{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T05:54:43Z","timestamp":1761630883363,"version":"3.40.5"},"reference-count":47,"publisher":"SAGE Publications","issue":"10","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"name":"Wenzhou-Kean University, Wenzhou, Zhejiang, China."}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2019,10]]},"abstract":"<jats:p> A false alarm rate of online anomaly-based intrusion detection system is a crucial concern. It is challenging to implement in the real-world scenarios when these anomalies occur sporadically. The existing intrusion detection system has been developed to limit or decrease the false alarm rate. However, the state-of-the-art approaches are attack or algorithm specific, which is not generic. In this article, a soft-computing-based approach has been designed to reduce the false-positive rate for hierarchical data of anomaly-based intrusion detection system. The recurrent neural network model is applied to classify the data set of intrusion detection system and normal instances for various subclasses. The designed approach is more practical, reason being, it does not require any assumption or knowledge of the data set structure. Experimental evaluation is conducted on various attacks on KDDCup\u201999 and NSL-KDD data sets. The proposed method enhances the intrusion detection systems that can work with data with dependent and independent features. Furthermore, this approach is also beneficial for real-life scenarios with a low occurrence of attacks. <\/jats:p>","DOI":"10.1177\/1550147719883132","type":"journal-article","created":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T06:56:42Z","timestamp":1571813802000},"page":"155014771988313","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":12,"title":["Soft-computing-based false alarm reduction for hierarchical data of intrusion detection system"],"prefix":"10.1177","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0750-6309","authenticated-orcid":false,"given":"Parminder","family":"Singh","sequence":"first","affiliation":[{"name":"Lovely Professional University, Phagwara, India"}]},{"given":"Sujatha","family":"Krishnamoorthy","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Wenzhou-Kean University, Wenzhou, China"}]},{"given":"Anand","family":"Nayyar","sequence":"additional","affiliation":[{"name":"Duy Tan University, Da Nang, Vietnam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8759-0290","authenticated-orcid":false,"given":"Ashish Kr","family":"Luhach","sequence":"additional","affiliation":[{"name":"The Papua New Guinea University of Technology, Lae, Papua New Guinea"}]},{"given":"Avinash","family":"Kaur","sequence":"additional","affiliation":[{"name":"Lovely Professional University, Phagwara, India"}]}],"member":"179","published-online":{"date-parts":[[2019,10,23]]},"reference":[{"key":"bibr1-1550147719883132","unstructured":"Scarfone K, Mell P. Guide to intrusion detection and prevention systems (IDPS). Technical report, National Institute of Standards and Technology, Gaithersburg, MD, 2012."},{"key":"bibr2-1550147719883132","doi-asserted-by":"publisher","DOI":"10.1080\/18756891.2012.733205"},{"first-page":"259","volume-title":"Proceedings 14th annual computer security applications conference (Cat. No. 98Ex217)","author":"Ghosh AK","key":"bibr3-1550147719883132"},{"key":"bibr4-1550147719883132","doi-asserted-by":"publisher","DOI":"10.1109\/32.372146"},{"first-page":"428","volume-title":"20th annual computer security applications conference","author":"Tombini E","key":"bibr5-1550147719883132"},{"volume-title":"First international conference on availability, reliability and security (ARES\u201906)","author":"Zhang J","key":"bibr6-1550147719883132"},{"key":"bibr8-1550147719883132","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.E92.B.1981"},{"key":"bibr9-1550147719883132","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.08.066"},{"first-page":"281","volume-title":"International symposium on statistical learning and data sciences","author":"Smith J","key":"bibr10-1550147719883132"},{"first-page":"243","volume-title":"Pacific-Asia conference on knowledge discovery and data mining","author":"Robinson J","key":"bibr11-1550147719883132"},{"key":"bibr12-1550147719883132","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0152173"},{"first-page":"74","volume-title":"2016 3rd national foundation for science and technology development conference on information and computer science (NICS)","author":"Nguyen XN","key":"bibr13-1550147719883132"},{"key":"bibr14-1550147719883132","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-016-0344-y"},{"key":"bibr16-1550147719883132","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.02.001"},{"key":"bibr17-1550147719883132","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2895957"},{"key":"bibr18-1550147719883132","doi-asserted-by":"crossref","unstructured":"Aggarwal