{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T05:08:12Z","timestamp":1732597692478,"version":"3.28.0"},"reference-count":32,"publisher":"SAGE Publications","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JHS"],"published-print":{"date-parts":[[2019,11,20]]},"DOI":"10.3233\/jhs-190620","type":"journal-article","created":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T15:46:25Z","timestamp":1572623185000},"page":"349-365","source":"Crossref","is-referenced-by-count":18,"title":["Discovery of DoS attacks by the ZED-IDS anomaly detector"],"prefix":"10.1177","volume":"25","author":[{"given":"Marta","family":"Catillo","sequence":"first","affiliation":[{"name":"Department of Engineering, University of Sannio, Benevento, Italy. E-mails:\u00a0mcatillo@unisannio.it,\u00a0villano@unisannio.it"}]},{"given":"Massimiliano","family":"Rak","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, University of Campania Luigi Vanvitelli, Aversa, Italy. E-mail:\u00a0massimiliano.rak@unicampania.it"}]},{"given":"Umberto","family":"Villano","sequence":"additional","affiliation":[{"name":"Department of Engineering, University of Sannio, Benevento, Italy. E-mails:\u00a0mcatillo@unisannio.it,\u00a0villano@unisannio.it"}]}],"member":"179","reference":[{"key":"10.3233\/JHS-190620_ref2","doi-asserted-by":"crossref","first-page":"10","DOI":"10.26034\/lu.akwi.2017.3183","article-title":"Comparison of supervised, semi-supervised and unsupervised learning methods in network intrusion detection system (NIDS) application","volume":"6","author":"Arunraj","year":"2017","journal-title":"AKWI"},{"key":"10.3233\/JHS-190620_ref3","unstructured":"H.\u00a0Attak, M.\u00a0Combalia, G.\u00a0Gardikis, B.\u00a0Gast\u00f3n, L.\u00a0Jacquin, D.\u00a0Katsianis, A.\u00a0Litke, N.\u00a0Papadakis, D.\u00a0Papadopoulos, A.\u00a0Pastor, M.\u00a0Roig and O.\u00a0Segou, Application of distributed computing and machine learning technologies to cybersecurity, in: Computer & Electronics Security Applications Rendez-vous (C&ESAR), 19\u201321 November 2018, Rennes, France, 2018, pp.\u00a01\u201316."},{"key":"10.3233\/JHS-190620_ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2017.39"},{"issue":"1","key":"10.3233\/JHS-190620_ref6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/2200000006","article-title":"Learning deep architectures for AI","volume":"2","author":"Bengio","year":"2009","journal-title":"Foundations and Trends in Machine Learning"},{"issue":"1","key":"10.3233\/JHS-190620_ref7","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1109\/SURV.2013.052213.00046","article-title":"Network anomaly detection: Methods, systems and tools","volume":"16","author":"Bhuyan","year":"2014","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"3","key":"10.3233\/JHS-190620_ref8","doi-asserted-by":"publisher","first-page":"15:1","DOI":"10.1145\/1541880.1541882","article-title":"Anomaly detection: A survey","volume":"41","author":"Chandola","year":"2009","journal-title":"ACM Computing Surveys"},{"key":"10.3233\/JHS-190620_ref10","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1016\/j.asoc.2015.07.029","article-title":"An uncertainty-managing batch relevance-based approach to network anomaly detection","volume":"36","author":"D\u2019Angelo","year":"2015","journal-title":"Applied Soft Computing"},{"key":"10.3233\/JHS-190620_ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2016.7586590"},{"key":"10.3233\/JHS-190620_ref12","doi-asserted-by":"crossref","unstructured":"F.\u00a0Farahnakian and J.\u00a0Heikkonen, A deep auto-encoder based approach for intrusion detection system, in: International Conference on Advanced Communications Technology (ICACT), 2018, pp.\u00a0178\u2013183.","DOI":"10.23919\/ICACT.2018.8323688"},{"key":"10.3233\/JHS-190620_ref13","unstructured":"I.\u00a0Goodfellow, Y.\u00a0Bengio and A.\u00a0Courville, Deep Learning, 2016."},{"key":"10.3233\/JHS-190620_ref15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46145-0_17"},{"issue":"7","key":"10.3233\/JHS-190620_ref17","doi-asserted-by":"publisher","first-page":"1527","DOI":"10.1162\/neco.2006.18.7.1527","article-title":"A fast learning algorithm for deep belief nets","volume":"18","author":"Hinton","year":"2006","journal-title":"Neural Computation"},{"issue":"8","key":"10.3233\/JHS-190620_ref18","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","article-title":"Long short-term memory","volume":"9","author":"Hochreiter","year":"1997","journal-title":"Neural Computation"},{"key":"10.3233\/JHS-190620_ref20","unstructured":"Y. Hua, J. Guo and H. Zhao, Deep belief networks and deep learning, in: Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things, 2015, pp.