{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T10:27:59Z","timestamp":1758968879037,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T00:00:00Z","timestamp":1569974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,2]]},"DOI":"10.1145\/3368756.3369061","type":"proceedings-article","created":{"date-parts":[[2019,12,18]],"date-time":"2019-12-18T13:21:21Z","timestamp":1576675281000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Newest collaborative and hybrid network intrusion detection framework based on suricata and isolation forest algorithm"],"prefix":"10.1145","author":[{"given":"Zouhair","family":"Chiba","sequence":"first","affiliation":[{"name":"Hassan II University of Casablanca, Casablanca, Morocco"}]},{"given":"Noreddine","family":"Abghour","sequence":"additional","affiliation":[{"name":"Hassan II University of Casablanca, Casablanca, Morocco"}]},{"given":"Khalid","family":"Moussaid","sequence":"additional","affiliation":[{"name":"Hassan II University of Casablanca, Casablanca, Morocco"}]},{"given":"Amina El","family":"Omri","sequence":"additional","affiliation":[{"name":"Hassan II University of Casablanca, Casablanca, Morocco"}]},{"given":"Mohamed","family":"Rida","sequence":"additional","affiliation":[{"name":"Hassan II University of Casablanca, Casablanca, Morocco"}]}],"member":"320","published-online":{"date-parts":[[2019,10,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5288-2"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/NAECON.2015.7443094"},{"key":"e_1_3_2_1_3_1","unstructured":"Hodo E. Bellekens X. Hamilton A. Tachtatzis C. and Atkinson R. 2017. Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey. arXiv preprint arXiv:1701.02145. 2015 1--43. [Online]. Available: https:\/\/arxiv.org\/ftp\/arxiv\/papers\/1701\/1701.02145.pdf. [Accessed: 15-June-2019].  Hodo E. Bellekens X. Hamilton A. Tachtatzis C. and Atkinson R. 2017. Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey. arXiv preprint arXiv:1701.02145. 2015 1--43. [Online]. Available: https:\/\/arxiv.org\/ftp\/arxiv\/papers\/1701\/1701.02145.pdf. [Accessed: 15-June-2019]."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.043"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-1841-8"},{"key":"e_1_3_2_1_6_1","volume-title":"Threat Report","author":"Symantec Enterprise","year":"2018","unstructured":"Symantec Enterprise . 2018. Internet Security Threat Report 2018 . Technical Report. Mountain View, CA, USA. [Online]. Available: https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/istr-23-2018-en.pdf. [Accessed: 15-June-2019]. Symantec Enterprise. 2018. Internet Security Threat Report 2018. Technical Report. Mountain View, CA, USA. [Online]. Available: https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/istr-23-2018-en.pdf. [Accessed: 15-June-2019]."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-11196-0_43"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E100.A.176"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.01.023"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of Fifth International Conference on Digital Society (Gosier","author":"Day D.","year":"2011","unstructured":"Day , D. , and Burns , B . 2011. A performance analysis of snort and suricata network intrusion detection and prevention engines . In Proceedings of Fifth International Conference on Digital Society (Gosier , Guadeloupe, France , February 23-28, 2011 ). 187--192. Day, D., and Burns, B. 2011. A performance analysis of snort and suricata network intrusion detection and prevention engines. In Proceedings of Fifth International Conference on Digital Society (Gosier, Guadeloupe, France, February 23-28, 2011). 187--192."},{"key":"e_1_3_2_1_12_1","unstructured":"Lococo M. 2011. Capacity planning for snort. [Online]. Available: http:\/\/mikelococo.com\/2011\/08\/snort-capacity-planning\/ [Accessed: 15-June-2019].  Lococo M. 2011. Capacity planning for snort. [Online]. Available: http:\/\/mikelococo.com\/2011\/08\/snort-capacity-planning\/ [Accessed: 15-June-2019]."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1999.10485670"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150459"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(03)00003-5"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the international conference on very large databases (VLDB)","author":"Knox E. M.","year":"1998","unstructured":"Knox , E. M. , and Ng , R. T . 