{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T16:09:08Z","timestamp":1776182948347,"version":"3.50.1"},"reference-count":80,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T00:00:00Z","timestamp":1693267200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T00:00:00Z","timestamp":1693267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100023674","name":"Deanship of Scientific Research, King Khalid University","doi-asserted-by":"crossref","award":["R.G.P.1\/188\/41"],"award-info":[{"award-number":["R.G.P.1\/188\/41"]}],"id":[{"id":"10.13039\/501100023674","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The growth of cloud computing is hindered by concerns about privacy and security. Despite the widespread use of network intrusion detection systems (NIDS), the issue of false positives remains prevalent. Furthermore, few studies have approached the intrusion detection problem as a time series issue, requiring time series modeling. In this study, we propose a novel technique for the early detection of intrusions in cloud computing using time series data. Our approach involves a method for Feature Selection (FS) and a prediction model based on the Facebook Prophet model to assess its efficiency. The FS method we propose is a collaborative feature selection model that integrates time series analysis techniques with anomaly detection, stationary, and causality tests. This approach specifically addresses the challenge of misleading connections between time series anomalies and attacks. Our results demonstrate a significant reduction in predictors employed in our prediction model, from 70 to 10 predictors, while improving performance metrics such as Mean Absolute Error (MAE), Mean Squared Error (MSE), Root Mean Squared Error (RMSE), Mean Absolute Percentage Error (MAPE), Median Absolute Percentage Error (MdAPE), and Dynamic Time Warping (DTW). Furthermore, our approach has resulted in reduced training, prediction, and cross-validation times of approximately 85%, 15%, and 97%, respectively. Although memory consumption remains similar, the utilization time has been significantly reduced, resulting in substantial resource usage reduction. Overall, our study presents a comprehensive methodology for effective early detection of intrusions in cloud computing based on time series anomalies, employing a collaborative feature selection model and the Facebook Prophet prediction model. Our findings highlight the efficiency and performance improvements achieved through our approach, contributing to the advancement of intrusion detection techniques in the context of cloud computing security.<\/jats:p>","DOI":"10.1186\/s13677-023-00491-x","type":"journal-article","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T12:02:01Z","timestamp":1693310521000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":87,"title":["Intrusion detection in cloud computing based on time series anomalies utilizing machine learning"],"prefix":"10.1186","volume":"12","author":[{"given":"Abdel-Rahman","family":"Al-Ghuwairi","sequence":"first","affiliation":[]},{"given":"Yousef","family":"Sharrab","sequence":"additional","affiliation":[]},{"given":"Dimah","family":"Al-Fraihat","sequence":"additional","affiliation":[]},{"given":"Majed","family":"AlElaimat","sequence":"additional","affiliation":[]},{"given":"Ayoub","family":"Alsarhan","sequence":"additional","affiliation":[]},{"given":"Abdulmohsen","family":"Algarni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,29]]},"reference":[{"issue":"4","key":"491_CR1","first-page":"31","volume":"2","author":"S Singh","year":"2014","unstructured":"Singh S, Saxena K, Khan Z (2014) Intrusion detection based on artificial intelligence techniques. Int J Comput Sci Trends Technol 2(4):31\u201335","journal-title":"Int J Comput Sci Trends