{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,10]],"date-time":"2026-05-10T23:38:06Z","timestamp":1778456286529,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,15]]},"DOI":"10.1145\/3508072.3508085","type":"proceedings-article","created":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T17:01:56Z","timestamp":1649869316000},"page":"78-86","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["A Hybrid Deep Learning Approach for Advanced Persistent Threat Attack Detection"],"prefix":"10.1145","author":[{"given":"Meaad","family":"Alrehaili","sequence":"first","affiliation":[{"name":"University of Jeddah, Saudi Arabia"}]},{"given":"Adel","family":"Alshamrani","sequence":"additional","affiliation":[{"name":"University of Jeddah, Saudi Arabia"}]},{"given":"Ala","family":"Eshmawi","sequence":"additional","affiliation":[{"name":"University of Jeddah, Saudi Arabia"}]}],"member":"320","published-online":{"date-parts":[[2022,4,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2891891"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP49622.2020.9259390"},{"key":"e_1_3_2_2_3_1","volume-title":"Evolving Advanced Persistent Threat Detection Using Provenance Graph and Metric Learning. IEEE International Conference on Communications and Network Security (CNS 2020","author":"Ayoade Gbadebo","year":"2020","unstructured":"Gbadebo Ayoade , Khandakar Akbar , Pracheta Sahoo , Yang Gao , Anoop Singhal , Kangkook Jee , Latifur Khan , and Anmol Agarwal . 2020 . Evolving Advanced Persistent Threat Detection Using Provenance Graph and Metric Learning. IEEE International Conference on Communications and Network Security (CNS 2020 ), Avignon, FR. https:\/\/doi.org\/10.1109\/CNS48642. 2020.9162264 10.1109\/CNS48642.2020.9162264 Gbadebo Ayoade, Khandakar Akbar, Pracheta Sahoo, Yang Gao, Anoop Singhal, Kangkook Jee, Latifur Khan, and Anmol Agarwal. 2020. Evolving Advanced Persistent Threat Detection Using Provenance Graph and Metric Learning. IEEE International Conference on Communications and Network Security (CNS 2020), Avignon, FR. https:\/\/doi.org\/10.1109\/CNS48642.2020.9162264"},{"key":"e_1_3_2_2_4_1","volume-title":"A Novel Deep Learning Stack for APT Detection. Applied Sciences 9, 6","author":"Bodstr\u00f6m Tero","year":"2019","unstructured":"Tero Bodstr\u00f6m and Timo H\u00e4m\u00e4l\u00e4inen . 2019. A Novel Deep Learning Stack for APT Detection. Applied Sciences 9, 6 ( 2019 ). https:\/\/doi.org\/10.3390\/app9061055 10.3390\/app9061055 Tero Bodstr\u00f6m and Timo H\u00e4m\u00e4l\u00e4inen. 2019. A Novel Deep Learning Stack for APT Detection. Applied Sciences 9, 6 (2019). https:\/\/doi.org\/10.3390\/app9061055"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.02.058"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2020.0110886"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357613.3357618"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"Nelly Elsayed Zaghloul\u00a0Saad Zaghloul Sylvia\u00a0Worlali Azumah and Chengcheng Li. 2021. Intrusion Detection System in Smart Home Network Using Bidirectional LSTM and Convolutional Neural Networks Hybrid Model. arxiv:2105.12096\u00a0[cs.LG]  Nelly Elsayed Zaghloul\u00a0Saad Zaghloul Sylvia\u00a0Worlali Azumah and Chengcheng Li. 2021. Intrusion Detection System in Smart Home Network Using Bidirectional LSTM and Convolutional Neural Networks Hybrid Model. arxiv:2105.12096\u00a0[cs.LG]","DOI":"10.1109\/MWSCAS47672.2021.9531683"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.06.055"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2930200"},{"key":"e_1_3_2_2_11_1","unstructured":"Ibrahim Ghafir and V\u00e1clav P\u0159enosil. 