1998. Algorithms for mining distance based outliers in large datasets . In Proceedings of the international conference on very large databases (VLDB) ( New York City, USA , August 24-27, 1998 ). Morgan Kaufmann, 392--403. Knox, E. M., and Ng, R. T. 1998. Algorithms for mining distance based outliers in large datasets. In Proceedings of the international conference on very large databases (VLDB) (New York City, USA, August 24-27, 1998). Morgan Kaufmann, 392--403."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335388"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150501"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956758"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1198\/106186006X94072"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.6633\/IJNS.201607.18(4).10"},{"key":"e_1_3_2_1_24_1","first-page":"1","article-title":"CloudIDS: Cloud intrusion detection model inspired by dendritic cell mechanism","volume":"9","author":"Azuan Ahmad N. B. I.","year":"2017","unstructured":"Azuan Ahmad , N. B. I. , and Kama , M. N. 2017 . CloudIDS: Cloud intrusion detection model inspired by dendritic cell mechanism . International Journal of Communication Networks and Information Security (IJCNIS). 9 , 1 (Apr. 2017), 67--75. Azuan Ahmad, N. B. I., and Kama, M. N. 2017. CloudIDS: Cloud intrusion detection model inspired by dendritic cell mechanism. International Journal of Communication Networks and Information Security (IJCNIS). 9, 1 (Apr. 2017), 67--75.","journal-title":"International Journal of Communication Networks and Information Security (IJCNIS)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4171"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2019.1582861"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93554-6_33"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-95104-1_4"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym11040583"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.2015616"},{"key":"e_1_3_2_1_31_1","unstructured":"Snort vs Suricata. [Online]. Available: https:\/\/tacticalflex.zendesk.com\/hc\/en-us\/articles\/360010678893-Snort-vs-Suricata. [Accessed: 15-June-2019].  Snort vs Suricata. [Online]. Available: https:\/\/tacticalflex.zendesk.com\/hc\/en-us\/articles\/360010678893-Snort-vs-Suricata. [Accessed: 15-June-2019]."},{"key":"e_1_3_2_1_32_1","unstructured":"Presentation of the IDS\/IPS suricata. [Online]. Available: https:\/\/connect.ed-diamond.com\/MISC\/MISC-066\/Presentation-de-l-IDS-IPS-Suricata2. [Accessed: 15-June-2019].  Presentation of the IDS\/IPS suricata. [Online]. Available: https:\/\/connect.ed-diamond.com\/MISC\/MISC-066\/Presentation-de-l-IDS-IPS-Suricata2. [Accessed: 15-June-2019]."},{"key":"e_1_3_2_1_33_1","unstructured":"Snort Users Manual. [Online]. Available: https:\/\/www.snort.org\/#documents. [Accessed: 15-June-2019].  Snort Users Manual. [Online]. Available: https:\/\/www.snort.org\/#documents. [Accessed: 15-June-2019]."},{"key":"e_1_3_2_1_34_1","unstructured":"Complete list of Suricata Features. [Online]. Available: https:\/\/suricata-ids.org\/features\/all-features\/. [Accessed: 16-June-2019].  Complete list of Suricata Features. [Online]. Available: https:\/\/suricata-ids.org\/features\/all-features\/. [Accessed: 16-June-2019]."},{"key":"e_1_3_2_1_35_1","volume-title":"A7011N","author":"Fekolkin R.","year":"2015","unstructured":"Fekolkin , R. 2015. Intrusion detection & prevention system: overview of snort & suricata. Internet Security , A7011N , Lulea University of Technology . ( Jan. 2015 ), 1--4. Fekolkin, R. 2015. Intrusion detection & prevention system: overview of snort & suricata. Internet Security, A7011N, Lulea University of Technology. (Jan. 2015), 1--4."},{"key":"e_1_3_2_1_36_1","first-page":"7","article-title":"Performance method of assessment of the intrusion detection and prevention systems","volume":"3","author":"Farhaoui Y.","year":"2011","unstructured":"Farhaoui , Y. , and Asimi , A. 2011 . Performance method of assessment of the intrusion detection and prevention systems . International Journal of Engineering Science and Technology. 3 , 7 (July 2011), 5916--5928. Farhaoui, Y., and Asimi, A. 2011. Performance method of assessment of the intrusion detection and prevention systems. International Journal of Engineering Science and Technology. 