Technol"},{"key":"491_CR2","doi-asserted-by":"crossref","unstructured":"Kene SG, Theng DP (2015), February A review on intrusion detection techniques for cloud computing and security challenges. In 2015 2nd International Conference on Electronics and Communication Systems (ICECS), 227\u2013232, IEEE","DOI":"10.1109\/ECS.2015.7124898"},{"key":"491_CR3","doi-asserted-by":"crossref","unstructured":"Heidari A, Jabraeil Jamali MA, Navimipour J, N., Akbarpour S (2020) Internet of things offloading: ongoing issues, opportunities, and future challenges. Int J Commun Syst, 33(14), e4474","DOI":"10.1002\/dac.4474"},{"key":"491_CR4","doi-asserted-by":"crossref","unstructured":"Gon\u00e7alves, F., Ribeiro, B., Gama, O., Santos, A., Costa, A., Dias, B., \u2026 Nicolau,M. J. (2019, October). A systematic review on intelligent intrusion detection systems for VANETs. In 2019 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 1\u201310, IEEE","DOI":"10.1109\/ICUMT48472.2019.8970942"},{"key":"491_CR5","doi-asserted-by":"crossref","unstructured":"Mahalakshmi G, Sridevi S, Rajaram S (2016), January A survey on forecasting of time series data. In 2016 International Conference on Computing Technologies and Intelligent Data Engineering (ICCTIDE\u201916), 1\u20138, IEEE","DOI":"10.1109\/ICCTIDE.2016.7725358"},{"key":"491_CR6","doi-asserted-by":"crossref","unstructured":"Zouhair C, Abghour N, Moussaid K, El Omri A, Rida M (2018) A review of intrusion detection systems in cloud computing. Secur Priv Smart Sens Networks, 253\u2013283","DOI":"10.4018\/978-1-5225-5736-4.ch012"},{"key":"491_CR7","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.isatra.2020.11.030","volume":"112","author":"C Zhao","year":"2021","unstructured":"Zhao C, Liu X, Zhong S, Shi K, Liao D, Zhong Q (2021) Secure consensus of multi-agent systems with redundant signal and communication interference via distributed dynamic event-triggered control. ISA Trans 112:89\u201398","journal-title":"ISA Trans"},{"issue":"1","key":"491_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40537-019-0278-0","volume":"7","author":"JL Leevy","year":"2020","unstructured":"Leevy JL, Khoshgoftaar TM (2020) A survey and analysis of intrusion detection models based on cse-cic-ids2018 big data. J Big Data 7(1):1\u201319","journal-title":"J Big Data"},{"key":"491_CR9","doi-asserted-by":"crossref","first-page":"54776","DOI":"10.1109\/ACCESS.2020.2980942","volume":"8","author":"GT Reddy","year":"2020","unstructured":"Reddy GT, Reddy MPK, Lakshmanna K, Kaluri R, Rajput DS, Srivastava G, Baker T (2020) Analysis of dimensionality reduction techniques on big data. IEEE Access 8:54776\u201354788","journal-title":"IEEE Access"},{"issue":"6","key":"491_CR10","doi-asserted-by":"crossref","first-page":"1046","DOI":"10.3390\/sym12061046","volume":"12","author":"O Almomani","year":"2020","unstructured":"Almomani O (2020) A feature selection model for network intrusion detection system based on PSO, GWO, FFA and GA algorithms. Symmetry 12(6):1046","journal-title":"Symmetry"},{"key":"491_CR11","doi-asserted-by":"crossref","unstructured":"Samadi Bonab M, Ghaffari A, Soleimanian Gharehchopogh F, Alemi P (2020) A wrapper-based feature selection for improving performance of intrusion detection systems. Int J Commun Syst, 33(12), e4434","DOI":"10.1002\/dac.4434"},{"key":"491_CR12","doi-asserted-by":"crossref","unstructured":"Torabi M, Udzir NI, Abdullah MT, Yaakob R (2021) A review on feature selection and ensemble techniques for intrusion detection system. Int J Adv Comput Sci Appl, 12(5)","DOI":"10.14569\/IJACSA.2021.0120566"},{"key":"491_CR13","doi-asserted-by":"crossref","first-page":"104216","DOI":"10.1016\/j.engappai.2021.104216","volume":"101","author":"M Di Mauro","year":"2021","unstructured":"Di Mauro M, Galatro G, Fortino G, Liotta A (2021) Supervised feature selection