{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T07:04:59Z","timestamp":1776755099579,"version":"3.51.2"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T00:00:00Z","timestamp":1710201600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T00:00:00Z","timestamp":1710201600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1007\/s11227-024-05994-1","type":"journal-article","created":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T00:02:37Z","timestamp":1710288157000},"page":"13918-13948","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Intrusion detection system: a deep neural network-based concatenated approach"],"prefix":"10.1007","volume":"80","author":[{"given":"Hidangmayum Satyajeet","family":"Sharma","sequence":"first","affiliation":[]},{"given":"Khundrakpam Johnson","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,12]]},"reference":[{"key":"5994_CR1","doi-asserted-by":"publisher","first-page":"103637","DOI":"10.1016\/j.jnca.2023.103637","volume":"215","author":"M Nuaimi","year":"2023","unstructured":"Nuaimi M, Fourati LC, Hamed BB (2023) Intelligent approaches toward intrusion detection systems for Industrial Internet of Things: a systematic comprehensive review. J Netw Comput Appl 215:103637. https:\/\/doi.org\/10.1016\/j.jnca.2023.103637","journal-title":"J Netw Comput Appl"},{"key":"5994_CR2","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.tcs.2022.07.030","volume":"931","author":"PR Kannari","year":"2022","unstructured":"Kannari PR, Chowdary NS, Biradar RL (2022) An anomaly-based intrusion detection system using recursive feature elimination technique for improved attack detection. Theor Comput Sci 931:56\u201364. https:\/\/doi.org\/10.1016\/j.tcs.2022.07.030","journal-title":"Theor Comput Sci"},{"key":"5994_CR3","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1186\/s42400-019-0038-7","volume":"2","author":"A Khraisat","year":"2019","unstructured":"Khraisat A, Gondal I, Vamplew P et al (2019) Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecur 2:20. https:\/\/doi.org\/10.1186\/s42400-019-0038-7","journal-title":"Cybersecur"},{"key":"5994_CR4","doi-asserted-by":"publisher","first-page":"102804","DOI":"10.1016\/j.jisa.2021.102804","volume":"58","author":"YN Kunang","year":"2021","unstructured":"Kunang YN, Nurmaini S, Stiawan D, Suprapto BY (2021) Attack classification of an intrusion detection system using deep learning and hyperparameter optimization. J Inf Secur Appl 58:102804. https:\/\/doi.org\/10.1016\/j.jisa.2021.102804","journal-title":"J Inf Secur Appl"},{"key":"5994_CR5","doi-asserted-by":"publisher","first-page":"100142","DOI":"10.1016\/j.dajour.2022.100142","volume":"5","author":"M Vishwakarma","year":"2022","unstructured":"Vishwakarma M, Kesswani N (2022) DIDS: a deep neural network based real-time intrusion detection system for IoT. Decis Anal J 5:100142. https:\/\/doi.org\/10.1016\/j.dajour.2022.100142","journal-title":"Decis Anal J"},{"issue":"5","key":"5994_CR6","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1145\/3234150","volume":"51","author":"S Pouyanfar","year":"2018","unstructured":"Pouyanfar S, Sadiq S, Yan Y, Tian H, Tao Y, Reyes MP, Shyu M-L, Chen S-C, Iyengar SS (2018) A survey on deep learning: algorithms, techniques, and applications. ACM Comput Surv 51(5):92. https:\/\/doi.org\/10.1145\/3234150","journal-title":"ACM Comput Surv"},{"issue":"2","key":"5994_CR7","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1109\/JSYST.2020.2992966","volume":"15","author":"D G\u00fcm\u00fc\u015fba\u015f","year":"2021","unstructured":"G\u00fcm\u00fc\u015fba\u015f D, Y\u0131ld\u0131r\u0131m T, Genovese A, Scotti F (2021) A Comprehensive survey of databases and deep learning methods for cybersecurity and intrusion detection systems. IEEE Syst J 15(2):1717\u20131731. https:\/\/doi.org\/10.1109\/JSYST.2020.2992966","journal-title":"IEEE Syst J"},{"key":"5994_CR8","doi-asserted-by":"publisher","DOI":"10.1186\/s13640-019-0417-8","author":"M Xin","year":"2019","unstructured":"Xin M, Wang Y (2019) Research on image classification model based on deep convolution neural network. EURASIP J Image Video Proc. https:\/\/doi.org\/10.1186\/s13640-019-0417-8","journal-title":"EURASIP. J Image Video