{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T19:26:43Z","timestamp":1770578803357,"version":"3.49.0"},"reference-count":20,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2017,3,29]],"date-time":"2017-03-29T00:00:00Z","timestamp":1490745600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2017,3,29]]},"abstract":"<jats:p>This paper presents a cascade of ensemble-based artificial neural network for multi-class intrusion detection (CANID) in computer network traffic. The proposed system learns a number of neural-networks connected as a cascade with each network trained using a small sample of training examples. The proposed cascade structure uses the trained neural network as a filter to partition the training data and hence a relatively small sample of training examples are used along with a boosting-based learning algorithm to learn an optimal set of neural network parameters for each successive partition. The performance of the proposed approach is evaluated and compared on the standard KDD CUP 1999 dataset as well as a very recent dataset, UNSW-NB15, composed of contemporary synthesized attack activities. Experimental results show that our proposed approach can efficiently detect various types of cyber attacks in computer networks.<\/jats:p>","DOI":"10.3233\/jifs-169230","type":"journal-article","created":{"date-parts":[[2017,3,31]],"date-time":"2017-03-31T18:21:31Z","timestamp":1490984491000},"page":"2875-2883","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":50,"title":["A multiclass cascade of artificial neural network for network intrusion detection"],"prefix":"10.1177","volume":"32","author":[{"given":"Mirza M.","family":"Baig","sequence":"first","affiliation":[{"name":"School of Science and Engineering (SSE), Lahore University of Management Sciences (LUMS), Lahore, Pakistan"}]},{"given":"Mian M.","family":"Awais","sequence":"additional","affiliation":[{"name":"School of Science and Engineering (SSE), Lahore University of Management Sciences (LUMS), Lahore, Pakistan"}]},{"given":"El-Sayed M.","family":"El-Alfy","sequence":"additional","affiliation":[{"name":"Department of Information and Computer Science, College of Computer Sciences and Engineering King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia"}]}],"member":"179","published-online":{"date-parts":[[2017,3,29]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30176-9_41"},{"key":"e_1_3_2_3_2","unstructured":"AxelssonS. Intrusion detection systems: A survey and taxonomy. Technical report Technical report 2000."},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.05.029"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2002.1007774"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2004.09.045"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45235-5_73"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/11527503_82"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00514-X"},{"key":"e_1_3_2_10_2","unstructured":"KDD Cup 1999 dataset for network-based intrusion detection systems. Available on: http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html."},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12637-1_25"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26532-2_38"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1997.1504"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007614523901"},{"key":"e_1_3_2_15_2","first-page":"313","article-title":"Rapid object detection using a boosted cascade of simple features","volume":"1","author":"Viola P.","year":"2001","unstructured":"ViolaP. and JonesM., Rapid object detection using a boosted cascade of simple features. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR), volume 1, 2001, pp. 313\u2013321.","journal-title":"Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR)"},{"key":"e_1_3_2_16_2","article-title":"Mining network data for intrusion detection through combining SVMs with ant colony networks","author":"Feng W.","year":"2013","unstructured":"FengW., ZhangQ., HuG. and HuangJ.X., Mining network data for intrusion detection through combining SVMs with ant colony networks, Future Generation Computer Systems (2013).","journal-title":"Future Generation Computer Systems"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.proenv.2011.12.040"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2011.10.001"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.01.002"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.11.028"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2015.1125974"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169230","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-169230","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169230","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T02:19:14Z","timestamp":1770517154000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-169230"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,29]]},"references-count":20,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,3,29]]}},"alternative-id":["10.3233\/JIFS-169230"],"URL":"https:\/\/doi.org\/10.3233\/jifs-169230","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,3,29]]}}}