{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T12:48:09Z","timestamp":1770986889252,"version":"3.50.1"},"reference-count":17,"publisher":"World Scientific Pub Co Pte Ltd","issue":"Supp01","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Inter. Net."],"published-print":{"date-parts":[[2022,3]]},"abstract":"<jats:p> With a steady increase in the population of Internet users, a plethora of network services have emerged on the global level. As an offshoot of this phenomenal rise in network services and their capabilities riding on the wave of internet, we are witnessing a massive risk of attacks on network security. Many security vulnerabilities are exposed and exploited by attackers, endangering the safety of massive amounts of data. To improve a network\u2019s effectiveness, it\u2019s critical to detect network traffic anomalies accurately and quickly. A new hybrid model that effectively detects anomalies in network services is proposed in this work. The genetic phase and NN phase represent the 2-phased approach making each one dependent on the other for weight assignment and prediction. The genetic phase generates optimal weights for classification of normal and anomaly patterns. The NN phase learns the input output relationship of network patterns employing GA in the training phase. Detection is accomplished using trained NN and it utilizes pre-processed KDD dataset containing normal and abnormal samples for training. The outcomes demonstrated that the suggested approach outperforms all other algorithms. <\/jats:p>","DOI":"10.1142\/s0219265921410371","type":"journal-article","created":{"date-parts":[[2022,2,11]],"date-time":"2022-02-11T06:32:57Z","timestamp":1644561177000},"source":"Crossref","is-referenced-by-count":2,"title":["Anomaly Detection Using Hybrid Neuro Genetic Model"],"prefix":"10.1142","volume":"22","author":[{"given":"Srinivasa Rao","family":"Pokuri","sequence":"first","affiliation":[{"name":"Department of CSE, Acharya Nagarjuna University, Nagarjuna Nagar, AP, India"}]},{"given":"Nagaraju","family":"Devarakonda","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, VIT-AP University, Amaravati, AP, India"}]}],"member":"219","published-online":{"date-parts":[[2022,2,10]]},"reference":[{"key":"S0219265921410371BIB001","volume-title":"Intrusion Detection","author":"Bace R. G.","year":"2000"},{"key":"S0219265921410371BIB003","doi-asserted-by":"publisher","DOI":"10.1016\/S0957-4174(03)00007-1"},{"issue":"6","key":"S0219265921410371BIB004","first-page":"914","volume":"7","author":"Rao J. N.","year":"2019","journal-title":"International Journal of Recent Technology and Engineering (IJRTE)"},{"issue":"2","key":"S0219265921410371BIB005","first-page":"72","volume":"25","author":"Hongxi L.","year":"2004","journal-title":"Journal of Minjiang University"},{"key":"S0219265921410371BIB006","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1012428"},{"key":"S0219265921410371BIB007","first-page":"194","volume-title":"Proceedings of the third International Conference on Natural Computation","volume":"3","author":"Yu L.","year":"2007"},{"key":"S0219265921410371BIB008","first-page":"2354","volume-title":"Proceedings of International Joint Conference on Neural Networks","author":"Tran T. P.","year":"2006"},{"key":"S0219265921410371BIB009","doi-asserted-by":"publisher","DOI":"10.1109\/PCI.2008.53"},{"key":"S0219265921410371BIB010","doi-asserted-by":"publisher","DOI":"10.1109\/ICACTE.2008.132"},{"key":"S0219265921410371BIB011","doi-asserted-by":"publisher","DOI":"10.1109\/ICICES.2014.7033783"},{"key":"S0219265921410371BIB012","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-020-67640-z"},{"key":"S0219265921410371BIB013","doi-asserted-by":"publisher","DOI":"10.1109\/CMI50323.2021.9362873"},{"key":"S0219265921410371BIB015","volume-title":"2018 International Conference on Soft-Computing and Network Security (ICSNS)","author":"Zemedkun Solomon","year":"2018"},{"key":"S0219265921410371BIB016","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2002.1007774"},{"key":"S0219265921410371BIB017","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2005.12.002"},{"key":"S0219265921410371BIB018","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948145"},{"key":"S0219265921410371BIB019","first-page":"2825","volume":"12","author":"Pedregosa F.","year":"2011","journal-title":"Journal of Machine Learning Research"}],"container-title":["Journal of Interconnection Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219265921410371","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T04:21:42Z","timestamp":1665721302000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0219265921410371"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,10]]},"references-count":17,"journal-issue":{"issue":"Supp01","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["10.1142\/S0219265921410371"],"URL":"https:\/\/doi.org\/10.1142\/s0219265921410371","relation":{},"ISSN":["0219-2659","1793-6713"],"issn-type":[{"value":"0219-2659","type":"print"},{"value":"1793-6713","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,10]]},"article-number":"2141037"}}