techniques in network intrusion detection: a critical review. Eng Appl Artif Intell 101:104216","journal-title":"Eng Appl Artif Intell"},{"key":"491_CR14","doi-asserted-by":"crossref","unstructured":"Al-Fraihat D, Alzaidi M, Joy M (2023) Why do consumers adopt smart voice assistants for shopping purposes? A perspective from complexity theory. Intell Syst Appl 18:200230","DOI":"10.1016\/j.iswa.2023.200230"},{"issue":"2","key":"491_CR15","doi-asserted-by":"crossref","first-page":"1303","DOI":"10.11591\/ijece.v11i2.pp1303-1310","volume":"11","author":"YO Sharrab","year":"2021","unstructured":"Sharrab YO, Alsmirat M, Hawashin B, Sarhan N (2021) Machine learning-based energy consumption modeling and comparing of H. 264 and Google VP8 encoders. Int J Electr Comput Eng (IJECE) 11(2):1303\u20131310","journal-title":"Int J Electr Comput Eng (IJECE)"},{"key":"491_CR16","doi-asserted-by":"crossref","unstructured":"Alsarhan A, Alauthman M, Alshdaifat EA, Al-Ghuwairi AR, Al-Dubai A (2021) Machine learning-driven optimization for SVM-based intrusion detection system in vehicular ad hoc networks. J Ambient Intell Humaniz Comput, 1\u201310","DOI":"10.1007\/s12652-021-02963-x"},{"key":"491_CR17","doi-asserted-by":"crossref","first-page":"3129","DOI":"10.1007\/s11277-020-07797-y","volume":"117","author":"A Alsarhan","year":"2021","unstructured":"Alsarhan A, Al-Ghuwairi AR, Almalkawi IT, Alauthman M, Al-Dubai A (2021) Machine learning-driven optimization for intrusion detection in smart vehicular networks. Wireless Pers Commun 117:3129\u20133152","journal-title":"Wireless Pers Commun"},{"issue":"1","key":"491_CR18","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.jnca.2012.09.004","volume":"36","author":"HJ Liao","year":"2013","unstructured":"Liao HJ, Lin CHR, Lin YC, Tung KY (2013) Intrusion detection system: a comprehensive review. J Netw Comput Appl 36(1):16\u201324","journal-title":"J Netw Comput Appl"},{"key":"491_CR19","doi-asserted-by":"crossref","unstructured":"Albasheer H, Md Siraj M, Mubarakali A, Elsier Tayfour O, Salih S, Hamdan M, Kamarudeen S (2022) Cyber-attack prediction based on network intrusion detection systems for alert correlation techniques: a survey. Sensors 22(4):1494","DOI":"10.3390\/s22041494"},{"issue":"1","key":"491_CR20","doi-asserted-by":"crossref","first-page":"173","DOI":"10.3390\/electronics9010173","volume":"9","author":"A Khraisat","year":"2020","unstructured":"Khraisat A, Gondal I, Vamplew P, Kamruzzaman J, Alazab A (2020) Hybrid intrusion detection system based on the stacking ensemble of c5 decision tree classifier and one class support vector machine. Electronics 9(1):173","journal-title":"Electronics"},{"issue":"1\u20132","key":"491_CR21","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P Garcia-Teodoro","year":"2009","unstructured":"Garcia-Teodoro P, Diaz-Verdejo J, Maci\u00e1-Fern\u00e1ndez G, V\u00e1zquez E (2009) Anomaly-based network intrusion detection: techniques, systems and challenges. computers & security 28(1\u20132):18\u201328","journal-title":"computers & security"},{"issue":"2","key":"491_CR22","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1109\/JAS.2020.1003527","volume":"8","author":"Z Liu","year":"2020","unstructured":"Liu Z, Zheng R, Lu W, Xu S (2020) Using event-based method to estimate cybersecurity equilibrium. IEEE\/CAA J Automatica Sinica 8(2):455\u2013467","journal-title":"IEEE\/CAA J Automatica Sinica"},{"issue":"1","key":"491_CR23","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1080\/00031305.2017.1380080","volume":"72","author":"SJ Taylor","year":"2018","unstructured":"Taylor SJ, Letham B (2018) Forecasting at scale. Am Stat 72(1):37\u201345","journal-title":"Am Stat"},{"key":"491_CR24","doi-asserted-by":"crossref","unstructured":"Pokharel P, Sigdel S, Pokhrel R, Joshi B (2019), November Time Series Based Pattern Recognition for Anomaly Detection from System Audit Logs. In 2019 Artificial Intelligence for Transforming Business and Society (AITB) (Vol.