<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462024000200473</article-id>
<article-id pub-id-type="doi">10.13053/cys-28-2-4579</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Optimizing the Performance of the IDS through Feature-Relevant Selection Using PSO and Random Forest Techniques]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Safa]]></surname>
<given-names><![CDATA[Benaissa]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Mohamed-Hamou]]></surname>
<given-names><![CDATA[Reda]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Toumouh]]></surname>
<given-names><![CDATA[Adil]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Djillali Liabes University Computer Science Department ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Algeria</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Dr. Tahar Moulay University Computer Science Department ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Algeria</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>06</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>06</month>
<year>2024</year>
</pub-date>
<volume>28</volume>
<numero>2</numero>
<fpage>473</fpage>
<lpage>488</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462024000200473&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462024000200473&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462024000200473&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: As the world becomes more digitalized, the potential for attacks increases, therefore, effective techniques for intrusion detection on network are needed. In this study, the authors propose a two steps approach. First, the Correlation-based Features Selection as a feature evaluator based on Particle Swarm Optimization is used to select the relevant features. This evaluator is compared with other evaluators. Second, the Random Forest algorithm is used to classify attacks in a network. A comparative study is also performed conducted with different classifiers such as Naïve Bayes, Stochastic Gradient Descent, Deep Learning, k-Nearest Neighbors and Support Vector Machine. Experiments were conducted on the NSL-KDD database and the results show an efficiency of 98.78% for binary classification. The performance results obtained show that the proposed technique performs better than other competing techniques.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Classification]]></kwd>
<kwd lng="en"><![CDATA[feature selection]]></kwd>
<kwd lng="en"><![CDATA[intrusion detection system]]></kwd>
<kwd lng="en"><![CDATA[machine learning]]></kwd>
<kwd lng="en"><![CDATA[NSL-KDD data set]]></kwd>
<kwd lng="en"><![CDATA[particle swarm optimization]]></kwd>
<kwd lng="en"><![CDATA[random forest]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aburomman]]></surname>
<given-names><![CDATA[A. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Reaz]]></surname>
<given-names><![CDATA[M. B. I.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A novel SVM-kNN-PSO ensemble method for intrusion detection system]]></article-title>
<source><![CDATA[Applied Soft Computing]]></source>
<year>2016</year>
<volume>38</volume>
<page-range>360-72</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aggarwal]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Sharma]]></surname>
<given-names><![CDATA[S. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Analysis of KDD dataset attributes - class wise for intrusion detection]]></article-title>
<source><![CDATA[Procedia Computer Science]]></source>
<year>2015</year>
<volume>57</volume>
<page-range>842-51</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alom]]></surname>
<given-names><![CDATA[M. Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Bontupalli]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Taha]]></surname>
<given-names><![CDATA[T. M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Intrusion detection using deep belief networks]]></source>
<year>2016</year>
<conf-name><![CDATA[ National Aerospace and Electronics Conference (NAECON)]]></conf-name>
<conf-date>2015</conf-date>
<conf-loc> </conf-loc>
<page-range>339-44</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alrawashdeh]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Purdy]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Toward an online anomaly intrusion detection system based on deep learning]]></source>
<year>2016</year>
<conf-name><![CDATA[ 15th IEEE International Conference on Machine Learning and Applications (ICMLA)]]></conf-name>
<conf-date>2016</conf-date>
<conf-loc> </conf-loc>
<page-range>195-200</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Altwaijry]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Algarny]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Bayesian based intrusion detection system]]></source>
<year>2011</year>
<volume>1</volume>
<conf-name><![CDATA[ IAENG Transactions on Engineering Technologies: Special Edition of the World Congress on Engineering and Computer Science]]></conf-name>
<conf-loc> </conf-loc>
<page-range>29-44</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ambusaidi]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
<name>
<surname><![CDATA[He]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Nanda]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Tan]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Building an intrusion detection system using a filter-based feature selection algorithm]]></article-title>
<source><![CDATA[IEEE Transactions on Computers]]></source>
<year>2016</year>
<volume>65</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>2986-98</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bostani]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Sheikhan]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Hybrid of binary gravitational search algorithm and mutual information for feature selection in intrusion detection systems]]></article-title>
<source><![CDATA[Soft Computing]]></source>
<year>2017</year>
<volume>21</volume>
<numero>9</numero>
<issue>9</issue>
<page-range>2307-24</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Boudia]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Hamou]]></surname>
<given-names><![CDATA[R. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Amine]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A new meta-heuristics for intrusion detection system inspired from the protection system of social bees]]></article-title>
<source><![CDATA[International Journal of Information Security and Privacy]]></source>
<year>2017</year>
<volume>11</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>18-34</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bousmaha]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Hamou]]></surname>
<given-names><![CDATA[R. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Amine]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Optimizing connection weights in neural networks using hybrid metaheuristics algorithms]]></article-title>
<source><![CDATA[International Journal of Information Retrieval Research]]></source>