3, 7 (July 2011), 5916--5928.","journal-title":"International Journal of Engineering Science and Technology."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.6633\/IJNS.201905_21(3).10"},{"key":"e_1_3_2_1_39_1","unstructured":"Isolation Forest Step by Step. [Online]. Available: https:\/\/medium.com\/@hyunsukim_9320\/isolation-forest-step-by-step-341b82923168. [Accessed: 16-June-2019].  Isolation Forest Step by Step. [Online]. Available: https:\/\/medium.com\/@hyunsukim_9320\/isolation-forest-step-by-step-341b82923168. [Accessed: 16-June-2019]."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133360.2133363"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11053-018-9375-6"},{"key":"e_1_3_2_1_42_1","unstructured":"Fuertes T. 2018. Isolation forest: the art of cutting off from the world. [Online]. Available: https:\/\/quantdare.com\/isolation-forest-algorithm\/. [Accessed: 16-June-2019].  Fuertes T. 2018. Isolation forest: the art of cutting off from the world. [Online]. Available: https:\/\/quantdare.com\/isolation-forest-algorithm\/. [Accessed: 16-June-2019]."},{"key":"e_1_3_2_1_43_1","unstructured":"Bahnsen A. C. 2016. Benefits of Anomaly Detection Using Isolation Forests. [Online]. Available: https:\/\/blog.easysol.net\/using-isolation-forests-anamoly-detection\/ [Accessed: 16-June-2019].  Bahnsen A. C. 2016. Benefits of Anomaly Detection Using Isolation Forests. [Online]. Available: https:\/\/blog.easysol.net\/using-isolation-forests-anamoly-detection\/ [Accessed: 16-June-2019]."},{"key":"e_1_3_2_1_44_1","article-title":"Comparison of Firewall and Intrusion Detection System","volume":"5","author":"Wankhade A.","year":"2014","unstructured":"Wankhade , A. , and Chatur , P. N. 2014 . Comparison of Firewall and Intrusion Detection System . International Journal of Computer Science and Information Technologies. 5 , 1( Feb. 2014), 674--678. Wankhade, A., and Chatur, P. N. 2014. Comparison of Firewall and Intrusion Detection System. International Journal of Computer Science and Information Technologies. 5, 1(Feb. 2014), 674--678.","journal-title":"International Journal of Computer Science and Information Technologies."},{"key":"e_1_3_2_1_45_1","first-page":"8","article-title":"A survey on latest DoS attacks: classification and defense mechanisms","volume":"1","author":"Rajkumar M. N.","year":"2013","unstructured":"Rajkumar , M. N. 2013 . A survey on latest DoS attacks: classification and defense mechanisms . International Journal of Innovative Research in Computer and Communication Engineering. 1 , 8 (Oct. 2013), 1847--1860. Rajkumar, M. N. 2013. A survey on latest DoS attacks: classification and defense mechanisms. International Journal of Innovative Research in Computer and Communication Engineering. 1, 8 (Oct. 2013), 1847--1860.","journal-title":"International Journal of Innovative Research in Computer and Communication Engineering."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Kizza J. 2007. Securing the information infrastructure. IGI Global Pennsylvanie USA.  Kizza J. 2007. Securing the information infrastructure. IGI Global Pennsylvanie USA.","DOI":"10.4018\/978-1-59904-379-1"},{"key":"e_1_3_2_1_47_1","unstructured":"Thomas T. M. and Stoddard D. 2012. Network security first-step. Cisco Press Indiana USA.  Thomas T. M. and Stoddard D. 2012. Network security first-step. Cisco Press Indiana USA."}],"event":{"name":"SCA2019: The Fourth International Conference on Smart City Applications","acronym":"SCA2019","location":"Casablanca Morocco"},"container-title":["Proceedings of the 4th International Conference on Smart City Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368756.3369061","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368756.3369061","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:27Z","timestamp":1750202607000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368756.3369061"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,2]]},"references-count":44,"alternative-id":["10.1145\/3368756.3369061","10.1145\/3368756"],"URL":"https:\/\/doi.org\/10.1145\/3368756.3369061","relation":{},"subject":[],"published":{"date-parts":[[2019,10,2]]},"assertion":[{"value":"2019-10-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}