\u00a01, pp.\u00a01\u20136). IEEE","DOI":"10.1109\/AITB48515.2019.8947448"},{"issue":"1","key":"491_CR25","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/j.ijinfomgt.2017.07.008","volume":"38","author":"E Raguseo","year":"2018","unstructured":"Raguseo E (2018) Big data technologies: an empirical investigation on their adoption, benefits and risks for companies. Int J Inf Manag 38(1):187\u2013195","journal-title":"Int J Inf Manag"},{"issue":"3","key":"491_CR26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv (CSUR) 41(3):1\u201358","journal-title":"ACM Comput Surv (CSUR)"},{"key":"491_CR27","unstructured":"Analytics A (2020) Anomaly detection toolkit. URL https:\/\/adtk.readthedocs.io\/en\/stable"},{"issue":"9","key":"491_CR28","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MCOM.2015.7263368","volume":"53","author":"A Ali","year":"2015","unstructured":"Ali A, Hamouda W, Uysal M (2015) Next generation M2M cellular networks: challenges and practical considerations. IEEE Commun Mag 53(9):18\u201324","journal-title":"IEEE Commun Mag"},{"key":"491_CR29","doi-asserted-by":"crossref","unstructured":"Chatfield C, Xing H (2019) The analysis of time series: an introduction with R. CRC press","DOI":"10.1201\/9781351259446"},{"key":"491_CR30","unstructured":"Jagreet Kaur. Anomaly detection with time series forecasting: Complete guide (2022) https:\/\/www.xenonstack.com\/blog\/time-series-deep-learning"},{"issue":"17","key":"491_CR31","doi-asserted-by":"crossref","first-page":"4751","DOI":"10.1002\/sec.1647","volume":"9","author":"AA Ramaki","year":"2016","unstructured":"Ramaki AA, Atani RE (2016) A survey of IT early warning systems: architectures, challenges, and solutions. Secur Communication Networks 9(17):4751\u20134776","journal-title":"Secur Communication Networks"},{"issue":"1","key":"491_CR32","first-page":"257","volume":"10","author":"YP Faniband","year":"2021","unstructured":"Faniband YP, Shaahid SM (2021) Univariate Time Series Prediction of wind speed with a case study of Yanbu, Saudi Arabia. Int J 10(1):257\u2013264","journal-title":"Int J"},{"key":"491_CR33","unstructured":"Faniband YP, Ishak I, Sait SM (2022) A review of open source software tools for time series analysis. arXiv preprint arXiv:2203.05195"},{"key":"491_CR34","unstructured":"Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., \u2026Duchesnay, E. (2011). Scikit-learn: Machine learning in Python. the Journal of machine Learning research, 12, 2825\u20132830"},{"key":"491_CR35","unstructured":"Brownlee J (2020) How to check if Time Series Data is stationary with Python.[online]. Machine Learning Mastery"},{"key":"491_CR36","unstructured":"Hmamouche Y, Casali A, Lakhal L (2017), May A causality based feature selection approach for multivariate time series forecasting. In DBKDA 2017, The Ninth International Conference on Advances in Databases, Knowledge, and Data Applications"},{"key":"491_CR37","doi-asserted-by":"crossref","unstructured":"Benaddi H, Ibrahimi K, Benslimane A, Qadir J (2020) A deep reinforcement learning based intrusion detection system (drl-ids) for securing wireless sensor networks and internet of things. In Wireless Internet: 12th EAI International Conference, WiCON 2019, TaiChung, Taiwan, November 26\u201327, 2019, Proceedings 12 (73\u201387). Springer International Publishing","DOI":"10.1007\/978-3-030-52988-8_7"},{"key":"491_CR38","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1016\/j.knosys.2014.08.013","volume":"71","author":"E De la Hoz","year":"2014","unstructured":"De la Hoz E, De La Hoz E, Ortiz A, Ortega J, Mart\u00ednez-\u00c1lvarez A (2014) Feature selection by multi-objective optimisation: application to network