{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T19:52:38Z","timestamp":1770061958283,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,2,2]],"date-time":"2024-02-02T00:00:00Z","timestamp":1706832000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,2,2]]},"DOI":"10.1145\/3651671.3651673","type":"proceedings-article","created":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T18:55:50Z","timestamp":1717786550000},"page":"200-205","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["A Survey of Novel Framework of Anomaly-Based Intrusion Detection Systems in Computer Networks Using Ensemble Feature Integration with Deep Learning Techniques"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-2248-6344","authenticated-orcid":false,"given":"Srinivas","family":"Akkepalli","sequence":"first","affiliation":[{"name":"Computer Science and Engineering, Osmania University, India and \rComputer science and Engineering, Osmania University, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1679-8657","authenticated-orcid":false,"given":"SAGAR","family":"K","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, Sreyas Institute of Engineering and Technology, JNTUH., India"}]}],"member":"320","published-online":{"date-parts":[[2024,6,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2022.105548"},{"key":"e_1_3_2_1_2_1","first-page":"100580","article-title":"Network intrusion detection in software defined networking with self-organized con-straint-based intelligent learning framework. Measurement","volume":"24","author":"Bhardwaj A.","year":"2022","unstructured":"Bhardwaj, A., Tyagi, R., Sharma, N., Khare, A., Punia, M.S. and Garg, V.K., 2022. Network intrusion detection in software defined networking with self-organized con-straint-based intelligent learning framework. Measurement: Sensors, 24, p.100580..","journal-title":"Sensors"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Tama B.A. Comuzzi M. and Rhee K.H. 2019. TSE-IDS: A two-stage classifier ensemble for intelligent anomaly-based intrusion detection system. IEEE access 7 pp.94497-94507.","DOI":"10.1109\/ACCESS.2019.2928048"},{"key":"e_1_3_2_1_4_1","first-page":"1","volume-title":"International Journal of Information Security","author":"Abdulganiyu O.H.","unstructured":"Abdulganiyu, O.H., AitTchakoucht, T. and Saheed, Y.K., 2023. A systematic literature review for network intrusion detection system (IDS). International Journal of Information Security, pp.1-38."},{"key":"e_1_3_2_1_5_1","volume-title":"2019 18th IEEE International conference on machine learning and applications (ICMLA) (pp. 1253-1258)","author":"Toupas P.","unstructured":"Toupas, P., Chamou, D., Giannoutakis, K.M., Drosou, A. and Tzovaras, D., 2019, December. An intrusion detection system for multi-class classification based on deep neural networks. In 2019 18th IEEE International conference on machine learning and applications (ICMLA) (pp. 1253-1258). IEEE."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Azam Z. Islam M.M. and Huda M.N. 2023. Comparative Analysis of Intrusion Detection Systems and Machine Learning Based Model Analysis Through Decision Tree. IEEE Access.","DOI":"10.1109\/ACCESS.2023.3296444"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9101684"},{"key":"e_1_3_2_1_8_1","volume-title":"SCF 2019, San Diego, CA, USA, June 25\u201330, 2019, Proceedings 12 (pp. 161-176)","author":"Lin P.","unstructured":"Lin, P., Ye, K. and Xu, C.Z., 2019. Dynamic network anomaly detection system by using deep learning techniques. In Cloud Computing\u2013CLOUD 2019: 12th International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25\u201330, 2019, Proceedings 12 (pp. 161-176). Springer International Publishing."},{"key":"e_1_3_2_1_9_1","volume-title":"2022 International Conference on Cyber Resilience (ICCR) (pp. 1-7). IEEE.","author":"Kaushik S.","unstructured":"Kaushik, S., Bhadrdwaj, A., Rehman, A.U., Bharany, S., Harguem, S., Kukunuru, S. and Thawabeh, O.A., 2022, October. Designing an MI-PCA based Agile Intrusion Detection System. In 2022 International Conference on Cyber Resilience (ICCR) (pp. 1-7). IEEE."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.11.005"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102062"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.05.048"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.05.025"},{"key":"e_1_3_2_1_14_1","first-page":"1","volume-title":"Cluster Computing","author":"Heidari A.","unstructured":"Heidari, A. and Jabraeil Jamali, M.A., 2022. Internet of Things intrusion detec-tion systems: A comprehensive review and future directions. Cluster Computing, pp.1-28."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3238664"},{"key":"e_1_3_2_1_16_1","volume-title":"SCF 2019, San Diego, CA, USA, June 25\u201330, 2019, Proceedings 12 (pp. 161-176)","author":"Lin P.","unstructured":"Lin, P., Ye, K. and Xu, C.Z., 2019. Dynamic network anomaly detection system by using deep learning techniques. In Cloud Computing\u2013CLOUD 2019: 12th Interna-tional Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25\u201330, 2019, Proceedings 12 (pp. 161-176). Springer In-ternational Publishing."