Proc"},{"key":"5994_CR9","doi-asserted-by":"publisher","first-page":"101322","DOI":"10.1016\/j.jestch.2022.101322","volume":"38","author":"HC Altunay","year":"2023","unstructured":"Altunay HC, Albayrak Z (2023) A hybrid CNN+LSTM-based intrusion detection system for industrial IoT networks. Eng Sci Technol Int J 38:101322. https:\/\/doi.org\/10.1016\/j.jestch.2022.101322","journal-title":"Eng Sci Technol Int J"},{"key":"5994_CR10","doi-asserted-by":"crossref","unstructured":"Moustafa N, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: Military Communications and Information Systems Conference (MilCIS), 2015. IEEE.","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"5994_CR11","doi-asserted-by":"crossref","unstructured":"Sharafaldin I, Lashkari AH, Hakak S, Ghorbani AA (2019) Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. In: IEEE 53rd International Carnahan Conference on Security Technology, Chennai, India","DOI":"10.1109\/CCST.2019.8888419"},{"key":"5994_CR12","doi-asserted-by":"publisher","first-page":"100156","DOI":"10.1016\/j.mlwa.2021.100156","volume":"6","author":"JO Onah","year":"2021","unstructured":"Onah JO, Abdulhamid SM, Abdullahi M, Hassan IH, Al-Ghusham A (2021) Genetic Algorithm based feature selection and Na\u00efve Bayes for anomaly detection in fog computing environment. Mach Learn Appl 6:100156. https:\/\/doi.org\/10.1016\/j.mlwa.2021.100156","journal-title":"Mach Learn Appl"},{"issue":"13","key":"5994_CR13","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6919","volume":"34","author":"US Chanu","year":"2022","unstructured":"Chanu US, Singh KJ, Chanu YJ (2022) An ensemble method for feature selection and an integrated approach for mitigation of distributed denial of service attacks. Concurr Comput Pract Exp 34(13):e6919. https:\/\/doi.org\/10.1002\/cpe.6919","journal-title":"Concurr Comput Pract Exp"},{"key":"5994_CR14","doi-asserted-by":"publisher","first-page":"101752","DOI":"10.1016\/j.cose.2020.101752","volume":"92","author":"SM Kasongo","year":"2020","unstructured":"Kasongo SM, Sun Y (2020) A deep learning method with wrapper based feature extraction for wireless intrusion detection system. Comput Secur 92:101752. https:\/\/doi.org\/10.1016\/j.cose.2020.101752","journal-title":"Comput Secur"},{"issue":"2","key":"5994_CR15","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.icte.2019.08.004","volume":"6","author":"SM Kasongo","year":"2020","unstructured":"Kasongo SM, Sun Y (2020) A deep long short-term memory based classifier for wireless intrusion detection system. ICT Express 6(2):98\u2013103. https:\/\/doi.org\/10.1016\/j.icte.2019.08.004","journal-title":"ICT Express"},{"key":"5994_CR16","doi-asserted-by":"publisher","first-page":"114520","DOI":"10.1016\/j.eswa.2020.114520","volume":"169","author":"AE Cil","year":"2021","unstructured":"Cil AE, Yildiz K, Buldu A (2021) Detection of DDoS attacks with feed forward based deep neural network model. Expert Syst Appl 169:114520. https:\/\/doi.org\/10.1016\/j.eswa.2020.114520","journal-title":"Expert Syst Appl"},{"key":"5994_CR17","doi-asserted-by":"publisher","first-page":"102448","DOI":"10.1016\/j.cose.2021.102448","volume":"110","author":"Z Halim","year":"2021","unstructured":"Halim Z, Yousaf MN, Waqas M, Sulaiman M, Abbas G, Hussain M, Ahmad I, Hanif M (2021) An effective genetic algorithm-based feature selection method for intrusion detection systems. Comput Secur 110:102448. https:\/\/doi.org\/10.1016\/j.cose.2021.102448","journal-title":"Comput Secur"},{"key":"5994_CR18","doi-asserted-by":"publisher","first-page":"103160","DOI":"10.1016\/j.jnca.2021.103160","volume":"191","author":"MS ElSayed","year":"2021","unstructured":"ElSayed MS, Le-Khac N-A, Albahar MA, Jurcut A (2021) A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique. J Netw Comput Appl 191:103160. https:\/\/doi.org\/10.1016\/j.jnca.2021.103160","journal-title":"J Netw Comput Appl"},{"key":"5994_CR19","doi-asserted-by":"publisher","unstructured":"Lin W-H, Lin H-C, Wang P, Wu B-H, Tsai J-Y (2018) Using convolutional neural networks to network intrusion detection for cyber threats. In:\u00a02018 IEEE International Conference on Applied System Invention (ICASI), Chiba, Japan, pp 1107\u20131110, doi: