{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T21:56:38Z","timestamp":1775339798112,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T00:00:00Z","timestamp":1700697600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,23]]},"DOI":"10.1145\/3647444.3647913","type":"proceedings-article","created":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T13:48:36Z","timestamp":1715608116000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A Survey of Swarm Intelligence Based Clustering Models for Anomaly Detection in Network Traffic"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-5851-3856","authenticated-orcid":false,"given":"Pradnya Balasaheb","family":"Borse","sequence":"first","affiliation":[{"name":"Computer, Sandip University, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5898-221X","authenticated-orcid":false,"given":"Sudhir Meesala","family":"Kumar","sequence":"additional","affiliation":[{"name":"Computer, Sandip University, India"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"A comprehensive review study of cyber-attacks and cyber security","author":"Li","year":"2021","unstructured":"Li, Yuchong & Liu, Qinghui. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports. 7. 10.1016\/j.egyr.2021.08.126."},{"key":"e_1_3_2_1_2_1","volume-title":"Swarm Intelligence in Data Science: Challenges, Opportunities and Applications. Paper presented at the 4th International Conference on Innovative Data Communication Technology and Application","author":"Chopra D.","year":"2022","unstructured":"Chopra, D., Arora, P. (n.d.). Swarm Intelligence in Data Science: Challenges, Opportunities and Applications. Paper presented at the 4th International Conference on Innovative Data Communication Technology and Application. 2022."},{"key":"e_1_3_2_1_3_1","volume-title":"Machine Learning, and Datasets. Sensors","author":"Gyamfi E.","year":"2022","unstructured":"Gyamfi, E.; Jurcut, A. Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets. Sensors 2022, 22, 3744."},{"key":"e_1_3_2_1_4_1","volume-title":"ICSI","author":"Yang J.","year":"2020","unstructured":"Yang, J. (2020). Swarm Intelligence in Data Science: Applications, Opportunities and Challenges. In: Tan, Y., Shi, Y., Tuba, M. (eds) Advances in Swarm Intelligence. ICSI 2020. Lecture Notes in Computer Science (), vol 12145. Springer, Cham."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-1665-5_8"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/3477.484436"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2013.06.001"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10898-007-9149-x"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1995.488968"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2002.1004010"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/547485"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12538-6_6"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/NABIC.2009.5393690"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJMMNO.2010.035430"},{"key":"e_1_3_2_1_15_1","volume-title":"Handbook of Swarm Intelligence (pp. 181-207)","author":"Zhang W. J.","year":"2017","unstructured":"Zhang, W. J. (2017). Hybrid swarm intelligence optimization algorithms. In Handbook of Swarm Intelligence (pp. 181-207). Springer."},{"key":"e_1_3_2_1_16_1","first-page":"1","article-title":"A comprehensive survey on particle swarm optimization algorithm and its applications","volume":"2008","author":"Zhang Y.","year":"2008","unstructured":"Zhang, Y., Wang, S., & Ji, G. (2008). A comprehensive survey on particle swarm optimization algorithm and its applications. Mathematical Problems in Engineering, 2008, 1-38.","journal-title":"Mathematical Problems in Engineering"},{"key":"e_1_3_2_1_17_1","volume-title":"OFCOD: On the Fly Clustering Based Outlier Detection Framework. Data","author":"Elmogy A.","year":"2021","unstructured":"Elmogy, A.; Rizk, H.; Sarhan, A.M. OFCOD: On the Fly Clustering Based Outlier Detection Framework. Data 2021, 6, 1."