{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T21:06:39Z","timestamp":1771103199853,"version":"3.50.1"},"reference-count":70,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,1,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Although cloud computing is considered the most widespread technology nowadays, it still suffers from many challenges, especially related to its security. Due to the open and distributed nature of the cloud environment, this makes the cloud itself vulnerable to various attacks. In this paper, the design of a novel integrated Cloud-based Intrusion Detection System (CIDS) is proposed to immunise the cloud against any possible attacks. The proposed CIDS consists of five main modules to do the following actions: monitoring the network, capturing the traffic flows, extracting features, analyzing the flows, detecting intrusions, taking a reaction, and logging all activities. Furthermore an enhanced bagging ensemble system of three deep learning models is utilized to predict intrusions effectively. Moreover, a third-party Cloud-based Intrusion Detection System Service (CIDSS) is also exploited to control the proposed CIDS and provide the reporting service. Finally, it has been shown that the proposed approach overcomes all problems associated with attacks on the cloud raised in the literature.<\/jats:p>","DOI":"10.1515\/comp-2020-0214","type":"journal-article","created":{"date-parts":[[2021,6,9]],"date-time":"2021-06-09T04:43:35Z","timestamp":1623213815000},"page":"365-379","source":"Crossref","is-referenced-by-count":40,"title":["A Design of an Integrated Cloud-based Intrusion Detection System with Third Party Cloud Service"],"prefix":"10.1515","volume":"11","author":[{"given":"Wisam","family":"Elmasry","sequence":"first","affiliation":[{"name":"Department of Computer Engineering , Istanbul Commerce University , , Istanbul , Turkey"}]},{"given":"Akhan","family":"Akbulut","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering , Istanbul Kultur University , , Istanbul , Turkey"}]},{"given":"Abdul Halim","family":"Zaim","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering , Istanbul Commerce University , , Istanbul , Turkey"}]}],"member":"374","published-online":{"date-parts":[[2021,6,8]]},"reference":[{"key":"2022020121510292597_j_comp-2020-0214_ref_001","doi-asserted-by":"crossref","unstructured":"Alguliev R. Abdullaeva F., Illegal access detection in the cloud computing environment, Journal of Information Security, 2014, 5(02), 65.","DOI":"10.4236\/jis.2014.52007"},{"key":"2022020121510292597_j_comp-2020-0214_ref_002","unstructured":"Alsafi H. M., Abduallah W. M., Pathan A.-S. K., Idps: An integrated intrusion handling model for cloud, arXiv preprint arXiv:1203.3323, 2012."},{"key":"2022020121510292597_j_comp-2020-0214_ref_003","doi-asserted-by":"crossref","unstructured":"Ambusaidi M. A., He X., Nanda P., Tan Z., Building an intrusion detection system using a filter-based feature selection algorithm, IEEE transactions on computers, 2016, 65(10), 2986\u20132998.","DOI":"10.1109\/TC.2016.2519914"},{"key":"2022020121510292597_j_comp-2020-0214_ref_004","unstructured":"Aminanto E. Kim K., Deep learning in intrusion detection system: An overview, 2016 International Research Conference on Engineering and Technology (2016 IRCET), Higher Education Forum, 2016."},{"key":"2022020121510292597_j_comp-2020-0214_ref_005","unstructured":"Aminanto M. E. Kim K., Deep learning-based feature selection for intrusion detection system in transport layer, Proceedings of the Korea Institutes of Information Security and Cryptology Conference, 2016, 740\u2013743."