{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T19:48:45Z","timestamp":1767988125389,"version":"3.49.0"},"reference-count":53,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2023,2,24]],"date-time":"2023-02-24T00:00:00Z","timestamp":1677196800000},"content-version":"vor","delay-in-days":54,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020YFB1805400"],"award-info":[{"award-number":["2020YFB1805400"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2021YFB3100700"],"award-info":[{"award-number":["2021YFB3100700"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1836112"],"award-info":[{"award-number":["U1836112"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61876134"],"award-info":[{"award-number":["61876134"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Intelligent Systems"],"published-print":{"date-parts":[[2023,1]]},"abstract":"<jats:p>Intrusion detection systems are crucial in fighting against various network attacks. By monitoring the network behavior in real time, possible attack attempts can be detected and acted upon. However, with the development of openness and flexibility of networks, artificial immunity\u2010based network anomaly detection methods lack continuous adaptability and hence have poor detection performance. Thus, a novel framework for network anomaly detection with adaptive regulation is built in this paper. First, a heuristic dimensionality reduction algorithm based on unsupervised clustering is proposed. This algorithm uses the correlation between features to select the best subset. Then, a hybrid partitioning strategy is introduced in the negative selection algorithm (NSA), which divides the feature space into a grid based on the sample distribution density and generates specific candidate detectors in the boundary grid to effectively mitigate the holes caused by boundary diversity. Finally, the NSA is improved by self\u2010set clustering and a novel gray wolf optimizer to achieve adaptive adjustment of the detector radius and position. The results show that the proposed NSA algorithm based on mixed hierarchical division and gray wolf optimization (MDGWO\u2010NSA) achieves a higher detection rate, lower false alarm rate, and better generation quality than other network anomaly detection algorithms.<\/jats:p>","DOI":"10.1155\/2023\/8980876","type":"journal-article","created":{"date-parts":[[2023,2,24]],"date-time":"2023-02-24T14:50:22Z","timestamp":1677250222000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["A Modified Gray Wolf Optimizer\u2010Based Negative Selection Algorithm for Network Anomaly Detection"],"prefix":"10.1155","volume":"2023","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3456-3464","authenticated-orcid":false,"given":"Geying","family":"Yang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8085-1312","authenticated-orcid":false,"given":"Lina","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1376-2720","authenticated-orcid":false,"given":"Rongwei","family":"Yu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7040-2425","authenticated-orcid":false,"given":"Junjiang","family":"He","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3334-6150","authenticated-orcid":false,"given":"Bo","family":"Zeng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5994-6069","authenticated-orcid":false,"given":"Tian","family":"Wu","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2023,2,24]]},"reference":[{"key":"e_1_2_9_1_2","doi-asserted-by":"crossref","unstructured":"KwonD. NatarajanK. SuhS. andKimH. An empirical study on network anomaly detection using convolutional neural networks Proceedings of the IEEE 38th International Conference on Distributed Computing Systems (ICDCS) July 2018 Vienna Austria IEEE 1595\u20131598.","DOI":"10.1109\/ICDCS.2018.00178"},{"key":"e_1_2_9_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.03.028"},{"key":"e_1_2_9_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.06.013"},{"key":"e_1_2_9_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.09.013"},{"key":"e_1_2_9_5_2","doi-asserted-by":"crossref","unstructured":"ForrestS. PerelsonA. AllenL. andCherukuriR. Self-nonself discrimination in a computer Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy May 1994 Oakland CA USA 202\u2013212.","DOI":"10.1109\/RISP.1994.296580"},{"key":"e_1_2_9_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2014.11.001"},{"key":"e_1_2_9_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.11.030"},{"key":"e_1_2_9_8_2","doi-asserted-by":"crossref","unstructured":"YuX. FuD. YangT. andRihaK. The application of negative selection algorithm in multi-angle infrared vehicle images recognition Proceedings of the 38th International Conference on Telecommunications and Signal Processing (TSP) July 2015 Prague Czech Republic 776\u2013780.","DOI":"10.1109\/TSP.2015.7296371"},{"key":"e_1_2_9_9_2","doi-asserted-by":"publisher","DOI":"10.38094\/jastt1224"},{"key":"e_1_2_9_10_2","doi-asserted-by":"crossref","unstructured":"HadriA. ChougdaliK. andTouahniR. Intrusion detection system using PCA and Fuzzy PCA techniques Proceedings of the 2016 International Conference on Advanced Communication Systems and Information Security (ACOSIS) February 2016 Marrakesh Morocco 1\u20137.","DOI":"10.1109\/ACOSIS.2016.7843930"},{"key":"e_1_2_9_11_2","doi-asserted-by":"crossref","unstructured":"BenaddiH. IbrahimiK. andBenslimaneA. Improving the intrusion detection system for NSL-KDD dataset based on PCA-fuzzy clustering-KNN Proceedings of the 2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM) January 2018 Marrakesh Morocco 1\u20136.","DOI":"10.1109\/WINCOM.2018.8629718"},{"key":"e_1_2_9_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.06.005"},{"key":"e_1_2_9_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102164"},{"key":"e_1_2_9_14_2","first-page":"660","article-title":"Efficient feature selection technique for network intrusion detection system using discrete differential evolution and decision","volume":"19","author":"Popoola E.","year":"2017","journal-title":"International Journal on Network Security"},{"key":"e_1_2_9_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/tc.2016.2519914"},{"key":"e_1_2_9_16_2","doi-asserted-by":"crossref","unstructured":"MishraP. PilliE. VaradharajanV. andTupakulaU. Out-vm monitoring for malicious