{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:16:07Z","timestamp":1760955367732},"reference-count":83,"publisher":"Hindawi Limited","license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Applied Computational Intelligence and Soft Computing"],"published-print":{"date-parts":[[2012]]},"abstract":"<jats:p>In supervised learning-based classification, ensembles have been successfully employed to different application domains. In the literature, many researchers have proposed different ensembles by considering different combination methods, training datasets, base classifiers, and many other factors. Artificial-intelligence-(AI-) based techniques play prominent role in development of ensemble for intrusion detection (ID) and have many benefits over other techniques. However, there is no comprehensive review of ensembles in general and AI-based ensembles for ID to examine and understand their current research status to solve the ID problem. Here, an updated review of ensembles and their taxonomies has been presented in general. The paper also presents the updated review of various AI-based ensembles for ID (in particular) during last decade. The related studies of AI-based ensembles are compared by set of evaluation metrics driven from (1) architecture &amp; approach followed; (2) different methods utilized in different phases of ensemble learning; (3) other measures used to evaluate classification performance of the ensembles. The paper also provides the future directions of the research in this area. The paper will help the better understanding of different directions in which research of ensembles has been done in general and specifically: field of intrusion detection systems (IDSs).<\/jats:p>","DOI":"10.1155\/2012\/850160","type":"journal-article","created":{"date-parts":[[2012,9,12]],"date-time":"2012-09-12T22:03:50Z","timestamp":1347487430000},"page":"1-20","source":"Crossref","is-referenced-by-count":19,"title":["The Use of Artificial-Intelligence-Based Ensembles for Intrusion Detection: A Review"],"prefix":"10.1155","volume":"2012","author":[{"given":"Gulshan","family":"Kumar","sequence":"first","affiliation":[{"name":"Department of Computer Application, Shaheed Bhagat Singh State Technical Campus, Ferozepur, Punjab 152004, India"}]},{"given":"Krishan","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Computer Science & Engineering, Punjab Institute of Technology, Kapurthala, Punjab 144601, India"}]}],"member":"98","reference":[{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2010.03.006"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2009.03.001"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-010-9179-5"},{"key":"6","year":"2005"},{"key":"14","first-page":"262","volume":"3-4","year":"2000","journal-title":"ACM Transactions on Information and System Security"},{"key":"15","first-page":"44","volume":"1","year":"2010","journal-title":"International Journal of Information and Telecommunication"},{"key":"16","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1002\/sec.303","volume":"5","year":"2012","journal-title":"Security and Communication Networks"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/950191.950192"},{"key":"18","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1007\/3-540-45474-8_6","volume":"2212","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.001"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/34.824819"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2004.01.003"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.09.008"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2005.06.003"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.12.008"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-010-0012-4"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.02.102"},{"key":"36","first-page":"217","volume":"4","year":"2009","journal-title":"Journal of Information Assurance and Security"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2008.01.008"},{"issue":"2","key":"38","doi-asserted-by":"crossref","first-page":"101","DOI":"10.22452\/mjcs.vol21no2.3","volume":"21","year":"2008","journal-title":"Malaysian Journal of Computer Science"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.05.002"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-006-0002-5"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1002\/int.20203"},{"key":"44","first-page":"105","volume-title":"Distributed intrusion detection systems: a computational intelligence approach","year":"2005"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(00)00096-9"},{"key":"30","year":"2004"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2004.04.004"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1109\/34.58871"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-006-9449-2"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022859003006"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(01)00121-X"},{"key":"52","first-page":"206","volume":"14","year":"2003","journal-title":"Genome Informatics"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(02)00143-4"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2008.01.028"},{"issue":"1","key":"58","first-page":"105","volume":"36","year":"1999","journal-title":"Machine