{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T06:12:48Z","timestamp":1775196768079,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T00:00:00Z","timestamp":1657670400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,13]]},"DOI":"10.1145\/3551690.3551693","type":"proceedings-article","created":{"date-parts":[[2022,9,14]],"date-time":"2022-09-14T18:04:58Z","timestamp":1663178698000},"page":"13-17","source":"Crossref","is-referenced-by-count":3,"title":["Network intrusion detection using Machine Learning approach"],"prefix":"10.1145","author":[{"given":"Zhour","family":"Rachidi","sequence":"first","affiliation":[{"name":"National School of Applied Sciences, Ibn Tofail University, Morocco"}]},{"given":"Khalid","family":"Chougdali","sequence":"additional","affiliation":[{"name":"National School of Applied Sciences, Ibn Tofail University, Morocco"}]},{"given":"Abdellatif","family":"Kobbane","sequence":"additional","affiliation":[{"name":"ENSIAS University Mohammed V, Morocco"}]},{"given":"Jalel","family":"Ben-Othman","sequence":"additional","affiliation":[{"name":"University of Paris 13, France"}]}],"member":"320","published-online":{"date-parts":[[2022,9,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"AGARWAL Arushi SHARMA Purushottam ALSHEHRI Mohammed \u00a0et al.\u00a0Classification model for accuracy and intrusion detection using machine learning approach.\u00a0PeerJ Computer Science 2021 vol. 7 p. e437  AGARWAL Arushi SHARMA Purushottam ALSHEHRI Mohammed \u00a0et al.\u00a0Classification model for accuracy and intrusion detection using machine learning approach.\u00a0PeerJ Computer Science 2021 vol. 7 p. e437","DOI":"10.7717\/peerj-cs.437"},{"issue":"3","key":"e_1_3_2_1_2_1","first-page":"178","article-title":"Intrusion detection based on distance combination","volume":"2","author":"Beauquier J.","year":"2008","unstructured":"J. Beauquier , Y. Hu ,\" Intrusion detection based on distance combination \", International Journal of Computer Science 2 ( 3 ) ( 2008 ) pp 178 - 186 J. Beauquier, Y.Hu,\" Intrusion detection based on distance combination\", International Journal of Computer Science 2(3) (2008) pp 178-186","journal-title":"International Journal of Computer Science"},{"key":"e_1_3_2_1_3_1","volume-title":"A. A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection.\u00a0International Journal of Engineering Research & Technology (IJERT)","author":"REVATHI","year":"2013","unstructured":"REVATHI , S. et MALATHI , A. A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection.\u00a0International Journal of Engineering Research & Technology (IJERT) , 2013 , vol. 2 , no 12, p. 1848-1853 REVATHI, S. et MALATHI, A. A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection.\u00a0International Journal of Engineering Research & Technology (IJERT), 2013, vol. 2, no 12, p. 1848-1853"},{"key":"e_1_3_2_1_4_1","volume-title":"Achin. Comparative analysis of KNN algorithm using various normalization techniques.\u00a0International Journal of Computer Network and Information Security","author":"PANDEY","year":"2017","unstructured":"PANDEY , Amit et JAIN , Achin. Comparative analysis of KNN algorithm using various normalization techniques.\u00a0International Journal of Computer Network and Information Security , 2017 , vol. 9 , no 11, p. 36 PANDEY, Amit et JAIN, Achin. Comparative analysis of KNN algorithm using various normalization techniques.\u00a0International Journal of Computer Network and Information Security, 2017, vol. 9, no 11, p. 36"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"AGARWAL Arushi SHARMA Purushottam ALSHEHRI Mohammed \u00a0et al.\u00a0Classification model for accuracy and intrusion detection using machine learning approach.\u00a0PeerJ Computer Science 2021 vol. 7 p. e437  AGARWAL Arushi SHARMA Purushottam ALSHEHRI Mohammed \u00a0et al.\u00a0Classification model for accuracy and intrusion detection using machine learning approach.\u00a0PeerJ Computer Science 2021 vol. 7 p. e437","DOI":"10.7717\/peerj-cs.437"},{"key":"e_1_3_2_1_6_1","volume-title":"Ali. Performance analysis of ANN and Naive Bayes classification algorithm for data classification.\u00a0International journal of intelligent systems and applications in engineering","author":"SARITAS","year":"2019","unstructured":"SARITAS , Mucahid Mustafa et YASAR , Ali. Performance analysis of ANN and Naive Bayes classification algorithm for data classification.\u00a0International journal of intelligent systems and applications in engineering , 2019 , vol. 7 , no 2, p. 88-91 SARITAS, Mucahid Mustafa et YASAR, Ali. Performance analysis of ANN and Naive Bayes classification algorithm for data classification.\u00a0International journal of intelligent systems and applications in engineering, 2019, vol. 7, no 2, p. 88-91"},{"key":"e_1_3_2_1_7_1","volume-title":"M. A. Random forest modeling for network intrusion detection system.