},{"key":"2022020121510292597_j_comp-2020-0214_ref_006","doi-asserted-by":"crossref","unstructured":"Bakshi A. Dujodwala Y. B., Securing cloud from ddos attacks using intrusion detection system in virtual machine, 2010 Second International Conference on Communication Software and Networks, IEEE, 2010, 260\u2013264.","DOI":"10.1109\/ICCSN.2010.56"},{"key":"2022020121510292597_j_comp-2020-0214_ref_007","doi-asserted-by":"crossref","unstructured":"Borji A., Combining heterogeneous classifiers for network intrusion detection, Annual Asian Computing Science Conference, Springer, 2007, 254\u2013260.","DOI":"10.1007\/978-3-540-76929-3_24"},{"key":"2022020121510292597_j_comp-2020-0214_ref_008","doi-asserted-by":"crossref","unstructured":"Bosin A., Dess\u00ec N., Pes B., A service based approach to a new generation of intrusion detection systems, 2008 Sixth European Conference on Web Services, IEEE, 2008, 215\u2013224.","DOI":"10.1109\/ECOWS.2008.16"},{"key":"2022020121510292597_j_comp-2020-0214_ref_009","unstructured":"Canadian Institute for Cybersecurity - IDS 2017, http:\/\/www.unb.ca\/cic\/datasets\/ids-2017.html, 2017."},{"key":"2022020121510292597_j_comp-2020-0214_ref_010","doi-asserted-by":"crossref","unstructured":"Cervante L., Xue B., Zhang M., Shang L., Binary particle swarm optimisation for feature selection: A filter based approach, 2012 IEEE Congress on Evolutionary Computation, IEEE, 2012, 1\u20138.","DOI":"10.1109\/CEC.2012.6256452"},{"key":"2022020121510292597_j_comp-2020-0214_ref_011","doi-asserted-by":"crossref","unstructured":"Chebrolu S., Abraham A., Thomas J. P., Feature deduction and ensemble design of intrusion detection systems, Computers & security, 2005, 24(4), 295\u2013307.","DOI":"10.1016\/j.cose.2004.09.008"},{"key":"2022020121510292597_j_comp-2020-0214_ref_012","unstructured":"CICFlowMeter, https:\/\/www.unb.ca\/cic\/research\/applications.html#CICFlowMeter, 2017."},{"key":"2022020121510292597_j_comp-2020-0214_ref_013","unstructured":"CIDDS-Coburg Intrusion Detection Data Sets, https:\/\/www.hs-coburg.de\/index.php?id=927, 2017."},{"key":"2022020121510292597_j_comp-2020-0214_ref_014","doi-asserted-by":"crossref","unstructured":"Dasarathy B. V. Sheela B. V., A composite classifier system design: Concepts and methodology, Proceedings of the IEEE, 1979, 67(5), 708\u2013713.","DOI":"10.1109\/PROC.1979.11321"},{"key":"2022020121510292597_j_comp-2020-0214_ref_015","doi-asserted-by":"crossref","unstructured":"Dastjerdi A. V., Bakar K. A., Tabatabaei S. G. H., Distributed intrusion detection in clouds using mobile agents, 2009 Third International Conference on Advanced Engineering Computing and Applications in Sciences, IEEE, 2009, 175\u2013180.","DOI":"10.1109\/ADVCOMP.2009.34"},{"key":"2022020121510292597_j_comp-2020-0214_ref_016","unstructured":"Dem\u0161ar J., Statistical comparisons of classifiers over multiple data sets, Journal of Machine learning research, 2006, 7(Jan), 1\u201330."},{"key":"2022020121510292597_j_comp-2020-0214_ref_017","doi-asserted-by":"crossref","unstructured":"Dhage S. N., Meshram B., Rawat R., Padawe S., Paingaokar M., Misra A., Intrusion detection system in cloud computing environment, Proceedings of the International Conference & Workshop on Emerging Trends in Technology, 2011, 235\u2013239.","DOI":"10.1145\/1980022.1980076"},{"key":"2022020121510292597_j_comp-2020-0214_ref_018","unstructured":"Dzeroski S. Zenko B., Is combining classifiers better than selecting the best one?, ICML, Citeseer, 2002, 2002, 123e30."},{"key":"2022020121510292597_j_comp-2020-0214_ref_019","doi-asserted-by":"crossref","unstructured":"Elmasry W., Akbulut A., Zaim A. H., Deep learning approaches for predictive masquerade detection, Security and Communication Networks, 2018, 2018.","DOI":"10.1155\/2018\/9327215"},{"key":"2022020121510292597_j_comp-2020-0214_ref_020","doi-asserted-by":"crossref","unstructured":"Elmasry W., Akbulut A., Zaim A. H., Empirical study on multiclass classification-based network intrusion detection, Computational Intelligence, 2019, 35(4), 919\u2013954.","DOI":"10.1111\/coin.12220"},{"key":"2022020121510292597_j_comp-2020-0214_ref_021","doi-asserted-by":"crossref","unstructured":"Elmasry