anomaly detection by hierarchical self-organising maps. Knowl Based Syst 71:322\u2013338","journal-title":"Knowl Based Syst"},{"key":"491_CR39","doi-asserted-by":"crossref","unstructured":"Pushpam CA, Jayanthi JG (2020), July Methodical Survey on IDS with Feature Selection. In 2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA), 606\u2013613, IEEE","DOI":"10.1109\/ICIRCA48905.2020.9182962"},{"key":"491_CR40","doi-asserted-by":"crossref","first-page":"1693","DOI":"10.1007\/s11517-019-01978-z","volume":"57","author":"Q Wang","year":"2019","unstructured":"Wang Q, Zhao D, Wang Y, Hou X (2019) Ensemble learning algorithm based on multi-parameters for sleep staging. Med Biol Eng Comput 57:1693\u20131707","journal-title":"Med Biol Eng Comput"},{"issue":"1","key":"491_CR41","first-page":"314","volume":"125","author":"N Naheed","year":"2020","unstructured":"Naheed N, Shaheen M, Khan SA, Alawairdhi M, Khan MA (2020) Importance of features selection, attributes selection, challenges and future directions for medical imaging data: a review. Comput Model Eng Sci 125(1):314\u2013344","journal-title":"Comput Model Eng Sci"},{"issue":"1","key":"491_CR42","first-page":"3","volume":"19","author":"B Venkatesh","year":"2019","unstructured":"Venkatesh B, Anuradha J (2019) A review of feature selection and its methods. Cybern Inf Technol 19(1):3\u201326","journal-title":"Cybern Inf Technol"},{"key":"491_CR43","doi-asserted-by":"crossref","unstructured":"Bhattacharyya DK, Kalita JK (2013) Network anomaly detection: a machine learning perspective. CRC Press","DOI":"10.1201\/b15088"},{"key":"491_CR44","unstructured":"Singh A, Singh Y, Singh R (2013) Improving efficiency and accuracy of classification and clustering of a text documents with feature selection. Int J Eng Res Technol (IJERT) 1(2)"},{"issue":"1","key":"491_CR45","doi-asserted-by":"crossref","first-page":"26","DOI":"10.22619\/IJCSA.2020.100132","volume":"5","author":"O Oladimeji","year":"2020","unstructured":"Oladimeji O, Olayemi BK, Alese AO, Adetunmbi, Aladesote Olomi Isaiah (2020) Evaluation of selected stacked Ensemble Models for the optimal multi-class Cyber-Attacks Detection. Int J Cyber Situational Aware 5(1):26\u201348","journal-title":"Int J Cyber Situational Aware"},{"issue":"1","key":"491_CR46","doi-asserted-by":"crossref","first-page":"299","DOI":"10.14445\/22315381\/IJETT-V70I1P235","volume":"70","author":"K Bouzoubaa","year":"2022","unstructured":"Bouzoubaa K, Taher Y, Nsiri B (2022) DOS-DDOS attacks Predicting: performance comparison of the Main feature selection strategies. Int J Eng Trends Technol 70(1):299\u2013312","journal-title":"Int J Eng Trends Technol"},{"key":"491_CR47","doi-asserted-by":"crossref","unstructured":"Belkhouja T, Yan Y, Doppa JR (2022) Dynamic time warping based Adversarial Framework for Time-Series Domain. IEEE Trans Pattern Anal Mach Intell.","DOI":"10.1109\/TPAMI.2022.3224754"},{"issue":"3","key":"491_CR48","doi-asserted-by":"crossref","first-page":"378","DOI":"10.3390\/e24030378","volume":"24","author":"H Otneim","year":"2022","unstructured":"Otneim H, Berentsen GD, Tj\u00f8stheim D (2022) Local lead\u2013lag Relationships and Nonlinear Granger causality: an empirical analysis. Entropy 24(3):378","journal-title":"Entropy"},{"issue":"7","key":"491_CR49","doi-asserted-by":"crossref","first-page":"8453","DOI":"10.1007\/s10489-022-03911-8","volume":"53","author":"Y Wang","year":"2023","unstructured":"Wang Y, Yu Z, Zhu L (2023) Intrusion detection for high-speed railways based on unsupervised anomaly detection models. Appl Intell 53(7):8453\u20138466","journal-title":"Appl Intell"},{"key":"491_CR50","doi-asserted-by":"crossref","unstructured":"Chen Z, Peng Z, Zou X, Sun H (2022), January Deep learning based anomaly detection for muti-dimensional time series: A survey. In Cyber Security: 