{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T12:47:04Z","timestamp":1773924424052,"version":"3.50.1"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,9,18]],"date-time":"2017-09-18T00:00:00Z","timestamp":1505692800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1007\/s11277-017-4663-8","type":"journal-article","created":{"date-parts":[[2017,9,18]],"date-time":"2017-09-18T07:49:58Z","timestamp":1505720998000},"page":"3097-3112","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["A Neural Network-Based Learning Algorithm for Intrusion Detection Systems"],"prefix":"10.1007","volume":"97","author":[{"given":"Hassan I.","family":"Ahmed","sequence":"first","affiliation":[]},{"given":"Nawal A.","family":"Elfeshawy","sequence":"additional","affiliation":[]},{"given":"S. F.","family":"Elzoghdy","sequence":"additional","affiliation":[]},{"given":"Hala S.","family":"El-sayed","sequence":"additional","affiliation":[]},{"given":"Osama S.","family":"Faragallah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,18]]},"reference":[{"key":"4663_CR1","unstructured":"Dass, M., Cannady, J., & Potter, W. D. (2003). Learning intrusion detection system. In The 16th international flairs conference (pp. 12\u201316), St. Augustine, Florida, May 12\u201314, 2003."},{"key":"4663_CR2","unstructured":"Cannady, J. (1998). Artificial neural networks for misuse detection. In National information systems security conference."},{"key":"4663_CR3","volume-title":"Statistical methods for computer usage anomaly detection using NIDES","author":"A Valdes","year":"1995","unstructured":"Valdes, A., & Anderson, D. (1995). Statistical methods for computer usage anomaly detection using NIDES. SRI International: Technical report."},{"key":"4663_CR4","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1007\/s11276-012-0467-7","volume":"19","author":"NA Elfeshawy","year":"2013","unstructured":"Elfeshawy, N. A., & Faragallah, Osama S. (2013). Divided two-part adaptive intrusion detection system. Wireless Networks, 19, 301\u2013321.","journal-title":"Wireless Networks"},{"key":"4663_CR5","unstructured":"Zhang, Z., Li, J., Manikopoulos, C., Jorgenson, J., & Ucles, J. (2001). A hierarchical anomaly network intrusion detection system using neural network classification. In WSES International conference on: Neural networks and applications (NNA 01), February 2001."},{"issue":"2","key":"4663_CR6","first-page":"54","volume":"1","author":"DP Vinchurkar","year":"2012","unstructured":"Vinchurkar, D. P., & Reshamwala, A. (2012). A review of intrusion detection system using neural network and machine learning technique. International Journal of Engineering Science and Innovative Technology (IJESIT), 1(2), 54\u201363.","journal-title":"International Journal of Engineering Science and Innovative Technology (IJESIT)"},{"key":"4663_CR7","unstructured":"Sebring, M., Shellhouse, E., Hanna, M., & Whitehurst, R. (1988). Expert systems in intrusion detection: A case study. In Proceedings of the 11th national computer security conference."},{"issue":"2","key":"4663_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4218\/etrij.00.0100.0201","volume":"22","author":"M Shin","year":"2000","unstructured":"Shin, M., & Park, C. (2000). A radial basis function approach to pattern recognition and its applications. ETRI Journal, 22(2), 1\u201310.","journal-title":"ETRI Journal"},{"key":"4663_CR9","series-title":"Grassroots series (Palgrave (Firm))","doi-asserted-by":"crossref","DOI":"10.5040\/9781350392434","volume-title":"Neural networks","author":"P Picton","year":"2000","unstructured":"Picton, P. (2000). Neural networks (2nd ed.)., Grassroots series (Palgrave (Firm)) Basingstoke: Palgrave.","edition":"2"},{"issue":"1\u20133","key":"4663_CR10","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/j.neucom.2007.08.002","volume":"71","author":"GA Montazer","year":"2007","unstructured":"Montazer, G. A., Sabzevari, R., & Khatir, H. G. (2007). Improvement of learning algorithms for RBF neural networks in a helicopter sound identification system. Neurocomputing, 71(1\u20133), 167\u2013173.","journal-title":"Neurocomputing"},{"issue":"4","key":"4663_CR11","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1109\/3468.935046","volume":"31","author":"SC Lee","year":"2001","unstructured":"Lee, S. C., & Heinbuch, D. V. (2001). Training a neural network based intrusion detector to recognize novel attacks. IEEE Transactions on Systems Management and Cybernetics, 31(4), 294\u2013299.","journal-title":"IEEE Transactions on Systems Management and Cybernetics"},{"key":"4663_CR12","volume-title":"Performance of neural networks methods in intrusion detection","author":"V Dao","year":"2001","unstructured":"Dao, V., & Vemuri, R. (2001). Performance of neural networks methods in intrusion detection. Washington: Cyber Defense Initiative."