstructured":"Buda M, Maki A, Mazurowski MA (2018) A systematic study of the class imbalance problem in convolutional neural networks. Neural Networks 106:249\u2013259","journal-title":"Neural Networks"},{"issue":"7","key":"11747_CR9","doi-asserted-by":"publisher","first-page":"2735","DOI":"10.1007\/s10489-018-01408-x","volume":"49","author":"\u00dc \u00c7avusoglu","year":"2019","unstructured":"\u00c7avusoglu \u00dc (2019) A new hybrid approach for intrusion detection using machine learning methods. Appl Intell 49(7):2735\u20132761","journal-title":"Appl Intell"},{"key":"11747_CR10","unstructured":"Clevert D-A, Unterthiner T, Hochreiter S (2015) Fast and accurate deep network learning by exponential linear units (elus),\u201d arXiv Prepr. arXiv1511.07289"},{"key":"11747_CR11","doi-asserted-by":"crossref","unstructured":"Collobert R, Weston J (2008) A unified architecture for natural language processing: Deep neural networks with multitask learning,\u201d in Proceedings of the 25th international conference on Machine learning, pp. 160\u2013167","DOI":"10.1145\/1390156.1390177"},{"key":"11747_CR12","doi-asserted-by":"crossref","unstructured":"Ding S, Wang G (2017) Research on intrusion detection technology based on deep learning,\u201d in 2017 3rd IEEE International Conference on Computer and Communications (ICCC), pp. 1474\u20131478","DOI":"10.1109\/CompComm.2017.8322786"},{"issue":"2","key":"11747_CR13","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1049\/iet-ifs.2019.0294","volume":"14","author":"R-H Dong","year":"2019","unstructured":"Dong R-H, Li X-Y, Zhang Q-Y, Yuan H (2019) Network intrusion detection model based on multivariate correlation analysis--long short-time memory network. IET Inf Secur 14(2):166\u2013174","journal-title":"IET Inf Secur"},{"key":"11747_CR14","doi-asserted-by":"publisher","first-page":"8909","DOI":"10.23919\/ChiCC.2019.8865258","volume":"2019","author":"J Gao","year":"2019","unstructured":"Gao J, Chai S, Zhang C, Zhang B, Cui L (2019) A Novel Intrusion Detection System based on Extreme Machine Learning and Multi-Voting Technology. Chinese Control Conference (CCC) 2019:8909\u20138914","journal-title":"Chinese Control Conference (CCC)"},{"issue":"1\u20132","key":"11747_CR15","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P Garcia-Teodoro","year":"2009","unstructured":"Garcia-Teodoro P, Diaz-Verdejo J, Maci\u00e1-Fern\u00e1ndez G, V\u00e1zquez E (2009) Anomaly-based network intrusion detection: Techniques, systems and challenges. Comput Secur 28(1\u20132):18\u201328","journal-title":"Comput Secur"},{"key":"11747_CR16","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.jpdc.2019.09.013","volume":"135","author":"S Garg","year":"2020","unstructured":"Garg S et al (2020) En-ABC: An ensemble artificial bee colony based anomaly detection scheme for cloud environment. J Parallel Distrib Comput 135:219\u2013233","journal-title":"J Parallel Distrib Comput"},{"key":"11747_CR17","unstructured":"Glorot X, Bengio Y (2010) Understanding the difficulty of training deep feedforward neural networks, in Proceedings of the thirteenth international conference on artificial intelligence and statistics, pp. 249\u2013256"},{"key":"11747_CR18","doi-asserted-by":"crossref","unstructured":"Graves A, Mohamed A, Hinton G (2013) Speech recognition with deep recurrent neural networks,\u201d in 2013 IEEE international conference on acoustics, speech and signal processing, pp. 6645\u20136649","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"11747_CR19","unstructured":"Hagan MT, Demuth HB, Beale M (1997) Neural network design. PWS