{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T15:47:24Z","timestamp":1778168844094,"version":"3.51.4"},"reference-count":155,"publisher":"MDPI AG","issue":"21","license":[{"start":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T00:00:00Z","timestamp":1635120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100007809","name":"Saudi Aramco","doi-asserted-by":"publisher","award":["Cybersecurity chair"],"award-info":[{"award-number":["Cybersecurity chair"]}],"id":[{"id":"10.13039\/501100007809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The significant growth in the use of the Internet and the rapid development of network technologies are associated with an increased risk of network attacks. Network attacks refer to all types of unauthorized access to a network including any attempts to damage and disrupt the network, often leading to serious consequences. Network attack detection is an active area of research in the community of cybersecurity. In the literature, there are various descriptions of network attack detection systems involving various intelligent-based techniques including machine learning (ML) and deep learning (DL) models. However, although such techniques have proved useful within specific domains, no technique has proved useful in mitigating all kinds of network attacks. This is because some intelligent-based approaches lack essential capabilities that render them reliable systems that are able to confront different types of network attacks. This was the main motivation behind this research, which evaluates contemporary intelligent-based research directions to address the gap that still exists in the field. The main components of any intelligent-based system are the training datasets, the algorithms, and the evaluation metrics; these were the main benchmark criteria used to assess the intelligent-based systems included in this research article. This research provides a rich source of references for scholars seeking to determine their scope of research in this field. Furthermore, although the paper does present a set of suggestions about future inductive directions, it leaves the reader free to derive additional insights about how to develop intelligent-based systems to counter current and future network attacks.<\/jats:p>","DOI":"10.3390\/s21217070","type":"journal-article","created":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T21:42:05Z","timestamp":1635198125000},"page":"7070","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":56,"title":["Intelligent Techniques for Detecting Network Attacks: Review and Research Directions"],"prefix":"10.3390","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9255-6094","authenticated-orcid":false,"given":"Malak","family":"Aljabri","sequence":"first","affiliation":[{"name":"Computer Science Department, College of Computer and Information Systems, Umm Al-Qura University, Makkah 21955, Saudi Arabia"},{"name":"SAUDI ARAMCO Cybersecurity Chair, Department of Computer Science, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8246-4658","authenticated-orcid":false,"given":"Sumayh S.","family":"Aljameel","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2612-1615","authenticated-orcid":false,"given":"Rami Mustafa A.","family":"Mohammad","sequence":"additional","affiliation":[{"name":"Department of Computer Information Systems, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1594-9115","authenticated-orcid":false,"given":"Sultan H.","family":"Almotiri","sequence":"additional","affiliation":[{"name":"Computer Science Department, College of Computer and Information Systems, Umm Al-Qura University, Makkah 21955, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3754-6894","authenticated-orcid":false,"given":"Samiha","family":"Mirza","sequence":"additional","affiliation":[{"name":"SAUDI ARAMCO Cybersecurity Chair, Department of Computer Science, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4916-8977","authenticated-orcid":false,"given":"Fatima M.","family":"Anis","sequence":"additional","affiliation":[{"name":"SAUDI ARAMCO Cybersecurity Chair, Department of Computer Science, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5455-4098","authenticated-orcid":false,"given":"Menna","family":"Aboulnour","sequence":"additional","affiliation":[{"name":"SAUDI ARAMCO Cybersecurity Chair, Department of Computer Science, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9031-9917","authenticated-orcid":false,"given":"Dorieh M.","family":"Alomari","sequence":"additional","affiliation":[{"name":"SAUDI ARAMCO Cybersecurity Chair, Department of Computer Engineering, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia"}]},{"given":"Dina H.","family":"Alhamed","sequence":"additional","affiliation":[{"name":"SAUDI ARAMCO Cybersecurity Chair, Department of Computer Engineering, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia"}]},{"given":"Hanan S.","family":"Altamimi","sequence":"additional","affiliation":[{"name":"SAUDI ARAMCO Cybersecurity Chair, Department of Computer Science, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2021,10,25]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Goli, Y.D., and Ambika, R. (2018, January 21\u201322). Network Traffic Classification Techniques-A Review. Proceedings of the International Conference on Computational Techniques, Electronics and Mechanical Systems, CTEMS 2018, Belgaum, India.","DOI":"10.1109\/CTEMS.2018.8769309"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/j.inffus.2021.02.009","article-title":"Network traffic classification for data fusion: A survey","volume":"72","author":"Zhao","year":"2021","journal-title":"Inf. Fusion"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1251","DOI":"10.1109\/COMST.2020.2964534","article-title":"Machine Learning for Resource Management in Cellular and IoT Networks: Potentials, Current Solutions, and Open Challenges","volume":"22","author":"Hussain","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_4","first-page":"742","article-title":"Cloud computing: Major challenges and counter acts","volume":"9","author":"Shaikh","year":"2018","journal-title":"Int. J. Adv. Res. Comput. Sci."