\u00a0Procedia Computer Science","author":"FARNAAZ","year":"2016","unstructured":"FARNAAZ , Nabila et JABBAR , M. A. Random forest modeling for network intrusion detection system.\u00a0Procedia Computer Science , 2016 , vol. 89 , p. 213-217 FARNAAZ, Nabila et JABBAR, M. A. Random forest modeling for network intrusion detection system.\u00a0Procedia Computer Science, 2016, vol. 89, p. 213-217"},{"key":"e_1_3_2_1_8_1","volume-title":"Interpr\u00e9tation graphique de la courbe ROC. In :\u00a0Extraction et Gestion des Connaissances (EGC'11)","author":"Fran\u00e7ois RIOULT","year":"2011","unstructured":"RIOULT , Fran\u00e7ois . Interpr\u00e9tation graphique de la courbe ROC. In :\u00a0Extraction et Gestion des Connaissances (EGC'11) . 2011 . p. 6 p. RIOULT, Fran\u00e7ois. Interpr\u00e9tation graphique de la courbe ROC. In :\u00a0Extraction et Gestion des Connaissances (EGC'11). 2011. p. 6 p."},{"key":"e_1_3_2_1_9_1","volume-title":"A machine learning approach.\u00a0Intelligent Decision Technologies","author":"Mrutyunjaya PANDA","year":"2011","unstructured":"PANDA , Mrutyunjaya , ABRAHAM , Ajith , DAS , Swagatam , \u00a0et al.\u00a0Network intrusion detection system : A machine learning approach.\u00a0Intelligent Decision Technologies , 2011 , vol. 5 , no 4, p. 347-356 PANDA, Mrutyunjaya, ABRAHAM, Ajith, DAS, Swagatam,\u00a0et al.\u00a0Network intrusion detection system: A machine learning approach.\u00a0Intelligent Decision Technologies, 2011, vol. 5, no 4, p. 347-356"},{"key":"e_1_3_2_1_10_1","first-page":"1","volume-title":"IEEE","author":"Deyban PEREZ","year":"2017","unstructured":"PEREZ , Deyban , ASTOR , Miguel A., ABREU , David Perez , \u00a0et al. \u00a0Intrusion detection in computer networks using hybrid machine learning techniques. In :\u00a02017 XLIII Latin American Computer Conference (CLEI) . IEEE , 2017 . p. 1 - 10 PEREZ, Deyban, ASTOR, Miguel A., ABREU, David Perez,\u00a0et al.\u00a0Intrusion detection in computer networks using hybrid machine learning techniques. In :\u00a02017 XLIII Latin American Computer Conference (CLEI). IEEE, 2017. p. 1-10"},{"key":"e_1_3_2_1_11_1","volume-title":"Md Al Mehedi","author":"HASAN","year":"2014","unstructured":"HASAN , Md Al Mehedi , NASSER, Mohammed , PAL, Biprodip,\u00a0et al.\u00a0Support vector machine and random forest modeling for intrusion detection system (IDS).\u00a0Journal of Intelligent Learning Systems and Applications , 2014 , vol. 2014 HASAN, Md Al Mehedi, NASSER, Mohammed, PAL, Biprodip,\u00a0et al.\u00a0Support vector machine and random forest modeling for intrusion detection system (IDS).\u00a0Journal of Intelligent Learning Systems and Applications, 2014, vol. 2014"},{"key":"e_1_3_2_1_12_1","volume-title":"Erhan. A survey of data mining and machine learning methods for cyber security intrusion detection.\u00a0IEEE Communications surveys & tutorials","author":"BUCZAK","year":"2015","unstructured":"BUCZAK , Anna L. et GUVEN , Erhan. A survey of data mining and machine learning methods for cyber security intrusion detection.\u00a0IEEE Communications surveys & tutorials , 2015 , vol. 18 , no 2, p. 1153-1176 BUCZAK, Anna L. et GUVEN, Erhan. A survey of data mining and machine learning methods for cyber security intrusion detection.\u00a0IEEE Communications surveys & tutorials, 2015, vol. 18, no 2, p. 1153-1176"},{"key":"e_1_3_2_1_13_1","volume-title":"Sajjan G. Comparative analysis of ML classifiers for network intrusion detection. In:\u00a0Fourth international congress on information and communication technology","author":"MAHFOUZ","year":"2020","unstructured":"MAHFOUZ , Ahmed M., VENUGOPAL , Deepak , et SHIVA , Sajjan G. Comparative analysis of ML classifiers for network intrusion detection. In:\u00a0Fourth international congress on information and communication technology . Springer , Singapore , 2020 . p. 193-207. MAHFOUZ, Ahmed M., VENUGOPAL, Deepak, et SHIVA, Sajjan G. Comparative analysis of ML classifiers for network intrusion detection. In:\u00a0Fourth international congress on information and communication technology. Springer, Singapore, 2020. p. 193-207."}],"event":{"name":"ICICM 2022: 2022 The 12th International Conference on Information Communication and Management","location":"London United Kingdom","acronym":"ICICM 2022"},"container-title":["2022 The 12th International Conference on Information Communication and Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551690.3551693","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3551690.3551693","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:00Z","timestamp":1750182540000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551690.3551693"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,13]]},"references-count":13,"alternative-id":["10.1145\/3551690.3551693","10.1145\/3551690"],"URL":"https:\/\/doi.org\/10.1145\/3551690.3551693","relation":{},"subject":[],"published":{"date-parts":[[2022,7,13]]}}}