W., Akbulut A., Zaim A. H., Evolving deep learning architectures for network intrusion detection using a double pso metaheuristic, Computer Networks, 2020, 168, 107042.","DOI":"10.1016\/j.comnet.2019.107042"},{"key":"2022020121510292597_j_comp-2020-0214_ref_022","doi-asserted-by":"crossref","unstructured":"Elmasry W., Akbulut A., Zaim A. H., Comparative evaluation of different classification techniques for masquerade attack detection, International Journal of Information and Computer Security, 2020, 13(2), 187\u2013209.","DOI":"10.1504\/IJICS.2020.108848"},{"key":"2022020121510292597_j_comp-2020-0214_ref_023","doi-asserted-by":"crossref","unstructured":"Fersini E., Messina V., Pozzi F., Sentiment analysis: Bayesian ensemble learning, Decision Support Systems, 2014, 68.","DOI":"10.1016\/j.dss.2014.10.004"},{"key":"2022020121510292597_j_comp-2020-0214_ref_024","doi-asserted-by":"crossref","unstructured":"Folino G. Sabatino P., Ensemble based collaborative and distributed intrusion detection systems: A survey, Journal of Network and Computer Applications, 2016, 66, 1\u201316.","DOI":"10.1016\/j.jnca.2016.03.011"},{"key":"2022020121510292597_j_comp-2020-0214_ref_025","doi-asserted-by":"crossref","unstructured":"Gharib A., Sharafaldin I., Lashkari A. H., Ghorbani A. A., An evaluation framework for intrusion detection dataset, 2016 International Conference on Information Science and Security (ICISS), IEEE, 2016, 1\u20136.","DOI":"10.1109\/ICISSEC.2016.7885840"},{"key":"2022020121510292597_j_comp-2020-0214_ref_026","unstructured":"Gul I. Hussain M., Distributed cloud intrusion detection model, International Journal of Advanced Science and Technology, 2011, 34(38), 135."},{"key":"2022020121510292597_j_comp-2020-0214_ref_027","doi-asserted-by":"crossref","unstructured":"Hinton G., Deng L., Yu D., Dahl G. E., Mohamed A.-r., Jaitly N., Senior A., Vanhoucke V., Nguyen P., Sainath T. N., et al., Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups, IEEE Signal processing magazine, 2012, 29(6), 82\u201397.","DOI":"10.1109\/MSP.2012.2205597"},{"key":"2022020121510292597_j_comp-2020-0214_ref_028","doi-asserted-by":"crossref","unstructured":"Hinton G. E., Osindero S., Teh Y.-W., A fast learning algorithm for deep belief nets, Neural computation, 2006, 18(7), 1527\u20131554.","DOI":"10.1162\/neco.2006.18.7.1527"},{"key":"2022020121510292597_j_comp-2020-0214_ref_029","doi-asserted-by":"crossref","unstructured":"Hochreiter S. Schmidhuber J., Long short-term memory, Neural computation, 1997, 9(8), 1735\u20131780.","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"2022020121510292597_j_comp-2020-0214_ref_030","unstructured":"Ji C. Ma S., Combinations of weak classifiers, Advances in Neural Information Processing Systems, 1997, 494\u2013500."},{"key":"2022020121510292597_j_comp-2020-0214_ref_031","unstructured":"Kadam Y., Security issues in cloud computing a transparent view, International Journal of Computer Science Emerging Technology, 2011, 2(5), 316\u2013322."},{"key":"2022020121510292597_j_comp-2020-0214_ref_032","doi-asserted-by":"crossref","unstructured":"Kholidy H. A. Baiardi F., Cids: A framework for intrusion detection in cloud systems, 2012 Ninth International Conference on Information Technology-New Generations, IEEE, 2012, 379\u2013385.","DOI":"10.1109\/ITNG.2012.94"},{"key":"2022020121510292597_j_comp-2020-0214_ref_033","unstructured":"Kholidy H. A., Erradi A., Abdelwahed S., Baiardi F., A hierarchical, autonomous, and forecasting cloud ids, 2013 5th International Conference on Modelling, Identification and Control (ICMIC), IEEE, 2013, 213\u2013220."