Publishing Co"},{"key":"11747_CR20","unstructured":"Hardt M, Recht B, Singer Y (2016) \u201cTrain faster, generalize better: Stability of stochastic gradient descent,\u201d in International Conference on Machine Learning, pp. 1225\u20131234"},{"key":"11747_CR21","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition, in Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"issue":"6","key":"11747_CR22","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MSP.2012.2205597","volume":"29","author":"G Hinton","year":"2012","unstructured":"Hinton G et al (2012) Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups. IEEE Signal Process Mag 29(6):82\u201397","journal-title":"IEEE Signal Process Mag"},{"issue":"1","key":"11747_CR23","first-page":"107","volume":"8","author":"LM Ibrahim","year":"2013","unstructured":"Ibrahim LM, Basheer DT, Mahmod MS (2013) A comparison study for intrusion database (Kdd99, Nsl-Kdd) based on self organization map (SOM) artificial neural network. J Eng Sci Technol 8(1):107\u2013119","journal-title":"J Eng Sci Technol"},{"key":"11747_CR24","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.neucom.2019.11.016","volume":"387","author":"C Ieracitano","year":"2020","unstructured":"Ieracitano C, Adeel A, Morabito FC, Hussain A (2020) A novel statistical analysis and autoencoder driven intelligent intrusion detection approach. Neurocomputing 387:51\u201362","journal-title":"Neurocomputing"},{"key":"11747_CR25","doi-asserted-by":"crossref","unstructured":"Ingre B, Yadav A (2015) Performance analysis of NSL-KDD dataset using ANN, in 2015 international conference on signal processing and communication engineering systems, pp. 92\u201396","DOI":"10.1109\/SPACES.2015.7058223"},{"key":"11747_CR26","doi-asserted-by":"crossref","unstructured":"Injadat M, Moubayed A, Nassif AB, Shami A (2020) Multi-stage optimized machine learning framework for network intrusion detection. IEEE Trans Netw Serv Manag","DOI":"10.1109\/TNSM.2020.3014929"},{"key":"11747_CR27","doi-asserted-by":"publisher","first-page":"32464","DOI":"10.1109\/ACCESS.2020.2973730","volume":"8","author":"K Jiang","year":"2020","unstructured":"Jiang K, Wang W, Wang A, Wu H (2020) Network intrusion detection combined hybrid sampling with deep hierarchical network. IEEE Access 8:32464\u201332476","journal-title":"IEEE Access"},{"key":"11747_CR28","doi-asserted-by":"crossref","unstructured":"Kalchbrenner N, Grefenstette E, Blunsom P (2014) A convolutional neural network for modelling sentences,\u201d arXiv Prepr. arXiv1404.2188","DOI":"10.3115\/v1\/P14-1062"},{"key":"11747_CR29","doi-asserted-by":"publisher","first-page":"101752","DOI":"10.1016\/j.cose.2020.101752","volume":"92","author":"SM Kasongo","year":"2020","unstructured":"Kasongo SM, Sun Y (2020) A deep learning method with wrapper based feature extraction for wireless intrusion detection system. Comput Secur 92:101752","journal-title":"Comput Secur"},{"issue":"1","key":"11747_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-020-00379-6","volume":"7","author":"SM Kasongo","year":"2020","unstructured":"Kasongo SM, Sun Y (2020) Performance Analysis of Intrusion Detection Systems Using a Feature Selection Method on the UNSW-NB15 Dataset. J Big Data 7(1):1\u201320","journal-title":"J Big Data"},{"key":"11747_CR31","unstructured":"Kaur T, Malhotra V, Singh D (2014) Comparison of network security tools-firewall, intrusion detection system and Honeypot. Int J Enhanc Res Sci Technol Eng 200204"},{"issue":"5","key":"11747_CR32","doi-asserted-by":"publisher","first-page":"834","DOI":"10.3390\/pr9050834","volume":"9","author":"MA