{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:36:05Z","timestamp":1767339365748,"version":"3.37.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,7,7]],"date-time":"2023-07-07T00:00:00Z","timestamp":1688688000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,7]],"date-time":"2023-07-07T00:00:00Z","timestamp":1688688000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-023-01954-3","type":"journal-article","created":{"date-parts":[[2023,7,7]],"date-time":"2023-07-07T11:01:31Z","timestamp":1688727691000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Intrusion Detection System with SVM and Ensemble Learning Algorithms"],"prefix":"10.1007","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9722-0592","authenticated-orcid":false,"given":"Khundrakpam","family":"Johnson Singh","sequence":"first","affiliation":[]},{"given":"Debabrata","family":"Maisnam","sequence":"additional","affiliation":[]},{"given":"Usham Sanjota","family":"Chanu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,7]]},"reference":[{"key":"1954_CR1","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1145\/846183.846201","volume":"1","author":"I Levin","year":"2000","unstructured":"Levin I. KDD-99 classifier learning contest: LLSoft\u2019s results overview. SIGKDD Explor. 2000;1:67\u201375.","journal-title":"SIGKDD Explor"},{"key":"1954_CR2","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/380995.381033","volume":"2","author":"R Kohavi","year":"2000","unstructured":"Kohavi R, Brodley CE, Frasca B, Mason L, Zheng Z. KDD-Cup 2000 organizers\u2019 report: peeling the onion. SIGKDD Explor Newsl. 2000;2:86\u201393.","journal-title":"SIGKDD Explor Newsl"},{"key":"1954_CR3","unstructured":"NSL-KDD dataset, available on: https:\/\/www.unb.ca\/cic\/datasets\/nsl.html. Accessed on Jan 2022."},{"key":"1954_CR4","unstructured":"Google Patents (2018): Method and system for network intrusion detection\u201f, available on : https:\/\/patents.google.com\/patent\/US20180241763A1\/en, accessed on Apr 2021"},{"key":"1954_CR5","doi-asserted-by":"crossref","unstructured":"Relan NG, Patil DR. Implementation of network intrusion detection system using variant of decision tree algorithm, International Conference on Nascent Technologies in the Engineering Field (ICNTE). 2015.","DOI":"10.1109\/ICNTE.2015.7029925"},{"issue":"6","key":"1954_CR6","first-page":"446","volume":"4","author":"L Dhanabal","year":"2015","unstructured":"Dhanabal L, Shantharajah SP. A Study on NSL-KDD dataset for intrusion detection system based on classification algorithms. Int J Adv Res Comput Commun Eng. 2015;4(6):446\u201352.","journal-title":"Int J Adv Res Comput Commun Eng"},{"issue":"4","key":"1954_CR7","first-page":"148","volume":"7","author":"H Nkiama","year":"2016","unstructured":"Nkiama H, Zainudeen S, Saidu M. A subset feature elimination mechanism for intrusion detection system. Int J Adv Comput Sci Appl. 2016;7(4):148\u201357.","journal-title":"Int J Adv Comput Sci Appl"},{"key":"1954_CR8","doi-asserted-by":"crossref","unstructured":"Senthilnayaki B, Venkatalakshmi K, Kannan A. Intrusion detection using optimal genetic feature selection and SVM based classifier. In: 3rd International Conference on Signal Processing, Communication and Networking (ICSCN). 2015.","DOI":"10.1109\/ICSCN.2015.7219890"},{"key":"1954_CR9","doi-asserted-by":"crossref","unstructured":"Osanaiye O, Cai H, Raymond Choo K-K, Dehghantanha A, Xu Z, Dlodlo M. Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing. EURASIP J Wirel Commun Netw. 2016;130.","DOI":"10.1186\/s13638-016-0623-3"},{"issue":"4","key":"1954_CR10","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1016\/j.jksus.2017.05.013","volume":"29","author":"IS Thaseen","year":"2017","unstructured":"Thaseen IS, Aswani Kumar C. Intrusion detection model using fusion of chi- square feature selection and multi class SVM. J King Saud Univ Comput Inf Sci. 2017;29(4):462\u201372.","journal-title":"J King Saud Univ Comput Inf Sci"},{"issue":"3","key":"1954_CR11","first-page":"129","volume":"7","author":"Md Al Mehedi Hasan","year":"2016","unstructured":"Al Mehedi Hasan Md, Nasser M, Ahmad S, Islam Molla K. Feature selection for intrusion detection using random forest. J Inf Secur. 2016;7(3):129\u201340.","journal-title":"J Inf Secur"},{"issue":"1","key":"1954_CR12","first-page":"71","volume":"29","author":"KJ Singh","year":"2020","unstructured":"Singh KJ, De T. Efficient classification of DDoS attacks using an ensemble feature selection algorithm. J Intell Syst. 2020;29(1):71\u201383.","journal-title":"J Intell Syst"},{"key":"1954_CR13","doi-asserted-by":"crossref","unstructured":"Farnaaz N, Jabbar MA. Random forest modelling for network intrusion detection system. In: 12th International Conference on Information Processing, 2016; p. 213\u201317","DOI":"10.1016\/j.procs.2016.06.047"},{"key":"1954_CR14","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.jal.2016.11.018","volume":"24","author":"ASA Aziz","year":"2017","unstructured":"Aziz ASA, EL-Ola Hanafi S, Ella-Hassanien A. Comparison of classification techniques applied for network intrusion detection and classification. J Appl Logic. 2017;24:109\u201318.","journal-title":"J Appl Logic"},{"key":"1954_CR15","doi-asserted-by":"crossref","unstructured":"Sultana A, Jabbar MA. Intelligent network intrusion detection system using data mining techniques. In: 2nd International Conference on Applied and TheoriticalComputing and Communication Technology, 2016, p. 329\u201333","DOI":"10.1109\/ICATCCT.2016.7912017"},{"key":"1954_CR16","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/s10586-015-0527-8","volume":"19","author":"SH Kang","year":"2016","unstructured":"Kang SH, Kim KJ. A feature selection approach to find optimal feature subsets for the network intrusion detection system. Clust Comput. 2016;19:325\u201333.","journal-title":"Clust Comput"},{"issue":"3","key":"1954_CR17","doi-asserted-by":"publisher","first-page":"364","DOI":"10.32768\/abc.202293364-376","volume":"9","author":"J Abdollahi","year":"2022","unstructured":"Abdollahi J, Davari N, Panahi Y, Gardaneh M. Detection of metastatic breast cancer from whole-slide pathology images using an ensemble deep-learning method: detection of breast cancer using deep-learning. Arch Breast Cancer. 2022;9(3):364\u201376.","journal-title":"Arch Breast Cancer"},{"key":"1954_CR18","doi-asserted-by":"publisher","DOI":"10.32768\/abc.20207118-24","author":"J Abdollahi","year":"2020","unstructured":"Abdollahi J, Keshandehghan A, Gardaneh M, Panahi Y, Gardaneh M. Accurate detection of breast cancer metastasis using a hybrid model of artificial intelligence algorithm. Arch Breast Cancer. 2020. https:\/\/doi.org\/10.32768\/abc.20207118-24.","journal-title":"Arch Breast Cancer"},{"issue":"1","key":"1954_CR19","first-page":"8","volume":"8","author":"F Amani","year":"2022","unstructured":"Amani F, Abdollahi J, Mohammadnia A, Amani P, Fattahzadeh-Ardalani G. Using Stacking methods based Genetic Algorithm to predict the time between symptom onset and hospital arrival in stroke patients and its related factors. JBE. 2022;8(1):8\u201323.","journal-title":"JBE"},{"key":"1954_CR20","first-page":"23","volume":"1","author":"J Abdollahi","year":"2019","unstructured":"Abdollahi J, Moghaddam BN, Parvar ME. Improving diabetes diagnosis in smart health using genetic-based Ensemble learning algorithm. Approach to IoT Infrastructure. Future Gen Distrib Syst J. 2019;1:23\u201330.","journal-title":"Future Gen Distrib Syst J"},{"key":"1954_CR21","unstructured":"Abdollahi J, Nouri-Moghaddam B & Ghazanfari M. Deep Neural Network Based Ensemble learning Algorithms for the healthcare system (diagnosis of chronic diseases). arXiv preprint arXiv:2103.08182. 