},{"key":"4663_CR13","unstructured":"Amini, M., et al. (2004). Network-based intrusion detection using unsupervised adaptive resonance theory (ART). In Published in the proceedings of the 4th conference on engineering of intelligent systems (EIS 2004), Madeira, Portugal."},{"key":"4663_CR14","volume-title":"Intrusion detection with neural networks","author":"J Ryan","year":"1998","unstructured":"Ryan, J., Lin, M.-J., & Miikkulainen, R. (1998). Intrusion detection with neural networks. Austin: The University of Texas at Austin."},{"key":"4663_CR15","doi-asserted-by":"crossref","unstructured":"Allen, J., Christie, A., & Fithen, W. (2000). State of the practice of intrusion detection technologies. In Networked systems survivability program, January 2000.","DOI":"10.21236\/ADA375846"},{"key":"4663_CR16","doi-asserted-by":"crossref","unstructured":"Mukkamala, S., Janoski, G., & Sung, A. H. (2002). Intrusion detection using neural networks and support vector machines. In Proceedings of IEEE international joint conference on neural networks.","DOI":"10.1109\/IJCNN.2002.1007774"},{"key":"4663_CR17","doi-asserted-by":"crossref","unstructured":"Sung, A., & Mukkamala, S. (2003). Identifying important features for intrusion detection using support vector machines and neural networks. In Symposium on applications and the internet (pp. 209\u2013216).","DOI":"10.1109\/SAINT.2003.1183050"},{"key":"4663_CR18","unstructured":"Oryspayuli, O. D. (2006). What intrusion detection approaches work well if only TCP\/IP packet header information is available?. Master Thesis, Faculty of Electrical Engineering, Mathematics and Computer Science, University of Twente, Enschede, The Netherlands, August 2006."},{"key":"4663_CR19","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.jnca.2012.05.003","volume":"36","author":"C Modi","year":"2013","unstructured":"Modi, C., Patel, D., Borisaniya, B., Pate, H., Patel, A., & Rajarajan, M. (2013). A survey of intrusion detection techniques in Cloud. Journal of Network and Computer Applications, 36, 42\u201357.","journal-title":"Journal of Network and Computer Applications"},{"key":"4663_CR20","unstructured":"Cannady, J. (1998). Applying neural networks for misuse detection. In Proceedings of 21st national information systems security conference (pp. 368\u2013381)."},{"key":"4663_CR21","doi-asserted-by":"crossref","unstructured":"Satpute, K., Agrawa, S., Agrawal, J., & Sharma, S., (2013) Survey on anomaly detection in network intrusion detection system using particle swarm optimization based machine learning techniques. In Proceedings of the international conference on frontiers of intelligent computing: Theory and applications (FICTA) advances in intelligent systems and computing (Vol. 199, pp. 441\u2013452).","DOI":"10.1007\/978-3-642-35314-7_50"},{"key":"4663_CR22","unstructured":"Carlson, M., & Scharlott, A. (2006). Intrusion detection and prevention systems. In CS536 May 05, 2006."},{"key":"4663_CR23","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1016\/S1319-1578(06)80002-9","volume":"18","author":"AA Alfantookh","year":"2006","unstructured":"Alfantookh, A. A. (2006). DoS attacks intelligent detection using neural networks. Journal of King Saud University-Computer and Information Sciences, 18, 27\u201345.","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"key":"4663_CR24","unstructured":"Anderson, J. P. (1980). Computer security threat monitoring and surveillance, Technical report. Fort Washington, Pennsylvania: James P. Anderson Co."},{"key":"4663_CR25","unstructured":"Lu, K., Chen, Z., Jin, Z., & Guo, J. (2003). An adaptive real-time intrusion detection system using sequences of system call. In CCECE 2003."},{"key":"4663_CR26","doi-asserted-by":"crossref","unstructured":"Dutkevyach, T., Piskozub, A., & Tymoshyk, N. (2007). Real-time intrusion prevention and anomaly analyze system for corporate networks. In Fourth IEEE workshop on intelligent data acquisition and advanced computing systems: Technology and applications, IDAACS 2007 (pp. 599\u2013602).","DOI":"10.1109\/IDAACS.2007.4488491"},{"key":"4663_CR27","doi-asserted-by":"crossref","unstructured":"Zhengbing, H., Jun, S., & Shirochin, V. P. (2007). An intelligent lightweight intrusion detection system with forensic technique. In: 4th IEEE workshop on intelligent data acquisition and advanced computingsystems: Technology and applications, IDAACS 2007 (pp. 647\u201351).","DOI":"10.1109\/IDAACS.2007.4488501"},{"key":"4663_CR28","doi-asserted-by":"crossref","unstructured":"Gu, C., & Zhang, X. (2009). A rough set and SVM based intrusion detection classifier. In Second international workshop on computer science and engineering.","DOI":"10.1109\/WCSE.2009.776"},{"key":"4663_CR29","doi-asserted-by":"crossref","unstructured":"Xia, Y.