{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:29:10Z","timestamp":1750220950052,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,3,27]],"date-time":"2019-03-27T00:00:00Z","timestamp":1553644800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,3,27]]},"DOI":"10.1145\/3320326.3320394","type":"proceedings-article","created":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T15:12:03Z","timestamp":1558451523000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Smart Approach to Build A Deep Neural Network Based IDS for Cloud Environment Using an Optimized Genetic Algorithm"],"prefix":"10.1145","author":[{"given":"Zouhair","family":"Chiba","sequence":"first","affiliation":[{"name":"LIMSAD Labs, Hassan II University of Casablanca, Casablanca, Morocco"}]},{"given":"Noreddine","family":"Abghour","sequence":"additional","affiliation":[{"name":"LIMSAD Labs, Hassan II University of Casablanca, Casablanca, Morocco"}]},{"given":"Khalid","family":"Moussaid","sequence":"additional","affiliation":[{"name":"LIMSAD Labs, Hassan II University of Casablanca, Casablanca, Morocco"}]},{"given":"Amina","family":"El Omri","sequence":"additional","affiliation":[{"name":"LIMSAD Labs, Hassan II University of Casablanca, Casablanca, Morocco"}]},{"given":"Mohamed","family":"Rida","sequence":"additional","affiliation":[{"name":"LIMSAD Labs, Hassan II University of Casablanca, Casablanca, Morocco"}]}],"member":"320","published-online":{"date-parts":[[2019,3,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.01.095"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Chiba Z. Abghour N. Moussaid K. and Rida M. 2016. A cooperative and hybrid network intrusion detection framework in cloud computing based on snort and optimized back propagation neural network. Procedia Computer Science. 83 (May. 2016) 1200--1206.  Chiba Z. Abghour N. Moussaid K. and Rida M. 2016. A cooperative and hybrid network intrusion detection framework in cloud computing based on snort and optimized back propagation neural network. Procedia Computer Science. 83 (May. 2016) 1200--1206.","DOI":"10.1016\/j.procs.2016.04.249"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCIA.2013.6725325"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Chiba Z. Abghour N. Moussaid K. and Rida M. 2018. A Review of Intrusion Detection Systems in Cloud Computing. In Security and Privacy in Smart Sensor Networks. IGI Global 253--283.  Chiba Z. Abghour N. Moussaid K. and Rida M. 2018. A Review of Intrusion Detection Systems in Cloud Computing. In Security and Privacy in Smart Sensor Networks. IGI Global 253--283.","DOI":"10.4018\/978-1-5225-5736-4.ch012"},{"key":"e_1_3_2_1_5_1","unstructured":"Mell P. and Grance T. 2011. The NIST definition of cloud computing. http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-145\/SP800-145.pdf.  Mell P. and Grance T. 2011. The NIST definition of cloud computing. http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-145\/SP800-145.pdf."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-013-0208-7"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of International Conference on Emerging Research in Computing, Information, Communication and and Applications","author":"Ghosh P.","year":"2016","unstructured":"Ghosh , P. , Jha , S. , Dutta , R. , and Phadikar , S . 2016. Intrusion Detection System Based on BCS-GA in Cloud Environment . In Proceedings of International Conference on Emerging Research in Computing, Information, Communication and and Applications ( Bangalore, India , July 23-30, 2016 ). ERCICA 2016. Springer, Singapore, Singapore, 393--403. Ghosh, P., Jha, S., Dutta, R., and Phadikar, S. 2016. Intrusion Detection System Based on BCS-GA in Cloud Environment. In Proceedings of International Conference on Emerging Research in Computing, Information, Communication and and Applications (Bangalore, India, July 23-30, 2016). ERCICA 2016. Springer, Singapore, Singapore, 393--403."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4171"},{"key":"e_1_3_2_1_9_1","first-page":"3","article-title":"Intrusion Detection Systems in Cloud Computing: A Contemporary Review of Techniques and Solutions","volume":"33","author":"Riaz A.","year":"2017","unstructured":"Riaz , A. , Ahmad , H. F. , Kiani , A. K. , Qadir , J. , Rasool , R. , and Younis , U. 2017 . Intrusion Detection Systems in Cloud Computing: A Contemporary Review of Techniques and Solutions . Journal of Information Science and Engineering , 33 , 3 (May 2017), 611--634. Riaz, A., Ahmad, H. F., Kiani, A. K., Qadir, J., Rasool, R., and Younis, U. 2017. Intrusion Detection Systems in Cloud Computing: A Contemporary Review of Techniques and Solutions. Journal of Information Science and Engineering, 33, 3 (May 2017), 611--634.","journal-title":"Journal of Information Science and Engineering"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.08.016"},{"key":"e_1_3_2_1_11_1","unstructured":"Wikipedia 2016 dyn cyberattack. https:\/\/en.wikipedia.org\/wiki\/2016_Dyn_cyberattack.  