{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T13:12:51Z","timestamp":1766754771234,"version":"3.40.5"},"reference-count":51,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,10,24]],"date-time":"2020-10-24T00:00:00Z","timestamp":1603497600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Shiraz International School"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,10,24]]},"abstract":"<jats:p>The significant development of Internet applications over the past 10 years has resulted in the rising necessity for the information network to be secured. An intrusion detection system is a fundamental network infrastructure defense that must be able to adapt to the ever-evolving threat landscape and identify new attacks that have low false alarm. Researchers have developed several supervised as well as unsupervised methods from the data mining and machine learning disciplines so that anomalies can be detected reliably. As an aspect of machine learning, deep learning uses a neuron-like structure to learn tasks. A successful deep learning technique method is convolution neural network (CNN); however, it is presently not suitable to detect anomalies. It is easier to identify expected contents within the input flow in CNNs, whereas there are minor differences in the abnormalities compared to the normal content. This suggests that a particular method is required for identifying such minor changes. It is expected that CNNs would learn the features that form the characteristic of the content of an image (flow) rather than variations that are unrelated to the content. Hence, this study recommends a new CNN architecture type known as mean convolution layer (CNN-MCL) that was developed for learning the anomalies\u2019 content features and then identifying the particular abnormality. The recommended CNN-MCL helps in designing a strong network intrusion detection system that includes an innovative form of convolutional layer that can teach low-level abnormal characteristics. It was observed that assessing the proposed model on the CICIDS2017 dataset led to favorable results in terms of real-world application regarding detecting anomalies that are highly accurate and have low false-alarm rate as opposed to other best models.<\/jats:p>","DOI":"10.1155\/2020\/8891185","type":"journal-article","created":{"date-parts":[[2020,10,24]],"date-time":"2020-10-24T18:50:09Z","timestamp":1603565409000},"page":"1-16","source":"Crossref","is-referenced-by-count":24,"title":["A Mean Convolutional Layer for Intrusion Detection System"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4596-0964","authenticated-orcid":true,"given":"Leila","family":"Mohammadpour","sequence":"first","affiliation":[{"name":"Department of Computer System & Technology, Faculty of Computer Science & Information Technology, University of Malaya, W. Persekutuan Kuala Lumpur 50603, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1225-7941","authenticated-orcid":true,"given":"T.C.","family":"Ling","sequence":"additional","affiliation":[{"name":"Department of Computer System & Technology, Faculty of Computer Science & Information Technology, University of Malaya, W. Persekutuan Kuala Lumpur 50603, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3217-3523","authenticated-orcid":true,"given":"C.S.","family":"Liew","sequence":"additional","affiliation":[{"name":"Department of Computer System & Technology, Faculty of Computer Science & Information Technology, University of Malaya, W. Persekutuan Kuala Lumpur 50603, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8361-8441","authenticated-orcid":true,"given":"Alihossein","family":"Aryanfar","sequence":"additional","affiliation":[{"name":"Department of Computer System & Technology, Faculty of Computer Science & Information Technology, University of Malaya, W. Persekutuan Kuala Lumpur 50603, Malaysia"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.05.029"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.07.044"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.024"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2863036"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/tse.1987.232894"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.neubiorev.2017.01.002"},{"key":"7","first-page":"55","article-title":"A deep learning approach for intrusion detection system in industry network","volume":"2343","author":"A. Hijazi","year":"2018","journal-title":"CEUR Workshop Proceedings"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2904620"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2973023"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2917299"},{"first-page":"313","article-title":"Method of intrusion detection using deep neural network","author":"J. Kim","key":"11"},{"first-page":"1","article-title":"Deep learning in intrusion detection System\u202f: an overview","author":"M. Erza","key":"12"},{"first-page":"108","article-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization","author":"I. Sharafaldin","key":"13"},{"first-page":"21","article-title":"A deep learning approach for network intrusion detection