https:\/\/doi.org\/10.1109\/ICASI.2018.8394474.","DOI":"10.1109\/ICASI.2018.8394474"},{"key":"5994_CR20","doi-asserted-by":"publisher","unstructured":"Tang TA, Mhamdi L, McLernon D, Zaidi SAR, Ghogho M (2018) Deep Recurrent Neural Network for Intrusion Detection in SDN-based Networks. In: 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft), Montreal, QC, Canada, pp 202\u2013206, https:\/\/doi.org\/10.1109\/NETSOFT.2018.8460090.","DOI":"10.1109\/NETSOFT.2018.8460090"},{"key":"5994_CR21","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2019.0100969","author":"AV Elijah","year":"2019","unstructured":"Elijah AV, Abdullah A, Jhanhi NZ, Supramaniam M, Abdullateef OB (2019) Ensemble and deep-learning methods for two-class and multi-attack anomaly intrusion detection: an empirical study. Int J Adv Comput Sci Appl (IJACSA). https:\/\/doi.org\/10.14569\/IJACSA.2019.0100969","journal-title":"Int J Adv Comput Sci Appl (IJACSA)"},{"key":"5994_CR22","doi-asserted-by":"publisher","first-page":"100527","DOI":"10.1016\/j.measen.2022.100527","volume":"24","author":"M Srikanth Yadav","year":"2022","unstructured":"Srikanth Yadav M, Kalpana R (2022) Recurrent nonsymmetric deep auto encoder approach for network intrusion detection system. Meas Sens 24:100527. https:\/\/doi.org\/10.1016\/j.measen.2022.100527","journal-title":"Meas Sens"},{"key":"5994_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895334","author":"R Vinayakumar","year":"2019","unstructured":"Vinayakumar R, Alazab M, Soman KP, Poornachandran P, Al-Nemrat A, Venkatraman S (2019) Deep learning approach for intelligent intrusion detection system. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2019.2895334","journal-title":"IEEE Access"},{"key":"5994_CR24","doi-asserted-by":"publisher","first-page":"11634","DOI":"10.3390\/app112411634","volume":"11","author":"D Alghazzawi","year":"2021","unstructured":"Alghazzawi D, Bamasag O, Ullah H, Asghar MZ (2021) Efficient detection of DDoS attacks using a hybrid deep learning model with improved feature selection. Appl Sci 11:11634. https:\/\/doi.org\/10.3390\/app112411634","journal-title":"Appl Sci"},{"key":"5994_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102158","author":"J Gu","year":"2021","unstructured":"Gu J, Lu S (2021) An effective intrusion detection approach using SVM with na\u00efve Bayes feature embedding. Comput Secur https:\/\/doi.org\/10.1016\/j.cose.2020.102158","journal-title":"Comput Secur"},{"key":"5994_CR26","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.comcom.2022.12.010","volume":"199","author":"SM Kasongo","year":"2023","unstructured":"Kasongo SM (2023) A deep learning technique for intrusion detection system using a recurrent neural networks based framework. Comput Commun 199:113\u2013125. https:\/\/doi.org\/10.1016\/j.comcom.2022.12.010","journal-title":"Comput Commun"},{"issue":"5","key":"5994_CR27","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.300","volume":"6","author":"YF Sallam","year":"2023","unstructured":"Sallam YF, Abd El-Nabi S, El-Shafai W et al (2023) Efficient implementation of image representation, visual geometry group with 19 layers and residual network with 152 layers for intrusion detection from UNSW-NB15 dataset. Secur Priv 6(5):e300. https:\/\/doi.org\/10.1002\/spy2.300","journal-title":"Secur Priv"},{"key":"5994_CR28","doi-asserted-by":"publisher","unstructured":"Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. https:\/\/doi.org\/10.48550\/arXiv.1409.1556","DOI":"10.48550\/arXiv.1409.1556"},{"key":"5994_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-323-90615-9.00011-6","author":"KK Mohbey","year":"2022","unstructured":"Mohbey KK, Sharma S, Kumar S, Sharma M (2022) COVID-19 identification and analysis using CT scan images: Deep transfer learning-based approach. Blockchain Appl Healthc Inf. https:\/\/doi.org\/10.1016\/B978-0-323-90615-9.00011-6","journal-title":"Blockchain Appl Healthc Inf"},{"key":"5994_CR30","doi-asserted-by":"publisher","first-page":"3609","DOI":"10.1007\/s12652-021-03488-z]","volume":"14","author":"M Bansal","year":"2023","unstructured":"Bansal M, Kumar M, Sachdeva M et al (2023) Transfer learning for image classification using VGG19: Caltech-101 image data set. J Ambient