{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:04:49Z","timestamp":1759961089050,"version":"3.37.3"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T00:00:00Z","timestamp":1642032000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T00:00:00Z","timestamp":1642032000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1007\/s11416-021-00410-1","type":"journal-article","created":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T00:04:26Z","timestamp":1642032266000},"page":"243-258","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["An efficient IDS in cloud environment using feature selection based on DM algorithm"],"prefix":"10.1007","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4808-3370","authenticated-orcid":false,"given":"Partha","family":"Ghosh","sequence":"first","affiliation":[]},{"given":"Shashwat","family":"Sinha","sequence":"additional","affiliation":[]},{"given":"Ritu Raj","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Santanu","family":"Phadikar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,13]]},"reference":[{"issue":"2","key":"410_CR1","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/s10922-018-9475-y","volume":"27","author":"K Mahmud","year":"2019","unstructured":"Mahmud, K., Usman, M.: Trust establishment and estimation in cloud services: a systematic literature review. J. Netw. Syst. Manage. 27(2), 489\u2013540 (2019)","journal-title":"J. Netw. Syst. Manage."},{"issue":"4","key":"410_CR2","first-page":"18","volume":"6","author":"P Ghosh","year":"2016","unstructured":"Ghosh, P., Shakti, S., Phadikar, S.: A cloud intrusion detection system using novel prfcm clustering and knn based dempster-shafer rule. Int. J. Cloud Appl. Comput. 6(4), 18\u201335 (2016)","journal-title":"Int. J. Cloud Appl. Comput."},{"issue":"4","key":"410_CR3","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/s11416-008-0103-3","volume":"5","author":"SO Al-Mamory","year":"2009","unstructured":"Al-Mamory, S.O., Zhang, H.: Ids alerts correlation using grammar-based approach. J. Comput. Virol. 5(4), 271\u2013282 (2009)","journal-title":"J. Comput. Virol."},{"issue":"4","key":"410_CR4","doi-asserted-by":"publisher","first-page":"21","DOI":"10.4018\/IJISMD.2017100102","volume":"8","author":"P Ghosh","year":"2017","unstructured":"Ghosh, P., Bardhan, M., Chowdhury, N.R., Phadikar, S., et al.: Ids using reinforcement learning automata for preserving security in cloud environment. Int. J. Inf. Syst. Model. Des. 8(4), 21\u201337 (2017)","journal-title":"Int. J. Inf. Syst. Model. Des."},{"issue":"1","key":"410_CR5","doi-asserted-by":"publisher","first-page":"67","DOI":"10.4018\/IJISP.2020010105","volume":"14","author":"P Ghosh","year":"2020","unstructured":"Ghosh, P., Biswas, S., Shakti, S., Phadikar, S.: An improved intrusion detection system to preserve security in cloud environment. Int. J. Inf. Secur. Privacy 14(1), 67\u201380 (2020)","journal-title":"Int. J. Inf. Secur. Privacy"},{"key":"410_CR6","doi-asserted-by":"crossref","unstructured":"De\u00a0La\u00a0Hoz, E., Ortiz, A., Ortega, J., De\u00a0la Hoz, E.: Network anomaly classification by support vector classifiers ensemble and non-linear projection techniques. In: International Conference on Hybrid Artificial Intelligence Systems. Springer, pp. 103\u2013111 (2013)","DOI":"10.1007\/978-3-642-40846-5_11"},{"key":"410_CR7","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.neucom.2016.03.031","volume":"199","author":"SMH Bamakan","year":"2016","unstructured":"Bamakan, S.M.H., Wang, H., Yingjie, T., Shi, Y.: An effective intrusion detection framework based on mclp\/svm optimized by time-varying chaos particle swarm optimization. Neurocomputing 199, 90\u2013102 (2016)","journal-title":"Neurocomputing"},{"key":"410_CR8","doi-asserted-by":"crossref","unstructured":"Ismail, Z., Jantan, A., Yusoff, M.N., Kiru, M.U.: The effects of feature selection on the classification of encrypted botnet. J. Comput. Virol. Hack. Tech., pp. 1\u201314 (2020)","DOI":"10.1007\/s11416-020-00367-7"},{"key":"410_CR9","doi-asserted-by":"crossref","unstructured":"Shawish, A., Salama, M.: Cloud computing: paradigms and technologies. In: Inter-Cooperative Collective Intelligence: Techniques and Applications. Springer, Berlin, pp. 39\u201367 (2014)","DOI":"10.1007\/978-3-642-35016-0_2"},{"key":"410_CR10","doi-asserted-by":"crossref","unstructured":"Ate\u015f, \u00c7., \u00d6zdel, S., Anar\u0131m, E.: Graph-based anomaly detection using fuzzy clustering. In: International Conference on Intelligent and Fuzzy Systems. Springer, Berlin, pp. 338\u2013345 (2019)","DOI":"10.1007\/978-3-030-23756-1_42"},{"key":"410_CR11","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"2","author":"DE Denning","year":"1987","unstructured":"Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. 2, 222\u2013232 (1987)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"3","key":"410_CR12","first-page":"285","volume":"9","author":"NI Ghali","year":"2009","unstructured":"Ghali, N.I.: Feature selection for effective anomaly-based intrusion detection. Int. J. Comput. Sci. Netw. Secur. 9(3), 285\u2013289 (2009)","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"410_CR13","doi-asserted-by":"crossref","unstructured":"Han, K., Wang, Y., Zhang, C., Li, C., Xu, C.: Autoencoder inspired unsupervised feature selection. In: 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, pp. 2941\u20132945 (2018)","DOI":"10.1109\/ICASSP.2018.8462261"},{"key":"410_CR14","doi-asserted-by":"crossref","unstructured":"Hong, T.-P., Wang, P.-C., Ting, C.-K.: An evolutionary attribute clustering and selection method based on feature similarity. In: IEEE Congress on Evolutionary Computation. IEEE, pp. 1\u20135 (2010)","DOI":"10.1109\/CEC.2010.5585918"},{"issue":"9","key":"410_CR15","doi-asserted-by":"publisher","first-page":"1161","DOI":"10.1016\/j.pnsc.2008.03.018","volume":"18","author":"S Lee","year":"2008","unstructured":"Lee, S., Soak, S., Oh, S., Pedrycz, W., Jeon, M.: Modified binary particle swarm optimization. Prog. Nat. Sci. 18(9), 1161\u20131166 (2008)","journal-title":"Prog. Nat. Sci."},{"key":"410_CR16","doi-asserted-by":"crossref","unstructured":"Dash, M., Ong, Y.-S.: Relief-c: Efficient feature selection for clustering over noisy data. In: 2011 IEEE 23rd International Conference on Tools with Artificial Intelligence. IEEE, pp. 869\u2013872 (2011)","DOI":"10.1109\/ICTAI.2011.135"},{"issue":"04","key":"410_CR17","doi-asserted-by":"publisher","first-page":"1350024","DOI":"10.1142\/S0218213013500243","volume":"22","author":"B Xue","year":"2013","unstructured":"Xue, B., Cervante, L., Shang, L., Browne, W.N., Zhang, M.: Multi-objective evolutionary algorithms for filter based feature selection in classification. Int. J. Artif. Intell. Tools 22(04), 1350024 (2013)","journal-title":"Int. J. Artif. Intell. Tools"},{"key":"410_CR18","doi-asserted-by":"crossref","unstructured":"Xu, K., Li, Y., Deng, R., Chen, K., Xu, J.: Droidevolver: self-evolving android malware detection system. In: IEEE European Symposium on Security and Privacy (EuroS&P). IEEE 2019, 47\u201362 (2019)","DOI":"10.1109\/EuroSP.2019.00014"},{"key":"410_CR19","doi-asserted-by":"crossref","unstructured":"Cai, H., Jenkins, J.: Towards sustainable android malware detection. In: Proceedings of the 40th International Conference on Software Engineering: Companion Proceedings, pp. 350\u2013351 (2018)","DOI":"10.1145\/3183440.3195004"},{"issue":"6","key":"410_CR20","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1016\/j.anbehav.2011.09.027","volume":"82","author":"GJ Parra","year":"2011","unstructured":"Parra, G.J., Corkeron, P.J., Arnold, P.: Grouping and fission-fusion dynamics in Australian snubfin and indo-pacific humpback dolphins. Anim. Behav. 