},{"key":"2022020121510292597_j_comp-2020-0214_ref_034","doi-asserted-by":"crossref","unstructured":"Kholidy H. A., Erradi A., Abdelwahed S., Attack prediction models for cloud intrusion detection systems, 2014 2nd International Conference on Artificial Intelligence, Modelling and Simulation, IEEE, 2014, 270\u2013275.","DOI":"10.1109\/AIMS.2014.64"},{"key":"2022020121510292597_j_comp-2020-0214_ref_035","doi-asserted-by":"crossref","unstructured":"Kim J., Kim J., Thu H. L. T., Kim H., Long short term memory recurrent neural network classifier for intrusion detection, 2016 International Conference on Platform Technology and Service (PlatCon), IEEE, 2016, 1\u20135.","DOI":"10.1109\/PlatCon.2016.7456805"},{"key":"2022020121510292597_j_comp-2020-0214_ref_036","doi-asserted-by":"crossref","unstructured":"Lashkari A. H., Draper-Gil G., Mamun M. S. I., Ghorbani A. A., Characterization of tor traffic using time based features., In Proceedings of the 3rd International Conference on Information Systems Security and Privacy (ICISSP), 2017, 253\u2013262.","DOI":"10.5220\/0005740704070414"},{"key":"2022020121510292597_j_comp-2020-0214_ref_037","doi-asserted-by":"crossref","unstructured":"Laureano M., Maziero C., Jamhour E., Protecting host-based intrusion detectors through virtual machines, Computer Networks, 2007, 51(5), 1275\u20131283.","DOI":"10.1016\/j.comnet.2006.09.007"},{"key":"2022020121510292597_j_comp-2020-0214_ref_038","unstructured":"Lee J.-H., Park M.-W., Eom J.-H., Chung T.-M., Multi-level intrusion detection system and log management in cloud computing, 13th International Conference on Advanced Communication Technology (ICACT2011), IEEE, 2011, 552\u2013555."},{"key":"2022020121510292597_j_comp-2020-0214_ref_039","doi-asserted-by":"crossref","unstructured":"Lo C.-C., Huang C.-C., Ku J., A cooperative intrusion detection system framework for cloud computing networks, 2010 39th International Conference on Parallel Processing Workshops, IEEE, 2010, 280\u2013284.","DOI":"10.1109\/ICPPW.2010.46"},{"key":"2022020121510292597_j_comp-2020-0214_ref_040","doi-asserted-by":"crossref","unstructured":"Ludwig S. A., Intrusion detection of multiple attack classes using a deep neural net ensemble, 2017 IEEE Symposium Series on Computational Intelligence (SSCI), IEEE, 2017, 1\u20137.","DOI":"10.1109\/SSCI.2017.8280825"},{"key":"2022020121510292597_j_comp-2020-0214_ref_041","doi-asserted-by":"crossref","unstructured":"Marir N., Wang H., Feng G., Li B., Jia M., Distributed abnormal behavior detection approach based on deep belief network and ensemble svm using spark, IEEE Access, 2018, 6, 59657\u201359671.","DOI":"10.1109\/ACCESS.2018.2875045"},{"key":"2022020121510292597_j_comp-2020-0214_ref_042","doi-asserted-by":"crossref","unstructured":"Mazzariello C., Bifulco R., Canonico R., Integrating a network ids into an open source cloud computing environment, 2010 Sixth International Conference on Information Assurance and Security, IEEE, 2010, 265\u2013270.","DOI":"10.1109\/ISIAS.2010.5604069"},{"key":"2022020121510292597_j_comp-2020-0214_ref_043","doi-asserted-by":"crossref","unstructured":"McHugh J., Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory, ACM Transactions on Information and System Security (TISSEC), 2000, 3(4), 262\u2013294.","DOI":"10.1145\/382912.382923"},{"key":"2022020121510292597_j_comp-2020-0214_ref_044","doi-asserted-by":"crossref","unstructured":"Mehmood Y., Shibli M. A., Habiba U., Masood R., Intrusion detection system in cloud computing: Challenges and opportunities, 2013 2nd National Conference on Information Assurance (NCIA), IEEE, 2013, 59\u201366.","DOI":"10.1109\/NCIA.2013.6725325"},{"key":"2022020121510292597_j_comp-2020-0214_ref_045","unstructured":"MIT Lincoln Laboratory-DARPA Intrusion Detection Evaluation Data Set, https:\/\/www.ll.mit.edu\/r-d\/datasets\/1999-darpa-intrusion-detection-data-set, 1998."