<year>2022</year>
<volume>12</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-21</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chadha]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Jain]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Hybrid genetic fuzzy rule based inference engine to detect intrusion in networks]]></article-title>
<source><![CDATA[Intelligent Systems and Computing]]></source>
<year>2015</year>
<volume>321</volume>
<page-range>185-98</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dubey]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Dubey]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[KBB: A hybrid method for intrusion detection]]></source>
<year>2015</year>
<conf-name><![CDATA[ International Conference on Computer, Communication and Control (IC4)]]></conf-name>
<conf-date>2015</conf-date>
<conf-loc> </conf-loc>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Eberhart]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Kennedy]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[A new optimizer using particle swarm theory]]></source>
<year>1995</year>
<conf-name><![CDATA[ Sixth International Symposium on Micro Machine and Human Science]]></conf-name>
<conf-loc> </conf-loc>
<page-range>39-43</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Elngar]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Mohamed]]></surname>
<given-names><![CDATA[D. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ghaleb]]></surname>
<given-names><![CDATA[F. F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A real-time anomaly network intrusion detection system with high accuracy]]></article-title>
<source><![CDATA[Information Sciences Letters]]></source>
<year>2013</year>
<volume>2</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>49-56</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fiore]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
<name>
<surname><![CDATA[Palmieri]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Castiglione]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[De-Santis]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Network anomaly detection with the restricted boltzmann machine]]></article-title>
<source><![CDATA[Neurocomputing]]></source>
<year>2013</year>
<volume>122</volume>
<page-range>13-23</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gao]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Gao]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Gao]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[An intrusion detection model based on deep belief networks]]></source>
<year>2014</year>
<conf-name><![CDATA[ Second International Conference on Advanced Cloud and Big Data]]></conf-name>
<conf-date>2014</conf-date>
<conf-loc> </conf-loc>
<page-range>247-52</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Han]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Xu]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Ren]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Gu]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<source><![CDATA[A naive bayesian network intrusion detection algorithm based on principal component analysis]]></source>
<year>2015</year>
<conf-name><![CDATA[ 7th International Conference on Information Technology in Medicine and Education (ITME)]]></conf-name>
<conf-date>2015</conf-date>
<conf-loc> </conf-loc>
<page-range>325-8</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Horng]]></surname>
<given-names><![CDATA[S. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Su]]></surname>
<given-names><![CDATA[M. Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Y. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Kao]]></surname>
<given-names><![CDATA[T. W.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[R. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Lai]]></surname>
<given-names><![CDATA[J. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Perkasa]]></surname>
<given-names><![CDATA[C. D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A novel intrusion detection system based on hierarchical clustering and support vector machines]]></article-title>
<source><![CDATA[Expert Systems with Applications]]></source>
<year>2011</year>
<volume>38</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>306-13</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Gao]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Maybank]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Online adaboost-based parameterized methods for dynamic distributed network intrusion detection]]></article-title>
<source><![CDATA[IEEE Transactions on Cybernetics]]></source>
<year>2014</year>
<volume>44</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>66-82</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Javaid]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Niyaz]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Sun]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Alam]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[A deep learning approach for network intrusion detection system]]></source>
<year>2016</year>
<conf-name><![CDATA[ 9th EAI International Conference on Bio-Inspired Information and Communications Technologies (Formerly BIONETICS)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>21-6</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Khan]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Awad]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Thuraisingham]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A new intrusion detection system using support vector machines and hierarchical clustering]]></article-title>
<source><![CDATA[The VLDB Journal]]></source>
<year>2007</year>
<volume>16</volume>
<page-range>507-21</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kim]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Kim]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[An effective intrusion detection classifier using long short-term memory with gradient descent optimization]]></source>
<year>2017</year>
<conf-name><![CDATA[ International Conference on Platform Technology and Service (PlatCon)]]></conf-name>
<conf-date>2017</conf-date>
<conf-loc> </conf-loc>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[W. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Ke]]></surname>
<given-names><![CDATA[S. W.]]></given-names>
</name>
<name>
<surname><![CDATA[Tsai]]></surname>
<given-names><![CDATA[C. F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[CANN: An intrusion detection system based on combining cluster centers and nearest neighbors]]></article-title>
<source><![CDATA[Knowledge-Based Systems]]></source>
<year>2015</year>
<volume>78</volume>
<page-range>13-21</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lokbani]]></surname>
<given-names><![CDATA[A. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Lehireche]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Hamou]]></surname>