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1007\/s11277-017-4647-8","article-title":"A Survey of IoT Key Enabling and Future Technologies: 5G, Mobile IoT, Sematic Web and Applications","volume":"97","author":"Goudos","year":"2017","journal-title":"Wirel. Pers. Commun."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Rahman, R.U., and Tomar, D.S. (2018). Security attacks on wireless networks and their detection techniques. Emerging Wireless Communication and Network Technologies: Principle, Paradigm and Performance, Springer.","DOI":"10.1007\/978-981-13-0396-8_13"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Sharma, N., Chakrabarti, A., and Balas, V.E. (2020). Intrusion Detection and Prevention Systems: An Updated Review. Data Management, Analytics and Innovation, Springer.","DOI":"10.1007\/978-981-13-9364-8"},{"key":"ref_8","unstructured":"Witten, I., Frank, E., Hall, M., and Pal, C. (2016). Data Mining\u2014Practical Machine Learning Tools and Techniques, Morgan Kaufmann. [4th ed.]."},{"key":"ref_9","unstructured":"Goodfellow, I., Bengio, Y., and Courville, A. (2016). Deep Learning-Adaptive Computation and Machine Learning Series\u2014Deep Learning, The MIT Press."},{"key":"ref_10","unstructured":"Tuor, A., Kaplan, S., Hutchinson, B., Nichols, N., and Robinson, S. (2017, January 4\u20135). Deep learning for unsupervised insider threat detection in structured cybersecurity data streams. Proceedings of the Artificial Intelligence for Cyber Security Workshop (AAAI-2017), San Francisco, CA, USA."},{"key":"ref_11","first-page":"80","article-title":"Generating test data for insider threat detectors","volume":"5","author":"Lindauer","year":"2014","journal-title":"J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Yuan, F., Cao, Y., Shang, Y., Liu, Y., Tan, J., and Fang, B. (2018). Insider Threat Detection with Deep Neural Network. Computational Science\u2014ICCS 2018, Springer.","DOI":"10.1007\/978-3-319-93698-7_4"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Glasser, J., and Lindauer, B. (2013, January 23\u201324). Bridging the gap: A pragmatic approach to generating insider threat data. Proceedings of the 2013 IEEE Security and Privacy Workshops, San Francisco, CA, USA.","DOI":"10.1109\/SPW.2013.37"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1155\/2019\/3898951","article-title":"An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning","volume":"2019","author":"Hu","year":"2019","journal-title":"Secur. Comm. Netw."},{"key":"ref_15","unstructured":"F\u00fcl\u00f6p, A., Kov\u00e1cs, L., Kurics, T., and Windhager-Pokol, E. (2021, October 20). GitHub\u2014Balabit\/Mouse-Dynamics-Challenge. Available online: https:\/\/github.com\/balabit\/Mouse-Dynamics-Challenge."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Yuan, X., Li, C., and Li, X. (2017, January 29\u201331). DeepDefense: Identifying DDoS Attack via Deep Learning. Proceedings of the 2017 IEEE International Conference on Smart Computing (SMARTCOMP), Hong Kong, China.","DOI":"10.1109\/SMARTCOMP.2017.7946998"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/j.cose.2011.12.012","article-title":"Toward developing a systematic approach to generate benchmark datasets for intrusion detection","volume":"31","author":"Shiravi","year":"2012","journal-title":"Comput. Secur."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Baek, U.J., Ji, S.H., Park, J.T., Lee, M.S., Park, J.S., and Kim, M.S. (2019, January 18\u201320). DDoS Attack Detection on Bitcoin Ecosystem using Deep-Learning. Proceedings of the 2019 20th Asia-Pacific Network Operations and Management Symposium (APNOMS), Matsue, Japan.","DOI":"10.23919\/APNOMS.2019.8892837"},{"key":"ref_19","unstructured":"Vasek, M., Thornton, M., and Moore, T. (2021, October 20). Replication data for: Empirical analysis of denial-of-service attacks in the bitcoin ecosystem. Harvard Dataverse, V2, Available online: https:\/\/dataverse.harvard.edu\/dataset.xhtml?persistentId=doi:10.7910\/DVN\/25541."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Sabeel, U., Heydari, S.S., Mohanka, H., Bendhaou, Y., Elgazzar, K., and El-Khatib, K. (2019, January 17\u201319). Evaluation of Deep Learning in Detecting Unknown Network Attacks. Proceedings of the 2019 International Conference on Smart Applications, Communications and Networking (SmartNets), Sharm El Sheikh, Egypt.","DOI":"10.1109\/SmartNets48225.2019.9069788"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Elsayed, M.S., Le-Khac, N.A., Dev, S., and Jurcut, A.D. (September, January 31). DDoSNet: A Deep-Learning Model for Detecting Network Attacks. Proceedings of the 2020 IEEE 21st International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM), Cork, Ireland.","DOI":"10.1109\/WoWMoM49955.2020.00072"},{"key":"ref_22","unstructured":"DDoS (2021, October 20). Datasets | Research| Canadian Institute for Cybersecurity | UNB. Available online: https:\/\/www.unb.ca\/cic\/datasets\/ddos-2019.html."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"876","DOI":"10.1109\/TNSM.2020.2971776","article-title":"Lucid: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection","volume":"17","author":"Millar","year":"2020","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Ahuja, N., Singal, G., and Mukhopadhyay, D. (2021, January 28\u201329). DLSDN: Deep learning for DDOS attack detection in software defined networking. Proceedings of the 2021 11th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India.","DOI":"10.1109\/Confluence51648.2021.9376879"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"3","DOI":"10.5596\/c16-022","article-title":"Mendeley Data","volume":"37","author":"Swab","year":"2016","journal-title":"J. Can. Health Libr. Assoc."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Shi, Z., Li, J., and Wu, C. (2019, January 9\u201313). DeepDDoS: Online DDoS attack detection. Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA.","DOI":"10.1109\/GLOBECOM38437.2019.9013186"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"12","DOI":"10.4108\/eai.28-12-2017.153515","article-title":"A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN)","volume":"4","author":"Niyaz","year":"2017","journal-title":"ICST Trans. Secur. Saf."