82(6), 1423\u20131433 (2011)","journal-title":"Anim. Behav."},{"issue":"1","key":"410_CR21","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1111\/j.1748-7692.1986.tb00026.x","volume":"2","author":"SH Shane","year":"1986","unstructured":"Shane, S.H., Wells, R.S., W\u00fcrsig, B.: Ecology, behavior and social organization of the bottlenose dolphin: a review. Mar. Mamm. Sci. 2(1), 34\u201363 (1986)","journal-title":"Mar. Mamm. Sci."},{"key":"410_CR22","doi-asserted-by":"crossref","unstructured":"Fu, X., Cai, H.: On the deterioration of learning-based malware detectors for android. In: 2019 IEEE\/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion). IEEE, pp. 272\u2013273 (2019)","DOI":"10.1109\/ICSE-Companion.2019.00110"},{"issue":"2","key":"410_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3371924","volume":"29","author":"H Cai","year":"2020","unstructured":"Cai, H.: Assessing and improving malware detection sustainability through app evolution studies. ACM Trans. Softw. Eng. Methodol. 29(2), 1\u201328 (2020)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"410_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/su11236669","volume":"11","author":"R Garg","year":"2019","unstructured":"Garg, R., Aggarwal, H., Centobelli, P., Cerchione, R.: Extracting knowledge from big data for sustainability: a comparison of machine learning techniques. Sustainability 11, 1\u201317 (2019)","journal-title":"Sustainability"},{"key":"410_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.adhoc.2020.102177","volume":"105","author":"S Huang","year":"2020","unstructured":"Huang, S., Lei, K.: Igan-ids: an imbalanced generative adversarial network towards intrusion detection system in ad-hoc networks. Ad Hoc Netw. 105, 1\u201313 (2020)","journal-title":"Ad Hoc Netw."},{"key":"410_CR26","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the kdd cup 99 data set. In: IEEE Symposium on Computational Intelligence for Security and Defense Applications. IEEE 2009, 1\u20136 (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"410_CR27","first-page":"1","volume":"76","author":"C Yin","year":"2019","unstructured":"Yin, C., Zhu, Y., Liu, S., Fei, J., Zhang, H.: Enhancing network intrusion detection classifiers using supervised adversarial training. J. Supercomput. 76, 1\u201330 (2019)","journal-title":"J. Supercomput."},{"issue":"3","key":"410_CR28","doi-asserted-by":"publisher","first-page":"580","DOI":"10.5937\/vojtehg66-16670","volume":"66","author":"DD Proti\u0107","year":"2018","unstructured":"Proti\u0107, D.D.: Review of kdd cup\u201999, nsl-kdd and kyoto 2006+ datasets. Vojnotehni\u010dki glasnik 66(3), 580\u2013596 (2018)","journal-title":"Vojnotehni\u010dki glasnik"},{"issue":"22","key":"410_CR29","doi-asserted-by":"publisher","first-page":"8609","DOI":"10.1016\/j.eswa.2015.07.015","volume":"42","author":"R Singh","year":"2015","unstructured":"Singh, R., Kumar, H., Singla, R.: An intrusion detection system using network traffic profiling and online sequential extreme learning machine. Expert Syst. Appl. 42(22), 8609\u20138624 (2015)","journal-title":"Expert Syst. Appl."},{"issue":"4","key":"410_CR30","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1080\/00207160108805080","volume":"77","author":"JG Digalakis","year":"2001","unstructured":"Digalakis, J.G., Margaritis, K.G.: On benchmarking functions for genetic algorithms. Int. J. Comput. Math. 77(4), 481\u2013506 (2001)","journal-title":"Int. J. Comput. Math."},{"key":"410_CR31","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.advengsoft.2016.01.008","volume":"95","author":"S Mirjalili","year":"2016","unstructured":"Mirjalili, S., Lewis, A.: The whale optimization algorithm. Adv. Eng. Softw. 