system","author":"A. Javaid","key":"14"},{"first-page":"258","article-title":"Deep learning approach for network intrusion detection in software defined networking","author":"T. A. Tang","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/access.2017.2762418"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2018.05.050"},{"first-page":"195","article-title":"Toward an online anomaly intrusion detection system based on deep learning","author":"K. Alrawashdeh","key":"19"},{"first-page":"317","article-title":"Analyzing flow-based anomaly intrusion detection using Replicator Neural Networks","author":"C. G. Cordero","key":"20"},{"author":"M. J. Kang","key":"21","article-title":"A novel intrusion detection method using deep neural network for in-vehicle network security"},{"key":"22","first-page":"141","article-title":"Collective anomaly detection based on long short-term memory recurrent neural networks","volume-title":"Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)","author":"L. Bontemps","year":"2016"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.3390\/s16101701"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.03.028"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2019.2927886"},{"first-page":"712","article-title":"Malware traffic classification using convolutional neural network for representation learning","author":"W. Wang","key":"26"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2972627"},{"first-page":"273","article-title":"Intrusion detection based on convolutional neural network","author":"W. F. Zheng","key":"28"},{"first-page":"74","article-title":"An improved convolutional neural network model for intrusion detection in networks","author":"R. U. Khan","key":"29"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.09.038"},{"article-title":"Improving neural networks by preventing co-adaptation of feature detectors","year":"2012","author":"G. E. Hinton","key":"31"},{"key":"32","first-page":"818","article-title":"Visualizing and understanding convolutional networks","volume-title":"Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)","author":"M. D. Zeiler","year":"2014"},{"author":"K. Simonyan","key":"33","article-title":"Very deep convolutional networks for large-scale image recognition"},{"key":"34","first-page":"111","article-title":"Efficient backprop in neural networks: tricks of the trade","volume-title":"Lecture Notes in Computer Science","author":"Y. LeCun","year":"1998"},{"first-page":"257","article-title":"Adaptive subgradient methods for online learning and stochastic optimization","author":"J. Duchi","key":"35"},{"article-title":"ADADELTA: an adaptive learning rate method","year":"2012","author":"M. D. Zeiler","key":"36"},{"issue":"176","key":"37","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1093\/nq\/s4-VII.176.416d","article-title":"Gnats V. Mosquitoes","volume":"s4-VII","year":"1871","journal-title":"Notes Queries"},{"first-page":"1","article-title":"An evaluation framework for intrusion detection dataset","author":"A. Gharib","key":"38"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1109\/mcse.2007.55"},{"first-page":"50","article-title":"A convolutional neural network for network intrusion detection system","author":"L. Mohammadpour","key":"40"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.2352\/issn.2470-1173.2017.7.mwsf-328"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"article-title":"Going deeper with convolutions","year":"2014","author":"C. Szegedy","key":"43"},{"first-page":"1026","article-title":"Delving deep into rectifiers: surpassing human-level performance on imagenet classification","author":"K. He","key":"44"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"author":"D. A. Clevert","key":"46","article-title":"Fast and accurate deep network learning by exponential linear units (ELUs)"},{"first-page":"448","article-title":"Batch normalization: accelerating deep network training by reducing internal covariate shift","author":"S. Ioffe","key":"47"},{"key":"48","first-page":"2825","article-title":"Scikit-learn: machine learning in Python","volume":"12","author":"F. Pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"article-title":"TensorFlow: large-scale machine learning on heterogeneous distributed systems","year":"2016","author":"M. Abadi","key":"49"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1145\/2627534.2627557"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2018.2825953"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8891185.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8891185.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8891185.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,24]],"date-time":"2020-10-24T18:50:15Z","timestamp":1603565415000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8891185\/"}},"subtitle":[],"editor":[{"given":"Tom","family":"Chen","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,10,24]]},"references-count":51,"alternative-id":["8891185","8891185"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8891185","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2020,10,24]]}}}