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Pande, S., Khamparia, A., Gupta, D., and Thanh, D.N.H. (2021). DDOS Detection Using Machine Learning Technique. Studies in Computational Intelligence, Springer.","DOI":"10.1007\/978-981-15-8469-5_5"},{"key":"ref_29","unstructured":"University of New Brunswick (2021, October 15). NSL-KDD Data Set for Network-Based Intrusion Detection Systems. NSL-KDD Dataset, Available online: http:\/\/www.unb.ca\/cic\/datasets\/nsl.html."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Radivilova, T., Kirichenko, L., Ageiev, D., and Bulakh, V. (2019, January 18\u201321). Classification methods of machine learning to detect DDoS attacks. Proceedings of the 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Metz, France.","DOI":"10.1109\/IDAACS.2019.8924406"},{"key":"ref_31","first-page":"1162","article-title":"Towards Generating Realistic SNMP-MIB Dataset for Network Anomaly Detection","volume":"14","year":"2016","journal-title":"Int. J. Comput. Sci. Inf. Secur."},{"key":"ref_32","first-page":"1574749","article-title":"Smart Detection: An Online Approach for DoS\/DDoS Attack Detection Using Machine Learning","volume":"2019","author":"Silveira","year":"2019","journal-title":"Secur. Commun. Netw."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.comnet.2017.03.018","article-title":"Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling","volume":"121","author":"Jazi","year":"2017","journal-title":"Comput. Netw."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Vijayanand, R., Devaraj, D., and Kannapiran, B. (2019, January 11\u201313). A Novel Deep Learning Based Intrusion Detection System for Smart Meter Communication Network. Proceedings of the 2019 IEEE International Conference on Intelligent Techniques in Control, Optimization and Signal Processing (INCOS), Tamilnadu, India.","DOI":"10.1109\/INCOS45849.2019.8951344"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"102008","DOI":"10.1016\/j.cose.2020.102008","article-title":"An improved rule induction based denial of service attacks classification model","volume":"99","author":"Mohammad","year":"2020","journal-title":"Comput. Secur."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Moustafa, N., and Slay, J. (2015, January 10\u201312). UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). Proceedings of the 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia.","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref_37","unstructured":"(2021, June 29). The CAIDA \u201cDDoS Attack 2007\u201d Dataset\u2014CAIDA. Available online: https:\/\/www.caida.org\/catalog\/datasets\/ddos-20070804_dataset\/."},{"key":"ref_38","unstructured":"Robinson, R.R.R., and Thomas, C. (2016, January 10\u201312). Ranking of machine learning algorithms based on the performance in classifying DDoS attacks. Proceedings of the 2015 IEEE Recent Advances in Intelligent Computational Systems (RAICS), Trivandrum, India."},{"key":"ref_39","unstructured":"Hettich, S.B. (2021, October 12). The UCI KDD Archive. Irvine, CA: University of California, Department of Information and Computer Science. Available online: http:\/\/kdd.ics.uci.edu\/."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Barati, M., Abdullah, A., Udzir, N.I., Mahmod, R., and Mustapha, N. (2014, January 26\u201327). Distributed Denial of Service detection using hybrid machine learning technique. Proceedings of the 2014 International Symposium on Biometrics and Security Technologies (ISBAST), Kuala Lumpur, Malaysia.","DOI":"10.1109\/ISBAST.2014.7013133"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Kim, J., Kim, J., Kim, H., Shim, M., and Choi, E. (2020). CNN-Based Network Intrusion Detection against Denial-of-Service Attacks. Electronics, 9.","DOI":"10.3390\/electronics9060916"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1016\/j.future.2021.01.022","article-title":"DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU)","volume":"118","author":"Khaliq","year":"2021","journal-title":"Futur. Gener. Comput. Syst."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Alam, M.N., Sarma, D., Lima, F.F., Saha, I., Ulfath, R.E., and Hossain, S. (2020, January 20\u201322). Phishing attacks detection using machine learning approach. Proceedings of the 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT), Tirunelveli, India.","DOI":"10.1109\/ICSSIT48917.2020.9214225"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1007\/s00521-013-1490-z","article-title":"Predicting phishing websites based on self-structuring neural network","volume":"25","author":"Mohammad","year":"2014","journal-title":"Neural Comput. Appl."},{"key":"ref_45","unstructured":"Mohammad, R.M.A., McCluske, L., and Thabtah, F. (2021, October 20). Phishing Websites Data Set. Available online: https:\/\/archive.ics.uci.edu\/ml\/datasets\/phishing+websites."},{"key":"ref_46","unstructured":"Mohammad, R.M., Thabtah, F., and McCluskey, L. (2012, January 10\u201312). An assessment of features related to phishing websites using an automated technique. Proceedings of the 2012 International Conference for Internet Technology and Secured Transactions, London, UK."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Thabtah, F., Mohammad, R.M., and McCluskey, L. (2016, January 24\u201329). A dynamic self-structuring neural network model to combat phishing. Proceedings of the 2016 International Joint Conference on Neural Networks (IJCNN), Vancouver, BC, Canada.","DOI":"10.1109\/IJCNN.2016.7727750"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Rendall, K., Nisioti, A., and Mylonas, A. (2020). Towards a Multi-Layered Phishing Detection. Sensors, 20.","DOI":"10.3390\/s20164540"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1016\/j.future.2018.11.004","article-title":"A stacking model using URL and HTML features for phishing webpage detection","volume":"94","author":"Li","year":"2019","journal-title":"Futur. Gener. Comput. Syst."