},{"key":"2022020121510292597_j_comp-2020-0214_ref_046","doi-asserted-by":"crossref","unstructured":"Modi C., Patel D., Borisaniya B., Patel H., Patel A., Rajarajan M., A survey of intrusion detection techniques in cloud, Journal of network and computer applications, 2013, 36(1), 42\u201357.","DOI":"10.1016\/j.jnca.2012.05.003"},{"key":"2022020121510292597_j_comp-2020-0214_ref_047","unstructured":"Naidoo T., McDonald A., Tapamo J.-R., Feature selection for anomaly\u2013based network intrusion detection using cluster validity indices, 2015."},{"key":"2022020121510292597_j_comp-2020-0214_ref_048","doi-asserted-by":"crossref","unstructured":"Natesan P. Balasubramanie P., Multi stage filter using enhanced adaboost for network intrusion detection, International Journal of Network Security & Its Applications, 2012, 4(3), 121.","DOI":"10.5121\/ijnsa.2012.4308"},{"key":"2022020121510292597_j_comp-2020-0214_ref_049","unstructured":"NSL-KDD Dataset, https:\/\/github.com\/defcom17\/NSL_KDD, 2009."},{"key":"2022020121510292597_j_comp-2020-0214_ref_050","unstructured":"Patel A., Qassim Q., Shukor Z., Nogueira J., J\u00fanior J., Wills C., Federal P., Autonomic agent-based self-managed intrusion detection and prevention system, Proceedings of the South African Information Security Multi-Conference (SAISMC 2010), 2011, 223\u2013234."},{"key":"2022020121510292597_j_comp-2020-0214_ref_051","doi-asserted-by":"crossref","unstructured":"Patel A., Taghavi M., Bakhtiyari K., J\u00faNior J. C., An intrusion detection and prevention system in cloud computing: A systematic review, Journal of network and computer applications, 2013, 36 (1), 25\u201341.","DOI":"10.1016\/j.jnca.2012.08.007"},{"key":"2022020121510292597_j_comp-2020-0214_ref_052","unstructured":"Ragsdale D. J., Carver C., Humphries J. W., Pooch U. W., Adaptation techniques for intrusion detection and intrusion response systems, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics.\u2019 cybernetics evolving to systems, humans, organizations, and their complex interactions\u2019 (cat. no. 0, IEEE, 2000, 4, 2344\u20132349."},{"key":"2022020121510292597_j_comp-2020-0214_ref_053","unstructured":"Ring M., Wunderlich S., Gr\u00fcdl D., Landes D., Hotho A., Flow-based benchmark data sets for intrusion detection, Proceedings of the 16th European Conference on Cyber Warfare and Security. ACPI, 2017, 361\u2013369."},{"key":"2022020121510292597_j_comp-2020-0214_ref_054","unstructured":"Ring M., Wunderlich S., Gr\u00fcdl D., Landes D., Hotho A., Creation of flow-based data sets for intrusion detection, Journal of Information Warfare, 2017, 16(4), 41\u201354."},{"key":"2022020121510292597_j_comp-2020-0214_ref_055","doi-asserted-by":"crossref","unstructured":"Roschke S., Cheng F., Meinel C., Intrusion detection in the cloud, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, IEEE, 2009, 729\u2013734.","DOI":"10.1109\/DASC.2009.94"},{"key":"2022020121510292597_j_comp-2020-0214_ref_056","doi-asserted-by":"crossref","unstructured":"Shaikh R. Sasikumar M., Trust framework for calculating security strength of a cloud service, 2012 International Conference on Communication, Information & Computing Technology (ICCICT), IEEE, 2012, 1\u20136.","DOI":"10.1109\/ICCICT.2012.6398163"},{"key":"2022020121510292597_j_comp-2020-0214_ref_057","doi-asserted-by":"crossref","unstructured":"Sharafaldin I., Lashkari A. H., Ghorbani A. A., Toward generating a new intrusion detection dataset and intrusion traffic characterization., ICISSP, 2018, 108\u2013116.","DOI":"10.5220\/0006639801080116"},{"key":"2022020121510292597_j_comp-2020-0214_ref_058","unstructured":"Shelke M. P. K., Sontakke M. S., Gawande A., Intrusion detection system for cloud computing, International Journal of Scientific & Technology Research, 2012, 1(4), 67\u201371."