Khan","year":"2021","unstructured":"Khan MA (2021) HCRNNIDS: Hybrid Convolutional Recurrent Neural Network-Based Network Intrusion Detection System. Processes 9(5):834","journal-title":"Processes"},{"key":"11747_CR33","doi-asserted-by":"publisher","first-page":"30373","DOI":"10.1109\/ACCESS.2019.2899721","volume":"7","author":"FA Khan","year":"2019","unstructured":"Khan FA, Gumaei A, Derhab A, Hussain A (2019) A novel two-stage deep learning model for efficient network intrusion detection. IEEE Access 7:30373\u201330385","journal-title":"IEEE Access"},{"issue":"1","key":"11747_CR34","doi-asserted-by":"publisher","first-page":"173","DOI":"10.3390\/electronics9010173","volume":"9","author":"A Khraisat","year":"2020","unstructured":"Khraisat A, Gondal I, Vamplew P, Kamruzzaman J, Alazab A (2020) Hybrid intrusion detection system based on the stacking ensemble of c5 decision tree classifier and one class support vector machine. Electronics 9(1):173","journal-title":"Electronics"},{"key":"11747_CR35","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1109\/BIGCOMP.2017.7881684","volume":"2017","author":"J Kim","year":"2017","unstructured":"Kim J, Shin N, Jo SY, Kim SH (2017) Method of intrusion detection using deep neural network. IEEE Int Conference Big Data Smart Comput (BigComp) 2017:313\u2013316","journal-title":"IEEE Int Conference Big Data Smart Comput (BigComp)"},{"issue":"2","key":"11747_CR36","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1093\/oxfordjournals.pan.a004868","volume":"9","author":"G King","year":"2001","unstructured":"King G, Zeng L (2001) Logistic regression in rare events data. Polit Anal 9(2):137\u2013163","journal-title":"Polit Anal"},{"key":"11747_CR37","unstructured":"Kingma DP, Ba J (2014) Adam: A method for stochastic optimization, arXiv Prepr. arXiv1412.6980"},{"key":"11747_CR38","first-page":"1097","volume":"25","author":"A Krizhevsky","year":"2012","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. Adv Neural Inf Process Syst 25:1097\u20131105","journal-title":"Adv Neural Inf Process Syst"},{"key":"11747_CR39","doi-asserted-by":"crossref","unstructured":"Kr\u00f6mer P, Plato\u0161 J, Sn\u00e1\u0161el V, Abraham A (2011) Fuzzy classification by evolutionary algorithms,\u201d in 2011 IEEE International Conference on Systems, Man, and Cybernetics, pp. 313\u2013318","DOI":"10.1109\/ICSMC.2011.6083684"},{"issue":"7553","key":"11747_CR40","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun Y, Bengio Y, Hinton G (2015) Deep learning. Nature 521(7553):436\u2013444","journal-title":"Nature"},{"issue":"3","key":"11747_CR41","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1038\/s41551-018-0324-9","volume":"3","author":"H Lee","year":"2019","unstructured":"Lee H et al (2019) An explainable deep-learning algorithm for the detection of acute intracranial haemorrhage from small datasets. Nat Biomed Eng 3(3):173\u2013182","journal-title":"Nat Biomed Eng"},{"key":"11747_CR42","doi-asserted-by":"crossref","unstructured":"Li Z, Qin Z, Huang K, Yang X, Ye S (2017) Intrusion detection using convolutional neural networks for representation learning, in International conference on neural information processing, pp. 858\u2013866.","DOI":"10.1007\/978-3-319-70139-4_87"},{"issue":"1","key":"11747_CR43","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.jnca.2012.09.004","volume":"36","author":"H-J Liao","year":"2013","unstructured":"Liao H-J, Lin C-HR, Lin Y-C, Tung K-Y (2013) Intrusion detection system: A comprehensive review. J Netw Comput Appl 36(1):16\u201324","journal-title":"J Netw Comput