},{"key":"ref_50","unstructured":"Lin, Y., Liu, R., Divakaran, M., Ng, J.Y., Chan, Q.Z., Lu, Y., Si, Y., Zhang, F., and Dong, J.S. (2021, January 11\u201313). Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages. Proceedings of the 30th {USENIX} Security Symposium ({USENIX} Security 21, Online."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Butnaru, A., Mylonas, A., and Pitropakis, N. (2021). Towards lightweight url-based phishing detection. Futur. Internet, 13.","DOI":"10.3390\/fi13060154"},{"key":"ref_52","unstructured":"Kumar, S. (2021, October 19). Malicious and Benign URLs | Kaggle. Available online: https:\/\/www.kaggle.com\/siddharthkumar25\/malicious-and-benign-urls."},{"key":"ref_53","unstructured":"(2021, October 19). SEO Backlink Checker & Link Building Toolset | Majestic.com. Available online: https:\/\/majestic.com\/."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"101084","DOI":"10.1016\/j.pmcj.2019.101084","article-title":"PhishDump: A multi-model ensemble based technique for the detection of phishing sites in mobile devices","volume":"60","author":"Rao","year":"2019","journal-title":"Pervasive Mob. Comput."},{"key":"ref_55","unstructured":"Marchal, S., and Asokan, N. (2021, August 23). On Designing and Evaluating Phishing Webpage Detection Techniques for the Real World. Available online: https:\/\/w3techs.com\/technologies\/."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1109\/COMST.2019.2957750","article-title":"SoK: A Comprehensive Reexamination of Phishing Research From the Security Perspective","volume":"22","author":"Das","year":"2020","journal-title":"IEEE Comm. Surv. Tutor."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Beaver, J.M., Symons, C.T., and Gillen, R.E. (2013, January 8\u201310). A learning system for discriminating variants of malicious network traffic. Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, TN, USA.","DOI":"10.1145\/2459976.2460003"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Ahmed, A.A., Jabbar, W.A., Sadiq, A.S., and Patel, H. (2020). Deep learning-based classification model for botnet attack detection. J. Ambient Intell. Humaniz. Comput.","DOI":"10.1007\/s12652-020-01848-9"},{"key":"ref_59","unstructured":"The CTU-13 Dataset (2021, October 20). A Labeled Dataset with Botnet, Normal and Background traffic\u2014Stratosphere IPS. Available online: https:\/\/www.stratosphereips.org\/datasets-ctu13."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Barut, O., Grohotolski, M., Dileo, C., Luo, Y., Li, P., and Zhang, T. (2020, January 22\u201324). Machine Learning Based Malware Detection on Encrypted Traffic: A Comprehensive Performance Study. Proceedings of the 7th International Conference on Networking, Systems and Security, Dhaka, Bangladesh.","DOI":"10.1145\/3428363.3428365"},{"key":"ref_61","unstructured":"Garcia, S., Parmisano, A., and Jose Erquiaga, M. (2021, October 20). IoT-23: A labeled dataset with malicious and benign IoT network traffic (Version 1.0.0) [Data set]. Available online: https:\/\/zenodo.org\/record\/4743746#.YXeyAhyEZPY."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Mar\u00edn, G., Casas, P., and Capdehourat, G. (2021). DeepMAL-Deep Learning Models for Malware Traffic Detection and Classification. Springer Vieweg.","DOI":"10.1007\/978-3-658-32182-6_16"},{"key":"ref_63","unstructured":"Wang, W., Zhu, M., Zeng, X., Ye, X., and Sheng, Y. (2017, January 11\u201313). Malware traffic classification using convolutional neural network for representation learning. Proceedings of the 2017 International Conference on Information Networking (ICOIN), Da Nang, Vietnam."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Park, K., Song, Y., and Cheong, Y.G. (2018, January 26\u201329). Classification of attack types for intrusion detection systems using a machine learning algorithm. Proceedings of the 2018 IEEE Fourth International Conference on Big Data Computing Service and Applications (BigDataService), Bamberg, Germany.","DOI":"10.1109\/BigDataService.2018.00050"},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Song, J., Takakura, H., Okabe, Y., Eto, M., Inoue, D., and Nakao, K. (2011, January 10). Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation. Proceedings of the 1st Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS 2011, Salzburg, Austria.","DOI":"10.1145\/1978672.1978676"},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"David, O.E., and Netanyahu, N.S. (2015, January 12\u201317). DeepSign: Deep learning for automatic malware signature generation and classification. Proceedings of the 2015 International Joint Conference on Neural Networks (IJCNN), Killarney, Ireland.","DOI":"10.1109\/IJCNN.2015.7280815"},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Wu, C., Shi, J., Yang, Y., and Li, W. (2018, January 2\u20134). Enhancing machine learning based malware detection model by reinforcement learning. Proceedings of the 8th International Conference on Communication and Network Security, Qingdao, China.","DOI":"10.1145\/3290480.3290494"},{"key":"ref_68","unstructured":"Anderson, H.S., and Roth, P. (2018). EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models. arXiv."},{"key":"ref_69","unstructured":"Letteri, I., Penna, G., Di Vita, L., and Grifa, M.T. (2021, October 20). MTA-KDD\u201919: A Dataset for Malware Traffic Detection. Available online: https:\/\/github.com\/IvanLetteri\/MTA-KDD-19."},{"key":"ref_70","unstructured":"Letteri, I., Di Cecco, A., and Della Penna, G. (2021, July 01). Dataset Optimization Strategies for MalwareTraffic Detection. Available online: http:\/\/arxiv.org\/abs\/2009.11347."},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Ramos, K.S.H., Monge, M.A.S., and Vidal, J.M. (2020). Benchmark-based reference model for evaluating botnet detection tools driven by traffic-flow analytics. Sensors, 20.","DOI":"10.3390\/s20164501"},{"key":"ref_72","first-page":"1","article-title":"Holistic Model for HTTP Botnet Detection Based on DNS Traffic Analysis","volume":"10618","author":"Alenazi","year":"2017","journal-title":"Adv. Artif. Intell."