{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T01:21:37Z","timestamp":1768699297191,"version":"3.49.0"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,3,7]],"date-time":"2022-03-07T00:00:00Z","timestamp":1646611200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,7]],"date-time":"2022-03-07T00:00:00Z","timestamp":1646611200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Sichuan science and technology program","award":["2021YFG0150"],"award-info":[{"award-number":["2021YFG0150"]}]},{"name":"Sichuan science and technology program","award":["2021YFG0037"],"award-info":[{"award-number":["2021YFG0037"]}]},{"name":"Sichuan science and technology program","award":["2021YFG0165"],"award-info":[{"award-number":["2021YFG0165"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61971105"],"award-info":[{"award-number":["61971105"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s12083-022-01300-z","type":"journal-article","created":{"date-parts":[[2022,3,7]],"date-time":"2022-03-07T07:02:39Z","timestamp":1646636559000},"page":"1521-1534","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["GE-IDS: an intrusion detection system based on grayscale and entropy"],"prefix":"10.1007","volume":"15","author":[{"given":"Dan","family":"Liao","sequence":"first","affiliation":[]},{"given":"Ruijin","family":"Zhou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6272-0818","authenticated-orcid":false,"given":"Hui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xue","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,7]]},"reference":[{"key":"1300_CR1","doi-asserted-by":"publisher","first-page":"1269","DOI":"10.1007\/s11276-020-02529-3","volume":"27","author":"MR Ayyagari","year":"2021","unstructured":"Ayyagari MR, Kesswani N, Kumar M et al (2021) Intrusion detection techniques in network environment: a systematic review. Wireless Netw 27:1269\u20131285","journal-title":"Wireless Netw"},{"key":"1300_CR2","doi-asserted-by":"crossref","unstructured":"Eltanbouly S, Bashendy M, AlNaimi N, Chkirbene Z, Erbad A (2020) Machine learning techniques for network anomaly detection: a survey. 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), Doha, Qatar, p 156\u2013162","DOI":"10.1109\/ICIoT48696.2020.9089465"},{"key":"1300_CR3","doi-asserted-by":"crossref","unstructured":"Sun C-C, Sebastian Cardenas DJ, Hahn A, Liu C-C (2021) Intrusion detection for cybersecurity of smart meters. IEEE Trans Smart Grid 12(1):612\u2013622","DOI":"10.1109\/TSG.2020.3010230"},{"key":"1300_CR4","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.ins.2013.12.020","volume":"265","author":"X Chen","year":"2014","unstructured":"Chen X, Zhang F, Willy S et al (2014) Identity-based chameleon hashing and signatures without key exposure. Inf Sci 265:198\u2013210","journal-title":"Inf Sci"},{"key":"1300_CR5","doi-asserted-by":"crossref","unstructured":"Wang D, Zhang Z, Wang P et al (2016) Targeted online password guessing: an underestimated threat. ACM Conf Comput Commun Secur 1242\u20131254","DOI":"10.1145\/2976749.2978339"},{"key":"1300_CR6","doi-asserted-by":"publisher","first-page":"9822","DOI":"10.1109\/ACCESS.2021.3049249","volume":"9","author":"T Mora-Gimeno","year":"2021","unstructured":"Mora-Gimeno T, Mora-Mora H, Volckaert B, Atrey A (2021) Intrusion detection system based on integrated system calls graph and neural networks. IEEE Access 9:9822\u20139833","journal-title":"IEEE Access"},{"key":"1300_CR7","doi-asserted-by":"crossref","unstructured":"Bhatia V, Choudhary S, Ramkumar KR (2020) A comparative study on various intrusion detection techniques using machine learning and neural network. 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, India","DOI":"10.1109\/ICRITO48877.2020.9198008"},{"key":"1300_CR8","doi-asserted-by":"crossref","unstructured":"Kumari A, Mehta AK (2020) A hybrid intrusion detection system based on decision tree and support vector machine. 2020 IEEE 5th International Conference on Computing Communication and Automation (ICCCA), Greater Noida, India","DOI":"10.1109\/ICCCA49541.2020.9250753"},{"key":"1300_CR9","doi-asserted-by":"crossref","unstructured":"Amaran S, Mohan RM (2021) Intrusion detection system using optimal support vector machine for wireless sensor networks. 