Learning"},{"key":"59","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007607513941"},{"key":"60","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.250609"},{"issue":"2","key":"61","first-page":"113","volume":"1","year":"2001","journal-title":"Journal of Machine Learning Research"},{"key":"62","doi-asserted-by":"publisher","DOI":"10.1109\/34.857004"},{"key":"64","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.01.022"},{"key":"66","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2009.07.017"},{"key":"69","series-title":"The Morgan Kaufmann Series in Data Management Systems","year":"2005"},{"key":"70","year":"2006"},{"key":"71","series-title":"Chapman & Hall\/CRC Machine Learning & Pattern Recognition","year":"2009"},{"key":"72","year":"2010"},{"key":"74","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(91)90094-L"},{"key":"75","first-page":"126","volume-title":"When networks disagree: ensemble methods for hybrid neural networks","year":"1993"},{"issue":"5","key":"76","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1109\/3468.618255","volume":"27","year":"1997","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics A"},{"key":"77","doi-asserted-by":"publisher","DOI":"10.1109\/21.155943"},{"issue":"2-3","key":"78","first-page":"103","volume":"29","year":"1997","journal-title":"Machine Learning"},{"key":"79","year":"2001"},{"key":"80","doi-asserted-by":"publisher","DOI":"10.1109\/21.364825"},{"key":"81","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(99)00012-4"},{"key":"82","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2009.12.012"},{"issue":"2","key":"83","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1016\/S0893-6080(05)80023-1","volume":"5","year":"1992","journal-title":"Neural Networks"},{"issue":"1","key":"84","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1008640732416","volume":"8","year":"1997","journal-title":"Journal of Intelligent Information Systems"},{"key":"85","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2004.06.019"},{"key":"86","doi-asserted-by":"publisher","DOI":"10.1186\/gb-2008-9-s1-s3"},{"key":"87","doi-asserted-by":"publisher","DOI":"10.1186\/gb-2008-9-s1-s6"},{"issue":"4","key":"89","first-page":"369","volume":"34","year":"1998","journal-title":"Kybernetika"},{"key":"91","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.03.027"},{"key":"92","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2006.01.003"},{"issue":"6","key":"94","doi-asserted-by":"crossref","first-page":"511","DOI":"10.3233\/IDA-2005-9602","volume":"9","year":"2005","journal-title":"Intelligent Data Analysis"},{"issue":"5","key":"95","doi-asserted-by":"crossref","first-page":"867","DOI":"10.1162\/neco.1995.7.5.867","volume":"7","year":"1995","journal-title":"Neural Computation"},{"key":"97","first-page":"31","volume":"3","year":"2008","journal-title":"IEEE Computational Intelligence Magazine"},{"key":"96","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69304-8_20"},{"key":"100","year":"2001"},{"key":"101","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"106","doi-asserted-by":"publisher","DOI":"10.1109\/72.363444"},{"issue":"1","key":"107","first-page":"451","volume":"26","year":"1998","journal-title":"The Annals of Statistics"},{"key":"109","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.05.020"},{"key":"110","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.08.025"},{"issue":"3","key":"111","doi-asserted-by":"crossref","first-page":"801","DOI":"10.1214\/aos\/1024691079","volume":"26","year":"1998","journal-title":"The Annals of Statistics"},{"key":"113","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.01.009"},{"issue":"6","key":"115","first-page":"1369","volume":"18","year":"2007","journal-title":"Journal of Software"},{"key":"116","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2007.914695"},{"key":"118","year":"1997"},{"key":"120","doi-asserted-by":"publisher","DOI":"10.1007\/BF00153759"},{"key":"57","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022631118932"},{"key":"67","first-page":"1","volume":"7","year":"2006","journal-title":"Journal of Machine Learning Research"},{"key":"93","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2011.06.014"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.3923\/itj.2011.648.655"}],"container-title":["Applied Computational Intelligence and Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2012\/850160.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2012\/850160.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2012\/850160.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T20:32:41Z","timestamp":1562185961000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.hindawi.com\/journals\/acisc\/2012\/850160\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"references-count":83,"alternative-id":["850160","850160"],"URL":"https:\/\/doi.org\/10.1155\/2012\/850160","relation":{},"ISSN":["1687-9724","1687-9732"],"issn-type":[{"value":"1687-9724","type":"print"},{"value":"1687-9732","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}