{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:50:13Z","timestamp":1762876213838,"version":"build-2065373602"},"reference-count":46,"publisher":"MDPI AG","issue":"19","license":[{"start":{"date-parts":[[2020,10,8]],"date-time":"2020-10-08T00:00:00Z","timestamp":1602115200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Owing to the constraints of time and space complexity, network intrusion detection systems (NIDSs) based on support vector machines (SVMs) face the \u201ccurse of dimensionality\u201d in a large-scale, high-dimensional feature space. This study proposes a joint training model that combines a stacked autoencoder (SAE) with an SVM and the kernel approximation technique. The training model uses the SAE to perform feature dimension reduction, uses random Fourier features to perform kernel approximation, and then random Fourier mapping is explicitly applied to the sub-sample to generate the random feature space, making it possible to apply a linear SVM to uniformly approximate to the Gaussian kernel SVM. Finally, the SAE performs joint training with the efficient linear SVM. We studied the effects of an SAE structure and a random Fourier feature on classification performance, and compared that performance with that of other training models, including some without kernel approximation. At the same time, we compare the accuracy of the proposed model with that of other models, which include basic machine learning models and the state-of-the-art models in other literatures. The experimental results demonstrate that the proposed model outperforms the previously proposed methods in terms of classification performance and also reduces the training time. Our model is feasible and works efficiently on large-scale datasets.<\/jats:p>","DOI":"10.3390\/s20195710","type":"journal-article","created":{"date-parts":[[2020,10,8]],"date-time":"2020-10-08T08:52:41Z","timestamp":1602147161000},"page":"5710","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A Hybrid Intrusion Detection Model Combining SAE with Kernel Approximation in Internet of Things"],"prefix":"10.3390","volume":"20","author":[{"given":"Yukun","family":"Wu","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou 310023, China"},{"name":"School of Artificial Intelligence, Zhejiang Post and Telecommunication College, Shaoxing 312366, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wei William","family":"Lee","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou 310023, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xuan","family":"Gong","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou 310023, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5837-4492","authenticated-orcid":false,"given":"Hui","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou 310023, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2020,10,8]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1963","DOI":"10.1109\/TII.2019.2938778","article-title":"A Distributed Deep Learning System for Web Attack Detection on Edge Devices","volume":"16","author":"Tian","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/s10462-010-9179-5","article-title":"The use of artificial intelligence based techniques for intrusion detection: A review","volume":"34","author":"Kumar","year":"2010","journal-title":"Artif. Intell. Rev."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"LeCun","year":"2015","journal-title":"Nature"},{"key":"ref_4","unstructured":"Abe, S. (2005). Support Vector Machines for Pattern Classification, Springer."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Auria, L., and Moro, R.A. (2020, October 07). Support Vector Machines (SVM) as a Technique for Solvency Analysis (1 August 2008). DIW Berlin Discussion Paper No 811. Available online: https:\/\/ssrn.com\/abstract=1424949; http:\/\/dx.doi.org\/10.2139\/ssrn.1424949.","DOI":"10.2139\/ssrn.1424949"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/j.patcog.2016.03.028","article-title":"High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning","volume":"58","author":"Erfani","year":"2016","journal-title":"Pattern Recogn."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Reddy, R.R., Ramadevi, Y., and Sunitha, K.V.N. (2016, January 21\u201324). Effective discriminant function for intrusion detection using SVM. Proceedings of the 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Jaipur, India.","DOI":"10.1109\/ICACCI.2016.7732199"},{"key":"ref_8","first-page":"240217","article-title":"A new intrusion detection system based on KNN classification algorithm in wireless sensor network","volume":"2014","author":"Li","year":"2014","journal-title":"J. Elect. Comput. Eng."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"13492","DOI":"10.1016\/j.eswa.2012.07.009","article-title":"A network intrusion detection system based on a hidden Na\u00efve Bayes multiclass classifier","volume":"39","author":"Koc","year":"2012","journal-title":"Expert Syst. Appl."