Wikipedia 2016 dyn cyberattack. https:\/\/en.wikipedia.org\/wiki\/2016_Dyn_cyberattack."},{"key":"e_1_3_2_1_13_1","unstructured":"Krizhevsky A. Sutskever I. and Hinton G. E. 2012. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems. 1097--1105.   Krizhevsky A. Sutskever I. and Hinton G. E. 2012. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems. 1097--1105."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.07.015"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Hajimirzaei B. and Navimipour N. J. 2018. Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm. ICT Express.  Hajimirzaei B. and Navimipour N. J. 2018. Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm. ICT Express.","DOI":"10.1016\/j.icte.2018.01.014"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.35444\/IJANA.2018.10014"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.29196\/jub.v26i2.471"},{"key":"e_1_3_2_1_18_1","first-page":"10","article-title":"Intrusion detection systems based on artificial intelligence techniques in wireless sensor networks","volume":"9","author":"Alrajeh N. A.","year":"2013","unstructured":"Alrajeh , N. A. , and Lloret , J. 2013 . Intrusion detection systems based on artificial intelligence techniques in wireless sensor networks . International Journal of Distributed Sensor Networks. 9 , 10 (Oct. 2013), 1--6. Alrajeh, N. A., and Lloret, J. 2013. Intrusion detection systems based on artificial intelligence techniques in wireless sensor networks. International Journal of Distributed Sensor Networks. 9, 10 (Oct. 2013), 1--6.","journal-title":"International Journal of Distributed Sensor Networks."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","author":"Modi C. N.","year":"2012","unstructured":"Modi , C. N. , Patel , D. R. , Patel , A. , and Muttukrishnan , R . 2012.Bayesian Classifier and Snort based network intrusion detection system in cloud computing . In Proceedings of 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12) (Coimbatore, India , July 26-28, 2012 ). IEEE, 1--7. Modi, C. N., Patel, D. R., Patel, A., and Muttukrishnan, R. 2012.Bayesian Classifier and Snort based network intrusion detection system in cloud computing. In Proceedings of 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12) (Coimbatore, India, July 26-28, 2012). IEEE, 1--7."},{"volume-title":"Genetic algorithms in Java basics","author":"Jacobson L.","key":"e_1_3_2_1_20_1","unstructured":"Jacobson , L. , Kanbe , B. 2015. Genetic algorithms in Java basics . Apress, New York, NY. Jacobson, L., Kanbe, B. 2015. Genetic algorithms in Java basics. Apress, New York, NY."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Chiba Z. Abghour N. Moussaid K. El Omri A. and Rida M. 2018. A novel architecture combined with optimal parameters for back propagation neural network applied to Network intrusion detection. Computers & Security.75 (Jun. 2018) 36--58.  Chiba Z. Abghour N. Moussaid K. El Omri A. and Rida M. 2018. A novel architecture combined with optimal parameters for back propagation neural network applied to Network intrusion detection. Computers & Security.75 (Jun. 2018) 36--58.","DOI":"10.1016\/j.cose.2018.01.023"},{"key":"e_1_3_2_1_22_1","unstructured":"Tama B.A and Rhee K. 2017. Attack Classification Analysis of IoT Network via Deep Learning Approach. Research Briefs on Information & Communication Technology Evolution (ReBICTE) 3 (Nov. 2017) 1--9.  Tama B.A and Rhee K. 2017. Attack Classification Analysis of IoT Network via Deep Learning Approach. Research Briefs on Information & Communication Technology Evolution (ReBICTE) 3 (Nov. 2017) 1--9."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Ahmim A. Maglaras L. Ferrag M. A. Derdour M. and Janicke H. 2018. A Novel Hierarchical Intrusion Detection System based on Decision Tree and Rules-based Models. arXiv preprint arXiv:1812.09059.  Ahmim A. Maglaras L. Ferrag M. A. Derdour M. and Janicke H. 2018. A Novel Hierarchical Intrusion Detection System based on Decision Tree and Rules-based Models. arXiv preprint arXiv:1812.09059.","DOI":"10.1109\/DCOSS.2019.00059"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of International Conference on Information and Communication Technology and its Applications (ICTA 2018)","author":"Musbau D.A","year":"2018","unstructured":"Musbau , D.A , Alhassan , J.K. 2018 . Ensemble Learning Approach for the Enhancement of Performance of Intrusion Detection System . In Proceedings of International Conference on Information and Communication Technology and its Applications (ICTA 2018) (Minna, Nigeria , September 5-6, 2018), 1--8. Musbau, D.A, Alhassan, J.K. 2018. Ensemble Learning Approach for the Enhancement of Performance of Intrusion Detection System. In Proceedings of International Conference on Information and Communication Technology and its Applications (ICTA 2018) (Minna, Nigeria, September 5-6, 2018), 1--8."