{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T02:43:15Z","timestamp":1755225795132,"version":"3.43.0"},"reference-count":135,"publisher":"IEEE","license":[{"start":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T00:00:00Z","timestamp":1504224000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T00:00:00Z","timestamp":1504224000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/icacci.2017.8126017","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T17:26:11Z","timestamp":1512408371000},"page":"1273-1281","source":"Crossref","is-referenced-by-count":0,"title":["Learning mechanisms for anomaly-based intruson detection: Updated review"],"prefix":"10.1109","author":[{"given":"El-Sayed M.","family":"El-Alfy","sequence":"first","affiliation":[{"name":"Information and Computer Science Department College of Computer Sciences and Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia"}]},{"given":"Khaled A.","family":"Al-Utaibi","sequence":"additional","affiliation":[{"name":"College of Computer Sciences and Engineerng University of Ha'il Ha'il 81451, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2008.04.041"},{"journal-title":"Probability Statistics and Random Processes for Electrical Engineering","year":"2008","author":"leon-garcia","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2004.06.016"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116251"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2011.10.001"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.5120\/2932-3883"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICNIT.2010.5508557"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2008.01.008"},{"key":"ref35","article-title":"Comparison of decision tree methods for intrusion detection","author":"ozturk","year":"2010","journal-title":"2nd International Symposium on Sustainable Development"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2008.923876"},{"journal-title":"Pattern Recognition and Machine Learning","year":"2006","author":"bishop","key":"ref28"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.02.021"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2010.5604193"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.050113.00191"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2012.2196010"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1224"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.08.007"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.12.008"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2409775"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2006.7"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2542049"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/MEC.2011.6025886"},{"key":"ref51","first-page":"11","article-title":"An enhanced resilient backpropagation artificial neural network for intrusion detection system","volume":"12","author":"naoum","year":"2012","journal-title":"Int J Computer Science and Network Security"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2006.10.017"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICETC.2010.5529535"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/EBISS.2009.5138016"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/PACCS.2011.5990227"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.cpc.2009.05.004"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2004.09.045"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511543241"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.12.004"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-94"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(98)00017-6"},{"journal-title":"Machine learning and feature engineering for computer network security","year":"2017","author":"davis","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.001"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/DeSE.2011.19"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2009.06.019"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2011.02.021"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.06.059"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2006.10.146"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-169230"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"1219","DOI":"10.1016\/j.jnca.2009.05.004","article-title":"A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference","volume":"32","author":"xenakis","year":"2009","journal-title":"Network and Computer Applications"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2012.05.081"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2004.03.019"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/2.485891"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1145\/1978672.1978676"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"journal-title":"NSL-KDD NSL-KDD dataset for network-based intrusion detection systems","year":"2009","key":"ref125"},{"journal-title":"KDD-99 KDD Cup 1999 dataset for network-based intrusion detection systems","year":"2007","key":"ref124"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/IBICA.2011.72"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2011.233"},{"key":"ref129","first-page":"47","article-title":"Web analyzing traffic challenge: description and results","author":"ra?ssi","year":"2007","journal-title":"Proc ECML\/PKDD"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/CITA.2011.5999520"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/IFITA.2009.34"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.02.102"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.13"},{"key":"ref77","volume":"209","author":"hartigan","year":"1975","journal-title":"Clustering Algorithms"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1080\/01969727308546046"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2012.06.213"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2015.1125974"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2402161"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2013.6555301"},{"key":"ref78","article-title":"Intrusion detection with unlabeled data using clustering","author":"portnoy","year":"2001","journal-title":"Proc ACM CSS Workshop on Data Mining Applied to Security"},{"journal-title":"Developing a high-accuracy cross platform host-based intrusion detection system capable of reliably detecting zero-day attacks","year":"2014","author":"creech","key":"ref132"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2005.11.015"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/4731953"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.06.066"},{"key":"ref62","first-page":"363","article-title":"Principle components analysis and support vector machine based intrusion detection system","author":"eid","year":"2010","journal-title":"10th Int Conf Intelligent Systems Design and Applications ISDA'10"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/NCIS.2011.123"},{"key":"ref63","first-page":"985","article-title":"Extreme learning machine: a new learning scheme of feedforward neural networks","volume":"2","author":"huang","year":"2004","journal-title":"IEEE International Joint Conference on Neural Networks"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2005.12.126"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2012.6252449"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/2666652.2666664"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.07.015"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.12.040"},{"key":"ref2","article-title":"Intrusion detection taxonomy and data preprocessing mechanisms","author":"al-utaibi","year":"0","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"key":"ref69","first-page":"281","article-title":"Some methods for classification and analysis of multivariate observations","volume":"1","author":"macqueen","year":"1967","journal-title":"Berkeley Symp Math Statistics and Prob"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.08.001"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1007\/11427469_67"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/MCAS.2006.1688199"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.12.006"},{"key":"ref94","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1613\/jair.614","article-title":"Popular ensemble methods: An empirical study","volume":"11","author":"opitz","year":"1999","journal-title":"J Artificial Intelligence Research"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2012.06.021"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2017.7925567"},{"key":"ref106","first-page":"2674","article-title":"Hybrid technique for detection of denial of service (dos) attack in wireless sensor network","volume":"7","author":"pandit","year":"2015","journal-title":"Int J Advanced Networking and Applications"},{"key":"ref92","first-page":"136","article-title":"Detecting impersonation attack in wifi networks using deep learning approach","author":"aminanto","year":"2016","journal-title":"International Workshop on Information Security and Application"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.06.013"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0155781"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2014.02.07"},{"journal-title":"Shallow and deep networks intrusion detection system A taxonomy and survey","year":"2017","author":"hodo","key":"ref90"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-013-0452-6"},{"key":"ref102","first-page":"37","article-title":"A novel data mining based hybrid intrusion detection framework","volume":"9","author":"dhakar","year":"2014","journal-title":"Information and Computer Science"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.09.041"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.01.028"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.06.027"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2005.06.003"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.03.025"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-009-9124-7"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.cs.04.060190.001351"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.05.003"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.05.029"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(93)90029-5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.09.004"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-010-0012-4"},{"key":"ref118","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/j.jnca.2004.01.003","article-title":"Intrusion detection using an ensemble of intelligent paradigms","volume":"28","author":"mukkamala","year":"2005","journal-title":"Network and Computer Applications"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.016"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.11.028"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(03)00004-7"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2003.10.003"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45248-5_3"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.08.009"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2015.070395"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.10.011"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2012.05.013"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2006.09.005"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.11.003"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/SACI.2014.6840052"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-1800-9_114"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-56927-2"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-012-1263-0"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/WINCOM.2016.7777224"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00139-0"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45248-5_13"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.04.019"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/CBD.2014.41"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-4642-1_5"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2016.7586590"}],"event":{"name":"2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2017,9,13]]},"location":"Udupi, India","end":{"date-parts":[[2017,9,16]]}},"container-title":["2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8119306\/8125802\/08126017.pdf?arnumber=8126017","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T17:30:38Z","timestamp":1755106238000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8126017\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":135,"URL":"https:\/\/doi.org\/10.1109\/icacci.2017.8126017","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}