{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T20:23:26Z","timestamp":1777494206485,"version":"3.51.4"},"reference-count":92,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Ministry of Higher Education (MOHE) through Fundamental Research Grant Scheme","award":["FRGS\/1\/2018\/ICT04\/UTHM\/03\/4"],"award-info":[{"award-number":["FRGS\/1\/2018\/ICT04\/UTHM\/03\/4"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3056614","type":"journal-article","created":{"date-parts":[[2021,2,3]],"date-time":"2021-02-03T22:00:06Z","timestamp":1612389606000},"page":"22351-22370","source":"Crossref","is-referenced-by-count":383,"title":["Benchmarking of Machine Learning for Anomaly Based Intrusion Detection Systems in the CICIDS2017 Dataset"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2338-6650","authenticated-orcid":false,"given":"Ziadoon Kamil","family":"Maseer","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0582-7512","authenticated-orcid":false,"given":"Robiah","family":"Yusof","sequence":"additional","affiliation":[]},{"given":"Nazrulazhar","family":"Bahaman","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5348-502X","authenticated-orcid":false,"given":"Salama A.","family":"Mostafa","sequence":"additional","affiliation":[]},{"given":"Cik Feresa Mohd","family":"Foozy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2019.03.02"},{"key":"ref72","first-page":"21","article-title":"A deep learning approach for network intrusion detection system","author":"niyaz","year":"2015","journal-title":"Proc EAI Int Conf Bio-Inspired Inf Commun Technol"},{"key":"ref71","first-page":"3884","article-title":"Effective dimensionality reduction of payload-based anomaly detection in TMAD model for HTTP payload","volume":"10","author":"kakavand","year":"2016","journal-title":"KSII Trans Internet Inf Syst"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2016\/v9i48\/105827"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2017.080651"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.07.003"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.04.019"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.13052\/jsn2445-9739.2017.009"},{"key":"ref75","first-page":"3","author":"ring","year":"2017","journal-title":"Big Data Analytics for Intrusion Detection System Statistical Decision-Making Using Finite Dirichlet Mixture Models"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01417-9"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-018-1141-2"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/3349341.3349364"},{"key":"ref33","first-page":"1307","article-title":"On evaluation of network intrusion detection systems: Statistical analysis of CIDDS-001 dataset using machine learning techniques","volume":"26","author":"verma","year":"2018","journal-title":"Pertanika J Sci Technol"},{"key":"ref32","first-page":"479","article-title":"A detailed analysis of CICIDS2017 dataset for designing intrusion detection systems","volume":"7","author":"panigrahi","year":"2018","journal-title":"Int J Eng Technol"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3009843"},{"key":"ref30","author":"raman","year":"2019","journal-title":"An Efficient Intrusion Detection Technique Based on Support Vector Machine and Improved Binary Gravitational Search Algorithm"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps50303.2020.9367477"},{"key":"ref36","first-page":"65","article-title":"Evaluation of machine learning algorithms for anomaly detection","author":"hippe","year":"2020","journal-title":"Proc Int Conf Cyber Secur Protection Digit Service Cyber Secur"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-32213-1_27"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s41650-017-0033-7"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1727-6"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2017.1358779"},{"key":"ref61","first-page":"315","article-title":"Integration bat algorithm with k-means for intrusion detection system","volume":"17","author":"sedghi","year":"2017","journal-title":"Int J Comput Sci Netw Secur"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2873125"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2715166"},{"key":"ref64","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2018\/4680867","article-title":"Intrusion detection system based on decision tree over big data in fog environment","volume":"2018","author":"peng","year":"2018","journal-title":"Wireless Commun Mobile Comput"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2018.02.015"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-016-0456-z"},{"key":"ref66","first-page":"13","article-title":"Anomaly based intrusion detection system using genetic algorithm and K-centroid clustering","volume":"163","author":"chakrabarty","year":"2017","journal-title":"Int J Comput Appl"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.06.005"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2016.11.07"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2016.08.003"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.20532\/cit.2016.1002701"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2018.03.011"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2019.101701","article-title":"A survey on intrusion detection and prevention in wireless ad-hoc networks","volume":"105","author":"khan","year":"2020","journal-title":"J Syst Archit"},{"key":"ref20","first-page":"362","article-title":"Analysis of three intrusion detection system benchmark datasets using machine","author":"g\u00fcne?","year":"2005","journal-title":"Proc Int Conf Intell Secur Inform"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14257\/ijdta.2015.8.1.16"},{"key":"ref21","first-page":"1023","article-title":"Fast feature reduction in intrusion detection datasets","author":"parsazad","year":"2012","journal-title":"Proc MIPRO"},{"key":"ref24","article-title":"Feature selection in UNSW-NB15 and KDDCUP&#x2019;99 datasets","author":"zargari","year":"0"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2016.73009"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2402161"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IWBIS.2017.8275095"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v10i2.pp1515-1523"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1109\/79.543975","article-title":"The