},{"key":"e_1_3_2_1_18_1","volume-title":"A Review on Representative Swarm Intelligence Algorithms for Solving Optimization Problems: Applications and Trends,\" in IEEE\/CAA Journal of Automatica Sinica","author":"Tang G.","unstructured":"J. Tang, G. Liu and Q. Pan, \"A Review on Representative Swarm Intelligence Algorithms for Solving Optimization Problems: Applications and Trends,\" in IEEE\/CAA Journal of Automatica Sinica, vol. 8, no. 10, pp. 1627-1643, October 2021"},{"key":"e_1_3_2_1_19_1","volume-title":"Network Traffic Anomaly Detection via Deep Learning. Information","author":"Fotiadou K.","year":"2021","unstructured":"Fotiadou, K.; Velivassaki, T.-H.; Voulkidis, A.; Skias, D.; Tsekeridou, S.; Zahariadis, T. Network Traffic Anomaly Detection via Deep Learning. Information 2021, 12, 215."},{"key":"e_1_3_2_1_20_1","volume-title":"The Scientific World Journal","author":"Amudha S.","year":"2015","unstructured":"P. Amudha, S. Karthik, S. Sivakumari, \"A Hybrid Swarm Intelligence Algorithm for Intrusion Detection Using Significant Features\", The Scientific World Journal, vol. 2015, Article ID 574589, 15 pages, 2015."},{"key":"e_1_3_2_1_21_1","volume-title":"A Hybrid Network Anomaly Detection system using Glowworm Swarm Optimization with Principal Component Analysis. 10.21203\/rs.3.rs-408246\/v1","author":"Khilar","year":"2021","unstructured":"Khilar, Rashmita & Mariyappan, Kandasamy & Christo, Mary Subaja & Joyson, Amutharaj & T, Anitha & Thavasimuthu, Rajendran. (2021). A Hybrid Network Anomaly Detection system using Glowworm Swarm Optimization with Principal Component Analysis. 10.21203\/rs.3.rs-408246\/v1."},{"key":"e_1_3_2_1_22_1","volume-title":"Numerische Mathematik","volume":"100","author":"Dai R.","year":"2005","unstructured":"Y.-H. Dai and R. Fletcher, \u201cProjected barzilai-borwein methods for large-scale box-constrained quadratic programming,\u201d Numerische Mathematik, vol. 100, 2005."},{"key":"e_1_3_2_1_23_1","first-page":"791","author":"Cemerlic","year":"2008","unstructured":"Cemerlic, Alma & Yang, Li & Kizza, Joseph. (2008). Network Intrusion Detection Based on Bayesian Networks. 791-794.","journal-title":"Network Intrusion Detection Based on Bayesian Networks."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102215"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195548"},{"key":"e_1_3_2_1_26_1","volume-title":"Anomaly detection based on a dynamic Markov model. Information Sciences. 411. 10.1016\/j.ins.2017.05.021","author":"Ren","year":"2017","unstructured":"Ren, Huorong & Ye, Zhixing & Li, Zhiwu. (2017). Anomaly detection based on a dynamic Markov model. Information Sciences. 411. 10.1016\/j.ins.2017.05.021."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1999.816048"},{"key":"e_1_3_2_1_28_1","volume-title":"Information Sciences","author":"Shon J.","unstructured":"T. Shon and J. Moon, \u201cA hybrid machine learning approach to network anomaly detection,\u201d Information Sciences, vol. 177, no. 18, pp. 3799\u20133821, 2007."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/8836057"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3590837.3590888"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3590837.3590882"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3590837.3590879"},{"key":"e_1_3_2_1_33_1","first-page":"864","article-title":"Different aspects of cloud security","volume":"2","author":"Chauhan M.","year":"2012","unstructured":"Chauhan, M., Malhotra, R., Pathak, M., & Singh, U. P. (2012). Different aspects of cloud security. International Journal of Engineering Research and Applications, 2, 864-869.","journal-title":"International Journal of Engineering Research and Applications"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00703-015-0375-3"},{"issue":"181","key":"e_1_3_2_1_35_1","first-page":"27","article-title":"Predictability study of forced Lorenz model: an artificial neural network approach","volume":"40","author":"Singh