<given-names><![CDATA[R. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Boudia]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An approach based on social bees for an intrusion detection system by scenario]]></article-title>
<source><![CDATA[Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications]]></source>
<year>2015</year>
<page-range>914-38</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Maniriho]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Ahmad]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Analyzing the performance of machine learning algorithms in anomaly network intrusion detection systems]]></source>
<year>2018</year>
<conf-name><![CDATA[ 4th International Conference on Science and Technology (ICST)]]></conf-name>
<conf-date>2018</conf-date>
<conf-loc> </conf-loc>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pajouh]]></surname>
<given-names><![CDATA[H. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Javidan]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Khayami]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Dehghantanha]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Choo]]></surname>
<given-names><![CDATA[K. K. R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks]]></article-title>
<source><![CDATA[IEEE Transactions on Emerging Topics in Computing]]></source>
<year>2019</year>
<volume>7</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>314-23</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Potluri]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Diedrich]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Accelerated deep neural networks for enhanced intrusion detection system]]></source>
<year>2016</year>
<volume>2016-November</volume>
<conf-name><![CDATA[ 21st International Conference on Emerging Technologies and Factory Automation (ETFA)]]></conf-name>
<conf-date>2016</conf-date>
<conf-loc> </conf-loc>
<page-range>1-8</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shone]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Ngoc]]></surname>
<given-names><![CDATA[T. N.]]></given-names>
</name>
<name>
<surname><![CDATA[Phai]]></surname>
<given-names><![CDATA[V. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Shi]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A deep learning approach to network intrusion detection]]></article-title>
<source><![CDATA[IEEE Transactions on Emerging Topics in Computational Intelligence]]></source>
<year>2018</year>
<volume>2</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>41-50</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tang]]></surname>
<given-names><![CDATA[T. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Mhamdi]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[McLernon]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Zaidi]]></surname>
<given-names><![CDATA[S. A. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Ghogho]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Deep learning approach for network intrusion detection in software defined networking]]></source>
<year>2016</year>
<conf-name><![CDATA[ International Conference on Wireless Networks and Mobile Communications (WINCOM)]]></conf-name>
<conf-date>2016</conf-date>
<conf-loc> </conf-loc>
<page-range>258-63</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tavallaee]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Bagheri]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Lu]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Ghorbani]]></surname>
<given-names><![CDATA[A. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[A detailed analysis of the KDD CUP 99 data set]]></source>
<year>2009</year>
<conf-name><![CDATA[ Symposium on Computational Intelligence for Security and Defense Applications]]></conf-name>
<conf-date>2009</conf-date>
<conf-loc> </conf-loc>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tsai]]></surname>
<given-names><![CDATA[C. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[C. Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A triangle area based nearest neighbors approach to intrusion detection]]></article-title>
<source><![CDATA[Pattern Recognition]]></source>
<year>2010</year>
<volume>43</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>222-9</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vinayakumar]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Alazab]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Soman]]></surname>
<given-names><![CDATA[K. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Poornachandran]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Al-Nemrat]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Venkatraman]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Deep learning approach for intelligent intrusion detection system]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2019</year>
<volume>7</volume>
<page-range>41525-50</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vinayakumar]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Soman]]></surname>
<given-names><![CDATA[K. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Poornachandran]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Evaluating effectiveness of shallow and deep networks to intrusion detection system]]></source>
<year>2017</year>
<conf-name><![CDATA[ International Conference on Advances in Computing, Communications and Informatics (ICACCI)]]></conf-name>
<conf-date>2017</conf-date>
<conf-loc> </conf-loc>
<page-range>1282-9</page-range></nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Hao]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Mab]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A new approach to intrusion detection using artificial neural networks and fuzzy clustering]]></article-title>
<source><![CDATA[Expert Systems with Applications]]></source>
<year>2010</year>
<volume>37</volume>
<numero>9</numero>
<issue>9</issue>
<page-range>6225-32</page-range></nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Xiao]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Xing]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An intrusion detection model based on feature reduction and convolutional neural networks]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2019</year>
<volume>7</volume>
<page-range>42210-9</page-range></nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yin]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Fei]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[He]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A deep learning approach for intrusion detection using recurrent neural networks]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2017</year>
<volume>5</volume>
<page-range>21954-61</page-range></nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Bao]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[You]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Guo]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Category coding with neural network application]]></source>
<year>2018</year>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