Appl"},{"key":"11747_CR44","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/j.proenv.2011.12.040","volume":"11","author":"Z Liu","year":"2011","unstructured":"Liu Z et al (2011) A method of SVM with normalization in intrusion detection. Procedia Environ Sci 11:256\u2013262","journal-title":"Procedia Environ Sci"},{"issue":"1","key":"11747_CR45","first-page":"3","volume":"30","author":"AL Maas","year":"2013","unstructured":"Maas AL, Hannun AY, Ng AY (2013) Rectifier nonlinearities improve neural network acoustic models. Proc icml 30(1):3","journal-title":"Proc icml"},{"key":"11747_CR46","doi-asserted-by":"crossref","unstructured":"Man J, Sun G (2021) A Residual Learning-Based Network Intrusion Detection System,\u201d Secur. Commun. Networks, vol. 2021","DOI":"10.1155\/2021\/5593435"},{"key":"11747_CR47","doi-asserted-by":"publisher","first-page":"22711","DOI":"10.1109\/ACCESS.2021.3055826","volume":"9","author":"B Manda","year":"2021","unstructured":"Manda B, Bhaskare P, Muthuganapathy R (2021) A Convolutional Neural Network Approach to the Classification of Engineering Models. IEEE Access 9:22711\u201322723","journal-title":"IEEE Access"},{"key":"11747_CR48","doi-asserted-by":"publisher","first-page":"e00497","DOI":"10.1016\/j.sciaf.2020.e00497","volume":"9","author":"JO Mebawondu","year":"2020","unstructured":"Mebawondu JO, Alowolodu OD, Mebawondu JO, Adetunmbi AO (2020) Network intrusion detection system using supervised learning paradigm. Sci. African 9:e00497","journal-title":"Sci. African"},{"issue":"3","key":"11747_CR49","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/s10207-020-00508-5","volume":"20","author":"SN Mighan","year":"2021","unstructured":"Mighan SN, Kahani M (2021) A novel scalable intrusion detection system based on deep learning. Int J Inf Secur 20(3):387\u2013403","journal-title":"Int J Inf Secur"},{"issue":"12","key":"11747_CR50","doi-asserted-by":"publisher","first-page":"1296","DOI":"10.1002\/sec.403","volume":"5","author":"M Mohammadi","year":"2012","unstructured":"Mohammadi M, Raahemi B, Akbari A, Nassersharif B (2012) New class-dependent feature transformation for intrusion detection systems. Secur Commun networks 5(12):1296\u20131311","journal-title":"Secur Commun networks"},{"key":"11747_CR51","doi-asserted-by":"crossref","unstructured":"Moukhafi M, El Yassini K, Bri S, Oufaska K (2018) Artificial neural network optimized by genetic algorithm for intrusion detection system,\u201d in International Conference on Advanced Intelligent Systems for Sustainable Development, pp 393\u2013404","DOI":"10.1007\/978-3-030-11928-7_35"},{"issue":"1","key":"11747_CR52","doi-asserted-by":"publisher","first-page":"4","DOI":"10.3390\/sym13010004","volume":"13","author":"M Mulyanto","year":"2021","unstructured":"Mulyanto M, Faisal M, Prakosa SW, Leu J-S (2021) Effectiveness of Focal Loss for Minority Classification in Network Intrusion Detection Systems. Symmetry (Basel) 13(1):4","journal-title":"Symmetry (Basel)"},{"key":"11747_CR53","unstructured":"Nair V, Hinton GE (2010) Rectified linear units improve restricted boltzmann machines"},{"key":"11747_CR54","doi-asserted-by":"crossref","unstructured":"Nguyen S-N, Nguyen V-Q, Choi J, Kim K (2018) Design and implementation of intrusion detection system using convolutional neural network for DoS detection,\u201d in Proceedings of the 2nd international conference on machine learning and soft computing, pp. 34\u201338","DOI":"10.1145\/3184066.3184089"},{"key":"11747_CR55","doi-asserted-by":"crossref","unstructured":"Nskh P, Varma MN, Naik RR (2016) Principle component analysis based intrusion