{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T19:47:58Z","timestamp":1776887278927,"version":"3.51.2"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2022,6,17]],"date-time":"2022-06-17T00:00:00Z","timestamp":1655424000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,6,17]],"date-time":"2022-06-17T00:00:00Z","timestamp":1655424000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"the Key Program of National Natural Science Foundation of China","award":["51934007"],"award-info":[{"award-number":["51934007"]}]},{"name":"Shandong Key S&T Innovation Engineering Project","award":["2019JZZY020504"],"award-info":[{"award-number":["2019JZZY020504"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s13042-022-01586-8","type":"journal-article","created":{"date-parts":[[2022,6,17]],"date-time":"2022-06-17T18:02:41Z","timestamp":1655488961000},"page":"3159-3172","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Detection and quantification of anomalies in communication networks based on LSTM-ARIMA combined model"],"prefix":"10.1007","volume":"13","author":[{"given":"Sheng","family":"Xue","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5982-4851","authenticated-orcid":false,"given":"Hualiang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xiaoliang","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,17]]},"reference":[{"key":"1586_CR1","doi-asserted-by":"crossref","unstructured":"Soule A, Salamatian K, Taft N (2005) Combining filtering and statistical methods for anomaly detection. IMC","DOI":"10.1145\/1330107.1330147"},{"issue":"2","key":"1586_CR2","first-page":"45","volume":"34","author":"Y Yanhua","year":"2011","unstructured":"Yanhua Y, Meina S, Wenting Z, Junde S (2011) A dynamic compuation approach to determining the threshold in network anomaly detection. J Beijing Univ Posts Telecommun 34(2):45\u201349","journal-title":"J Beijing Univ Posts Telecommun"},{"key":"1586_CR3","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/S1353-4858(21)00039-8","volume":"4","author":"S Eswaran","year":"2021","unstructured":"Eswaran S, Honnavalli P, Honnavalli P (2021) A threshold-based, real-time analysis in early detection of endpoint anomalies using SIEM expertise. Netw Secur 4:7\u201316. https:\/\/doi.org\/10.1016\/S1353-4858(21)00039-8","journal-title":"Netw Secur"},{"key":"1586_CR4","doi-asserted-by":"publisher","first-page":"0167","DOI":"10.1016\/j.cose.2022.102675","volume":"102675","author":"Y Zhen","year":"2022","unstructured":"Zhen Y, Liu XD, Li T, Wu D, Wang JJ, Zhao YW, Han H (2022) A systematic literature review of methods and datasets for anomaly-based network intrusion detection. Comput Secur 102675:0167\u20134048. https:\/\/doi.org\/10.1016\/j.cose.2022.102675","journal-title":"Comput Secur"},{"key":"1586_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2021.104216","volume":"101","author":"MD Mauro","year":"2021","unstructured":"Mauro MD, Galatro G, Fortino G, Liotta A (2021) Supervised feature selection techniques in network intrusion detection: a critical review. Eng Appl Artif Intell 101:104216. https:\/\/doi.org\/10.1016\/j.engappai.2021.104216","journal-title":"Eng Appl Artif Intell"},{"key":"1586_CR6","doi-asserted-by":"crossref","unstructured":"Mukkamala S, Sung AH (2003) Detecting denial of service attacks using support vector machines. FUZZ-IEEE.02","DOI":"10.1109\/FUZZ.2003.1206607"},{"issue":"4","key":"1586_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102225","volume":"104","author":"EK Boahen","year":"2021","unstructured":"Boahen EK, Elvire B, Wang C (2021) Network anomaly detection in a controlled environment based on an enhanced PSOGSARFC. Comput Secur 104(4):102225. https:\/\/doi.org\/10.1016\/j.cose.2021.102225","journal-title":"Comput Secur"},{"issue":"6","key":"1586_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113864","volume":"162","author":"Y Zhou","year":"2020","unstructured":"Zhou Y, Mazzuchi TA, Sarkani S (2020) M-AdaBoost-A based ensemble system for network intrusion detection. Expert Syst Appl 162(6):113864. https:\/\/doi.org\/10.1016\/j.eswa.2020.113864","journal-title":"Expert Syst Appl"},{"key":"1586_CR9","doi-asserted-by":"crossref","unstructured":"Potluri S, Henry NF, Diedrich C (2017) Evaluation of hybrid deep learning techniques for ensuring security in networked