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20\u201321, 2021, Revised Selected Papers, 71\u201392. Singapore: Springer Nature Singapore","DOI":"10.1007\/978-981-16-9229-1_5"},{"issue":"1","key":"491_CR51","doi-asserted-by":"crossref","first-page":"35","DOI":"10.5267\/j.dsl.2021.10.001","volume":"11","author":"T Purwandari","year":"2022","unstructured":"Purwandari T, Zahroh S, Hidayat Y, Sukonob S, Mamat M, Saputra J (2022) Forecasting model of COVID-19 pandemic in Malaysia: an application of time series approach using neural network. Decis Sci Lett 11(1):35\u201342","journal-title":"Decis Sci Lett"},{"key":"491_CR52","doi-asserted-by":"crossref","first-page":"107841","DOI":"10.1016\/j.compeleceng.2022.107841","volume":"100","author":"Z Wang","year":"2022","unstructured":"Wang Z, Guo Y, Montgomery D (2022) Machine learning-based algorithmically generated domain detection. Comput Electr Eng 100:107841","journal-title":"Comput Electr Eng"},{"issue":"6","key":"491_CR53","doi-asserted-by":"crossref","first-page":"2151","DOI":"10.3390\/en15062151","volume":"15","author":"N Shao","year":"2022","unstructured":"Shao N, Chen Y (2022) Abnormal data detection and identification method of distribution internet of things Monitoring Terminal based on Spatiotemporal correlation. Energies 15(6):2151","journal-title":"Energies"},{"key":"491_CR54","doi-asserted-by":"crossref","unstructured":"Blanco R, Pedro M, Juan C, Jos\u00e9 M (2018) Multiclass network attack classifier using CNN tuned with genetic algorithms. In 28th International Symposium on Power and Timing Modeling, Optimization and Simulation (PATMOS), 177\u2013182. IEEE","DOI":"10.1109\/PATMOS.2018.8463997"},{"key":"491_CR55","doi-asserted-by":"crossref","unstructured":"Zhou H, Kang L, Pan H, Wei G, Feng Y (2022) An intrusion detection approach based on incremental long short-term memory. Int J Inf Secur, 1\u201314","DOI":"10.1007\/s10207-022-00632-4"},{"issue":"3","key":"491_CR56","doi-asserted-by":"crossref","first-page":"829","DOI":"10.1007\/s40998-022-00498-1","volume":"46","author":"A Ghorbani","year":"2022","unstructured":"Ghorbani A, Fakhrahmad SM (2022) A deep learning approach to network intrusion detection using a proposed supervised sparse auto-encoder and svm. Iran J Sci Technol Trans Electr Eng 46(3):829\u2013846","journal-title":"Iran J Sci Technol Trans Electr Eng"},{"issue":"12","key":"491_CR57","doi-asserted-by":"crossref","first-page":"9310","DOI":"10.1109\/JIOT.2021.3130434","volume":"9","author":"X Zhou","year":"2021","unstructured":"Zhou X, Liang W, Li W, Yan K, Shimizu S, Kevin I, Wang K (2021) Hierarchical adversarial attacks against graph-neural-network-based IoT network intrusion detection system. IEEE Internet of Things Journal 9(12):9310\u20139319","journal-title":"IEEE Internet of Things Journal"},{"issue":"8","key":"491_CR58","doi-asserted-by":"crossref","first-page":"5790","DOI":"10.1109\/TII.2020.3047675","volume":"17","author":"X Zhou","year":"2020","unstructured":"Zhou X, Liang W, Shimizu S, Ma J, Jin Q (2020) Siamese neural network based few-shot learning for anomaly detection in industrial cyber-physical systems. IEEE Trans Industr Inf 17(8):5790\u20135798","journal-title":"IEEE Trans Industr Inf"},{"issue":"9","key":"491_CR59","doi-asserted-by":"crossref","first-page":"6503","DOI":"10.1109\/TII.2021.3139363","volume":"18","author":"L Qi","year":"2021","unstructured":"Qi L, Yang Y, Zhou X, Rafique W, Ma J (2021) Fast anomaly identification based on multiaspect data streams for intelligent intrusion detection toward secure industry 4.0. IEEE Trans Industr Inf 18(9):6503\u20136511","journal-title":"IEEE Trans Industr Inf"},{"issue":"8","key":"491_CR60","doi-asserted-by":"crossref","first-page":"5087","DOI":"10.1109\/TII.2021.3116085","volume":"18","author":"W Liang","year":"2021","unstructured":"Liang W, Hu Y, Zhou X, Pan Y, Kevin I, Wang K (2021) Variational few-shot learning for microservice-oriented intrusion detection in distributed industrial IoT. IEEE Trans Industr Inf 18(8):5087\u20135095","journal-title":"IEEE Trans Industr Inf"},{"key":"491_CR61","doi-asserted-by":"crossref","unstructured":"Wei Y, Wu F (2022) A Self-adaptive Intrusion Detection Model Based on Bi-LSTM-CRF with Historical Access Logs. In Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery: Proceedings of the ICNC-FSKD 2021 17 (pp.