detection system using support vector machine, in 2016 IEEE International Conference on Recent Trends in Electronics, Information \\& Communication Technology (RTEICT), pp. 1344\u20131350","DOI":"10.1109\/RTEICT.2016.7808050"},{"issue":"1","key":"11747_CR56","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.jnca.2012.08.007","volume":"36","author":"A Patel","year":"2013","unstructured":"Patel A, Taghavi M, Bakhtiyari K, J\u00fanior JC (2013) An intrusion detection and prevention system in cloud computing: A systematic review. J Netw Comput Appl 36(1):25\u201341","journal-title":"J Netw Comput Appl"},{"key":"11747_CR57","doi-asserted-by":"crossref","unstructured":"Paulauskas N, Auskalnis J (2017) Analysis of data pre-processing influence on intrusion detection using NSL-KDD dataset, in 2017 open conference of electrical, electronic and information sciences (eStream), pp. 1\u20135","DOI":"10.1109\/eStream.2017.7950325"},{"key":"11747_CR58","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1016\/j.neucom.2020.04.075","volume":"407","author":"P Peng","year":"2020","unstructured":"Peng P, Zhang W, Zhang Y, Xu Y, Wang H, Zhang H (2020) Cost sensitive active learning using bidirectional gated recurrent neural networks for imbalanced fault diagnosis. Neurocomputing 407:232\u2013245","journal-title":"Neurocomputing"},{"key":"11747_CR59","doi-asserted-by":"crossref","unstructured":"Pervez MS, Farid DM (2014) Feature selection and intrusion classification in NSL-KDD cup 99 dataset employing SVMs,\u201d in The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014), pp. 1\u20136.","DOI":"10.1109\/SKIMA.2014.7083539"},{"key":"11747_CR60","doi-asserted-by":"crossref","unstructured":"Priyadarsini PI (2021) ABC-BSRF: Artificial Bee Colony and Borderline-SMOTE RF Algorithm for Intrusion Detection System on Data Imbalanced Problem,\u201d in Proceedings of International Conference on Computational Intelligence and Data Engineering: ICCIDE 2020, pp. 15\u201329","DOI":"10.1007\/978-981-15-8767-2_2"},{"key":"11747_CR61","doi-asserted-by":"crossref","unstructured":"Rani M, Gagandeep (2019) A Review of Intrusion Detection System in Cloud Computing","DOI":"10.2139\/ssrn.3355127"},{"key":"11747_CR62","unstructured":"Rani M, et al. (2021) Employing Artificial Bee Colony Algorithm for Feature Selection in Intrusion Detection System,\u201d in 2021 8th International Conference on Computing for Sustainable Global Development (INDIACom), pp 496\u2013500"},{"key":"11747_CR63","unstructured":"Rawat S, Srinivasan A, Ravi V, Ghosh U Intrusion detection systems using classical machine learning techniques vs integrated unsupervised feature learning and deep neural network. Internet Technol. Lett, p. e232"},{"key":"11747_CR64","doi-asserted-by":"crossref","unstructured":"Sethi K, Kumar R, Prajapati N, Bera P (2020) Deep Reinforcement Learning based Intrusion Detection System for Cloud Infrastructure,\u201d in 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS), pp. 1\u20136","DOI":"10.1109\/COMSNETS48256.2020.9027452"},{"key":"11747_CR65","doi-asserted-by":"crossref","unstructured":"Singh D, Singh B (2019) Investigating the impact of data normalization on classification performance, Appl Soft Comput, p. 105524","DOI":"10.1016\/j.asoc.2019.105524"},{"key":"11747_CR66","doi-asserted-by":"publisher","first-page":"29575","DOI":"10.1109\/ACCESS.2020.2972627","volume":"8","author":"T Su","year":"2020","unstructured":"Su T, Sun H, Zhu J, Wang S, Li Y (2020) BAT: Deep learning methods on network intrusion detection using NSL-KDD dataset. IEEE Access 8:29575\u201329585","journal-title":"IEEE