control systems. In: 22nd IEEE conference on ETFA","DOI":"10.1109\/ETFA.2017.8247662"},{"issue":"2","key":"1586_CR10","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1049\/iet-ifs.2018.5186","volume":"13","author":"H Weijie","year":"2019","unstructured":"Weijie H, Xue J (2019) Detecting anomalous traffic in the controlled network based on cross entropy and support vector machine. IET Inf Secur 13(2):109\u2013116. https:\/\/doi.org\/10.1049\/iet-ifs.2018.5186","journal-title":"IET Inf Secur"},{"issue":"3","key":"1586_CR11","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1002\/wics.1347","volume":"7","author":"S Ranshous","year":"2015","unstructured":"Ranshous S, Shen S, Koutra D, Harenberg S, Faloutsos C, Samatova NF (2015) Anomaly detection in dynamic networks: a survey. Comput Stat 7(3):223\u2013247. https:\/\/doi.org\/10.1002\/wics.1347","journal-title":"Comput Stat"},{"key":"1586_CR12","unstructured":"Chalapathy R, Chawla S (2019) Deep learning for anomaly detection: a survey. arXiv:1901.03407v1"},{"issue":"2","key":"1586_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.106847","volume":"219","author":"F Wang","year":"2021","unstructured":"Wang F, Zhu L, Li J, Haibao C, Huaxiang Z (2021) Unsupervised soft-label feature selection. Knowl Based Syst 219(2):106847. https:\/\/doi.org\/10.1016\/j.knosys.2021.106847","journal-title":"Knowl Based Syst"},{"issue":"6","key":"1586_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.107951","volume":"116","author":"X Hui","year":"2021","unstructured":"Hui X, Jiaxing W, Hao L, Dengqing O, Jie S (2021) Unsupervised meta-learning for few-shot learning. Pattern Recognit 116(6):107951. https:\/\/doi.org\/10.1016\/j.patcog.2021.107951","journal-title":"Pattern Recognit"},{"issue":"2019","key":"1586_CR15","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.compeleceng.2018.11.003","volume":"73","author":"R Aliakbarisani","year":"2019","unstructured":"Aliakbarisani R, Ghasemi A, Wu SF (2019) A data-driven metric learning-based scheme for unsupervised network anomaly detection. Comput Electr Eng 73(2019):71\u201383. https:\/\/doi.org\/10.1016\/j.compeleceng.2018.11.003","journal-title":"Comput Electr Eng"},{"issue":"2","key":"1586_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2021.100030","volume":"1","author":"V Zenfack","year":"2021","unstructured":"Zenfack V, Donghyun K, Daehee S, Ahyoung L (2021) An unsupervised anomaly detection framework for detecting anomalies in real time through network system\u2019s log files analysis. High Confid Comput 1(2):100030. https:\/\/doi.org\/10.1016\/j.hcc.2021.100030","journal-title":"High Confid Comput"},{"key":"1586_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102070","volume":"99","author":"ZQ Qin","year":"2020","unstructured":"Qin ZQ, Ma XK, Wang YJ (2020) ADSAD: An unsupervised attention-based discrete sequence anomaly detection framework for network security analysis. Comput Secur 99:102070. https:\/\/doi.org\/10.1016\/j.cose.2020.102070","journal-title":"Comput Secur"},{"key":"1586_CR18","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1016\/j.ins.2021.04.056","volume":"571","author":"X Meng","year":"2021","unstructured":"Meng X, Wang S, Liang Z, Yao D, Zhou JH, Zhang YJ (2021) Semi-supervised anomaly detection in dynamic communication networks. Inf Sci 571:527\u2013542","journal-title":"Inf Sci"},{"issue":"3","key":"1586_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108102","volume":"193","author":"H Yang","year":"2021","unstructured":"Yang H, Xutao L, Wenhao Q, Yuhan Z, Wei Z, Chang T (2021) A network traffic forecasting method based on SA optimized ARIMA-BP neural network. Comput Netw 193(3):108102. https:\/\/doi.org\/10.1016\/j.comnet.2021.108102","journal-title":"Comput Netw"},{"issue":"6","key":"1586_CR20","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.procs.2021.04.043","volume":"187","author":"D Guo","year":"2021","unstructured":"Guo D, Xingwen X, Lin Z, Yong Z (2021) Dynamic modification neural network model for short-term traffic prediction. Procedia Comput Sci 187(6):134\u2013139. https:\/\/doi.org\/10.1016\/j.procs.2021.04.043","journal-title":"Procedia Comput Sci"},{"issue":"1","key":"1586_CR21","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.comcom.2010.08.008","volume":"34","author":"W Hyun