{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T03:14:35Z","timestamp":1769829275412,"version":"3.49.0"},"reference-count":72,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T00:00:00Z","timestamp":1721865600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"European Union (EU)","award":["CZ.10.03.01\/00\/22 _003\/0000048"],"award-info":[{"award-number":["CZ.10.03.01\/00\/22 _003\/0000048"]}]},{"name":"European Union (EU)","award":["SGS SP2024\/061"],"award-info":[{"award-number":["SGS SP2024\/061"]}]},{"name":"Ministry of Education, Youth and Sports of the Czech Republic (MEYS CZ)","award":["CZ.10.03.01\/00\/22 _003\/0000048"],"award-info":[{"award-number":["CZ.10.03.01\/00\/22 _003\/0000048"]}]},{"name":"Ministry of Education, Youth and Sports of the Czech Republic (MEYS CZ)","award":["SGS SP2024\/061"],"award-info":[{"award-number":["SGS SP2024\/061"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>In modern network security setups, Intrusion Detection Systems (IDS) are crucial elements that play a key role in protecting against unauthorized access, malicious actions, and policy breaches. Despite significant progress in IDS technology, two of the most major obstacles remain: how to avoid false alarms due to imbalanced data and accurately forecast the precise type of attacks before they even happen to minimize the damage caused. To deal with two problems in the most optimized way possible, we propose a two-task regression and classification strategy called Hybrid Regression\u2013Classification (HRC), a deep learning-based strategy for developing an intrusion detection system (IDS) that can minimize the false alarm rate and detect and predict potential cyber-attacks before they occur to help the current wireless network in dealing with the attacks more efficiently and precisely. The experimental results show that our HRC strategy accurately predicts the incoming behavior of the IP data traffic in two different datasets. This can help the IDS to detect potential attacks sooner with high accuracy so that they can have enough reaction time to deal with the attack. Furthermore, our proposed strategy can also deal with imbalanced data. Even when the imbalance is large between categories. This will help significantly reduce the false alarm rate of IDS in practice. These strengths combined will benefit the IDS by making it more active in defense and help deal with the intrusion detection problem more effectively.<\/jats:p>","DOI":"10.3390\/fi16080264","type":"journal-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T13:10:28Z","timestamp":1721913028000},"page":"264","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A Novel Deep Learning Framework for Intrusion Detection Systems in Wireless Network"],"prefix":"10.3390","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-4788-8866","authenticated-orcid":false,"given":"Khoa Dinh","family":"Nguyen Dang","sequence":"first","affiliation":[{"name":"Department of Telecommunications, VSB\u2014Technical University of Ostrava, 708 00 Ostrava, Czech Republic"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2590-034X","authenticated-orcid":false,"given":"Peppino","family":"Fazio","sequence":"additional","affiliation":[{"name":"Department of Telecommunications, VSB\u2014Technical University of Ostrava, 708 00 Ostrava, Czech Republic"},{"name":"Department of Molecular Sciences and Nanosystems, Ca\u2019 Foscari University of Venice, 30123 Venezia, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5135-7980","authenticated-orcid":false,"given":"Miroslav","family":"Voznak","sequence":"additional","affiliation":[{"name":"Department of Telecommunications, VSB\u2014Technical University of Ostrava, 708 00 Ostrava, Czech Republic"}]}],"member":"1968","published-online":{"date-parts":[[2024,7,25]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"430","DOI":"10.3390\/telecom2040025","article-title":"A Survey on the Implementation and Management of Secure Virtual Private Networks (VPNs) and Virtual LANs (VLANs) in Static and Mobile Scenarios","volume":"2","author":"Gentile","year":"2021","journal-title":"Telecom"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/JSAC.2023.3322756","article-title":"On the Dilemma of Reliability or Security in Unmanned Aerial Vehicle Communications Assisted by Energy Harvesting Relaying","volume":"42","author":"Nguyen","year":"2024","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"107679","DOI":"10.1016\/j.comnet.2020.107679","article-title":"A survey on intrusion detection and prevention systems in digital substations","volume":"184","author":"Quincozes","year":"2021","journal-title":"Comput. Netw."