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"8021","DOI":"10.1007\/s00521-018-3595-x","article-title":"Deep learning to detect botnet via network flow summaries","volume":"31","author":"Acarman","year":"2019","journal-title":"Neural Comput. Appl."},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Abu Al-Haija, Q., and Zein-Sabatto, S. (2020). An Efficient Deep-Learning-Based Detection and Classification System for Cyber-Attacks in IoT Communication Networks. Electronics, 9.","DOI":"10.20944\/preprints202011.0508.v2"},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1109\/MNET.011.2000514","article-title":"A Machine Learning Approach for Blockchain-Based Smart Home Networks Security","volume":"35","author":"Khan","year":"2021","journal-title":"IEEE Netw."},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"124379","DOI":"10.1109\/ACCESS.2019.2937347","article-title":"Cyber security threats detection in internet of things using deep learning approach","volume":"7","author":"Ullah","year":"2019","journal-title":"IEEE Access"},{"key":"ref_77","unstructured":"(2021, October 20). GitHub\u2014Jur1cek\/gcj-Dataset: Collected Solutions from Google Code Jam Programming Competition (2008\u20132020). Available online: https:\/\/github.com\/Jur1cek\/gcj-dataset."},{"key":"ref_78","first-page":"1","article-title":"Attack classification analysis of IoT network via deep learning approach","volume":"3","author":"Tama","year":"2017","journal-title":"Res. Briefs Inf. Commun. Technol. Evol."},{"key":"ref_79","unstructured":"Ring, M., Wunderlich, S., Gr\u00fcdl, D., Landes, D., and Hotho, A. (2017, January 29\u201330). Flow-Based Benchmark Data Sets for Intrusion Detection. Proceedings of the 16th European Conference on Cyber Warfare and Security. ACPI, Dublin, Ireland."},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Vilela, D.W.F.L., Ferreira, E.T., Shinoda, A.A., De Souza Araujo, N.V., De Oliveira, R., and Nascimento, V.E. (2014, January 4\u20136). A dataset for evaluating intrusion detection systems in IEEE 802.11 wireless networks. Proceedings of the 2014 IEEE Colombian Conference on Communications and Computing (COLCOM), Bogota, Colombia.","DOI":"10.1109\/ColComCon.2014.6860434"},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Alrashdi, I., Alqazzaz, A., Aloufi, E., Alharthi, R., Zohdy, M., and Ming, H. (2019, January 7\u20139). AD-IoT: Anomaly detection of IoT cyberattacks in smart city using machine learning. Proceedings of the 2019 IEEE 9th Annual Computing and Communication Workshop and Conference, CCWC 2019, Las Vegas, NV, USA.","DOI":"10.1109\/CCWC.2019.8666450"},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"7842","DOI":"10.1109\/ACCESS.2019.2963716","article-title":"NetFlow Monitoring and Cyberattack Detection Using Deep Learning with Ceph","volume":"8","author":"Yang","year":"2020","journal-title":"IEEE Access"},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Der Chou, L., Tseng, C.W., Lai, M.S., Chen, W.Y., Chen, K.C., Yen, C.K., Ou, T.F., Tsai, W.H., and Chiu, Y.H. (2018, January 17\u201319). Classification of Malicious Traffic Using TensorFlow Machine Learning. Proceedings of the 2018 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea.","DOI":"10.1109\/ICTC.2018.8539685"},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Dutta, V., Chora\u015b, M., Pawlicki, M., and Kozik, R. (2020). A deep learning ensemble for network anomaly and cyber-attack detection. Sensors, 20.","DOI":"10.3390\/s20164583"},{"key":"ref_85","doi-asserted-by":"crossref","unstructured":"Damasevicius, R., Venckauskas, A., Grigaliunas, S., Toldinas, J., Morkevicius, N., Aleliunas, T., and Smuikys, P. (2020). Litnet-2020: An annotated real-world network flow dataset for network intrusion detection. Electronics, 9.","DOI":"10.3390\/electronics9050800"},{"key":"ref_86","unstructured":"(2021, October 20). Overview\u2014EvalAI. Available online: https:\/\/eval.ai\/web\/challenges\/challenge-page\/526\/overview."},{"key":"ref_87","doi-asserted-by":"crossref","unstructured":"Sun, R., Yang, B., Peng, L., Chen, Z., Zhang, L., and Jing, S. (2010, January 10\u201312). Traffic classification using probabilistic neural networks. Proceedings of the 2010 Sixth International Conference on Natural Computation, Yantai, China.","DOI":"10.1109\/ICNC.2010.5584648"},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1007\/978-3-030-04503-6_15","article-title":"Deep learning for classifying malicious network traffic","volume":"11154 LNAI","author":"Millar","year":"2018","journal-title":"Lect. Notes Comput. Sci."},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1049\/ell2.12125","article-title":"A deep-learning- and reinforcement-learning-based system for encrypted network malicious traffic detection","volume":"57","author":"Yang","year":"2021","journal-title":"Electron. Lett."},{"key":"ref_90","unstructured":"Xu, Z., Ray, S., Subramanyan, P., and Malik, S. (, January 27\u201331). Malware detection using machine learning based analysis of virtual memory access patterns. Proceedings of the Design, Automation & Test in Europe Conference & Exhibition (DATE), Lausanne, Switzerland."},{"key":"ref_91","doi-asserted-by":"crossref","unstructured":"De Lucia, M.J., and Cotton, C. (2019, January 12\u201314). Detection of Encrypted Malicious Network Traffic using Machine Learning. Proceedings of the MILCOM 2019\u20142019 IEEE Military Communications Conference (MILCOM), Norfolk, VA, USA.","DOI":"10.1109\/MILCOM47813.2019.9020856"},{"key":"ref_92","unstructured":"Garcia, S. (2021, October 15). Malware Capture Facility Project. Available online: https:\/\/stratosphereips.org."},{"key":"ref_93","unstructured":"(2021, October 09). PcapPlusPlus\u2014A multiplatform C++ library for capturing, parsing and crafting of network packets. Available online: https:\/\/pcapplusplus.github.io\/."},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"4867","DOI":"10.1007\/s11227-018-2263-3","article-title":"A machine learning approach for feature selection traffic classification using security analysis","volume":"74","author":"Shafiq","year":"2018","journal-title":"J. Supercomput."