{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:28:53Z","timestamp":1771025333531,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,9]],"date-time":"2021-08-09T00:00:00Z","timestamp":1628467200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,9]]},"DOI":"10.1145\/3484824.3484908","type":"proceedings-article","created":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T23:09:15Z","timestamp":1642115355000},"page":"26-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Leveraging LSTM-RNN combined with SVM for Network Intrusion Detection"],"prefix":"10.1145","author":[{"given":"Shweta","family":"Patidar","sequence":"first","affiliation":[]},{"given":"Meenakshi","family":"Tripathi","sequence":"additional","affiliation":[]},{"given":"Subham Kumar","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"320","published-online":{"date-parts":[[2022,1,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.09.004"},{"key":"e_1_3_2_1_2_1","first-page":"156","volume-title":"Heidelberg)","author":"Beqiri E.","year":"2009","unstructured":"E. Beqiri , \"Neural networks for intrusion detection systems,\" in Global Security, Safety, and Sustainability ( H. Jahankhani , A. G. Hessami , and F. Hsu , eds . ), (Berlin , Heidelberg) , pp. 156 -- 165 . Springer Berlin Heidelberg , 2009 . E. Beqiri, \"Neural networks for intrusion detection systems,\" in Global Security, Safety, and Sustainability (H. Jahankhani, A. G. Hessami, and F. Hsu, eds.), (Berlin, Heidelberg), pp. 156--165. Springer Berlin Heidelberg, 2009."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.3390\/app9204396"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5120\/13334-0928"},{"key":"e_1_3_2_1_5_1","volume-title":"A review,\" expert systems with applications","author":"Tsai C.-F.","unstructured":"C.-F. Tsai , Y.-F. Hsu , C.-Y. Lin , and W.-Y. Lin , \"Intrusion detection by machine learning : A review,\" expert systems with applications , vol. 36 , no. 10, pp. 11994--12000. 2009. C.-F. Tsai, Y.-F. Hsu, C.-Y. Lin, and W.-Y. Lin, \"Intrusion detection by machine learning: A review,\" expert systems with applications, vol. 36, no. 10, pp. 11994--12000. 2009."},{"key":"e_1_3_2_1_6_1","first-page":"473","volume-title":"Lstm can solve hard long time lag problems,\" in Advances in neural information processing systems","author":"Hochreiter S.","year":"1997","unstructured":"S. Hochreiter and J. Schmidhuber , \" Lstm can solve hard long time lag problems,\" in Advances in neural information processing systems , pp. 473 -- 479 . 1997 . S. Hochreiter and J. Schmidhuber, \"Lstm can solve hard long time lag problems,\" in Advances in neural information processing systems, pp. 473--479. 1997."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.3390\/app9204396"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5120\/13334-0928"},{"key":"e_1_3_2_1_9_1","first-page":"29","volume-title":"Machine learning ddos detection for consumer internet of things devices,\" in 2018 IEEE Security and Privacy Workshops (SPW)","author":"Doshi R.","year":"2018","unstructured":"R. Doshi , N. Apthorpe , and N. Feamster , \" Machine learning ddos detection for consumer internet of things devices,\" in 2018 IEEE Security and Privacy Workshops (SPW) , pp. 29 -- 35 . IEEE , 2018 . R. Doshi, N. Apthorpe, and N. Feamster, \"Machine learning ddos detection for consumer internet of things devices,\" in 2018 IEEE Security and Privacy Workshops (SPW), pp. 29--35. IEEE, 2018."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"A. F. M. Agarap \"A neural network architecture combining gated recurrent unit (gru) and support vector machine (svm) for intrusion detection in network traffic data \" in Proceedings of the 2018 10th International Conference on Machine Learning and Computing pp. 26--30. 2018.  A. F. M. Agarap \"A neural network architecture combining gated recurrent unit (gru) and support vector machine (svm) for intrusion detection in network traffic data \" in Proceedings of the 2018 10th International Conference on Machine Learning and Computing pp. 26--30. 2018.","DOI":"10.1145\/3195106.3195117"},{"key":"e_1_3_2_1_11_1","first-page":"1","volume-title":"Long short term memory recur- rent neural network classifier for intrusion detection,\" in 2016 International Conference on Platform Technology and Service (PlatCon)","author":"Kim J.","year":"2016","unstructured":"J. Kim , J. Kim , H. L. T. Thu , and H. Kim , \" Long short term memory recur- rent neural network classifier for intrusion detection,\" in 2016 International Conference on Platform Technology and Service (PlatCon) , pp. 1 -- 5 . IEEE , 2016 . J. Kim, J. Kim, H. L. T. Thu, and H. Kim, \"Long short term memory recur- rent neural network classifier for intrusion detection,\" in 2016 International Conference on Platform Technology and Service (PlatCon), pp. 1--5. IEEE, 2016."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-018-0145-4"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2867564"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2910860"},{"key":"e_1_3_2_1_15_1","volume-title":"Network intrusion detection based on lstm and feature embedding,\" arXiv preprint arXiv:1911.11552","author":"Gwon H.","year":"2019","unstructured":"H. Gwon , C. Lee , R. Keum , and H. Choi , \" Network intrusion detection based on lstm and feature embedding,\" arXiv preprint arXiv:1911.11552 , 2019 . H. Gwon, C. Lee, R. Keum, and H. Choi, \"Network intrusion detection based on lstm and feature embedding,\" arXiv preprint arXiv:1911.11552, 2019."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1109\/ISAC.2010.5670479","volume-title":"Ddos attack detection based on neural network,\" in 2010 2nd International Symposium on Aware Computing","author":"Li J.","year":"2010","unstructured":"J. Li , Y. Liu , and L. Gu , \" Ddos attack detection based on neural network,\" in 2010 2nd International Symposium on Aware Computing , pp. 196 -- 199 . IEEE , 2010 . J. Li, Y. Liu, and L. Gu, \"Ddos attack detection based on neural network,\" in 2010 2nd International Symposium on Aware Computing, pp. 196--199. IEEE, 2010."