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1186\/s42400-019-0038-7","article-title":"Survey of intrusion detection systems: Techniques, datasets and challenges","volume":"2","author":"Khraisat","year":"2019","journal-title":"Cybersecurity"},{"key":"ref_5","first-page":"0110667","article-title":"Signature based Network Intrusion Detection System using Feature Selection on Android","volume":"11","author":"Cyril","year":"2020","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"6639714","DOI":"10.1155\/2021\/6639714","article-title":"The Anomaly- and Signature-Based IDS for Network Security Using Hybrid Inference Systems","volume":"2021","author":"Einy","year":"2021","journal-title":"Math. Probl. Eng."},{"key":"ref_7","first-page":"0150215","article-title":"Addressing Imbalanced Data in Network Intrusion Detection: A Review and Survey","volume":"15","year":"2024","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Mohammad, R., Saeed, F., Almazroi, A.A., Alsubaei, F.S., and Almazroi, A.A. (2024). Enhancing Intrusion Detection Systems Using a Deep Learning and Data Augmentation Approach. Systems, 12.","DOI":"10.3390\/systems12030079"},{"key":"ref_9","unstructured":"Veeramreddy, J., and Prasad, K.M. (2019). Anomaly-Based Intrusion Detection System, IntechOpen."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1016\/j.procs.2023.03.013","article-title":"Anomaly-Based Intrusion Detection System using One-Dimensional Convolutional Neural Network","volume":"220","author":"Assy","year":"2023","journal-title":"Procedia Comput. Sci."},{"key":"ref_11","first-page":"1","article-title":"Hybrid Network Intrusion Detection Systems: A Systematic Review","volume":"7","author":"Alhasan","year":"2024","journal-title":"Sci. Pract. Cyber Secur. J."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"102709","DOI":"10.1016\/j.cose.2022.102709","article-title":"Hybrid intrusion detection system based on Dempster-Shafer evidence theory","volume":"117","author":"Qiu","year":"2022","journal-title":"Comput. Secur."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"71414","DOI":"10.1109\/ACCESS.2022.3186975","article-title":"A Hybrid Intrusion Detection System Based on Feature Selection and Weighted Stacking Classifier","volume":"10","author":"Zhao","year":"2022","journal-title":"IEEE Access"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"110576","DOI":"10.1016\/j.comnet.2024.110576","article-title":"Machine learning-enabled hybrid intrusion detection system with host data transformation and an advanced two-stage classifier","volume":"250","author":"Chen","year":"2024","journal-title":"Comput. Netw."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"11994","DOI":"10.1016\/j.eswa.2009.05.029","article-title":"Intrusion detection by machine learning: A review","volume":"36","author":"Tsai","year":"2009","journal-title":"Expert Syst. Appl."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Ablat, H. (2011, January 14\u201317). Study on Multi-grade Intrusion Detection Model Based on Data Mining Technology. Proceedings of the 2011 10th International Symposium on Distributed Computing and Applications to Business, Engineering and Science, Wuxi, China.","DOI":"10.1109\/DCABES.2011.85"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"325","DOI":"10.21817\/indjcse\/2020\/v11i4\/201104300","article-title":"A hybrid approach for cyber security: Improved intrusion detection system using Ann-Svm","volume":"11","author":"Kajal","year":"2020","journal-title":"Indian J. Comput. Sci. Eng."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"10859","DOI":"10.1007\/s13369-020-04907-7","article-title":"An improved intrusion detection system based on KNN hyperparameter tuning and cross-validation","volume":"45","author":"Wazirali","year":"2020","journal-title":"Arab. J. Sci. Eng."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"103808","DOI":"10.1016\/j.csi.2023.103808","article-title":"An efficient network intrusion detection approach based on logistic regression model and parallel artificial bee colony algorithm","volume":"89","author":"Kolukisa","year":"2024","journal-title":"Comput. Stand. Interfaces"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"105845","DOI":"10.1016\/j.knosys.2020.105845","article-title":"LR-SMOTE\u2014An improved unbalanced data set oversampling based on K-means and SVM","volume":"196","author":"Liang","year":"2020","journal-title":"Knowl.-Based Syst."