},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"60","DOI":"10.4018\/IJWNBT.2020070104","article-title":"Detection of Virtual Private Network Traffic Using Machine Learning","volume":"9","author":"Miller","year":"2020","journal-title":"Int. J. Wirel. Netw. Broadband Technol."},{"key":"ref_96","doi-asserted-by":"crossref","unstructured":"Wang, S., Wang, Y., and Tang, M. (2020, January 27\u201329). Auto Malicious Websites Classification Based on Naive Bayes Classifier. Proceedings of the 2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE), Dalian, China.","DOI":"10.1109\/ICISCAE51034.2020.9236912"},{"key":"ref_97","first-page":"467","article-title":"Detecting Malicious URLs Using Lexical Analysis","volume":"Volume 9955","author":"Mamun","year":"2016","journal-title":"Formal Methods in Outer Space"},{"key":"ref_98","unstructured":"Ongun, T., Sakharaov, T., Boboila, S., Oprea, A., and Eliassi-Rad, T. (2019). On Designing Machine Learning Models for Malicious Network Traffic Classification. arXiv."},{"key":"ref_99","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40537-021-00475-1","article-title":"Apply machine learning techniques to detect malicious network traffic in cloud computing","volume":"8","author":"Alshammari","year":"2021","journal-title":"J. Big Data"},{"key":"ref_100","doi-asserted-by":"crossref","first-page":"101646","DOI":"10.1016\/j.cose.2019.101646","article-title":"Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking","volume":"88","author":"Aldribi","year":"2020","journal-title":"Comput. Secur."},{"key":"ref_101","doi-asserted-by":"crossref","unstructured":"Sethi, K., Kumar, R., Mohanty, D., and Bera, P. (2020). Robust Adaptive Cloud Intrusion Detection System Using Advanced Deep Reinforcement Learning, Springer.","DOI":"10.1007\/978-3-030-66626-2_4"},{"key":"ref_102","doi-asserted-by":"crossref","unstructured":"Xie, M., Hu, J., and Slay, J. (2014, January 19\u201321). Evaluating host-based anomaly detection systems: Application of the one-class SVM algorithm to ADFA-LD. Proceedings of the 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), Xiamen, China.","DOI":"10.1109\/FSKD.2014.6980972"},{"key":"ref_103","doi-asserted-by":"crossref","unstructured":"Creech, G., and Hu, J. (2013, January 7\u201310). Generation of a new IDS test dataset: Time to retire the KDD collection. Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), Shanghai, China.","DOI":"10.1109\/WCNC.2013.6555301"},{"key":"ref_104","doi-asserted-by":"crossref","unstructured":"Vanhoenshoven, F., Napoles, G., Falcon, R., Vanhoof, K., and Koppen, M. (2016, January 6\u20139). Detecting malicious URLs using machine learning techniques. Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence (SSCI), Athens, Greece.","DOI":"10.1109\/SSCI.2016.7850079"},{"key":"ref_105","doi-asserted-by":"crossref","unstructured":"Ma, J., Saul, L.K., Savage, S., and Voelker, G.M. (2009, January 14\u201318). Identifying suspicious URLs: An application of large-scale online learning. Proceedings of the 26th Annual International Conference on Machine Learning, Montreal, QC, Canada.","DOI":"10.1145\/1553374.1553462"},{"key":"ref_106","doi-asserted-by":"crossref","first-page":"9464","DOI":"10.1109\/ACCESS.2021.3049625","article-title":"Malicious URL detection based on a parallel neural joint model","volume":"9","author":"Yuan","year":"2021","journal-title":"IEEE Access"},{"key":"ref_107","first-page":"508","article-title":"A Scheme for Generating a Dataset for Anomalous Activity Detection in IoT Networks","volume":"Volume 12109","author":"Ullah","year":"2020","journal-title":"Artificial Intelligence and Lecture Notes in Bioinformatics"},{"key":"ref_108","doi-asserted-by":"crossref","unstructured":"Maniriho, P., Niyigaba, E., Bizimana, Z., Twiringiyimana, V., Mahoro, L.J., and Ahmad, T. (2020, January 17\u201318). Anomaly-based Intrusion Detection Approach for IoT Networks Using Machine Learning. Proceedings of the 2020 International Conference on Computer Engineering, Network, and Intelligent Multimedia (CENIM), Surabaya, Indonesia.","DOI":"10.1109\/CENIM51130.2020.9297958"},{"key":"ref_109","doi-asserted-by":"crossref","unstructured":"Qaddoura, R., Al-Zoubi, A.M., Almomani, I., and Faris, H. (2021). A multi-stage classification approach for iot intrusion detection based on clustering with oversampling. Appl. Sci., 11.","DOI":"10.3390\/app11073022"},{"key":"ref_110","doi-asserted-by":"crossref","unstructured":"Qaddoura, R., Al-Zoubi, A.M., Faris, H., and Almomani, I. (2021). A multi-layer classification approach for intrusion detection in iot networks based on deep learning. Sensors, 21.","DOI":"10.3390\/s21092987"},{"key":"ref_111","doi-asserted-by":"crossref","unstructured":"Singh, S.K., and Roy, P.K. (2020, January 20\u201321). Detecting Malicious DNS over HTTPS Traffic Using Machine Learning. Proceedings of the 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT), Sakheer, Bahrain.","DOI":"10.1109\/3ICT51146.2020.9312004"},{"key":"ref_112","doi-asserted-by":"crossref","unstructured":"Li, Q., Qi, X., Liu, J., and Han, H. (2017, January 19\u201321). Design and implementation of traditional DNS protocol. Proceedings of the 2017 International Conference on Computer Technology, Electronics and Communication (ICCTEC), Dalian, China.","DOI":"10.1109\/ICCTEC.2017.00303"},{"key":"ref_113","unstructured":"(2021, October 09). GitHub\u2014Ahlashkari\/DoHLyzer: DoHlyzer Is a DNS over HTTPS (DoH) Traffic Flow Generator and Analyzer for Anomaly Detection and Characterization. Available online: https:\/\/github.com\/ahlashkari\/DoHlyzer."},{"key":"ref_114","doi-asserted-by":"crossref","first-page":"52843","DOI":"10.1109\/ACCESS.2018.2869577","article-title":"Deep Learning Approach Combining Sparse Autoencoder with SVM for Network Intrusion Detection","volume":"6","author":"Lasheng","year":"2018","journal-title":"IEEE Access"},{"key":"ref_115","first-page":"e2","article-title":"A deep learning approach for network intrusion detection system","volume":"3","author":"Niyaz","year":"2016","journal-title":"EAI Int. Conf. Bio-inspired Inf. Commun. Technol."