95, 51\u201367 (2016)","journal-title":"Adv. Eng. Softw."},{"key":"410_CR32","doi-asserted-by":"crossref","unstructured":"Kennedy, J., Eberhart, R.: Particle swarm optimization. In: Proceedings of ICNN\u201995-International Conference on Neural Networks, vol.\u00a04. IEEE, pp. 1942\u20131948 (1995)","DOI":"10.1109\/ICNN.1995.488968"},{"issue":"13","key":"410_CR33","doi-asserted-by":"publisher","first-page":"2232","DOI":"10.1016\/j.ins.2009.03.004","volume":"179","author":"E Rashedi","year":"2009","unstructured":"Rashedi, E., Nezamabadi-Pour, H., Saryazdi, S.: Gsa: a gravitational search algorithm. Inf. Sci. 179(13), 2232\u20132248 (2009)","journal-title":"Inf. Sci."},{"issue":"4","key":"410_CR34","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1023\/A:1008202821328","volume":"11","author":"R Storn","year":"1997","unstructured":"Storn, R., Price, K.: Differential evolution-a simple and efficient heuristic for global optimization over continuous spaces. J. Global Optim. 11(4), 341\u2013359 (1997)","journal-title":"J. Global Optim."},{"issue":"2","key":"410_CR35","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/4235.771163","volume":"3","author":"X Yao","year":"1999","unstructured":"Yao, X., Liu, Y., Lin, G.: Evolutionary programming made faster. IEEE Trans. Evol. Comput. 3(2), 82\u2013102 (1999)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"410_CR36","doi-asserted-by":"crossref","unstructured":"Alpaydin, E.: Introduction to Machine Learning. MIT Press (2020)","DOI":"10.7551\/mitpress\/13811.001.0001"},{"key":"410_CR37","doi-asserted-by":"crossref","unstructured":"Ghosh, P., Mandal, A.K., Kumar, R.: An efficient cloud network intrusion detection system. In: Information Systems Design and Intelligent Applications. Springer, pp. 91\u201399 (2015)","DOI":"10.1007\/978-81-322-2250-7_10"},{"key":"410_CR38","doi-asserted-by":"crossref","unstructured":"Alzubi, Q.M., Anbar, M., Alqattan, Z.N., Al-Betar, M.A., Abdullah, R.: Intrusion detection system based on a modified binary grey wolf optimisation. In: Neural Computing and Applications, pp. 1\u201313 (2019)","DOI":"10.1007\/s00521-019-04103-1"},{"key":"410_CR39","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1016\/j.asoc.2015.04.041","volume":"33","author":"S Rastegari","year":"2015","unstructured":"Rastegari, S., Hingston, P., Lam, C.-P.: Evolving statistical rulesets for network intrusion detection. Appl. Soft Comput. 33, 348\u2013359 (2015)","journal-title":"Appl. Soft Comput."},{"issue":"1","key":"410_CR40","first-page":"107","volume":"8","author":"LM Ibrahim","year":"2013","unstructured":"Ibrahim, L.M., Basheer, D.T., Mahmod, M.S.: A comparison study for intrusion database (kdd99, nsl-kdd) based on self organization map (som) artificial neural network. J. Eng. Sci. Technol. 8(1), 107\u2013119 (2013)","journal-title":"J. Eng. Sci. Technol."},{"key":"410_CR41","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.ins.2017.06.007","volume":"414","author":"AA Aburomman","year":"2017","unstructured":"Aburomman, A.A., Reaz, M.B.I.: A novel weighted support vector machines multiclass classifier based on differential evolution for intrusion detection systems. Inf. Sci. 414, 225\u2013246 (2017)","journal-title":"Inf. Sci."},{"issue":"12","key":"410_CR42","doi-asserted-by":"publisher","first-page":"1296","DOI":"10.1002\/sec.403","volume":"5","author":"M Mohammadi","year":"2012","unstructured":"Mohammadi, M., Raahemi, B., Akbari, A., Nassersharif, B.: New class-dependent feature transformation for intrusion detection systems. Secur. Commun. Netw. 5(12), 1296\u20131311 (2012)","journal-title":"Secur. Commun. Netw."