2014. Advanced Persistent Threat Attack Detection: An Overview. International Journal of Advances in Computer Networks and Its Security (IJCNS) Volume 4(2014).  Ibrahim Ghafir and V\u00e1clav P\u0159enosil. 2014. Advanced Persistent Threat Attack Detection: An Overview. International Journal of Advances in Computer Networks and Its Security (IJCNS) Volume 4(2014)."},{"key":"e_1_3_2_2_12_1","volume-title":"Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis. Secur. Commun. Networks 2018","author":"Hu Hao","year":"2018","unstructured":"Hao Hu , Yuling Liu , Hongqi Zhang , and Yuchen Zhang . 2018. Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis. Secur. Commun. Networks 2018 ( 2018 ), 5787102:1\u20135787102:14. Hao Hu, Yuling Liu, Hongqi Zhang, and Yuchen Zhang. 2018. Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis. Secur. Commun. Networks 2018 (2018), 5787102:1\u20135787102:14."},{"key":"e_1_3_2_2_13_1","unstructured":"Sekitoshi Kanai Yasuhiro Fujiwara Yuki Yamanaka and Shuichi Adachi. 2018. Sigsoftmax: Reanalysis of the Softmax Bottleneck. In Advances in Neural Information Processing Systems S.\u00a0Bengio H.\u00a0Wallach H.\u00a0Larochelle K.\u00a0Grauman N.\u00a0Cesa-Bianchi and R.\u00a0Garnett (Eds.). Vol.\u00a031. Curran Associates Inc.https:\/\/proceedings.neurips.cc\/paper\/2018\/file\/9dcb88e0137649590b755372b040afad-Paper.pdf  Sekitoshi Kanai Yasuhiro Fujiwara Yuki Yamanaka and Shuichi Adachi. 2018. Sigsoftmax: Reanalysis of the Softmax Bottleneck. In Advances in Neural Information Processing Systems S.\u00a0Bengio H.\u00a0Wallach H.\u00a0Larochelle K.\u00a0Grauman N.\u00a0Cesa-Bianchi and R.\u00a0Garnett (Eds.). Vol.\u00a031. Curran Associates Inc.https:\/\/proceedings.neurips.cc\/paper\/2018\/file\/9dcb88e0137649590b755372b040afad-Paper.pdf"},{"key":"e_1_3_2_2_14_1","volume-title":"2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)(2020)","author":"Meliboev Aziz","year":"2020","unstructured":"Aziz Meliboev , Jumabek Alikhanov , and Wooseong Kim . 2020 . 1D CNN based network intrusion detection with normalization on imbalanced data . 2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)(2020) , 218\u2013224. Aziz Meliboev, Jumabek Alikhanov, and Wooseong Kim. 2020. 1D CNN based network intrusion detection with normalization on imbalanced data. 2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)(2020), 218\u2013224."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59621-7_8"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"crossref","unstructured":"Sun Pengfei Liu Pengju Li Qi Liu Chenxi Lu Xiangling Hao Ruochen and Chen Jinpeng. 2020. DL-IDS: Extracting features using CNN-LSTM hybrid network for intrusion detection system.  Sun Pengfei Liu Pengju Li Qi Liu Chenxi Lu Xiangling Hao Ruochen and Chen Jinpeng. 2020. DL-IDS: Extracting features using CNN-LSTM hybrid network for intrusion detection system.","DOI":"10.1155\/2020\/8890306"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"crossref","unstructured":"A. Sagheer and Mostafa Kotb. 2019. Unsupervised Pre-training of a Deep LSTM-based Stacked Autoencoder for Multivariate Time Series Forecasting Problems. Scientific Reports 9(2019).  A. Sagheer and Mostafa Kotb. 2019. Unsupervised Pre-training of a Deep LSTM-based Stacked Autoencoder for Multivariate Time Series Forecasting Problems. Scientific Reports 9(2019).","DOI":"10.1038\/s41598-019-55320-6"},{"key":"e_1_3_2_2_18_1","volume-title":"What\u2019s under the ROC? An introduction to receiver operating characteristics curves. Canadian journal of psychiatry 12","author":"Streiner L","year":"2007","unstructured":"David\u00a0 L Streiner and John Cairney . 