network packet detection in cloud Proceedings of the 2017 ISEA Asia Security and Privacy (ISEASP) January 2017 Surat India 1\u201310.","DOI":"10.1109\/ISEASP.2017.7976995"},{"key":"e_1_2_9_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2883142"},{"key":"e_1_2_9_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04396-2"},{"key":"e_1_2_9_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-014-0599-9"},{"key":"e_1_2_9_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.03.031"},{"key":"e_1_2_9_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2015.12.014"},{"key":"e_1_2_9_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2012.01.004"},{"key":"e_1_2_9_23_2","first-page":"611","article-title":"Dual negative selection algorithm","volume":"43","author":"Zheng X.","year":"2013","journal-title":"China Information"},{"key":"e_1_2_9_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.01.011"},{"key":"e_1_2_9_25_2","doi-asserted-by":"publisher","DOI":"10.1515\/phys-2017-0013"},{"key":"e_1_2_9_26_2","doi-asserted-by":"crossref","unstructured":"ZhangF. YangJ. LiT. andZhuF. DnyNSA: a novel real-value based negative selection algorithm Proceedings of the IEEE Symposium Series on Computational Intelligence (SSCI) November 2018 Bangalore India 1104\u20131109.","DOI":"10.1109\/SSCI.2018.8628680"},{"key":"e_1_2_9_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.12.016"},{"key":"e_1_2_9_28_2","article-title":"A negative selection algorithm based on hierarchical clustering of self set","volume":"43","author":"Chen W.","year":"2013","journal-title":"China Information"},{"key":"e_1_2_9_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2013.10.018"},{"key":"e_1_2_9_30_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2017.09.005"},{"key":"e_1_2_9_31_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107726"},{"key":"e_1_2_9_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.08.062"},{"key":"e_1_2_9_33_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2016.08.014"},{"key":"e_1_2_9_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2017.2753851"},{"key":"e_1_2_9_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.107477"},{"key":"e_1_2_9_36_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.1205438"},{"key":"e_1_2_9_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcyb.2015.2444435"},{"key":"e_1_2_9_38_2","first-page":"258","article-title":"K-nearest neighbors optimized clustering algorithm by fast search and finding the density peaks of a dataset","volume":"46","author":"Xie J.","year":"2016","journal-title":"Science China Information Sciences"},{"key":"e_1_2_9_39_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.1242072"},{"key":"e_1_2_9_40_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2013.12.007"},{"key":"e_1_2_9_41_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88079-0_2"},{"key":"e_1_2_9_42_2","doi-asserted-by":"publisher","DOI":"10.1023\/a:1026195112518"},{"key":"e_1_2_9_43_2","first-page":"287","article-title":"Real-valued negative selection algorithm with variable-sized detectors","author":"Ji Z.","year":"2004","journal-title":"Genetic and Evolutionary Computation Conference"},{"key":"e_1_2_9_44_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107726"},{"key":"e_1_2_9_45_2","first-page":"446","article-title":"A study on NSL-KDD dataset for intrusion detection system based on classification algorithms","volume":"4","author":"Dhanabal L.","year":"2015","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"key":"e_1_2_9_46_2","doi-asserted-by":"crossref","unstructured":"MoustafaN.andSlayJ. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) Proceedings of the 2015 Military Communications and Information Systems Conference (MilCIS) November 2015 Canberra ACT Australia 1\u20136.","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"e_1_2_9_47_2","first-page":"187","article-title":"Evaluating the CIC IDS-2017 dataset using machine learning methods and creating multiple predictive models in the statistical computing language R","volume":"5","author":"Pelletier Z.","year":"2020","journal-title":"Science"},{"key":"e_1_2_9_48_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.04.011"},{"key":"e_1_2_9_49_2","doi-asserted-by":"crossref","unstructured":"WuP. GuoH. andMoustafaN. Pelican: a deep residual network for network intrusion detection Proceedings of the 2020 50th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W) June 2020 Valencia Spain 55\u201362.","DOI":"10.1109\/DSN-W50199.2020.00018"},{"key":"e_1_2_9_50_2","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-020-00379-6"},{"key":"e_1_2_9_51_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115524"},{"key":"e_1_2_9_52_2","doi-asserted-by":"crossref","unstructured":"BelgranaF. BenamraneN. HamaidaM. ChaabaniA. andTaleb-AhmedA. Network intrusion detection system using neural network and condensed nearest neighbors with selection of NSL-KDD influencing features Proceedings of the 2020 IEEE International Conference on Internet of Things and Intelligence System (IoTaIS) January 2021 Bali Indonesia 23\u201329.","DOI":"10.1109\/IoTaIS50849.2021.9359689"},{"key":"e_1_2_9_53_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-33-6173-7_7"}],"container-title":["International Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijis\/2023\/8980876.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijis\/2023\/8980876.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2023\/8980876","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T05:15:56Z","timestamp":1735622156000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2023\/8980876"}},"subtitle":[],"editor":[{"given":"Yu-An","family":"Tan","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2023,1]]},"references-count":53,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["10.1155\/2023\/8980876"],"URL":"https:\/\/doi.org\/10.1155\/2023\/8980876","archive":["Portico"],"relation":{},"ISSN":["0884-8173","1098-111X"],"issn-type":[{"value":"0884-8173","type":"print"},{"value":"1098-111X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1]]},"assertion":[{"value":"2022-09-02","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-10-07","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-02-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"8980876"}}