{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T04:34:00Z","timestamp":1776400440104,"version":"3.51.2"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T00:00:00Z","timestamp":1672790400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T00:00:00Z","timestamp":1672790400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Nowadays, cloud computing provides easy access to a set of variable and configurable computing resources based on user demand through the network. Cloud computing services are available through common internet protocols and network standards. In addition to the unique benefits of cloud computing, insecure communication and attacks on cloud networks cannot be ignored. There are several techniques for dealing with network attacks. To this end, network anomaly detection systems are widely used as an effective countermeasure against network anomalies. The anomaly-based approach generally learns normal traffic patterns in various ways and identifies patterns of anomalies. Network anomaly detection systems have gained much attention in intelligently monitoring network traffic using machine learning methods. This paper presents an efficient model based on autoencoders for anomaly detection in cloud computing networks. The autoencoder learns a basic representation of the normal data and its reconstruction with minimum error. Therefore, the reconstruction error is used as an anomaly or classification metric. In addition, to detecting anomaly data from normal data, the classification of anomaly types has also been investigated. We have proposed a new approach by examining an autoencoder\u2019s anomaly detection method based on data reconstruction error. Unlike the existing autoencoder-based anomaly detection techniques that consider the reconstruction error of all input features as a single value, we assume that the reconstruction error is a vector. This enables our model to use the reconstruction error of every input feature as an anomaly or classification metric. We further propose a multi-class classification structure to classify the anomalies. We use the CIDDS-001 dataset as a commonly accepted dataset in the literature. Our evaluations show that the performance of the proposed method has improved considerably compared to the existing ones in terms of accuracy, recall, false-positive rate, and F1-score metrics.<\/jats:p>","DOI":"10.1186\/s42400-022-00134-9","type":"journal-article","created":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T03:02:42Z","timestamp":1672801362000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":132,"title":["Practical autoencoder based anomaly detection by using vector reconstruction error"],"prefix":"10.1186","volume":"6","author":[{"given":"Hasan","family":"Torabi","sequence":"first","affiliation":[]},{"given":"Seyedeh Leili","family":"Mirtaheri","sequence":"additional","affiliation":[]},{"given":"Sergio","family":"Greco","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,4]]},"reference":[{"issue":"4","key":"134_CR1","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I et al (2010) A view of cloud computing. Commun ACM 53(4):50\u201358","journal-title":"Commun ACM"},{"issue":"1","key":"134_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-021-00092-8","volume":"4","author":"S Sagar","year":"2021","unstructured":"Sagar S, Keke C (2021) Confidential machine learning on untrusted platforms: a survey. Cybersecurity 4(1):1\u201319","journal-title":"Cybersecurity"},{"issue":"1","key":"134_CR3","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MPOT.2013.2279684","volume":"33","author":"MN Sadiku","year":"2014","unstructured":"Sadiku MN, Musa SM, Momoh OD (2014) Cloud computing: opportunities and challenges. IEEE Potent 33(1):34\u201336","journal-title":"IEEE Potent"},{"key":"134_CR4","doi-asserted-by":"crossref","unstructured":"Popa L, Kumar G, Chowdhury M, Krishnamurthy A, Ratnasamy S, Stoica I (2012) Faircloud: sharing the network in cloud computing. In: Proceedings of the ACM SIGCOMM 2012 conference on applications, technologies, architectures, and protocols for computer communication, pp 187\u2013198","DOI":"10.1145\/2377677.2377717"},{"key":"134_CR5","unstructured":"Gupta R (2012) Above the clouds: a view of cloud computing"},{"issue":"2","key":"134_CR6","doi-asserted-by":"publisher","first-page":"108","DOI":"10.34306\/itsdi.v1i2.103","volume":"1","author":"T Alam","year":"2020","unstructured":"Alam T (2020) Cloud computing and its role in the information technology. IAIC Trans Sustain Digital Innov (ITSDI) 1(2):108\u2013115","journal-title":"IAIC Trans Sustain Digital Innov (ITSDI)"},{"issue":"1","key":"134_CR7","first-page":"52","volume":"14","author":"NH Hussein","year":"2016","unstructured":"Hussein NH, Khalid A (2016) A survey of cloud computing security challenges and solutions. Int J Comput Sci Inf Secur 