Access"},{"issue":"1","key":"11747_CR67","doi-asserted-by":"publisher","first-page":"203","DOI":"10.3390\/s19010203","volume":"19","author":"X Tan","year":"2019","unstructured":"Tan X et al (2019) Wireless sensor networks intrusion detection based on SMOTE and the random forest algorithm. Sensors 19(1):203","journal-title":"Sensors"},{"key":"11747_CR68","doi-asserted-by":"crossref","unstructured":"Tao W, Honghui F, HongJin Z, CongZhe Y, HongYan Z, XianZhen H (2021) Intrusion Detection System Combined Enhanced Random Forest With Smote Algorithm","DOI":"10.21203\/rs.3.rs-270201\/v1"},{"key":"11747_CR69","doi-asserted-by":"crossref","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set,\u201d in 2009 IEEE symposium on computational intelligence for security and defense applications, pp. 1\u20136","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"11747_CR70","doi-asserted-by":"publisher","first-page":"72458","DOI":"10.1109\/ACCESS.2018.2867345","volume":"6","author":"TA Tchakoucht","year":"2018","unstructured":"Tchakoucht TA, Ezziyyani M (2018) Multilayered Echo-State Machine: A Novel architecture for efficient intrusion detection. IEEE Access 6:72458\u201372468","journal-title":"IEEE Access"},{"key":"11747_CR71","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1016\/j.ins.2019.11.004","volume":"513","author":"F Thabtah","year":"2020","unstructured":"Thabtah F, Hammoud S, Kamalov F, Gonsalves A (2020) Data imbalance in classification: Experimental evaluation. Inf Sci (Ny) 513:429\u2013441","journal-title":"Inf Sci (Ny)"},{"key":"11747_CR72","doi-asserted-by":"crossref","unstructured":"Umar MA, Zhanfang C (2020) Effects of Feature Selection and Normalization on Network Intrusion Detection","DOI":"10.36227\/techrxiv.12480425.v2"},{"key":"11747_CR73","doi-asserted-by":"crossref","unstructured":"Umar MA, Zhanfang C, Liu Y (2020) Network Intrusion Detection Using Wrapper-based Decision Tree for Feature Selection, in Proceedings of the 2020 International Conference on Internet Computing for Science and Engineering, pp. 5\u201313","DOI":"10.1145\/3424311.3424330"},{"key":"11747_CR74","doi-asserted-by":"crossref","unstructured":"Verma AK, Kaushik P, Shrivastava G (2019) A Network Intrusion Detection Approach Using Variant of Convolution Neural Network, in 2019 International Conference on Communication and Electronics Systems (ICCES), pp. 409\u2013416","DOI":"10.1109\/ICCES45898.2019.9002221"},{"key":"11747_CR75","doi-asserted-by":"publisher","first-page":"41525","DOI":"10.1109\/ACCESS.2019.2895334","volume":"7","author":"R Vinayakumar","year":"2019","unstructured":"Vinayakumar R, Alazab M, Soman KP, Poornachandran P, Al-Nemrat A, Venkatraman S (2019) Deep learning approach for intelligent intrusion detection system. IEEE Access 7:41525\u201341550","journal-title":"IEEE Access"},{"key":"11747_CR76","unstructured":"Wang Y, Shen Y, Zhang G (2016) Research on intrusion detection model using ensemble learning methods,\u201d in 2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS), , pp. 422\u2013425"},{"key":"11747_CR77","doi-asserted-by":"publisher","first-page":"50850","DOI":"10.1109\/ACCESS.2018.2868993","volume":"6","author":"K Wu","year":"2018","unstructured":"Wu K, Chen Z, Li W (2018) A novel intrusion detection model for a massive network using convolutional neural networks. Ieee Access 6:50850\u201350859","journal-title":"Ieee Access"},{"key":"11747_CR78","doi-asserted-by":"publisher","first-page":"98600","DOI":"10.1109\/ACCESS.2020.2994947","volume":"8","author":"Y Wu","year":"2020","unstructured":"Wu Y, Lee WW, Xu Z, Ni