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), Coimbatore, India","DOI":"10.1109\/ICAIS50930.2021.9395919"},{"key":"1300_CR10","doi-asserted-by":"crossref","unstructured":"Pump R, Ahlers V, Koschel A (2020) Evaluating artificial immune system algorithms for intrusion detection. 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), London, UK","DOI":"10.1109\/WorldS450073.2020.9210342"},{"key":"1300_CR11","doi-asserted-by":"crossref","unstructured":"Mirsky Y, Doitshman T, Elovici Y et al (2018) Kitsune: an ensemble of autoencoders for online network intrusion detection. Netw Distrib Syst Secur Symp","DOI":"10.14722\/ndss.2018.23204"},{"key":"1300_CR12","doi-asserted-by":"publisher","first-page":"108","DOI":"10.5220\/0006639801080116","volume":"1","author":"I Sharafaldin","year":"2018","unstructured":"Sharafaldin I, Lashkari A, Ghorbani A (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. Int Conf Inform Syst Secur Privacy 1:108\u2013116","journal-title":"Int Conf Inform Syst Secur Privacy"},{"key":"1300_CR13","first-page":"1","volume":"10","author":"M Zbakh","year":"2015","unstructured":"Zbakh M, Elmahdi K, Cherkaoui R et al (2015) A multi-criteria analysis of intrusion detection architectures in cloud environments. IEEE Int Conf Cloud Tenhnol App 10:1\u20139","journal-title":"IEEE Int Conf Cloud Tenhnol App"},{"key":"1300_CR14","unstructured":"Abdullah K, Copeland JA (2006) High alarm count issues in IDS RainStorm. ACM Conference on Computer and Communications Security\u2019s Workshop on Visualization and Data Mining for Computer Security, p 61\u201362"},{"key":"1300_CR15","doi-asserted-by":"crossref","unstructured":"Liu J, Li L (2008) A distributed intrusion detection system based on agents. IEEE Pacific-Asia Workshop Comput Intell Ind App 553\u2013557","DOI":"10.1109\/PACIIA.2008.143"},{"key":"1300_CR16","doi-asserted-by":"crossref","unstructured":"Kabir M E, Hu J (2014) A statistical framework for intrusion detection system.\u00a02014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD). IEEE","DOI":"10.1109\/FSKD.2014.6980966"},{"key":"1300_CR17","doi-asserted-by":"publisher","first-page":"35365","DOI":"10.1109\/ACCESS.2018.2836950","volume":"6","author":"X Yang","year":"2018","unstructured":"Yang X, Kong L, Liu Z et al (2018) Machine learning and deep learning methods for cybersecurity. IEEE Access 6:35365\u201335381","journal-title":"IEEE Access"},{"issue":"1","key":"1300_CR18","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1016\/j.future.2017.01.029","volume":"79","author":"E Kabir","year":"2018","unstructured":"Kabir E, Hu J, Wang H et al (2018) A novel statistical technique for intrusion detection systems. Futur Generation Comput Syst \u2013 Int J Escience 79(1):303\u2013318","journal-title":"Futur Generation Comput Syst \u2013 Int J Escience"},{"key":"1300_CR19","doi-asserted-by":"crossref","unstructured":"Naseer S, Saleem Y, Khalid S et al (2018) Enhanced network anomaly detection based on deep neural networks. IEEE Access 6:48231\u201348246","DOI":"10.1109\/ACCESS.2018.2863036"},{"issue":"7","key":"1300_CR20","doi-asserted-by":"publisher","first-page":"2881","DOI":"10.1007\/s11227-015-1604-8","volume":"73","author":"D Moon","year":"2017","unstructured":"Moon D, Im H, Kim I et al (2017) DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks. J Supercomput 73(7):2881\u20132895","journal-title":"J Supercomput"},{"key":"1300_CR21","doi-asserted-by":"crossref","unstructured":"Dey A (2020) Deep IDS: a deep learning approach for Intrusion detection based on IDS. 2020 2nd International Conference on Sustainable Technologies for Industry 4.0 (STI), Dhaka, Bangladesh","DOI":"10.1109\/STI50764.2020.9350411"},{"key":"1300_CR22","doi-asserted-by":"publisher","first-page":"3235","DOI":"10.1007\/s10489-019-01436-1","volume":"49","author":"N Kaja","year":"2019","unstructured":"Kaja N, Shaout A, Ma D (2019) An intelligent intrusion detection system. Appl Intell 49:3235\u20133247","journal-title":"Appl