\u00a01\u20134."},{"key":"10.3233\/JHS-190620_ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IWBIS.2017.8275095"},{"issue":"11","key":"10.3233\/JHS-190620_ref23","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","article-title":"Gradient-based learning applied to document recognition","volume":"86","author":"Lecun","year":"1998","journal-title":"Proceedings of the IEEE"},{"issue":"2\/3\/4","key":"10.3233\/JHS-190620_ref24","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1504\/IJICS.2015.073028","article-title":"Application-layer denial of service attacks: Taxonomy and survey","volume":"7","author":"Mantas","year":"2015","journal-title":"International Journal of Information and Computer Security"},{"key":"10.3233\/JHS-190620_ref25","doi-asserted-by":"publisher","first-page":"59657","DOI":"10.1109\/ACCESS.2018.2875045","article-title":"Distributed abnormal behavior detection approach based on deep belief network and ensemble SVM using spark","volume":"6","author":"Marir","year":"2018","journal-title":"IEEE Access"},{"issue":"4","key":"10.3233\/JHS-190620_ref26","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1145\/382912.382923","article-title":"Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory","volume":"3","author":"McHugh","year":"2000","journal-title":"ACM Transactions on Information and System Security"},{"issue":"2","key":"10.3233\/JHS-190620_ref27","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.jnca.2004.01.003","article-title":"Intrusion detection using an ensemble of intelligent paradigms","volume":"28","author":"Mukkamala","year":"2005","journal-title":"Journal of Network and Computer Applications"},{"issue":"5","key":"10.3233\/JHS-190620_ref28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3234150","article-title":"A survey on deep learning","volume":"51","author":"Pouyanfar","year":"2018","journal-title":"ACM Computing Surveys"},{"key":"10.3233\/JHS-190620_ref31","doi-asserted-by":"crossref","unstructured":"M.\u00a0Sakurada and T.\u00a0Yairi, Anomaly detection using autoencoders with nonlinear dimensionality reduction, in: Proceedings of the MLSDA 2014 2nd Workshop on Machine Learning for Sensory Data Analysis, Vol.\u00a044, ACM, 2014, pp.\u00a04\u201311.","DOI":"10.1145\/2689746.2689747"},{"key":"10.3233\/JHS-190620_ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77949-0_15"},{"key":"10.3233\/JHS-190620_ref34","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.future.2017.10.016","article-title":"Performance comparison of intrusion detection systems and application of machine learning to Snort system","volume":"80","author":"Shah","year":"2018","journal-title":"Future Generation Computer Systems"},{"key":"10.3233\/JHS-190620_ref35","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"issue":"1","key":"10.3233\/JHS-190620_ref37","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/TETCI.2017.2772792","article-title":"A deep learning approach to network intrusion detection","volume":"2","author":"Shone","year":"2018","journal-title":"IEEE Transactions on Emerging Topics in Computational Intelligence"},{"key":"10.3233\/JHS-190620_ref38","doi-asserted-by":"crossref","unstructured":"H.\u00a0Singh, Performance analysis of unsupervised machine learning techniques for network traffic classification, in: 2015 Fifth International Conference on Advanced Computing Communication Technologies, 2015, pp.\u00a0401\u2013404.","DOI":"10.1109\/ACCT.2015.54"},{"key":"10.3233\/JHS-190620_ref39","doi-asserted-by":"publisher","DOI":"10.1109\/IAdCC.2013.6514309"},{"key":"10.3233\/JHS-190620_ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"10.3233\/JHS-190620_ref41","doi-asserted-by":"publisher","DOI":"10.1109\/IBIGDELFT.2018.8625318"},{"key":"10.3233\/JHS-190620_ref42","first-page":"3371","article-title":"Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion","volume":"11","author":"Vincent","year":"2010","journal-title":"Journal of Machine Learning Research"},{"key":"10.3233\/JHS-190620_ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599821"}],"container-title":["Journal of High Speed Networks"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JHS-190620","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T10:08:54Z","timestamp":1732529334000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JHS-190620"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,20]]},"references-count":32,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.3233\/jhs-190620","relation":{},"ISSN":["1875-8940","0926-6801"],"issn-type":[{"type":"electronic","value":"1875-8940"},{"type":"print","value":"0926-6801"}],"subject":[],"published":{"date-parts":[[2019,11,20]]}}}