expectation-maximization algorithm","volume":"13","author":"fv","year":"1996","journal-title":"IEEE Signal Process Mag"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2019.2922936"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2953095"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.3103\/S0146411619050043"},{"key":"ref59","doi-asserted-by":"crossref","first-page":"863","DOI":"10.1080\/18756891.2016.1237186","article-title":"A two-stage hybrid classification technique for network intrusion detection system","volume":"9","author":"hussain","year":"2016","journal-title":"Int J Comput Intell Syst"},{"key":"ref58","author":"gozzoli","year":"0","journal-title":"Practical Guide to Hyperparameters Optimization for Deep Learning Models"},{"key":"ref57","author":"wahed","year":"0","journal-title":"Tuning to optimize SVM approach for breast cancer diagnosis with blood analysis data"},{"key":"ref56","first-page":"187","article-title":"Evaluating the CIC IDS-2017 dataset using machine learning methods and creating multiple predictive models in the statistical computing language R","volume":"5","author":"pelletier","year":"2020","journal-title":"Science"},{"key":"ref55","author":"sharafaldin","year":"2019","journal-title":"A Detailed Analysis of the CICIDS2017 Data Set"},{"key":"ref54","first-page":"5094","article-title":"Multi-classification of UNSW-NB15 dataset for","volume":"96","author":"nawir","year":"2018","journal-title":"J Theor Appl Inf Technol"},{"key":"ref53","first-page":"88","article-title":"On the KDD&#x2019;99 dataset: Statistical analysis for feature selection","volume":"3","author":"eldos","year":"2012","journal-title":"J Data Min Knowl"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/S0925-2312(98)00030-7"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"},{"key":"ref40","article-title":"Studying machine learning techniques for intrusion detection systems","author":"dang","year":"2019","journal-title":"Stud Mach Learn Tech"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2969428"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"842","DOI":"10.1016\/j.procs.2015.07.490","article-title":"Analysis of KDD dataset attributes&#x2014;Class wise for intrusion detection","volume":"57","author":"aggarwal","year":"2015","journal-title":"Procedia Comput Sci"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14257\/ijdta.2013.6.5.03"},{"key":"ref82","first-page":"1358","article-title":"Performance analysis of intrusion detection system utilizing deep learning techniques","volume":"21","author":"kolte","year":"2019","journal-title":"Journal of The Gujarat Research Society"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SPACES.2015.7058223"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.056"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2015.7275914"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/7130868"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS.2016.7947776"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-017-3128-z"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.02.028"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-019-03008-x"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1007\/s12530-019-09317-1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.04.012"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2908998"},{"key":"ref6","first-page":"219","article-title":"Intrusion detection in network systems through hybrid supervised and unsupervised machine learning process: A case study on the ISCX dataset","author":"soheily-khah","year":"2017","journal-title":"Proc ICDIS"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2841987"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ICTCS.2017.29"},{"key":"ref8","first-page":"e1954v1","article-title":"A review of KDD99 dataset usage in intrusion detection and machine learning between 2010 and 2015","volume":"4","author":"\u00f6zg\u00fcr","year":"2016","journal-title":"PeerJ"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/1075648"},{"key":"ref7","first-page":"4519","article-title":"A detailed analysis of new intrusion detection dataset","volume":"97","author":"abdulraheem","year":"2019","journal-title":"J Theor Appl Inf Technol"},{"key":"ref49","article-title":"A k-means clustering algorithm on numeric data","volume":"117","author":"praveen","year":"2017","journal-title":"Int J Pure Appl Math"},{"key":"ref87","volume":"1","author":"wang","year":"2018","journal-title":"Effectiveness of Machine Learning Based Intrusion Detection Systems"},{"key":"ref88","article-title":"GAN-based imbalanced data intrusion detection system","author":"lee","year":"2019","journal-title":"Pers Ubiquitous Comput"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.5815\/ijitcs.2013.08.08"},{"key":"ref46","first-page":"25","article-title":"Intrusion detection system using support vector machine","volume":"2013","author":"jha","year":"2013","journal-title":"Int J Appl Inf Syst"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.06.047"},{"key":"ref48","author":"das","year":"0","journal-title":"CNN Architectures LeNet AlexNet VGG GoogleNet ResNet and more"},{"key":"ref47","first-page":"1","article-title":"CNN-based network intrusion detection against denial-of-service attacks","volume":"9","author":"kim","year":"2020","journal-title":"Electron"},{"key":"ref42","first-page":"1114","article-title":"Decision tree analysis on J48 algorithm for data mining","volume":"3","author":"bhargava","year":"2013","journal-title":"Proc Int J Adv Res Comput Sci Softw Eng"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13650-9"},{"key":"ref44","first-page":"16","article-title":"Naive (Bayes) at forty: The independence assumption in information retrieval","author":"lewis","year":"1998","journal-title":"Proc ECML"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1053964"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09345704.pdf?arnumber=9345704","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,23]],"date-time":"2024-08-23T14:51:36Z","timestamp":1724424696000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9345704\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":92,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3056614","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}