Intell"},{"issue":"5\/6","key":"1300_CR23","doi-asserted-by":"publisher","first-page":"2166","DOI":"10.1166\/jctn.2019.7868","volume":"16","author":"MH Ali","year":"2019","unstructured":"Ali MH, Mohammed MA (2019) An improved fast learning network with harmony search based on intrusion-detection system. J Comput Theo Nanosci 16(5\/6):2166\u20132167","journal-title":"J Comput Theo Nanosci"},{"key":"1300_CR24","doi-asserted-by":"crossref","unstructured":"Nancy P, Muthurajkumar S,Ganapathy S et al (2020) Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks. IET Commun 14(5):888\u2013895","DOI":"10.1049\/iet-com.2019.0172"},{"issue":"3","key":"1300_CR25","doi-asserted-by":"publisher","first-page":"31","DOI":"10.4018\/IJISP.201907010102","volume":"13","author":"AK Shukla","year":"2019","unstructured":"Shukla AK (2019) Building an effective approach toward intrusion detection using ensemble feature selection. Int J Inform Secur Privacy 13(3):31\u201347","journal-title":"Int J Inform Secur Privacy"},{"key":"1300_CR26","doi-asserted-by":"crossref","unstructured":"Gauthama Raman MR, Somu N, Jagarapu S et al (2020) An efficient intrusion detection technique based on support vector machine and improved binary gravitational search algorithm. Artif Intell Rev 53:3255\u20133286","DOI":"10.1007\/s10462-019-09762-z"},{"key":"1300_CR27","doi-asserted-by":"publisher","first-page":"2735","DOI":"10.1007\/s10489-018-01408-x","volume":"49","author":"\u00dc \u00c7avu\u015fo\u011flu","year":"2019","unstructured":"\u00c7avu\u015fo\u011flu \u00dc (2019) A new hybrid approach for intrusion detection using machine learning methods. Appl Intell 49:2735\u20132761","journal-title":"Appl Intell"},{"key":"1300_CR28","doi-asserted-by":"publisher","first-page":"95864","DOI":"10.1109\/ACCESS.2020.2994931","volume":"8","author":"Z Chkirbene","year":"2020","unstructured":"Chkirbene Z, Erbad A, Hamila R et al (2020) TIDCS: a dynamic intrusion detection and classification system based feature selection. IEEE Access 8:95864\u201395877","journal-title":"IEEE Access"},{"key":"1300_CR29","doi-asserted-by":"crossref","unstructured":"Abdaljabar ZH, Ucan ON, Ali Alheeti KM (2021) An intrusion detection system for IoT using KNN and decision-tree based classification. 2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI)","DOI":"10.1109\/MTICTI53925.2021.9664772"},{"key":"1300_CR30","doi-asserted-by":"crossref","unstructured":"Waskle S, Parashar L, Singh U (2020) Intrusion detection system using PCA with random forest approach. Int Conf Electron Sustain Commun Syst (ICESC)","DOI":"10.1109\/ICESC48915.2020.9155656"},{"key":"1300_CR31","doi-asserted-by":"crossref","unstructured":"Rashid MM, Kamruzzaman J, Ahmed M, Islam N, Wibowo S, Gordon S (2020) Performance enhancement of intrusion detection system using bagging ensemble technique with feature selection. IEEE Asia-Pacific Conf Comput Sci Data Eng (CSDE)","DOI":"10.1109\/CSDE50874.2020.9411608"},{"key":"1300_CR32","doi-asserted-by":"crossref","unstructured":"Chen Z, Ruan L, Cao J (2013) TIFAflow: Enhancing traffic archiving system with flow granularity for forensic analysis in network security. Tsinghua Sci Technol 18(4):406\u2013417","DOI":"10.1109\/TST.2013.6574679"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01300-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-022-01300-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01300-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,26]],"date-time":"2022-04-26T07:56:25Z","timestamp":1650959785000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-022-01300-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,7]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["1300"],"URL":"https:\/\/doi.org\/10.1007\/s12083-022-01300-z","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,7]]},"assertion":[{"value":"26 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 February 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 March 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We declare that we have no financial and personal relationships with other people or organizations that can inappropriately influence our work in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}