},{"key":"ref_21","first-page":"2280","article-title":"A Framework of Intrusion Detection System based on Bayesian Network in IoT","volume":"14","author":"Shi","year":"2018","journal-title":"Int. J. Perform. Eng."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1016\/j.cose.2016.11.004","article-title":"A survey of intrusion detection systems based on ensemble and hybrid classifiers","volume":"65","author":"Aburomman","year":"2017","journal-title":"Comput. Secur."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/j.procs.2022.03.029","article-title":"Intrusion Detection Systems using Supervised Machine Learning Techniques: A survey","volume":"201","author":"Abdallah","year":"2022","journal-title":"Procedia Comput. Sci."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1251","DOI":"10.1016\/j.procs.2020.04.133","article-title":"Performance Analysis of Machine Learning Algorithms in Intrusion Detection System: A Review","volume":"171","author":"Saranya","year":"2020","journal-title":"Procedia Comput. Sci."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"11665","DOI":"10.1007\/s00521-019-04655-2","article-title":"A new approach for intrusion detection system based on training multilayer perceptron by using enhanced Bat algorithm","volume":"32","author":"Ghanem","year":"2020","journal-title":"Neural Comput. Appl."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"49114","DOI":"10.1109\/ACCESS.2023.3275789","article-title":"Graph Neural Networks for Intrusion Detection: A Survey","volume":"11","author":"Bilot","year":"2023","journal-title":"IEEE Access"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"103821","DOI":"10.1016\/j.cose.2024.103821","article-title":"A Survey on Graph Neural Networks for Intrusion Detection Systems: Methods, Trends and Challenges","volume":"141","author":"Zhong","year":"2024","journal-title":"Comput. Secur."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"281","DOI":"10.37394\/232018.2024.12.27","article-title":"Intrusion Detection System using CNNs and GANs","volume":"12","year":"2024","journal-title":"WSEAS Trans. Comput. Res."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Mohammadpour, L., Ling, T.C., Liew, C.S., and Aryanfar, A. (2022). A survey of CNN-based network intrusion detection. Appl. Sci., 12.","DOI":"10.3390\/app12168162"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"103160","DOI":"10.1016\/j.jnca.2021.103160","article-title":"A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique","volume":"191","author":"ElSayed","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Gautam, S., Henry, A., Zuhair, M., Rashid, M., Javed, A.R., and Maddikunta, P.K.R. (2022). A composite approach of intrusion detection systems: Hybrid RNN and correlation-based feature optimization. Electronics, 11.","DOI":"10.3390\/electronics11213529"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"100013","DOI":"10.1016\/j.jer.2023.100013","article-title":"Modeling an intrusion detection using recurrent neural networks","volume":"11","author":"Ibrahim","year":"2023","journal-title":"J. Eng. Res."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1186\/s40537-021-00448-4","article-title":"Intrusion detection systems using long short-term memory (LSTM)","volume":"8","author":"Laghrissi","year":"2021","journal-title":"J. Big Data"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"102600","DOI":"10.1016\/j.cose.2021.102600","article-title":"An efficient network behavior anomaly detection using a hybrid DBN-LSTM network","volume":"114","author":"Chen","year":"2022","journal-title":"Comput. Secur."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"115524","DOI":"10.1016\/j.eswa.2021.115524","article-title":"A bidirectional LSTM deep learning approach for intrusion detection","volume":"185","author":"Imrana","year":"2021","journal-title":"Expert Syst. Appl."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"100030","DOI":"10.1016\/j.teler.2022.100030","article-title":"Hybrid intelligent intrusion detection system for internet of things","volume":"8","author":"Jain","year":"2022","journal-title":"Telemat. Inform. Rep."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"99837","DOI":"10.1109\/ACCESS.2022.3206425","article-title":"CNN-LSTM: Hybrid deep neural network for network intrusion detection system","volume":"10","author":"Halbouni","year":"2022","journal-title":"IEEE Access"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Khan, M.A., Karim, M.R., and Kim, Y. (2019). A scalable and hybrid intrusion detection system based on the convolutional-LSTM network. Symmetry, 11.","DOI":"10.3390\/sym11040583"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Psychogyios, K., Papadakis, A., Bourou, S., Nikolaou, N., Maniatis, A., and Zahariadis, T. (2024). Deep Learning for Intrusion Detection Systems (IDSs) in Time Series Data. Future Internet, 16.","DOI":"10.3390\/fi16030073"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1007\/s10994-021-05964-1","article-title":"F*: An interpretable transformation of the F-measure","volume":"110","author":"Hand","year":"2021","journal-title":"Mach. Learn."