-X., Shi, Z.-C., Hu, Z.-H. (2009). An incremental SVM for intrusion detection based on key feature selection. In 3rd international symposium on intelligent information technology application, 2009.","DOI":"10.1109\/IITA.2009.358"},{"issue":"1","key":"4663_CR30","first-page":"465","volume":"1","author":"R-C Chen","year":"2009","unstructured":"Chen, R.-C., Cheng, K.-F., & Hsieh, C.-F. (2009). Using rough set and support vector machine for network intrusion detection. International Journal of Network Security & Its Applications (IJNSA), 1(1), 465\u2013470.","journal-title":"International Journal of Network Security & Its Applications (IJNSA)"},{"key":"4663_CR31","doi-asserted-by":"crossref","unstructured":"Heba, F. E., Ashraf, D., Hassanien, A. E., & Abraham, A. (2010). Principle components analysis and support vector machine based intrusion detection system. In 10th international conference on Intelligent Systems Design and Applications (ISDA) (pp. 363\u2013367). IEEE.","DOI":"10.1109\/ISDA.2010.5687239"},{"key":"4663_CR32","unstructured":"Shingo, M., Ci, C., Nannan, L., Kaoru, S., & Kotaro, H. (2011). An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming. IEEE Transactions On Systems, Man, and Cybernetics\u2014Part C: Applications And Reviews 41(1)."},{"key":"4663_CR33","volume-title":"Adaptive network intrusion detection system using a hybrid approach","author":"RR Karthick","year":"2012","unstructured":"Karthick, R. R., Hattiwale, V. P., & Balaraman, R. (2012). Adaptive network intrusion detection system using a hybrid approach. New York: IEEE."},{"key":"4663_CR34","unstructured":"Yogita B. Bhavsa and, Kalyani C.Waghmare, \u201cintrusion Detection System Using Data Mining Technique: Support Vector Machine\u201d, Int. J. of Emerging Technology and Advanced Engineering, Vol. 3, Issue 3, March 2013."},{"key":"4663_CR35","unstructured":"Han, H., Lu, X. L., Ren, L. Y. (2002). Using data mining to discover signatures in network-based intrusion detection. In Proceedings of the first international conference on machine learning and cybernetics (Vol. 1), Beijing."},{"key":"4663_CR36","doi-asserted-by":"crossref","unstructured":"Zhengbing, H, Zhitang, L., Jumgi, W. (2008). Novel A. Intrusion detection system (NIDS) based on signature search of data mining. In WKDD First Int. Workshop on Knowledge discovery and Data Ming; 2008 (pp. 6\u201310).","DOI":"10.1109\/WKDD.2008.48"},{"key":"4663_CR37","doi-asserted-by":"crossref","unstructured":"Lei, L., Yang, D.-Z., Shen, F.-C. (2010) A novel rule based intrusion detection system using data ming. In 3rd IEEE international conference on computer science and information technology 2010 (Vol. 6(1), pp. 69\u201372).","DOI":"10.1109\/ICCSIT.2010.5563714"},{"key":"4663_CR38","doi-asserted-by":"crossref","unstructured":"Ektefa, M., Dept. of IS, UPM, Serdang, Malaysia, Memar, S., Sidi, F., & Affendey, L. S. (2010) Intrusion detection using data mining techniques. In: Proceedings of international conference on information retrieval & knowledge management, (CAMP 2010) (pp. 17\u201318). March, 2010.","DOI":"10.1109\/INFRKM.2010.5466919"},{"key":"4663_CR39","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.eij.2013.10.003","volume":"15","author":"GV Nadiammai","year":"2014","unstructured":"Nadiammai, G. V., & Hemalatha, M. (2014). Effective approach toward intrusion detection system using data mining techniques. Egyptian Informatics Journal, 15, 37\u201350.","journal-title":"Egyptian Informatics Journal"},{"key":"4663_CR40","unstructured":"Shyu, M. L, Chen, S. C., Sarinnapakorn, K., & Chang, L. (2003). A novel anomaly detection scheme based on principal component classifier. In IEEE foundations and new directions of data mining workshop (pp. 172\u2013179), Nov 2003."