},{"key":"2022020121510292597_j_comp-2020-0214_ref_059","doi-asserted-by":"crossref","unstructured":"Spafford E. H. Zamboni D., Intrusion detection using autonomous agents, Computer networks, 2000, 34(4), 547\u2013570.","DOI":"10.1016\/S1389-1286(00)00136-5"},{"key":"2022020121510292597_j_comp-2020-0214_ref_060","doi-asserted-by":"crossref","unstructured":"Stolfo S. J., Fan W., Lee W., Prodromidis A., Chan P. K., Cost-based modeling for fraud and intrusion detection: Results from the jam project, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX\u201900, IEEE, 2000, 2, 130\u2013144.","DOI":"10.1109\/DISCEX.2000.821515"},{"key":"2022020121510292597_j_comp-2020-0214_ref_061","doi-asserted-by":"crossref","unstructured":"Tavallaee M., Bagheri E., Lu W., Ghorbani A. A., A detailed analysis of the kdd cup 99 data set, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, IEEE, 2009, 1\u20136.","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"2022020121510292597_j_comp-2020-0214_ref_062","unstructured":"UCI Machine Learning Repository: KDD CUP 1999 Data Set, https:\/\/archive.ics.uci.edu\/ml\/datasets\/KDD+Cup+1999+Data, 1999."},{"key":"2022020121510292597_j_comp-2020-0214_ref_063","unstructured":"Vani R., Towards efficient intrusion detection using deep learning techniques: a review, Int J Adv Res Comput Commun Eng ISO, 2017, 3297, 2007."},{"key":"2022020121510292597_j_comp-2020-0214_ref_064","doi-asserted-by":"crossref","unstructured":"Vieira K., Schulter A., Westphall C., Westphall C., Intrusion detection for grid and cloud computing, It Professional, 2009, 12 (4), 38\u201343.","DOI":"10.1109\/MITP.2009.89"},{"key":"2022020121510292597_j_comp-2020-0214_ref_065","doi-asserted-by":"crossref","unstructured":"Wadi M. Elmasry W., Statistical analysis of wind energy potential using different estimation methods for weibull parameters: a case study, Electrical Engineering, 2021, 1\u201322.","DOI":"10.1007\/s00202-021-01254-0"},{"key":"2022020121510292597_j_comp-2020-0214_ref_066","unstructured":"Wahba Y., ElSalamouny E., ElTaweel G., Improving the performance of multi-class intrusion detection systems using feature reduction, arXiv preprint arXiv:1507.06692, 2015."},{"key":"2022020121510292597_j_comp-2020-0214_ref_067","doi-asserted-by":"crossref","unstructured":"Wang Y., Wen J., Wang X., Tao B., Zhou W., A cloud service trust evaluation model based on combining weights and gray correlation analysis, Security and Communication Networks, 2019, 2019.","DOI":"10.1155\/2019\/2437062"},{"key":"2022020121510292597_j_comp-2020-0214_ref_068","doi-asserted-by":"crossref","unstructured":"Yee C. G., Shin W. H., Rao G., An adaptive intrusion detection and prevention (id\/ip) framework for web services, 2007 International Conference on Convergence Information Technology (ICCIT 2007), IEEE, 2007, 528\u2013534.","DOI":"10.1109\/ICCIT.2007.422"},{"key":"2022020121510292597_j_comp-2020-0214_ref_069","unstructured":"Zarrabi A. Zarrabi A., Internet intrusion detection system service in a cloud, International Journal of Computer Science Issues (IJCSI), 2012, 9(5), 308."},{"key":"2022020121510292597_j_comp-2020-0214_ref_070","doi-asserted-by":"crossref","unstructured":"Zhou Z., Liu X., Li P., Shang L., Feature selection method with proportionate fitness based binary particle swarm optimization, Asia-Pacific Conference on Simulated Evolution and Learning, Springer, 2014, 582\u2013592.","DOI":"10.1007\/978-3-319-13563-2_49"}],"container-title":["Open Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2020-0214\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2020-0214\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T12:55:39Z","timestamp":1725195339000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2020-0214\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,1]]},"references-count":70,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2021,1,13]]},"published-print":{"date-parts":[[2021,1,1]]}},"alternative-id":["10.1515\/comp-2020-0214"],"URL":"https:\/\/doi.org\/10.1515\/comp-2020-0214","relation":{},"ISSN":["2299-1093"],"issn-type":[{"value":"2299-1093","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,1]]}}}