Woo","year":"2011","unstructured":"Hyun Woo W, Jun Hui L, Yong Hoon C, Young-UK C, Hyunkjoon L (2011) Dynamic bandwidth provisioning using ARIMA based traffic forecasting for mobile WiMAX. Comput Commun 34(1):99\u2013106. https:\/\/doi.org\/10.1016\/j.comcom.2010.08.008","journal-title":"Comput Commun"},{"issue":"2021","key":"1586_CR22","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1016\/j.procs.2021.01.004","volume":"179","author":"AG Salman","year":"2021","unstructured":"Salman AG, Kanigoro B (2021) Visibility forecasting using autoregressive integrated moving average (ARIMA) models. Procedia Comput Sci 179(2021):252\u2013259. https:\/\/doi.org\/10.1016\/j.procs.2021.01.004","journal-title":"Procedia Comput Sci"},{"key":"1586_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.rinp.2021.104462","volume":"3","author":"L Junling","year":"2021","unstructured":"Junling L, Zhongliang Z, Yao F, Feng R (2021) Time series prediction of COVID-19 transmission in America using LSTM and XGBoost algorithms. Results Phys 3:104462. https:\/\/doi.org\/10.1016\/j.rinp.2021.104462","journal-title":"Results Phys"},{"issue":"3","key":"1586_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.enbuild.2021.110998","volume":"243","author":"S Jiancai","year":"2021","unstructured":"Jiancai S, Liyi Z, Guixiang X, Yunpeng M, Shan G, Qingling J (2021) Predicting hourly heating load in a district heating system based on a hybrid CNN-LSTM model. Energy Build 243(3):110998. https:\/\/doi.org\/10.1016\/j.enbuild.2021.110998","journal-title":"Energy Build"},{"key":"1586_CR25","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.renene.2021.05.095","volume":"177","author":"A Agga","year":"2021","unstructured":"Agga A, Abbou A, Labbadi M, Yassine H (2021) Short-term self consumption PV plant power production forecasts based on hybrid CNN-LSTM. ConvLSTM Models Renew Energy 177:101\u2013112. https:\/\/doi.org\/10.1016\/j.renene.2021.05.095","journal-title":"ConvLSTM Models Renew Energy"},{"key":"1586_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2021.107807","volume":"214","author":"L Junqiang","year":"2021","unstructured":"Junqiang L, Fan L, Chunlu P, Dongbin H, Hongfu Z (2021) Prediction of remaining useful life of multi-stage aero-engine based on clustering and LSTM fusion. Reliab Eng Syst Saf 214:107807. https:\/\/doi.org\/10.1016\/j.ress.2021.107807","journal-title":"Reliab Eng Syst Saf"},{"key":"1586_CR27","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.psep.2021.06.005","volume":"152","author":"D Prasanjit","year":"2021","unstructured":"Prasanjit D, Chaulya SK, Sanjay K (2021) Hybrid CNN-LSTM and IoT-based coal mine hazards monitoring and prediction system. Process Saf Environ Prot 152:249\u2013263. https:\/\/doi.org\/10.1016\/j.psep.2021.06.005","journal-title":"Process Saf Environ Prot"},{"key":"1586_CR28","doi-asserted-by":"publisher","first-page":"958","DOI":"10.1016\/j.neucom.2015.08.051","volume":"173","author":"GF Fan","year":"2016","unstructured":"Fan GF, Peng LL, Hong WC, Sun F (2016) Electric load forecasting by the SVR model with differential empirical mode decomposition and auto regression. Neurocomputing 173:958\u2013970. https:\/\/doi.org\/10.1016\/j.neucom.2015.08.051","journal-title":"Neurocomputing"},{"key":"1586_CR29","doi-asserted-by":"publisher","first-page":"2448","DOI":"10.1016\/j.egypro.2019.01.318","volume":"158","author":"YT Feng","year":"2019","unstructured":"Feng YT, Zhang PX, Yang M, Li Q, Zhang AA (2019) Short term load forecasting of offshore oil field microgrids based on DA-SVM. Energy Procedia 158:2448\u20132455. https:\/\/doi.org\/10.1016\/j.egypro.2019.01.318","journal-title":"Energy Procedia"},{"key":"1586_CR30","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1016\/j.apenergy.2019.01.055","volume":"237","author":"FF He","year":"2019","unstructured":"He FF, Zhou JZ, Feng ZK, Liu GB, Yang YQ (2019) A hybrid short-term load forecasting model based on variational mode decomposition and long short-term memory networks considering relevant factors with Bayesian optimization algorithm. Appl Energy 237:106\u2013116. https:\/\/doi.org\/10.1016\/j.apenergy.2019.01.055","journal-title":"Appl Energy"},{"key":"1586_CR31","doi-asserted-by":"publisher","first-page":"101294","DOI":"10.1016\/j.jup.2021.101294","volume":"73","author":"GF