M (2020) Large-scale and robust intrusion detection model combining improved deep belief network with feature-weighted SVM. IEEE Access 8:98600\u201398611","journal-title":"IEEE Access"},{"issue":"19","key":"11747_CR79","doi-asserted-by":"publisher","first-page":"5710","DOI":"10.3390\/s20195710","volume":"20","author":"Y Wu","year":"2020","unstructured":"Wu Y, Lee WW, Gong X, Wang H (2020) A Hybrid Intrusion Detection Model Combining SAE with Kernel Approximation in Internet of Things. Sensors 20(19):5710","journal-title":"Sensors"},{"key":"11747_CR80","unstructured":"Xu B, Wang N, Chen T, Li M (2015) Empirical evaluation of rectified activations in convolutional network,\u201d arXiv Prepr. arXiv1505.00853"},{"key":"11747_CR81","doi-asserted-by":"crossref","unstructured":"Xu J, Li Z, Du B, Zhang M, Liu J (2020) Reluplex made more practical: Leaky ReLU,\u201d in 2020 IEEE Symposium on Computers and Communications (ISCC), pp. 1\u20137","DOI":"10.1109\/ISCC50000.2020.9219587"},{"issue":"1","key":"11747_CR82","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/S0031-3203(02)00026-2","volume":"36","author":"D-Y Yeung","year":"2003","unstructured":"Yeung D-Y, Ding Y (2003) Host-based intrusion detection using dynamic and static behavioral models. Pattern Recognit 36(1):229\u2013243","journal-title":"Pattern Recognit"},{"key":"11747_CR83","doi-asserted-by":"publisher","first-page":"21954","DOI":"10.1109\/ACCESS.2017.2762418","volume":"5","author":"C Yin","year":"2017","unstructured":"Yin C, Zhu Y, Fei J, He X (2017) A deep learning approach for intrusion detection using recurrent neural networks. Ieee Access 5:21954\u201321961","journal-title":"Ieee Access"},{"key":"11747_CR84","first-page":"3854","volume":"2017","author":"M Yousefi-Azar","year":"2017","unstructured":"Yousefi-Azar M, Varadharajan V, Hamey L, Tupakula U (2017) Autoencoder-based feature learning for cyber security applications. Int Joint Conference Neural Networks (IJCNN) 2017:3854\u20133861","journal-title":"Int Joint Conference Neural Networks (IJCNN)"},{"key":"11747_CR85","doi-asserted-by":"crossref","unstructured":"Zhang C, Ruan F, Yin L, Chen X, Zhai L, Liu F (2019) A deep learning approach for network intrusion detection based on NSL-KDD dataset,\u201d in 2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID), pp. 41\u201345","DOI":"10.1109\/ICASID.2019.8925239"},{"key":"11747_CR86","first-page":"1","volume":"2018","author":"S Zwane","year":"2018","unstructured":"Zwane S, Tarwireyi P, Adigun M (2018) Performance Analysis of Machine Learning Classifiers for Intrusion Detection. Int Conference Intell Innov Comput Applic (ICONIC) 2018:1\u20135","journal-title":"Int Conference Intell Innov Comput Applic (ICONIC)"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11747-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11747-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11747-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,22]],"date-time":"2022-10-22T02:35:46Z","timestamp":1666406146000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11747-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,2]]},"references-count":86,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["11747"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11747-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,2]]},"assertion":[{"value":"29 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 August 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 November 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 February 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}}]}}