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"34188","DOI":"10.1109\/ACCESS.2021.3061609","article-title":"Empirical Evaluation of Attacks Against IEEE 802.11 Enterprise Networks: The AWID3 Dataset","volume":"9","author":"Chatzoglou","year":"2021","journal-title":"IEEE Access"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Aminanto, A.E., and Aminanto, M.E. (2022). Deep learning models for intrusion detection in Wi-Fi networks: A literature survey. Sustainable Architecture and Building Environment: Proceedings of ICSDEMS 2020, Springer.","DOI":"10.1007\/978-981-16-2329-5_14"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1186\/s40537-020-00382-x","article-title":"A survey and analysis of intrusion detection models based on CSE-CIC-IDS2018 Big Data","volume":"7","author":"Leevy","year":"2020","journal-title":"J. Big Data"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"157761","DOI":"10.1109\/ACCESS.2021.3129775","article-title":"Research Trends in Network-Based Intrusion Detection Systems: A Review","volume":"9","author":"Kumar","year":"2021","journal-title":"IEEE Access"},{"key":"ref_45","first-page":"446","article-title":"A study on NSL-KDD dataset for intrusion detection system based on classification algorithms","volume":"4","author":"Dhanabal","year":"2015","journal-title":"Int. J. Adv. Res. Comput. Commun. Eng."},{"key":"ref_46","first-page":"1","article-title":"KDD 1999 generation faults: A review and analysis","volume":"2","author":"Duncan","year":"2018","journal-title":"J. Cyber Secur. Technol."},{"key":"ref_47","unstructured":"Wilson, D.L.R. (2021). Towards Effective Wireless Intrusion Detection Using AWID Dataset, Rochester Institute of Technology."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1186\/s13634-022-00871-6","article-title":"Intrusion detection system combined enhanced random forest with SMOTE algorithm","volume":"2022","author":"Wu","year":"2022","journal-title":"EURASIP J. Adv. Signal Process."},{"key":"ref_49","first-page":"12","article-title":"Intrusion detection with supervised machine learning using smote for imbalanced datasets","volume":"5","author":"Telo","year":"2021","journal-title":"J. Artif. Intell. Mach. Learn. Manag."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1093\/comjnl\/bxab039","article-title":"Improved hybrid bag-boost ensemble with K-means-SMOTE\u2013ENN technique for handling noisy class imbalanced data","volume":"65","author":"Puri","year":"2022","journal-title":"Comput. J."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"12251","DOI":"10.1109\/JIOT.2021.3060878","article-title":"Semi-Supervised Spatiotemporal Deep Learning for Intrusions Detection in IoT Networks","volume":"8","author":"Hawash","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"8445","DOI":"10.1109\/JIOT.2023.3237661","article-title":"A Secure Intrusion Detection Platform Using Blockchain and Radial Basis Function Neural Networks for Internet of Drones","volume":"10","author":"Heidari","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1016\/j.comcom.2022.09.012","article-title":"Federated Learning for Intrusion Detection System: Concepts, Challenges and Future Directions","volume":"195","author":"Agrawal","year":"2021","journal-title":"Comput. Commun."},{"key":"ref_54","unstructured":"Lee, B.S., Kim, J.W., and Choi, M.J. (2023, January 6\u20138). Federated Learning Based Network Intrusion Detection Model. Proceedings of the 2023 24st Asia-Pacific Network Operations and Management Symposium (APNOMS), Sejong, Republic of Korea."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"2455","DOI":"10.1109\/JSYST.2023.3236995","article-title":"An Efficient Federated Learning System for Network Intrusion Detection","volume":"17","author":"Li","year":"2023","journal-title":"IEEE Syst. J."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Qazi, E.U.H., Faheem, M.H., and Zia, T. (2023). HDLNIDS: Hybrid Deep-Learning-Based Network Intrusion Detection System. Appl. Sci., 13.","DOI":"10.3390\/app13084921"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"107315","DOI":"10.1016\/j.comnet.2020.107315","article-title":"An effective convolutional neural network based on SMOTE and Gaussian mixture model for intrusion detection in imbalanced dataset","volume":"177","author":"Zhang","year":"2020","journal-title":"Comput. Netw."