Intell Human Comput 14:3609\u20133620. https:\/\/doi.org\/10.1007\/s12652-021-03488-z]","journal-title":"J Ambient Intell Human Comput"},{"key":"5994_CR31","doi-asserted-by":"crossref","unstructured":"Chollet F (2016) Xception: deep learning with depthwise separable convolutions. In:\u00a02017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp 1800\u20131807. https:\/\/arxiv.org\/abs\/1610.02357v3","DOI":"10.1109\/CVPR.2017.195"},{"issue":"12","key":"5994_CR32","doi-asserted-by":"publisher","first-page":"4506","DOI":"10.1007\/s10489-020-01776-3","volume":"50","author":"M Injadat","year":"2020","unstructured":"Injadat M, Moubayed A, Nassif AB et al (2020) Multi-split optimized bagging ensemble model selection for multi-class educational data mining. Appl Intell 50(12):4506\u20134528. https:\/\/doi.org\/10.1007\/s10489-020-01776-3","journal-title":"Appl Intell"},{"issue":"1","key":"5994_CR33","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1109\/JIOT.2021.3084796","volume":"9","author":"L Yang","year":"2022","unstructured":"Yang L, Moubayed A, Shami A (2022) MTH-IDS: a multitiered hybrid intrusion detection system for internet of vehicles. IEEE Internet Things J 9(1):616\u2013632. https:\/\/doi.org\/10.1109\/JIOT.2021.3084796","journal-title":"IEEE Internet Things J"},{"key":"5994_CR34","doi-asserted-by":"publisher","first-page":"106997","DOI":"10.1016\/j.asoc.2020.106997","volume":"100","author":"R SaiSindhuTheja","year":"2021","unstructured":"SaiSindhuTheja R, Shyam GK (2021) An efficient metaheuristic algorithm based feature selection and recurrent neural network for DoS attack detection in cloud computing environment. Appl Soft Comput 100:106997. https:\/\/doi.org\/10.1016\/j.asoc.2020.106997","journal-title":"Appl Soft Comput"},{"key":"5994_CR35","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla NV, Bowyer KW, Hall LO, Kegelmeyer WP (2002) SMOTE: synthetic minority over-sampling technique. J Artif Intell Res 16:321\u2013357","journal-title":"J Artif Intell Res"},{"key":"5994_CR36","doi-asserted-by":"publisher","first-page":"103445","DOI":"10.1016\/j.jisa.2023.103445","volume":"74","author":"US Chanu","year":"2023","unstructured":"Chanu US, Singh KJ, Chanu YJ (2023) A dynamic feature selection technique to detect DDoS attack. J Inf Secur Appl 74:103445. https:\/\/doi.org\/10.1016\/j.jisa.2023.103445","journal-title":"J Inf Secur Appl"},{"issue":"2","key":"5994_CR37","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/3578366","volume":"7","author":"N Sahani","year":"2023","unstructured":"Sahani N, Zhu R, Cho J-H, Liu C-C (2023) Machine learning-based intrusion detection for smart grid computing: a survey. ACM Trans. Cyber-Phys Syst 7(2):11. https:\/\/doi.org\/10.1145\/3578366","journal-title":"ACM Trans. Cyber-Phys Syst"},{"key":"5994_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103784","author":"S Latif","year":"2024","unstructured":"Latif S, Bouilila W, Koubaa A, Zou Z, Ahmad J (2024) An optimized intrusion detection framework using deep transfer learning and genetic algorithm. J Netw Comput Appl. https:\/\/doi.org\/10.1016\/j.jnca.2023.103784","journal-title":"J Netw Comput Appl"},{"key":"5994_CR39","doi-asserted-by":"publisher","first-page":"64366","DOI":"10.1109\/ACCESS.2019.2917299","volume":"7","author":"H Yang","year":"2019","unstructured":"Yang H, Wang F (2019) Wireless network intrusion detection based on improved convolutional neural network. IEEE Access 7:64366\u201364374. https:\/\/doi.org\/10.1109\/ACCESS.2019.2917299","journal-title":"IEEE Access"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-05994-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-024-05994-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-05994-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T11:15:03Z","timestamp":1718018103000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-024-05994-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,12]]},"references-count":39,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["5994"],"URL":"https:\/\/doi.org\/10.1007\/s11227-024-05994-1","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,12]]},"assertion":[{"value":"9 February 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}