14(1):52","journal-title":"Int J Comput Sci Inf Secur"},{"key":"134_CR8","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.comnet.2018.12.009","volume":"150","author":"JB Hong","year":"2019","unstructured":"Hong JB, Nhlabatsi A, Kim DS, Hussein A, Fetais N, Khan KM (2019) Systematic identification of threats in the cloud: a survey. Comput Netw 150:46\u201369","journal-title":"Comput Netw"},{"issue":"3","key":"134_CR9","doi-asserted-by":"publisher","first-page":"927","DOI":"10.3390\/s22030927","volume":"22","author":"A Ometov","year":"2022","unstructured":"Ometov A, Molua OL, Komarov M, Nurmi J (2022) A survey of security in cloud, edge, and fog computing. Sensors 22(3):927","journal-title":"Sensors"},{"key":"134_CR10","first-page":"35","volume":"19","author":"GS Alijani","year":"2014","unstructured":"Alijani GS, Fulk HK, Omar A, Tulsi R (2014) Cloud computing effects on small business. Entrep Execut 19:35","journal-title":"Entrep Execut"},{"issue":"3","key":"134_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3501297","volume":"55","author":"J Soldani","year":"2022","unstructured":"Soldani J, Brogi A (2022) Anomaly detection and failure root cause analysis in (micro) service-based cloud applications: a survey. ACM Comput Surv (CSUR) 55(3):1\u201339","journal-title":"ACM Comput Surv (CSUR)"},{"key":"134_CR12","doi-asserted-by":"crossref","unstructured":"Yasarathna TL, Munasinghe L (2020) Anomaly detection in cloud network data. In: 2020 International research conference on smart computing and systems engineering (SCSE). IEEE, pp 62\u201367","DOI":"10.1109\/SCSE49731.2020.9313014"},{"issue":"1","key":"134_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-021-00103-8","volume":"5","author":"RA Disha","year":"2022","unstructured":"Disha RA, Waheed S (2022) Performance analysis of machine learning models for intrusion detection system using gini impurity-based weighted random forest (giwrf) feature selection technique. Cybersecurity 5(1):1\u201322","journal-title":"Cybersecurity"},{"key":"134_CR14","doi-asserted-by":"crossref","unstructured":"Islam MS, Miranskyy A (2020) Anomaly detection in cloud components. In: 2020 IEEE 13th international conference on cloud computing (CLOUD). IEEE, pp 1\u20133","DOI":"10.1109\/CLOUD49709.2020.00008"},{"key":"134_CR15","unstructured":"Ring M, Wunderlich S, Gr\u00fcdl D, Landes D, Hotho A (2017) Flow-based benchmark data sets for intrusion detection. In: Proceedings of the 16th European conference on cyber warfare and security. ACPI, pp 361\u2013369"},{"key":"134_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107647","volume":"184","author":"KN Qureshi","year":"2021","unstructured":"Qureshi KN, Jeon G, Piccialli F (2021) Anomaly detection and trust authority in artificial intelligence and cloud computing. Comput Netw 184:107647","journal-title":"Comput Netw"},{"key":"134_CR17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.56801\/rebicte.v3i.28","volume":"3","author":"BA Tama","year":"2017","unstructured":"Tama BA, Rhee K-H (2017) Attack classification analysis of iot network via deep learning approach. Res Briefs Inf Commun Technol Evol (ReBICTE) 3:1\u20139","journal-title":"Res Briefs Inf Commun Technol Evol (ReBICTE)"},{"key":"134_CR18","doi-asserted-by":"crossref","unstructured":"Althubiti SA, Jones EM, Roy K (2018) Lstm for anomaly-based network intrusion detection. In: 2018 28th international telecommunication networks and applications conference (ITNAC). IEEE, pp 1\u20133","DOI":"10.1109\/ATNAC.2018.8615300"},{"key":"134_CR19","doi-asserted-by":"crossref","unstructured":"Rashid A, Siddique MJ, Ahmed SM (2020) Machine and deep learning based comparative analysis using hybrid approaches for intrusion detection system. In: 2020 3rd international conference on advancements in computational sciences (ICACS). IEEE, pp 1\u20139","DOI":"10.1109\/ICACS47775.2020.9055946"},{"key":"134_CR20","doi-asserted-by":"crossref","unstructured":"Fenanir S, Semchedine F, Harous S, Baadache A (2020) A semi-supervised deep auto-encoder based intrusion detection for iot. Ing\u00e9nierie des Syst\u00e8mes d\u2019Information 25(5)","DOI":"10.18280\/isi.250503"},{"issue":"3","key":"134_CR21","doi-asserted-by":"publisher","first-page":"924","DOI":"10.1109\/TNSM.2019.2927886","volume":"16","author":"S Garg","year":"2019","unstructured":"Garg S, Kaur K, Kumar N, Kaddoum G, Zomaya AY, Ranjan R (2019) A hybrid deep learning-based model for anomaly detection in cloud datacenter networks. IEEE Trans Netw Serv Manag 16(3):924\u2013935","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"134_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107784","volume":"186","author":"M Ge","year":"2021","unstructured":"Ge M, Syed NF, Fu X, Baig Z, Robles-Kelly A (2021) Towards a deep learning-driven intrusion detection approach for internet of things. Comput Netw 186:107784","journal-title":"Comput