},{"issue":"2","key":"4663_CR41","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1002\/qre.392","volume":"17","author":"N Ye","year":"2001","unstructured":"Ye, N., & Chen, Q. (2001). An anomaly detection technique based on a chi square statistic for detecting intrusions into information systems. Quality and Reliability Eng. Int\u2019l, 17(2), 105\u2013112.","journal-title":"Quality and Reliability Eng. Int\u2019l"},{"key":"4663_CR42","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1016\/j.cose.2011.05.008","volume":"30","author":"JJ Davis","year":"2011","unstructured":"Davis, J. J., & Clark, A. J. (2011). Data preprocessing for anomaly based network intrusion detection: Review. Computers & Security, 30, 353\u2013375.","journal-title":"Computers & Security"},{"key":"4663_CR43","doi-asserted-by":"crossref","first-page":"2185","DOI":"10.1016\/j.patcog.2006.12.010","volume":"40","author":"S Jin","year":"2007","unstructured":"Jin, S., Yeung, D. S., & Wang, X. (2007). Network intrusion detection in covariance feature space. Pattern Recognition, 40, 2185\u20132197.","journal-title":"Pattern Recognition"},{"key":"4663_CR44","doi-asserted-by":"crossref","first-page":"1974","DOI":"10.1016\/j.jss.2009.06.040","volume":"82","author":"W Wang","year":"2009","unstructured":"Wang, W., Zhang, X., & Gombault, S. (2009). Constructing attribute weights from computer audit data for effective intrusion detection. Journal of Systems and Software, 82, 1974\u20131981.","journal-title":"Journal of Systems and Software"},{"key":"4663_CR45","doi-asserted-by":"crossref","first-page":"772","DOI":"10.1016\/j.comcom.2012.01.016","volume":"35","author":"P Casas","year":"2012","unstructured":"Casas, P., Mazel, J., & Owezarski, P. (2012). Unsupervised network intrusion detection systems: detecting the unknown without knowledge. Computer Communications, 35, 772\u2013783.","journal-title":"Computer Communications"},{"key":"4663_CR46","unstructured":"Om, H., & Hazra, T. (2012). Statistical techniques in anomaly intrusion detection system. International Journal of Advances in Engineering & Technology, 387\u2013398"},{"key":"4663_CR47","doi-asserted-by":"crossref","unstructured":"Chen, Z., Qian, P., & Chen, Z. (2009). Application of PSO-RBF neural network in network intrusion detection. In Proceedings of the 3rd international symposium on intelligent information technology application (pp. 362\u2013364).","DOI":"10.1109\/IITA.2009.154"},{"issue":"9","key":"4663_CR48","first-page":"1479","volume":"8","author":"Y Liu","year":"2011","unstructured":"Liu, Y. (2011). QPSO-optimized RBF neural network for network anomaly detection. Journal of Information & Computational Science, 8(9), 1479\u20131485.","journal-title":"Journal of Information & Computational Science"},{"key":"4663_CR49","unstructured":"Xu, R., Rui, A., & Xiao, F. (2011). Research intrusion detection based PSO-RBF classifier. In: Proceedings of IEEE 2nd international conference on software engineering and service science (ICSESS) (pp. 104\u2013107)."},{"key":"4663_CR50","unstructured":"Sayed, H. I. (2010). Utilization of neural networks for network intrusion detection systems. MSc Thesis, Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menoufia University."},{"key":"4663_CR51","unstructured":"Sayed, H. I., Faragallah, O. S., & El-Fishawy, N. A. (2009). Neural network algorithms performance measure for intrusion detection. In Proceedings of the international computer engineering conference, (ICENCO), Cairo, Egypt, EG06."},{"issue":"1","key":"4663_CR52","first-page":"46","volume":"4","author":"NM Nawi","year":"2007","unstructured":"Nawi, N. M., Ransing, M. R., & Ransing, R. S. (2007). An improved conjugate gradient based learning algorithm for back propagation neural networks. International Journal of Computational Intelligence, 4(1), 46\u201355.","journal-title":"International Journal of Computational Intelligence"},{"key":"4663_CR53","doi-asserted-by":"crossref","unstructured":"Nawi, N. M., Ransing, R. S., Salleh, M. N. M., Ghazali, R., & Hamid, N. A. (2010). An Improved Back Propagation Neural Network Algorithm on Classification Problems. In DTA\/BSBT 2010, CCIS 118 (pp. 177\u2013188).","DOI":"10.1007\/978-3-642-17622-7_18"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-4663-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4663-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4663-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,26]],"date-time":"2023-08-26T00:04:46Z","timestamp":1693008286000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-4663-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,18]]},"references-count":53,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,11]]}},"alternative-id":["4663"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-4663-8","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,9,18]]}}}