},{"key":"ref_116","doi-asserted-by":"crossref","unstructured":"Zhang, C., Ruan, F., Yin, L., Chen, X., Zhai, L., and Liu, F. (2019, January 25\u201327). A Deep Learning Approach for Network Intrusion Detection Based on NSL-KDD Dataset. In Proceedings of 2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID), Xiamen, China.","DOI":"10.1109\/ICASID.2019.8925239"},{"key":"ref_117","doi-asserted-by":"crossref","unstructured":"Wu, P., and Guo, H. (2019, January 6\u20139). LuNet: A Deep Neural Network for Network Intrusion Detection. Proceedings of the 2019 IEEE Symposium Series on Computational Intelligence (SSCI), Xiamen, China.","DOI":"10.1109\/SSCI44817.2019.9003126"},{"key":"ref_118","unstructured":"Al Mehedi Hasan, M., Pal, B., and Mijanur Rahman Howlader, M. (2019, January 7\u20139). A Neural Network Based Approach To Network Intrusion Detection And Analyzing Different Backpropagation Algorithm Training Approaches. Proceedings of the International Conference on Electrical, Computer and Telecommunication Engineering, Cox\u2019s Bazar, Banglades."},{"key":"ref_119","unstructured":"Lippmann, R.P., Fried, D.J., Graf, I., Haines, J.W., Kendall, K.R., McClung, D., Weber, D., Webster, S.E., Wyschogrod, D., and Cunningham, R.K. (2000, January 25\u201327). Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. Proceedings of the DARPA Information Survivability Conference and Exposition. DISCEX\u201900, Hilton Head, SC, USA."},{"key":"ref_120","first-page":"1959","article-title":"An Artificial Neural Network based Intrusion Detection System and Classification of Attacks","volume":"3","author":"S","year":"2013","journal-title":"Int. J. Eng. Res. Appl."},{"key":"ref_121","doi-asserted-by":"crossref","first-page":"601","DOI":"10.2298\/CSIS130415035A","article-title":"Flow-based anomaly intrusion detection system using two neural network stages","volume":"11","author":"Abuadlla","year":"2014","journal-title":"Comput. Sci. Inf. Syst."},{"key":"ref_122","doi-asserted-by":"crossref","unstructured":"Alrawashdeh, K., and Purdy, C. (2016, January 18\u201320). Toward an online anomaly intrusion detection system based on deep learning. Proceedings of the 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA), Anaheim, CA, USA.","DOI":"10.1109\/ICMLA.2016.0040"},{"key":"ref_123","doi-asserted-by":"crossref","unstructured":"Faraj Al-Janabi, S.T., and Saeed, H.A. (2011, January 6\u20138). A neural network based anomaly intrusion detection system. Proceedings of the 2011 Developments in E-systems Engineering, Dubai, United Arab Emirates.","DOI":"10.1109\/DeSE.2011.19"},{"key":"ref_124","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.procs.2016.06.016","article-title":"Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection","volume":"89","author":"Belavagi","year":"2016","journal-title":"Procedia Comput. Sci."},{"key":"ref_125","doi-asserted-by":"crossref","unstructured":"Almseidin, M., Alzubi, M., Kovacs, S., and Alkasassbeh, M. (2017, January 14\u201316). Evaluation of machine learning algorithms for intrusion detection system. Proceedings of the 2017 IEEE 15th International Symposium on Intelligent Systems and Informatics (SISY), Subotica, Serbia.","DOI":"10.1109\/SISY.2017.8080566"},{"key":"ref_126","doi-asserted-by":"crossref","unstructured":"Choudhury, S., and Bhowal, A. (2015, January 6\u20138). Comparative analysis of machine learning algorithms along with classifiers for network intrusion detection. Proceedings of the 2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), Avadi, India.","DOI":"10.1109\/ICSTM.2015.7225395"},{"key":"ref_127","doi-asserted-by":"crossref","unstructured":"Sumaiya Thaseen, I., Poorva, B., and Ushasree, P.S. (2020, January 24\u201325). Network Intrusion Detection using Machine Learning Techniques. Proceedings of the 2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE), Vellore, India.","DOI":"10.1109\/ic-ETITE47903.2020.148"},{"key":"ref_128","doi-asserted-by":"crossref","unstructured":"Churcher, A., Ullah, R., Ahmad, J., Ur Rehman, S., Masood, F., Gogate, M., Alqahtani, F., Nour, B., and Buchanan, W.J. (2021). An experimental analysis of attack classification using machine learning in IoT networks. Sensors, 21.","DOI":"10.3390\/s21020446"},{"key":"ref_129","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","article-title":"Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset","volume":"100","author":"Koroniotis","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_130","doi-asserted-by":"crossref","unstructured":"Halimaa, A.A., and Sundarakantham, K. (2019, January 23\u201325). Machine learning based intrusion detection system. Proceedings of the 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), Tirunelveli, India.","DOI":"10.1109\/ICOEI.2019.8862784"},{"key":"ref_131","doi-asserted-by":"crossref","unstructured":"Ghanem, K., Aparicio-Navarro, F.J., Kyriakopoulos, K.G., Lambotharan, S., and Chambers, J.A. (2017, January 6\u20137). Support Vector Machine for Network Intrusion and Cyber-Attack Detection. Proceedings of the 2017 Sensor Signal Processing for Defence Conference (SSPD), London, UK.","DOI":"10.1109\/SSPD.2017.8233268"},{"key":"ref_132","doi-asserted-by":"crossref","unstructured":"Mehmood, T., and Rais, H.B.M. (2016, January 15\u201317). Machine learning algorithms in context of intrusion detection. Proceedings of the 2016 3rd International Conference on Computer and Information Sciences (ICCOINS), Kuala Lumpur, Malaysia.","DOI":"10.1109\/ICCOINS.2016.7783243"},{"key":"ref_133","doi-asserted-by":"crossref","unstructured":"Alsubaie, F., Al-Akhras, M., and Alzahrani, H.A. (2020, January 3\u20135). Using Machine Learning for Intrusion Detection System in Wireless Body Area Network. Proceedings of the 2020 First International Conference of Smart Systems and Emerging Technologies (SMARTTECH), Riyadh, Saudi Arabia.","DOI":"10.1109\/SMART-TECH49988.2020.00036"},{"key":"ref_134","doi-asserted-by":"crossref","first-page":"4731953","DOI":"10.1155\/2016\/4731953","article-title":"WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks","volume":"2016","author":"Almomani","year":"2016","journal-title":"J. Sens."