Netw"},{"key":"134_CR23","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1016\/j.procs.2017.12.091","volume":"125","author":"A Verma","year":"2018","unstructured":"Verma A, Ranga V (2018) Statistical analysis of cidds-001 dataset for network intrusion detection systems using distance-based machine learning. Procedia Comput Sci 125:709\u2013716","journal-title":"Procedia Comput Sci"},{"key":"134_CR24","doi-asserted-by":"crossref","unstructured":"Albahar MA, Binsawad M, Almalki J, El-etriby S, Karali S (2020) Improving intrusion detection system using artificial neural network. Int J Adv Comput Sci Appl 11(6)","DOI":"10.14569\/IJACSA.2020.0110670"},{"key":"134_CR25","doi-asserted-by":"publisher","first-page":"108346","DOI":"10.1109\/ACCESS.2020.3001350","volume":"8","author":"S Zavrak","year":"2020","unstructured":"Zavrak S, Skefiyeli M (2020) Anomaly-based intrusion detection from network flow features using variational autoencoder. IEEE Access 8:108346\u2013108358","journal-title":"IEEE Access"},{"issue":"4","key":"134_CR26","doi-asserted-by":"publisher","first-page":"1674","DOI":"10.3390\/app11041674","volume":"11","author":"N Oliveira","year":"2021","unstructured":"Oliveira N, Pra\u00e7a I, Maia E, Sousa O (2021) Intelligent cyber attack detection and classification for network-based intrusion detection systems. Appl Sci 11(4):1674","journal-title":"Appl Sci"},{"issue":"11","key":"134_CR27","doi-asserted-by":"publisher","first-page":"155014772097151","DOI":"10.1177\/1550147720971517","volume":"16","author":"X Tao","year":"2020","unstructured":"Tao X, Kong K, Zhao F, Cheng S, Wang S (2020) An efficient method for network security situation assessment. Int J Distrib Sens Netw 16(11):1550147720971517","journal-title":"Int J Distrib Sens Netw"},{"key":"134_CR28","unstructured":"Hinton GE, Zemel R (1993) Autoencoders, minimum description length and helmholtz free energy. Adv Neural Inf Process Syst 6"},{"issue":"4","key":"134_CR29","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/BF00332918","volume":"59","author":"H Bourlard","year":"1988","unstructured":"Bourlard H, Kamp Y (1988) Auto-association by multilayer perceptrons and singular value decomposition. Biol Cybern 59(4):291\u2013294","journal-title":"Biol Cybern"},{"key":"134_CR30","doi-asserted-by":"crossref","unstructured":"Sakurada M, Yairi T (2014) Anomaly detection using autoencoders with nonlinear dimensionality reduction. In: Proceedings of the MLSDA 2014 2nd workshop on machine learning for sensory data analysis, pp 4\u201311","DOI":"10.1145\/2689746.2689747"},{"key":"134_CR31","unstructured":"Ring M, Wunderlich S, Gruedl D, Landes D, Hotho A (2017) Technical report cidds-001 data set. J Inf Warfare 13"},{"issue":"7825","key":"134_CR32","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1038\/s41586-020-2649-2","volume":"585","author":"CR Harris","year":"2020","unstructured":"Harris CR, Millman KJ, Van Der Walt SJ, Gommers R, Virtanen P, Cournapeau D, Wieser E, Taylor J, Berg S, Smith NJ et al (2020) Array programming with numpy. Nature 585(7825):357\u2013362","journal-title":"Nature"},{"key":"134_CR33","unstructured":"McKinney W (2015) Pandas, python data analysis library. http:\/\/pandas.pydata.org"},{"key":"134_CR34","doi-asserted-by":"crossref","unstructured":"Akiba T, Sano S, Yanase T, Ohta T, Koyama M (2019) Optuna: a next-generation hyperparameter optimization framework. In: Proceedings of the 25th ACM SIGKDD international conference on knowledge discovery & data mining, pp 2623\u20132631","DOI":"10.1145\/3292500.3330701"},{"key":"134_CR35","unstructured":"Paszke A, Gross S, Massa F, Lerer A, Bradbury J, Chanan G, Killeen T, Lin Z, Gimelshein N, Antiga L et al (2019) Pytorch: an imperative style, high-performance deep learning library. Adv Neural Inf Process Syst 32"},{"key":"134_CR36","doi-asserted-by":"crossref","unstructured":"Bisong E (2019) Building machine learning and deep learning models on google cloud platform. Springer","DOI":"10.1007\/978-1-4842-4470-8"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-022-00134-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-022-00134-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-022-00134-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:09:08Z","timestamp":1701648548000},"score":1,"resource":{"primary":{"URL":"https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-022-00134-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,4]]},"references-count":36,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["134"],"URL":"https:\/\/doi.org\/10.1186\/s42400-022-00134-9","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,4]]},"assertion":[{"value":"10 August 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 December 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 January 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"1"}}