\u00a0185\u2013197). Springer International Publishing","DOI":"10.1007\/978-3-030-89698-0_20"},{"issue":"19","key":"491_CR62","doi-asserted-by":"crossref","first-page":"7396","DOI":"10.3390\/s22197396","volume":"22","author":"TI Toma","year":"2022","unstructured":"Toma TI, Choi S (2022) A parallel Cross Convolutional recurrent neural network for Automatic Imbalanced ECG Arrhythmia detection with continuous Wavelet Transform. Sensors 22(19):7396","journal-title":"Sensors"},{"issue":"3","key":"491_CR63","doi-asserted-by":"crossref","first-page":"2125","DOI":"10.1007\/s10586-021-03388-z","volume":"25","author":"R Ahmad","year":"2022","unstructured":"Ahmad R, Alsmadi I, Alhamdani W, Tawalbeh LA (2022) Towards building data analytics benchmarks for IoT intrusion detection. Cluster Comput 25(3):2125\u20132141","journal-title":"Cluster Comput"},{"issue":"1","key":"491_CR64","doi-asserted-by":"crossref","first-page":"206","DOI":"10.3390\/s23010206","volume":"23","author":"EH Salman","year":"2022","unstructured":"Salman EH, Taher MA, Hammadi YI, Mahmood OA, Muthanna A, Koucheryavy A (2022) An anomaly intrusion detection for high-density internet of things Wireless Communication Network Based Deep Learning Algorithms. Sensors 23(1):206","journal-title":"Sensors"},{"key":"491_CR65","doi-asserted-by":"crossref","unstructured":"Kim MS, Shin JH, Hong CS (2022), September Network Intrusion Detection System using 2D Anomaly Detection. In 2022 23rd Asia-Pacific Network Operations and Management Symposium (APNOMS), 1\u20134. IEEE","DOI":"10.23919\/APNOMS56106.2022.9919904"},{"key":"491_CR66","doi-asserted-by":"crossref","first-page":"101685","DOI":"10.1016\/j.phycom.2022.101685","volume":"52","author":"T Gaber","year":"2022","unstructured":"Gaber T, El-Ghamry A, Hassanien AE (2022) Injection attack detection using machine learning for smart IoT applications. Phys Communication 52:101685","journal-title":"Phys Communication"},{"key":"491_CR67","doi-asserted-by":"publisher","unstructured":"Moustafa N, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). Military Communications and Information Systems Conference (MilCIS), Canberra, ACT, Australia, 1\u20136, doi: https:\/\/doi.org\/10.1109\/MilCIS.2015.7348942","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"491_CR68","doi-asserted-by":"crossref","unstructured":"Z\u00e4ngerle D, Schiereck D (2022) Modelling and predicting enterprise-level cyber risks in the context of sparse data availability. The Geneva Papers on Risk and Insurance-Issues and Practice, 1\u201329","DOI":"10.1057\/s41288-022-00282-6"},{"key":"491_CR69","doi-asserted-by":"crossref","unstructured":"Pietrantuono R, Ficco M, Palmieri F (2023) Testing the resilience of MEC-based IoT applications against resource exhaustion attacks. IEEE Trans Dependable Secur Comput.","DOI":"10.1109\/TDSC.2023.3263137"},{"key":"491_CR70","first-page":"103124","volume":"65","author":"Z Zeng","year":"2022","unstructured":"Zeng Z, Peng W, Zeng D, Zeng C, Chen Y (2022) Intrusion detection framework based on causal reasoning for DDoS. J Inform Secur Appl 65:103124","journal-title":"J Inform Secur Appl"},{"key":"491_CR71","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1007\/978-981-19-7660-5_62","volume-title":"Intelligent Sustainable Systems: selected Papers of WorldS4 2022, volume 