2021."},{"key":"1954_CR22","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/s42044-022-00100-1","volume":"5","author":"J Abdollahi","year":"2022","unstructured":"Abdollahi J, Nouri-Moghaddam B. Hybrid stacked ensemble combined with genetic algorithms for diabetes prediction. Iran J Comput Sci. 2022;5:205\u201320. https:\/\/doi.org\/10.1007\/s42044-022-00100-1.","journal-title":"Iran J Comput Sci"},{"key":"1954_CR23","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s42044-022-00104-x","volume":"5","author":"J Abdollahi","year":"2022","unstructured":"Abdollahi J, Nouri-Moghaddam B. A hybrid method for heart disease diagnosis utilizing feature selection based ensemble classifier model generation. Iran J Comput Sci. 2022;5:229\u201346. https:\/\/doi.org\/10.1007\/s42044-022-00104-x.","journal-title":"Iran J Comput Sci"},{"key":"1954_CR24","unstructured":"Scikit learn, available on: https:\/\/scikit-learn.org\/stable, accessed on Jan 2022."},{"issue":"2","key":"1954_CR25","first-page":"23","volume":"9","author":"KJ Singh","year":"2017","unstructured":"Singh KJ, De T. Analysis of application layer DDoS Attack Detection parameters using statistical classifiers. Internetworking Indones J. 2017;9(2):23\u201331.","journal-title":"Internetworking Indones J"},{"key":"1954_CR26","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.protcy.2012.05.017","volume":"4","author":"S Mukherjee","year":"2012","unstructured":"Mukherjee S, Sharma N. Intrusion detection using naive bayes classifier with feature reduction, 2012. Procedia Technol. 2012;4:119\u201328.","journal-title":"Procedia Technol"},{"key":"1954_CR27","unstructured":"Parsazad S, Saboori E, Allahyar. Fast Feature Reduction in intrusion detection datasets. In: MIPRO 2012 Proceedings of the 35th International Convention, 2012; p. 1023\u20139."},{"key":"1954_CR28","doi-asserted-by":"crossref","unstructured":"Alazab A, Hobbs M, Abawajy J and Alazab M. Using feature selection for intrusion detection system, (2012). In: International Symposium on Communications and Information Technologies (ISCIT), 2012; p. 296\u2013301.","DOI":"10.1109\/ISCIT.2012.6380910"},{"key":"1954_CR29","doi-asserted-by":"crossref","unstructured":"Zhang F and Wang D. An effective feature selection approach for network intrusion detection. In: 2013 IEEE Eighth International Conference on Networking, Architecture and Storage, 2013; p. 307\u201311.","DOI":"10.1109\/NAS.2013.49"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-01954-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-023-01954-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-01954-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,7]],"date-time":"2023-07-07T11:04:56Z","timestamp":1688727896000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-023-01954-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,7]]},"references-count":29,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2023,9]]}},"alternative-id":["1954"],"URL":"https:\/\/doi.org\/10.1007\/s42979-023-01954-3","relation":{},"ISSN":["2661-8907"],"issn-type":[{"type":"electronic","value":"2661-8907"}],"subject":[],"published":{"date-parts":[[2023,7,7]]},"assertion":[{"value":"20 January 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 May 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 July 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"517"}}