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895334"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2019.102031"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-021-00448-4"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4522"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Nguyen T.P. Nam H. and Kim D. 2023. Transformer-Based Attention Net-work for In-Vehicle Intrusion Detection. IEEE Access.","DOI":"10.1109\/ACCESS.2023.3282110"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101645"},{"key":"e_1_3_2_1_23_1","volume-title":"2020 international conference on computer engineering, network, and intelligent multimedia (CENIM) (pp. 303-308)","author":"Maniriho P.","unstructured":"Maniriho, P., Niyigaba, E., Bizimana, Z., Twiringiyimana, V., Mahoro, L.J. and Ahmad, T., 2020, November. Anomaly-based intrusion detection approach for IoT networks using machine learning. In 2020 international conference on computer engineering, network, and intelligent multimedia (CENIM) (pp. 303-308). IEEE."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-020-03222-y"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.teler.2023.100053"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3182333"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103516"},{"key":"e_1_3_2_1_28_1","volume-title":"Intrusion Detection Tools and Techniques \u2013A Survey,\" International Journal of Computer Theory and Engineering","author":"Karthikeyan K. R.","unstructured":"Karthikeyan K. R. and A. Indra, \"Intrusion Detection Tools and Techniques \u2013A Survey,\" International Journal of Computer Theory and Engineering vol. 2, no. 6, pp. 901-906, 2010."},{"key":"e_1_3_2_1_29_1","volume-title":"Complex Event Processing for Object Tracking and Intrusion Detection in Wireless Sensor Networks,\" International Journal of Com-puter Theory and Engineering","author":"Bhargavi R.","unstructured":"Bhargavi R. and V. Vaidehi, \"Complex Event Processing for Object Tracking and Intrusion Detection in Wireless Sensor Networks,\" International Journal of Com-puter Theory and Engineering vol. 3, no. 3, pp. 435-439, 2011."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Maheyzah Md Siraj Mohd AizainiMaarof and Siti Zaiton Mohd Hashim \"A Hybrid Intelligent Approach for Automated Alert Clustering and Filtering in Intrusion Alert Analysis \" International Journal of Computer Theory and Engineering vol. 1 no. 5 pp. 539- 545 2009.","DOI":"10.7763\/IJCTE.2009.V1.87"},{"key":"e_1_3_2_1_31_1","first-page":"188","volume-title":"no. 2","author":"Swimpy Pahuja","year":"2013","unstructured":"Swimpy Pahuja and Anita Singhrova, \" Preventive Alternate Path Routing Algo-rithm against Intrusion in Sensor Area Network,\" international journal of computer theory and engineering vol. 5, no. 2, pp. 188-191, 2013."},{"key":"e_1_3_2_1_32_1","volume-title":"Udzir, \"A Naturally Inspired Statistical Intrusion Detection Model,\" International Journal of Computer Thery and Engineering","author":"Mahboubian I","unstructured":"M. Mahboubian and Nor I. Udzir, \"A Naturally Inspired Statistical Intrusion Detection Model,\" International Journal of Computer Thery and Engineering vol. 5, no. 3, pp. 578- 581, 2013."},{"key":"e_1_3_2_1_33_1","first-page":"374","volume-title":"no.5","author":"Sasanka Potluri","year":"2017","unstructured":"Sasanka Potluri and Christian Diedrich, \"Deep Feature Extraction for multi-Class Intrusion Detection in Industrial Control Systems,\" International Journal of Computer Theory and Engineering vol. 9, no.5, pp. 374-379 , 2017."},{"key":"e_1_3_2_1_34_1","first-page":"117","volume-title":"no. 3","author":"Bhavesh Bhuckory","year":"2023","unstructured":"Bhavesh Bhuckory and Sameerchand Pudaruth, \"A Multimodal IoT-Based Home Intrusion Detection System,\" International Journal of Computer Theory and Engineering vol. 15, no. 3, pp. 117-124, 2023."},{"key":"e_1_3_2_1_35_1","unstructured":"MariamIbrahim RubaElhafiz Modeling and intrusion detection using Recurrent neural networks"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Journal of Engineering Research11(2023)100013(ELSEVIER).","DOI":"10.1016\/j.jer.2023.100013"},{"key":"e_1_3_2_1_37_1","volume-title":"BAT: Deep Learning Methods on Network Intrusion Detection Using NSL-KDD Dataset","author":"Tongtong Su","year":"2020","unstructured":"Tongtong Su,\u00a0Huazhi Sun,\u00a0Jinqi Zhu;\u00a0Sheng Wang;Yabo Li, BAT: Deep Learning Methods on Network Intrusion Detection Using NSL-KDD Dataset, IEEEAccess2020."}],"event":{"name":"ICMLC 2024: 2024 16th International Conference on Machine Learning and Computing","location":"Shenzhen China","acronym":"ICMLC 2024"},"container-title":["Proceedings of the 2024 16th International Conference on Machine Learning and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3651671.3651673","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3651671.3651673","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T11:20:33Z","timestamp":1755861633000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3651671.3651673"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,2]]},"references-count":37,"alternative-id":["10.1145\/3651671.3651673","10.1145\/3651671"],"URL":"https:\/\/doi.org\/10.1145\/3651671.3651673","relation":{},"subject":[],"published":{"date-parts":[[2024,2,2]]},"assertion":[{"value":"2024-06-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}