},{"key":"ref_135","doi-asserted-by":"crossref","first-page":"33789","DOI":"10.1109\/ACCESS.2018.2841987","article-title":"Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection","volume":"6","author":"Ahmad","year":"2018","journal-title":"IEEE Access"},{"key":"ref_136","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.jal.2016.11.018","article-title":"Comparison of classification techniques applied for network intrusion detection and classification","volume":"24","author":"Amira","year":"2017","journal-title":"J. Appl. Log."},{"key":"ref_137","unstructured":"Gogoi, P., Borah, B., and Bhattacharyya, D.K. (2013). Network anomaly identification using supervised classifier. Informatica, 37."},{"key":"ref_138","first-page":"322","article-title":"Packet and Flow Based Network Intrusion Dataset","volume":"306","author":"Gogoi","year":"2012","journal-title":"Commun. Comput. Inf. Sci."},{"key":"ref_139","unstructured":"Wattanapongsakorn, N., Sangkatsanee, P., Srakaew, S., and Charnsripinyo, C. (2011, January 26\u201328). Classifying network attack types with machine learning approach. Proceedings of the 7th International Conference on Networked Computing, INC2011, Gumi, Korea."},{"key":"ref_140","doi-asserted-by":"crossref","first-page":"1805","DOI":"10.1109\/TSG.2020.2965797","article-title":"Flexible Machine Learning-Based Cyberattack Detection Using Spatiotemporal Patterns for Distribution Systems","volume":"11","author":"Cui","year":"2020","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_141","doi-asserted-by":"crossref","unstructured":"Kumar, S., Viinikainen, A., and Hamalainen, T. (2017, January 11\u201314). Evaluation of ensemble machine learning methods in mobile threat detection. Proceedings of the 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST), Cambridge, UK.","DOI":"10.23919\/ICITST.2017.8356396"},{"key":"ref_142","unstructured":"Tahir, H.M., Hasan, W., Said, A., Zakar, N.H., Katuk, N., Kabir, N.F., Omar, M.H., and Yahya, N.I. (2015, January 11\u201313). Hybrid Machine Learning Technique for Intrusion Detection System. Proceedings of the 5th International Conference on Computing and Informatics (ICOCI) 2015, Istanbul, Turkey."},{"key":"ref_143","unstructured":"Sharma, S.K., Pandey, P., Tiwari, S.K., and Sisodia, M.S. (2012, January 30\u201331). An improved network intrusion detection technique based on k-means clustering via Na\u00efve bayes classification. Proceedings of the IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM-2012), Nagapattinam, India."},{"key":"ref_144","unstructured":"Lehnert, K., and Friedrich, E. (2021, October 20). Machine Learning Classification of Malicious Network Traffic. Available online: http:\/\/cs229.stanford.edu\/proj2008\/LehnertFriedrich-MachineLearningClassificationOfMaliciousNetworkTraffic.pdf."},{"key":"ref_145","doi-asserted-by":"crossref","first-page":"9805","DOI":"10.1007\/s00521-021-05745-w","article-title":"Intrusion detection using Highest Wins feature selection algorithm","volume":"33","author":"Mohammad","year":"2021","journal-title":"Neural Comput. Appl."},{"key":"ref_146","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/978-3-030-13453-2_12","article-title":"Host Based Intrusion Detection System with Combined CNN\/RNN Model","volume":"Volume 11329","author":"Chawla","year":"2019","journal-title":"Lecture Notes in Computer Science"},{"key":"ref_147","first-page":"8376973","article-title":"Cyberattack detection in mobile cloud computing: A deep learning approach","volume":"2018","author":"Nguyen","year":"2018","journal-title":"IEEE Wirel. Commun. Netw. Conf. WCNC"},{"key":"ref_148","doi-asserted-by":"crossref","first-page":"94497","DOI":"10.1109\/ACCESS.2019.2928048","article-title":"TSE-IDS: A Two-Stage Classifier Ensemble for Intelligent Anomaly-Based Intrusion Detection System","volume":"7","author":"Tama","year":"2019","journal-title":"IEEE Access"},{"key":"ref_149","doi-asserted-by":"crossref","first-page":"4943509","DOI":"10.1155\/2018\/4943509","article-title":"TR-IDS: Anomaly-Based Intrusion Detection through Text-Convolutional Neural Network and Random Forest","volume":"2018","author":"Min","year":"2018","journal-title":"Secur. Commun. Netw."},{"key":"ref_150","doi-asserted-by":"crossref","first-page":"3369","DOI":"10.1109\/COMST.2018.2854724","article-title":"From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods","volume":"20","author":"Nisioti","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_151","doi-asserted-by":"crossref","unstructured":"Anderson, B., and McGrew, D. (2017, January 13\u201317). Machine learning for encrypted malware traffic classification: Accounting for noisy labels and non-stationarity. Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada.","DOI":"10.1145\/3097983.3098163"},{"key":"ref_152","doi-asserted-by":"crossref","first-page":"8925","DOI":"10.1016\/j.jfranklin.2020.04.033","article-title":"Non-iterative and Fast Deep Learning: Multilayer Extreme Learning Machines","volume":"357","author":"Zhang","year":"2020","journal-title":"J. Franklin Inst."},{"key":"ref_153","unstructured":"Ma, J., Saul, L.K., Savage, S., and Voelker, G.M. (July, January 28). Beyond blacklists: Learning to detect malicious web sites from suspicious URLs. Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France."},{"key":"ref_154","unstructured":"(2021, October 20). Find Open Datasets and Machine Learning Projects | Kaggle. Available online: https:\/\/www.kaggle.com\/datasets."},{"key":"ref_155","unstructured":"(2021, October 19). UCI Machine Learning Repository, Center for Machine Learning and Intelligent Systems. Available online: https:\/\/archive.ics.uci.edu\/ml\/index.php."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/21\/7070\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:23:07Z","timestamp":1760167387000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/21\/7070"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,25]]},"references-count":155,"journal-issue":{"issue":"21","published-online":{"date-parts":[[2021,11]]}},"alternative-id":["s21217070"],"URL":"https:\/\/doi.org\/10.3390\/s21217070","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,25]]}}}