},{"issue":"1","key":"410_CR43","first-page":"5","volume":"76","author":"K Bajaj","year":"2013","unstructured":"Bajaj, K., Arora, A.: Improving the intrusion detection using discriminative machine learning approach and improve the time complexity by data mining feature selection methods. Int. J. Comput. Appl. 76(1), 5\u201311 (2013)","journal-title":"Int. J. Comput. Appl."},{"issue":"1","key":"410_CR44","doi-asserted-by":"publisher","first-page":"58","DOI":"10.4018\/IJKDB.2017010105","volume":"7","author":"SK Sahu","year":"2017","unstructured":"Sahu, S.K., Jena, S.K., Verma, M.: K-nn based outlier detection technique on intrusion dataset. Int. J. Knowl. Discov. Bioinform. 7(1), 58\u201370 (2017)","journal-title":"Int. J. Knowl. Discov. Bioinform."},{"key":"410_CR45","doi-asserted-by":"crossref","unstructured":"Osanaiye, O., Cai, H., Choo, K.-K.R., Dehghantanha, A., Xu, Z., Dlodlo, M.: Ensemble-based multi-filter feature selection method for ddos detection in cloud computing. EURASIP J. Wirel. Commun. Netw. 2016(1), 1\u201310 (2016)","DOI":"10.1186\/s13638-016-0623-3"},{"key":"410_CR46","doi-asserted-by":"crossref","unstructured":"Raman, M.G., Somu, N., Kirthivasan, K., Liscano, R., Sriram, V.S.: An efficient intrusion detection system based on hypergraph-genetic algorithm for parameter optimization and feature selection in support vector machine. Knowl.-Based Syst. 134, 1\u201312 (2017)","DOI":"10.1016\/j.knosys.2017.07.005"},{"key":"410_CR47","doi-asserted-by":"publisher","unstructured":"Abd-Eldayem, M. M.: A proposed http service based ids. Egypt. Inform. J. 15(1), 13\u201324. https:\/\/doi.org\/10.1016\/j.eij.2014.01.001. ISSN:11108665 (2014)","DOI":"10.1016\/j.eij.2014.01.001"},{"issue":"4","key":"410_CR48","doi-asserted-by":"publisher","first-page":"1690","DOI":"10.1016\/j.eswa.2013.08.066","volume":"41","author":"G Kim","year":"2014","unstructured":"Kim, G., Lee, S., Kim, S.: A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Syst. Appl. 41(4), 1690\u20131700 (2014)","journal-title":"Expert Syst. Appl."},{"key":"410_CR49","doi-asserted-by":"crossref","unstructured":"Gogoi, P., Bhuyan, M.H., Bhattacharyya, D., Kalita, J.K.: Packet and flow based network intrusion dataset. In: International Conference on Contemporary Computing. Springer, Berlin, pp. 322\u2013334 (2012)","DOI":"10.1007\/978-3-642-32129-0_34"},{"key":"410_CR50","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/j.cose.2014.06.006","volume":"45","author":"R Chitrakar","year":"2014","unstructured":"Chitrakar, R., Huang, C.: Selection of candidate support vectors in incremental svm for network intrusion detection. Comput. Secur. 45, 231\u2013241 (2014)","journal-title":"Comput. Secur."}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-021-00410-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-021-00410-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-021-00410-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T05:24:26Z","timestamp":1726464266000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-021-00410-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,13]]},"references-count":50,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["410"],"URL":"https:\/\/doi.org\/10.1007\/s11416-021-00410-1","relation":{},"ISSN":["2263-8733"],"issn-type":[{"type":"electronic","value":"2263-8733"}],"subject":[],"published":{"date-parts":[[2022,1,13]]},"assertion":[{"value":"27 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 November 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 January 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose. The authors have no conflicts of interest to declare that are relevant to the content of this article. All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript. The authors have no financial or proprietary interests in any material discussed in this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}