U. P.","year":"2015","unstructured":"Singh, U. P., Mittal, A. K., Dwivedi, S., & Tiwari, A. (2015). Predictability study of forced Lorenz model: an artificial neural network approach. History, 40(181), 27-33.","journal-title":"History"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.2166\/wcc.2019.212"},{"issue":"2","key":"e_1_3_2_1_37_1","first-page":"838","article-title":"Secure communication protocol for ATM using TLS handshake","volume":"2","author":"Singh U.","year":"2012","unstructured":"Singh, U., Pathak, M., Malhotra, R., & Chauhan, M. (2012). Secure communication protocol for ATM using TLS handshake. Journal of Engineering Research and Applications (IJERA), 2(2), 838-948.","journal-title":"Journal of Engineering Research and Applications (IJERA)"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.2166\/wcc.2021.097"},{"issue":"4","key":"e_1_3_2_1_39_1","first-page":"411","article-title":"Nonlinear time series analysis of rainfall over central Indian region using CMIP5 based climate model","volume":"1","author":"Tiwari A.","year":"2015","unstructured":"Tiwari, A., Mittal, A. K., Dwivedi, S., & Singh, U. P. (2015). Nonlinear time series analysis of rainfall over central Indian region using CMIP5 based climate model. Climate Change, 1(4), 411-417.","journal-title":"Climate Change"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6610675"},{"key":"e_1_3_2_1_41_1","first-page":"96","volume-title":"B. B. Zarpel\u00e3o, and M. L. P. Junior, \u201cDeep IP flow inspection to detect beyond network anomalies","author":"Amaral L.","year":"2017","unstructured":"A. A. Amaral, L. d. S. Mendes, B. B. Zarpel\u00e3o, and M. L. P. Junior, \u201cDeep IP flow inspection to detect beyond network anomalies,\u201d Computer Communications, vol. 98, pp. 80\u201396, 2017."},{"key":"e_1_3_2_1_42_1","unstructured":"Abdalrahman Hwoij Mouhammd Al-kasassbeh Mustafa Al-Fayoumi \"Detecting Network Anomalies using Rule-based machine learning within SNMP-MIB dataset\" 2002"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.05.203"},{"key":"e_1_3_2_1_44_1","volume-title":"Wireless Communications and Mobile Computing","author":"Guohong Qi","year":"2021","unstructured":"Guohong Qi, Jie Zhou, Wenxian Jia, Menghan Liu, Shengnan Zhang, Mengying Xu, \"Intrusion Detection for Network Based on Elite Clone Artificial Bee Colony and Back Propagation Neural Network\", Wireless Communications and Mobile Computing, vol. 2021, Article ID 9956371, 11 pages, 2021."},{"key":"e_1_3_2_1_45_1","volume-title":"GWO, FFA and GA Algorithms. Symmetry","author":"Almomani O.","year":"2020","unstructured":"Almomani, O. A Feature Selection Model for Network Intrusion Detection System Based on PSO, GWO, FFA and GA Algorithms. Symmetry 2020, 12, 1046."},{"key":"e_1_3_2_1_46_1","volume-title":"Intrusion detection in networks using cuckoo search optimization. Soft Computing","author":"Imran","year":"2022","unstructured":"Imran, Muhammad & Khan, Sangeen & Hlavacs, Helmut & Khan, Fakhri & Anwar, Sajid. (2022). Intrusion detection in networks using cuckoo search optimization. Soft Computing."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103141"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC49090.2020.9243442"}],"event":{"name":"ICIMMI 2023: International Conference on Information Management & Machine Intelligence","location":"Jaipur India","acronym":"ICIMMI 2023"},"container-title":["Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3647444.3647913","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3647444.3647913","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,18]],"date-time":"2025-09-18T17:22:08Z","timestamp":1758216128000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3647444.3647913"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,23]]},"references-count":48,"alternative-id":["10.1145\/3647444.3647913","10.1145\/3647444"],"URL":"https:\/\/doi.org\/10.1145\/3647444.3647913","relation":{},"subject":[],"published":{"date-parts":[[2023,11,23]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}