CC. Outlier analysis (Data mining). Cham: Springer, 2015, pp.237\u2013263.","DOI":"10.1007\/978-3-319-14142-8_8"},{"key":"bibr19-1550147719883132","doi-asserted-by":"publisher","DOI":"10.2200\/S00573ED1V01Y201403DMK008"},{"first-page":"226","volume-title":"International workshop on recent advances in intrusion detection","author":"Wang K","key":"bibr20-1550147719883132"},{"first-page":"1","volume-title":"2015 IEEE international conference on advanced networks and telecommunications systems (ANTS)","author":"Swarnkar M","key":"bibr21-1550147719883132"},{"first-page":"203","volume-title":"International workshop on recent advances in intrusion detection","author":"Wang K","key":"bibr22-1550147719883132"},{"key":"bibr23-1550147719883132","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2006.10.017"},{"first-page":"530","volume-title":"International conference on neural information processing","author":"Michlovsk\u00fd Z","key":"bibr24-1550147719883132"},{"key":"bibr26-1550147719883132","first-page":"419","volume":"2","author":"Lodhi H","year":"2002","journal-title":"J Mach Learn Res"},{"key":"bibr27-1550147719883132","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47578-3_1"},{"key":"bibr28-1550147719883132","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.11.011"},{"key":"bibr29-1550147719883132","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.01.002"},{"key":"bibr30-1550147719883132","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2005.06.003"},{"key":"bibr31-1550147719883132","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2008.01.008"},{"key":"bibr32-1550147719883132","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-010-0175-9"},{"key":"bibr33-1550147719883132","doi-asserted-by":"publisher","DOI":"10.1023\/B:MACH.0000033116.57574.95"},{"first-page":"23","volume-title":"Proceedings of the second international conference on information and communication technology for competitive strategies","author":"Batra I","key":"bibr36-1550147719883132"},{"first-page":"21","volume-title":"Proceedings of the 9th EAI international conference on bio-inspired information and communications technologies (formerly BIONETICS)","author":"Javaid A","key":"bibr37-1550147719883132"},{"first-page":"258","volume-title":"2016 international conference on wireless networks and mobile communications (WINCOM)","author":"Tang TA","key":"bibr38-1550147719883132"},{"key":"bibr39-1550147719883132","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-010-0487-0"},{"key":"bibr40-1550147719883132","volume":"344","author":"Kaufman L","year":"2009","journal-title":"Finding groups in data: an introduction to cluster analysis"},{"first-page":"313","volume-title":"International symposium on abstraction, reformulation, and approximation","author":"Wu F","key":"bibr41-1550147719883132"},{"first-page":"67","volume-title":"IFIP international conference on trust management","author":"Gal-Oz N","key":"bibr42-1550147719883132"},{"key":"bibr43-1550147719883132","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-934613-64-4.50011-6"},{"key":"bibr44-1550147719883132","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056489"},{"first-page":"1","volume-title":"2009 IEEE symposium on computational intelligence for security and defense applications","author":"Tavallaee M","key":"bibr46-1550147719883132"},{"issue":"12","key":"bibr47-1550147719883132","first-page":"1848","volume":"2","author":"Revathi S","year":"2013","journal-title":"Int J Eng Res Tech"},{"first-page":"1","volume-title":"2017 open conference of electrical, electronic and information sciences (eStream)","author":"Paulauskas N","key":"bibr48-1550147719883132"},{"issue":"2","key":"bibr49-1550147719883132","first-page":"235","volume":"10","author":"Bhattacharjee PS","year":"2017","journal-title":"Adv Comput Sci Tech"},{"key":"bibr50-1550147719883132","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.04.019"},{"key":"bibr51-1550147719883132","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/16.5.412"},{"first-page":"92","volume-title":"2015 international conference on signal processing and communication engineering systems","author":"Ingre B","key":"bibr53-1550147719883132"},{"key":"bibr54-1550147719883132","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147719883132","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147719883132","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147719883132","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T06:57:01Z","timestamp":1571813821000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147719883132"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":47,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2019,10,23]]},"published-print":{"date-parts":[[2019,10]]}},"alternative-id":["10.1177\/1550147719883132"],"URL":"https:\/\/doi.org\/10.1177\/1550147719883132","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2019,10]]}}}