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Ingre, B., and Yadav, A. (2015, January 2\u20133). Performance analysis of NSL-KDD dataset using ANN. Proceedings of the 2015 International Conference on Signal Processing and Communication Engineering Systems, Guntur, India.","DOI":"10.1109\/SPACES.2015.7058223"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1016\/j.procs.2016.06.047","article-title":"Random forest modeling for network intrusion detection system","volume":"89","author":"Farnaaz","year":"2016","journal-title":"Procedia Comput. Sci."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.neucom.2014.09.083","article-title":"PCA filtering and probabilistic SOM for network intrusion detection","volume":"164","author":"Ortiz","year":"2015","journal-title":"Neurocomputing"},{"key":"ref_13","first-page":"202","article-title":"A survey on intrusion detection systems and classification techniques","volume":"2","author":"Khan","year":"2016","journal-title":"Int. J. Sci. Res. Sci. Eng. Technol."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","article-title":"A survey of data mining and machine learning methods for cyber security intrusion detection","volume":"18","author":"Buczak","year":"2016","journal-title":"IEEE Commun. Surveys Tuts."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Mehmood, T., and Rais, H.B.M. (2015, January 19\u201320). SVM for network anomaly detection using ACO feature subset. Proceedings of the 2015 International Symposium on Mathematical Sciences and Computing Research (ISMSC), Ipon, Malaysia.","DOI":"10.1109\/ISMSC.2015.7594039"},{"key":"ref_16","unstructured":"Mukkamala, S., Janoski, G., and Sung, A. (2002, January 12\u201317). Intrusion detection using neural networks and support vector machines. Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN\u201902 (Cat. No.02CH37290), Honolulu, HI, USA."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1016\/j.ins.2008.10.025","article-title":"Multiple criteria mathematical programming for multi-class classification and application in network intrusion detection","volume":"179","author":"Kou","year":"2009","journal-title":"Inf. Sci."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1792","DOI":"10.1109\/ACCESS.2017.2780250","article-title":"HAST-IDS: Learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection","volume":"6","author":"Wang","year":"2017","journal-title":"IEEE Access"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"107450","DOI":"10.1016\/j.measurement.2019.107450","article-title":"Robust detection for network intrusion of industrial IoT based on multi-CNN fusion","volume":"154","author":"Li","year":"2020","journal-title":"Measurement"},{"key":"ref_20","first-page":"136","article-title":"Applying long short-term memory recurrent neural networks to intrusion detection","volume":"56","author":"Staudemeyer","year":"2015","journal-title":"S. Afr. Comput. J."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"8820","DOI":"10.1109\/TVT.2020.2995133","article-title":"Detection of Low-Frequency and Multi-Stage Attacks in Industrial Internet of Things","volume":"69","author":"Li","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Alrawashdeh, K., and Purdy, C. (2016, January 18\u201320). Toward an online anomaly intrusion detection system based on deep learning. Proceedings of the 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA), Anaheim, CA, USA.","DOI":"10.1109\/ICMLA.2016.0040"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Alom, M.Z., Bontupalli, V.R., and Taha, T.M. (2015, January 15\u201319). Intrusion detection using deep belief networks. Proceedings of the 2015 National Aerospace and Electronics Conference (NAECON), Dayton, OH, USA.","DOI":"10.1109\/NAECON.2015.7443094"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Cao, V.L., Nicolau, M., and Mcdermott, J. (2016). A Hybrid Autoencoder and Density Estimation Model for Anomaly Detection. International Conference on Parallel Problem Solving from Nature, Springer.","DOI":"10.1007\/978-3-319-45823-6_67"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/TETCI.2017.2772792","article-title":"A Deep Learning Approach to Network Intrusion Detection","volume":"2","author":"Shone","year":"2018","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"key":"ref_26","first-page":"52843","article-title":"Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection","volume":"1","author":"Lasheng","year":"2018","journal-title":"IEEE Access"},{"key":"ref_27","first-page":"790","article-title":"A Real-Time and Ubiquitous Network Attack Detection Based on Deep Belief Network and Support Vector Machine","volume":"7","author":"Zhang","year":"2020","journal-title":"IEEE\/CAA JAS"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"38688","DOI":"10.1109\/ACCESS.2019.2905754","article-title":"A Method for Guaranteeing Wireless Communication Based on a Combination of Deep and Shallow Learning","volume":"7","author":"Tian","year":"2019","journal-title":"IEEE Access"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Agarap, A.F.M. (2018, January 26\u201328). A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection in Network Traffic Data. Proceedings of the 2018 10th International Conference on Machine Learning and Computing\u2014ICMLC, Macau, China.","DOI":"10.1145\/3195106.3195117"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Chowdhury, M.M.U., Hammond, F., Konowicz, G., Xin, C., Wu, H., and Li, J. (2017, January 19\u201321). A few-shot deep learning approach for improved intrusion detection. Proceedings of the 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), New York, NY, USA.","DOI":"10.1109\/UEMCON.2017.8249084"},{"key":"ref_31","unstructured":"Bengio, Y., Lamblin, P., Popovici, D., and Larochelle, H. (2006, January 4\u20137). Greedy layer-wise training of deep networks. Proceedings of the 21st International Conference Neural Information Processing Systems (NIPS), Vancouver, BC, Canada."