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"616","DOI":"10.1109\/JIOT.2021.3084796","article-title":"MTH-IDS: A Multitiered Hybrid Intrusion Detection System for Internet of Vehicles","volume":"9","author":"Yang","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/j.procs.2019.09.167","article-title":"The Proposal of Undersampling Method for Learning from Imbalanced Datasets","volume":"159","author":"Bach","year":"2019","journal-title":"Procedia Comput. Sci."},{"key":"ref_60","unstructured":"Yu, L., and Zhou, N. (2021). Survey of Imbalanced Data Methodologies. arXiv."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Fu, G., Wang, J.B., Zong, M.J., and Yi, L. (2021). Feature Ranking and Screening for Class-Imbalanced Metabolomics Data Based on Rank Aggregation Coupled with Re-Balance. Metabolites, 11.","DOI":"10.3390\/metabo11060389"},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Dang, K., Fazio, P., and Voz\u0148\u00e1k, M. (2022). High-Speed Users\u2019 Mobility Prediction Scheme Based on Deep Learning for Small Cell and Femtocell Networks, Springer.","DOI":"10.1109\/TELFOR52709.2021.9653254"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Ampomah, E., Qin, Z., and Nyame, G. (2020). Evaluation of Tree-Based Ensemble Machine Learning Models in Predicting Stock Price Direction of Movement. Information, 11.","DOI":"10.3390\/info11060332"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"1779","DOI":"10.1109\/LSP.2020.3027517","article-title":"The Role of Neural Network Activation Functions","volume":"27","author":"Parhi","year":"2020","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1016\/j.conb.2019.01.011","article-title":"Backpropagation through time and the brain","volume":"55","author":"Lillicrap","year":"2019","journal-title":"Curr. Opin. Neurobiol."},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Kuo, W.C., Chen, C.H., Chen, S.Y., and Wang, C.C. (2022). Deep Learning Neural Networks for Short-Term PV Power Forecasting via Sky Image Method. Energies, 15.","DOI":"10.3390\/en15134779"},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/j.neunet.2020.02.016","article-title":"Backpropagation algorithms and Reservoir Computing in Recurrent Neural Networks for the forecasting of complex spatiotemporal dynamics","volume":"126","author":"Vlachas","year":"2020","journal-title":"Neural Netw."},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"132306","DOI":"10.1016\/j.physd.2019.132306","article-title":"Fundamentals of Recurrent Neural Network (RNN) and Long Short-Term Memory (LSTM) network","volume":"404","author":"Sherstinsky","year":"2020","journal-title":"Phys. D Nonlinear Phenom."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"92","DOI":"10.32736\/sisfokom.v13i1.1985","article-title":"Classification Comparison Performance of Supervised Machine Learning Random Forest and Decision Tree Algorithms Using Confusion Matrix","volume":"13","author":"Helmud","year":"2024","journal-title":"J. Sisfokom (Sist. Inf. Dan Komput.)"},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1016\/j.ins.2013.03.022","article-title":"Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues","volume":"239","author":"Corona","year":"2013","journal-title":"Inf. Sci."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1007\/s44196-023-00355-x","article-title":"A Comparative Study of Using Boosting-Based Machine Learning Algorithms for IoT Network Intrusion Detection","volume":"16","author":"Saied","year":"2023","journal-title":"Int. J. Comput. Intell. Syst."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"1069","DOI":"10.30684\/etj.v39i7.1695","article-title":"Intrusion Detection System for NSL-KDD Dataset Based on Deep Learning and Recursive Feature Elimination","volume":"39","author":"Gbashi","year":"2021","journal-title":"Eng. Technol. J."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/16\/8\/264\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T15:23:22Z","timestamp":1760109802000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/16\/8\/264"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,25]]},"references-count":72,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2024,8]]}},"alternative-id":["fi16080264"],"URL":"https:\/\/doi.org\/10.3390\/fi16080264","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,25]]}}}