2007. What\u2019s under the ROC? An introduction to receiver operating characteristics curves. Canadian journal of psychiatry 12 ( 2007 ), 121\u2013128. David\u00a0L Streiner and John Cairney. 2007. What\u2019s under the ROC? An introduction to receiver operating characteristics curves. Canadian journal of psychiatry 12 (2007), 121\u2013128."},{"key":"e_1_3_2_2_19_1","volume-title":"Algorithms and Architectures for Parallel Processing","author":"Tan Jiayu","unstructured":"Jiayu Tan and Jian Wang . 2018. Detecting Advanced Persistent Threats Based on Entropy and Support Vector Machine . In Algorithms and Architectures for Parallel Processing . Springer International Publishing , 153\u2013165. Jiayu Tan and Jian Wang. 2018. Detecting Advanced Persistent Threats Based on Entropy and Support Vector Machine. In Algorithms and Architectures for Parallel Processing. Springer International Publishing, 153\u2013165."},{"key":"e_1_3_2_2_20_1","unstructured":"Aaron\u00a0R. Tuor Samuel\u00a0P. Kaplan Brian\u00a0J. Hutchinson Nicole\u00a0M. Nichols and Sean\u00a0M. Robinson. 2018. Deep Learning for Unsupervised Insider Threat Detection in Structured Cyber Security Data Streams. https:\/\/www.osti.gov\/biblio\/1591618  Aaron\u00a0R. Tuor Samuel\u00a0P. Kaplan Brian\u00a0J. Hutchinson Nicole\u00a0M. Nichols and Sean\u00a0M. Robinson. 2018. Deep Learning for Unsupervised Insider Threat Detection in Structured Cyber Security Data Streams. https:\/\/www.osti.gov\/biblio\/1591618"},{"key":"e_1_3_2_2_21_1","volume-title":"APT attack detection algorithm based on spatio-temporal association analysis in industrial network. Journal of Ambient Intelligence and Humanized Computing","author":"Wang Xiaoying","year":"2020","unstructured":"Xiaoying Wang , Qingjie Liu , Z. Pan , and Guoli Pang . 2020. APT attack detection algorithm based on spatio-temporal association analysis in industrial network. Journal of Ambient Intelligence and Humanized Computing ( 2020 ), 1\u201310. Xiaoying Wang, Qingjie Liu, Z. Pan, and Guoli Pang. 2020. APT attack detection algorithm based on spatio-temporal association analysis in industrial network. Journal of Ambient Intelligence and Humanized Computing (2020), 1\u201310."},{"key":"e_1_3_2_2_22_1","unstructured":"Cho\u00a0Do Xuan and M. Dao. 2021. A novel approach for APT attack detection based on combined deep learning model. Neural Computing and Applications(2021) 1\u201314.  Cho\u00a0Do Xuan and M. Dao. 2021. A novel approach for APT attack detection based on combined deep learning model. Neural Computing and Applications(2021) 1\u201314."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761077"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149384"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.01.032"}],"event":{"name":"ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems","location":"Dubai United Arab Emirates","acronym":"ICFNDS 2021"},"container-title":["The 5th International Conference on Future Networks &amp; Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508072.3508085","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508072.3508085","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:30Z","timestamp":1750191150000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508072.3508085"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,15]]},"references-count":25,"alternative-id":["10.1145\/3508072.3508085","10.1145\/3508072"],"URL":"https:\/\/doi.org\/10.1145\/3508072.3508085","relation":{},"subject":[],"published":{"date-parts":[[2021,12,15]]},"assertion":[{"value":"2022-04-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}