},{"key":"ref_32","unstructured":"Williams, C.K.I., and Seeger, M. (2001). Using the Nystrom method to speed up kernel machines. Advances in Neural Information Processing Systems, NIPS\u201900, MIT Press."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1016\/j.eswa.2019.01.063","article-title":"Shallow neural network with kernel approximation for prediction problems in highly demanding data networks","volume":"124","author":"Carro","year":"2019","journal-title":"Expert. Syst. Appl."},{"key":"ref_34","first-page":"1177","article-title":"Random features for large-scale kernel machines","volume":"Volume 20","author":"Rahimi","year":"2009","journal-title":"Proceedings of the Advances in Neural Information Processing Systems"},{"key":"ref_35","first-page":"1848","article-title":"A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection","volume":"2","author":"Revathi","year":"2013","journal-title":"Int. J. Eng. Res. Technol."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Paulauskas, N., and Auskalnis, J. (2017, January 27\u201327). Analysis of data pre-processing influence on intrusion detection using NSL-KDD dataset. Proceedings of the 2017 Open Conference of Electrical, Electronic and Information Sciences (eStream), Vilnius, Lithuania.","DOI":"10.1109\/eStream.2017.7950325"},{"key":"ref_37","first-page":"235","article-title":"Intrusion detection system for NSL-KDD data set using vectorised fitness function in genetic algorithm","volume":"10","author":"Bhattacharjee","year":"2017","journal-title":"Adv. Comput. Sci. Technol."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"484","DOI":"10.1016\/j.ins.2016.04.019","article-title":"Fuzziness based semi-supervised learning approach for intrusion detection system","volume":"378","author":"Ashfaq","year":"2017","journal-title":"Inf. Sci."},{"key":"ref_39","unstructured":"Glorot, X., and Bengio, Y. (2010, January 13\u201315). Understanding the difficulty of training deep feedforward neural networks. Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, Proceedings of Machine Learning Research, Sardinia, Italy."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"21954","DOI":"10.1109\/ACCESS.2017.2762418","article-title":"A deep learning approach for intrusion detection using recurrent neural networks","volume":"5","author":"Yin","year":"2017","journal-title":"IEEE Access"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., and Ghorbani, A.A. (2009, January 8\u201310). A detailed analysis of the KDD CUP 99 data set. Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, ON, Canada.","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Ma, T., Wang, F., Cheng, J., Yu, Y., and Chen, X. (2016). A hybrid spectral clustering and deep neural network ensemble algorithm for intrusion detection in sensor networks. Sensors, 16.","DOI":"10.3390\/s16101701"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Li, Z., Rios, A.L.G., Xu, G., and Trajkovic, L. (2019, January 26\u201329). Machine learning techniques for classifying network anomalies and intrusions. Proceedings of the 2019 IEEE International Symposium on Circuits and Systems (ISCAS), Sapporo, Japan.","DOI":"10.1109\/ISCAS.2019.8702583"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"94497","DOI":"10.1109\/ACCESS.2019.2928048","article-title":"TSE-IDS: A two-stage classifier ensemble for intelligent anomaly-based intrusion detection system","volume":"7","author":"Tama","year":"2019","journal-title":"IEEE Access"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Yang, Y., Zheng, K., Wu, C., and Yang, Y. (2019). Improving the classification effectiveness of intrusion detection by using improved conditional variational AutoEncoder and deep neural network. Sensors, 19.","DOI":"10.3390\/s19112528"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/s42452-019-1931-0","article-title":"Future developments in standardisation of cyber risk in the Internet of Things (IoT)","volume":"2","author":"Radanliev","year":"2020","journal-title":"SN Appl. Sci."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/19\/5710\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:17:19Z","timestamp":1760177839000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/19\/5710"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,8]]},"references-count":46,"journal-issue":{"issue":"19","published-online":{"date-parts":[[2020,10]]}},"alternative-id":["s20195710"],"URL":"https:\/\/doi.org\/10.3390\/s20195710","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2020,10,8]]}}}