},{"key":"e_1_3_2_1_17_1","first-page":"368","volume-title":"A new intrusion detection system based on gated recurrent unit (gru) and genetic algorithm,\" in International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","author":"Manavi M.","year":"2019","unstructured":"M. Manavi and Y. Zhang , \" A new intrusion detection system based on gated recurrent unit (gru) and genetic algorithm,\" in International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage , pp. 368 -- 383 . Springer , 2019 . M. Manavi and Y. Zhang, \"A new intrusion detection system based on gated recurrent unit (gru) and genetic algorithm,\" in International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, pp. 368--383. Springer, 2019."},{"key":"e_1_3_2_1_18_1","first-page":"483","volume-title":"An intelligent network attack detection method based on rnn,\" in 2018 IEEE Third In- ternational Conference on Data Science in Cyberspace (DSC)","author":"Fu Y.","year":"2018","unstructured":"Y. Fu , F. Lou , F. Meng , Z. Tian , H. Zhang , and F. Jiang , \" An intelligent network attack detection method based on rnn,\" in 2018 IEEE Third In- ternational Conference on Data Science in Cyberspace (DSC) , pp. 483 -- 489 . IEEE , 2018 . Y. Fu, F. Lou, F. Meng, Z. Tian, H. Zhang, and F. Jiang, \"An intelligent network attack detection method based on rnn,\" in 2018 IEEE Third In- ternational Conference on Data Science in Cyberspace (DSC), pp. 483--489. IEEE, 2018."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.26735\/16587790.2018.003"},{"key":"e_1_3_2_1_20_1","first-page":"1","volume-title":"An effective intrusion detection classifier using long short-term memory with gradient descent optimization,\" in 2017 International Conference on Platform Technology and Service (PlatCon)","author":"Kim J.","year":"2017","unstructured":"J. Kim , H. Kim , , \" An effective intrusion detection classifier using long short-term memory with gradient descent optimization,\" in 2017 International Conference on Platform Technology and Service (PlatCon) , pp. 1 -- 6 . IEEE , 2017 . J. Kim, H. Kim, et al., \"An effective intrusion detection classifier using long short-term memory with gradient descent optimization,\" in 2017 International Conference on Platform Technology and Service (PlatCon), pp. 1--6. IEEE, 2017."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.07.015"},{"key":"e_1_3_2_1_22_1","first-page":"6645","volume-title":"Speech recognition with deep recurrent neural networks,\" in 2013 IEEE international conference on acoustics, speech and signal processing","author":"Graves A.","year":"2013","unstructured":"A. Graves , A.-r. Mohamed, and G. Hinton , \" Speech recognition with deep recurrent neural networks,\" in 2013 IEEE international conference on acoustics, speech and signal processing , pp. 6645 -- 6649 . IEEE , 2013 . A. Graves, A.-r. Mohamed, and G. Hinton, \"Speech recognition with deep recurrent neural networks,\" in 2013 IEEE international conference on acoustics, speech and signal processing, pp. 6645--6649. IEEE, 2013."},{"key":"e_1_3_2_1_23_1","first-page":"1764","volume-title":"Towards end-to-end speech recognition with re- current neural networks,\" in International conference on machine learning","author":"Graves A.","year":"2014","unstructured":"A. Graves and N. Jaitly , \" Towards end-to-end speech recognition with re- current neural networks,\" in International conference on machine learning , pp. 1764 -- 1772 . 2014 . A. Graves and N. Jaitly, \"Towards end-to-end speech recognition with re- current neural networks,\" in International conference on machine learning, pp. 1764--1772. 2014."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2847722"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_26_1","unstructured":"Y. Tang \"Deep learning using linear support vector machines \" arXi preprint arXiv:1306.0239 2013.  Y. Tang \"Deep learning using linear support vector machines \" arXi preprint arXiv:1306.0239 2013."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5937\/vojtehg66-16670"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2004.03.019"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2007.914695"},{"key":"e_1_3_2_1_30_1","volume-title":"IEEE","author":"Cheng C.","year":"2012","unstructured":"C. Cheng , W. P. Tay , and G.-B. Huang , \"Extreme learning machines for intrusion detection,\" in The 2012 International joint conference on neural networks (IJCNN), pp. 1--8 . IEEE , 2012 . C. Cheng, W. P. Tay, and G.-B. Huang, \"Extreme learning machines for intrusion detection,\" in The 2012 International joint conference on neural networks (IJCNN), pp. 1--8. IEEE, 2012."}],"event":{"name":"DSMLAI '21': International Conference on Data Science, Machine Learning and Artificial Intelligence","location":"Windhoek Namibia","acronym":"DSMLAI '21'"},"container-title":["Proceedings of the International Conference on Data Science, Machine Learning and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3484824.3484908","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3484824.3484908","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:15Z","timestamp":1750191435000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3484824.3484908"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,9]]},"references-count":30,"alternative-id":["10.1145\/3484824.3484908","10.1145\/3484824"],"URL":"https:\/\/doi.org\/10.1145\/3484824.3484908","relation":{},"subject":[],"published":{"date-parts":[[2021,8,9]]},"assertion":[{"value":"2022-01-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}