Fan","year":"2021","unstructured":"Fan GF, Yu M, Dong SQ, Yeh YH, Hong WC (2021) Forecasting short-term electricity load using hybrid support vector regression with grey catastrophe and random forest modeling. Util Policy 73:101294","journal-title":"Util Policy"},{"issue":"10","key":"1586_CR32","doi-asserted-by":"publisher","first-page":"1415","DOI":"10.1016\/j.jiph.2020.06.019","volume":"13","author":"Y Qiuying","year":"2020","unstructured":"Qiuying Y, Jie W, Hongli M, Xihao W (2020) Research on COVID-19 based on ARIMA model\u0394-Taking Hubei, China as an example to see the epidemic in Italy. J Infect Public Health 13(10):1415\u20131418. https:\/\/doi.org\/10.1016\/j.jiph.2020.06.019","journal-title":"J Infect Public Health"},{"issue":"1","key":"1586_CR33","doi-asserted-by":"publisher","first-page":"1299","DOI":"10.1016\/j.aej.2020.10.052","volume":"60","author":"M Farsi","year":"2020","unstructured":"Farsi M, Hosahalli D, Manjunatha BR (2020) Parallel genetic algorithms for optimizing the SARIMA model for better forecasting of the NCDC weather data. Alex Eng J 60(1):1299\u20131316. https:\/\/doi.org\/10.1016\/j.aej.2020.10.052","journal-title":"Alex Eng J"},{"issue":"1","key":"1586_CR34","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.aej.2020.06.008","volume":"60","author":"L Saiqun","year":"2020","unstructured":"Saiqun L, Qiyan Z, Guangsen G, Dewen S (2020) A combined method for short-term traffic flow prediction based on recurrent neural network. Alex Eng J 60(1):87\u201394. https:\/\/doi.org\/10.1016\/j.aej.2020.06.008","journal-title":"Alex Eng J"},{"key":"1586_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.ecoinf.2020.101153","volume":"60","author":"L Chen-jui","year":"2020","unstructured":"Chen-jui L, Jeng-Jong L, Chiao-Wun J, Ming-Chang T (2020) A rolling forecast approach for next six-hour air quality index track. Ecol Inform 60:101153. https:\/\/doi.org\/10.1016\/j.ecoinf.2020.101153","journal-title":"Ecol Inform"},{"issue":"1","key":"1586_CR36","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1186\/1471-2105-11-110","volume":"11","author":"KK Nicodemus","year":"2010","unstructured":"Nicodemus KK, Malley J, Strobl C, Ziegler A (2010) The behaviour of random forest permutation-based variable importance measures under predictor correlation. BMC Bioinform 11(1):110\u2013122. https:\/\/doi.org\/10.1186\/1471-2105-11-110","journal-title":"BMC Bioinform"},{"key":"1586_CR37","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.neucom.2017.04.070","volume":"262","author":"A Subutai","year":"2017","unstructured":"Subutai A, Alexander, Scott P, Zuha A (2017) Unsupervised real-time anomaly detection for streaming data. Neurocomput 262:134-147. https:\/\/doi.org\/10.1016\/j.neucom.2017.04.070","journal-title":"Neurocomput"},{"key":"1586_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105587","volume":"82","author":"P Jiang","year":"2019","unstructured":"Jiang P, Liu Z (2019) Variable weights combined model based on multi-objective optimization for short-term wind speed forecasting. Appl Soft Comput 82:105587","journal-title":"Appl Soft Comput"},{"key":"1586_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2020.103919","volume":"95","author":"Yu Mengran","year":"2020","unstructured":"Mengran Yu, Shiliang Sun (2020) Policy-based reinforcement learning for time series anomaly detection. Eng Appl Artif Intel 95:103919","journal-title":"Eng Appl Artif Intel"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-022-01586-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-022-01586-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-022-01586-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T13:04:54Z","timestamp":1744203894000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-022-01586-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,17]]},"references-count":39,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["1586"],"URL":"https:\/\/doi.org\/10.1007\/s13042-022-01586-8","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,17]]},"assertion":[{"value":"6 August 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 May 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 June 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared toinfluence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}