1","author":"K Ali","year":"2023","unstructured":"Ali K, Alzaidi M, Al-Fraihat D, Elamir AM (2023) Artificial Intelligence: benefits, application, ethical issues, and organizational responses. Intelligent Sustainable Systems: selected Papers of WorldS4 2022, volume 1. Springer Nature Singapore, Singapore, pp 685\u2013702"},{"key":"491_CR72","doi-asserted-by":"crossref","first-page":"1075","DOI":"10.1016\/j.neucom.2022.06.002","volume":"500","author":"M Pawlicki","year":"2022","unstructured":"Pawlicki M, Kozik R, Chora\u015b M (2022) A survey on neural networks for (cyber-) security and (cyber-) security of neural networks. Neurocomputing 500:1075\u20131087","journal-title":"Neurocomputing"},{"key":"491_CR73","doi-asserted-by":"crossref","unstructured":"Yusof NNM, Sulaiman NS (2022), August Cyber attack detection dataset: A review. In Journal of Physics: Conference Series (Vol.\u00a02319, No. 1, p.\u00a0012029). IOP Publishing","DOI":"10.1088\/1742-6596\/2319\/1\/012029"},{"key":"491_CR74","doi-asserted-by":"crossref","first-page":"108768","DOI":"10.1016\/j.asoc.2022.108768","volume":"121","author":"E Mushtaq","year":"2022","unstructured":"Mushtaq E, Zameer A, Umer M, Abbasi AA (2022) A two-stage intrusion detection system with auto-encoder and LSTMs. Appl Soft Comput 121:108768","journal-title":"Appl Soft Comput"},{"issue":"5","key":"491_CR75","doi-asserted-by":"crossref","first-page":"937","DOI":"10.1080\/01605682.2021.1892464","volume":"73","author":"D Koutsandreas","year":"2022","unstructured":"Koutsandreas D, Spiliotis E, Petropoulos F, Assimakopoulos V (2022) On the selection of forecasting accuracy measures. J Oper Res Soc 73(5):937\u2013954","journal-title":"J Oper Res Soc"},{"key":"491_CR76","doi-asserted-by":"crossref","unstructured":"Albasheer, H., Md Siraj, M., Mubarakali, A., Elsier Tayfour, O., Salih, S., Hamdan,M., \u2026 Kamarudeen, S. (2022). Cyber-attack prediction based on network intrusion detection systems for alert correlation techniques: a survey. Sensors, 22(4), 1494","DOI":"10.3390\/s22041494"},{"key":"491_CR77","doi-asserted-by":"crossref","unstructured":"Marappan R, Bhaskaran S (2022) Movie recommendation system modeling using machine learning. Int J Math Eng Biol Appl Comput, 12\u201316","DOI":"10.31586\/ijmebac.2022.291"},{"key":"491_CR78","doi-asserted-by":"crossref","unstructured":"Kotenko I, Gaifulina D, Zelichenok I (2022) Systematic literature review of security event correlation methods. IEEE Access.","DOI":"10.1109\/ACCESS.2022.3168976"},{"key":"491_CR79","doi-asserted-by":"crossref","unstructured":"Staroletov S, Chudov R (2022), November An Anomaly Detection and Network Filtering System for Linux Based on Kohonen Maps and Variable-order Markov Chains. In 2022 32nd Conference of Open Innovations Association (FRUCT) (pp.\u00a0280\u2013290). IEEE","DOI":"10.23919\/FRUCT56874.2022.9953860"},{"key":"491_CR80","unstructured":"Miel Verkerken. Miel verkerken \/ ids dataset cleaning \u00c2\u00b7 gitlab https:\/\/gitlab.ilabt.imec.be\/mverkerk\/ids-dataset-cleaning"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00491-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-023-00491-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00491-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T12:14:41Z","timestamp":1700223281000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-023-00491-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,29]]},"references-count":80,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["491"],"URL":"https:\/\/doi.org\/10.1186\/s13677-023-00491-x","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,29]]},"assertion":[{"value":"15 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 July 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 August 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"127"}}