},{"key":"e_1_3_2_1_25_1","unstructured":"The NSL-KDD data set. Available from: http:\/\/nsl.cs.unb.ca\/NSL-KDD  The NSL-KDD data set. Available from: http:\/\/nsl.cs.unb.ca\/NSL-KDD"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICISSEC.2016.7885840"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2009.03.002"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2526-3_60"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E100.A.176"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-015-0388-x"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of International Conference on Frontier Computing","author":"Ma T.","year":"2016","unstructured":"Ma , T. , Yu , Y. , Wang , F. , Zhang , Q. , and Chen , X . 2016. A Hybrid Methodologies for Intrusion Detection Based Deep Neural Network with Support Vector Machine and Clustering Technique . In Proceedings of International Conference on Frontier Computing ( Tokyo, Japan , July 13-15, 2016 ). Springer, Singapore, Singapore, 123--134. Ma, T., Yu, Y., Wang, F., Zhang, Q., and Chen, X. 2016. A Hybrid Methodologies for Intrusion Detection Based Deep Neural Network with Support Vector Machine and Clustering Technique. In Proceedings of International Conference on Frontier Computing (Tokyo, Japan, July 13-15, 2016). Springer, Singapore, Singapore, 123--134."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.09.013"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of First International Conference on Smart System, Innovations and Computing","author":"Sharma R.","year":"2017","unstructured":"Sharma , R. , and Chaurasia , S . 2018. An Enhanced Approach to Fuzzy C-means Clustering for Anomaly Detection . In Proceedings of First International Conference on Smart System, Innovations and Computing ( Jaipur, India , April 15-16, 2017 ). Springer, Singapore, Singapore, 623--636. Sharma, R., and Chaurasia, S. 2018. An Enhanced Approach to Fuzzy C-means Clustering for Anomaly Detection. In Proceedings of First International Conference on Smart System, Innovations and Computing (Jaipur, India, April 15-16, 2017). Springer, Singapore, Singapore, 623--636."},{"key":"e_1_3_2_1_35_1","volume-title":"An Enhanced Intrusion Detection System Based on Clustering. In Proceedings of 17th China Annual Conference for International Education & Expo (CACIE 2016)","author":"Borah S.","year":"2016","unstructured":"Borah , S. , Panigrahi , R. , and Chakraborty , A . 2018 . An Enhanced Intrusion Detection System Based on Clustering. In Proceedings of 17th China Annual Conference for International Education & Expo (CACIE 2016) (Beijing, China , October 20-22, 2016 ). Springer, Singapore, Singapore, 37--45. Borah, S., Panigrahi, R., and Chakraborty, A. 2018. An Enhanced Intrusion Detection System Based on Clustering. In Proceedings of 17th China Annual Conference for International Education & Expo (CACIE 2016) (Beijing, China, October 20-22, 2016). Springer, Singapore, Singapore, 37--45."},{"key":"e_1_3_2_1_36_1","first-page":"3","article-title":"A New Distributed Intrusion Detection System Based on Multi-Agent System for Cloud Environment","volume":"10","author":"Achbarou O.","year":"2018","unstructured":"Achbarou , O. , El Kiram , M. A. , Bourkoukou , O. , and Elbouanani , S. 2018 . A New Distributed Intrusion Detection System Based on Multi-Agent System for Cloud Environment . International Journal of Communication Networks and Information Security. 10 , 3 (Dec. 2018), 526--533. Achbarou, O., El Kiram, M. A., Bourkoukou, O., and Elbouanani, S. 2018. A New Distributed Intrusion Detection System Based on Multi-Agent System for Cloud Environment. International Journal of Communication Networks and Information Security. 10, 3 (Dec. 2018), 526--533.","journal-title":"International Journal of Communication Networks and Information Security."}],"event":{"name":"NISS19: Networking, Information Systems & Security","acronym":"NISS19","location":"Rabat Morocco"},"container-title":["Proceedings of the 2nd International Conference on Networking, Information Systems &amp; Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320326.3320394","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3320326.3320394","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:56Z","timestamp":1750204436000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320326.3320394"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,27]]},"references-count":35,"alternative-id":["10.1145\/3320326.3320394","10.1145\/3320326"],"URL":"https:\/\/doi.org\/10.1145\/3320326.3320394","relation":{},"subject":[],"published":{"date-parts":[[2019,3,27]]},"assertion":[{"value":"2019-03-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}