{"id":"https://openalex.org/W1983563995","doi":"https://doi.org/10.1109/his.2013.6920485","title":"Multi-layer hybrid machine learning techniques for anomalies detection and classification approach","display_name":"Multi-layer hybrid machine learning techniques for anomalies detection and classification approach","publication_year":2013,"publication_date":"2013-12-01","ids":{"openalex":"https://openalex.org/W1983563995","doi":"https://doi.org/10.1109/his.2013.6920485","mag":"1983563995"},"language":"en","primary_location":{"id":"doi:10.1109/his.2013.6920485","is_oa":false,"landing_page_url":"https://doi.org/10.1109/his.2013.6920485","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"13th International Conference on Hybrid Intelligent Systems (HIS 2013)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049827059","display_name":"Amira Sayed A. Aziz","orcid":null},"institutions":[{"id":"https://openalex.org/I50050410","display_name":"French University of Egypt","ror":"https://ror.org/017n1k193","country_code":"EG","type":"education","lineage":["https://openalex.org/I50050410"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"Amira Sayed A. Aziz","raw_affiliation_strings":["Universite Francaise d'Egypte (UFE), Cairo, Egypt"],"affiliations":[{"raw_affiliation_string":"Universite Francaise d'Egypte (UFE), Cairo, Egypt","institution_ids":["https://openalex.org/I50050410"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085432173","display_name":"Aboul Ella Hassanien","orcid":"https://orcid.org/0000-0002-9989-6681"},"institutions":[{"id":"https://openalex.org/I4210134598","display_name":"Scientific Research Group in Egypt","ror":"https://ror.org/03rahtg67","country_code":"EG","type":"facility","lineage":["https://openalex.org/I4210134598"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Aboul Ella Hassanien","raw_affiliation_strings":["Scientific Research Group in Egypt (SRGE)","Scientific Research Group in Egypt (SRGE), Egypt"],"affiliations":[{"raw_affiliation_string":"Scientific Research Group in Egypt (SRGE)","institution_ids":["https://openalex.org/I4210134598"]},{"raw_affiliation_string":"Scientific Research Group in Egypt (SRGE), Egypt","institution_ids":["https://openalex.org/I4210134598"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032478548","display_name":"Sanaa El-Ola Hanaf","orcid":null},"institutions":[{"id":"https://openalex.org/I145487455","display_name":"Cairo University","ror":"https://ror.org/03q21mh05","country_code":"EG","type":"education","lineage":["https://openalex.org/I145487455"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Sanaa El-Ola Hanaf","raw_affiliation_strings":["Cairo University, Giza, EG","Faculty of Computers and Information, Cairo University Egypt"],"affiliations":[{"raw_affiliation_string":"Cairo University, Giza, EG","institution_ids":["https://openalex.org/I145487455"]},{"raw_affiliation_string":"Faculty of Computers and Information, Cairo University Egypt","institution_ids":["https://openalex.org/I145487455"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011000412","display_name":"Mohamed F. Tolba","orcid":"https://orcid.org/0000-0003-3104-6418"},"institutions":[{"id":"https://openalex.org/I107720978","display_name":"Ain Shams University","ror":"https://ror.org/00cb9w016","country_code":"EG","type":"education","lineage":["https://openalex.org/I107720978"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"M.F. Tolba","raw_affiliation_strings":["Faculty of Computers and Information, Ain Shams University, Egypt"],"affiliations":[{"raw_affiliation_string":"Faculty of Computers and Information, Ain Shams University, Egypt","institution_ids":["https://openalex.org/I107720978"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5049827059"],"corresponding_institution_ids":["https://openalex.org/I50050410"],"apc_list":null,"apc_paid":null,"fwci":2.5372,"has_fulltext":false,"cited_by_count":32,"citation_normalized_percentile":{"value":0.89911337,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"215","last_page":"220"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/c4.5-algorithm","display_name":"C4.5 algorithm","score":0.8601065874099731},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7788829803466797},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.777673065662384},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.7375175952911377},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7211676836013794},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.6775559186935425},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6557964086532593},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.6143515110015869},{"id":"https://openalex.org/keywords/perceptron","display_name":"Perceptron","score":0.6045099496841431},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5432795286178589},{"id":"https://openalex.org/keywords/statistical-classification","display_name":"Statistical classification","score":0.48956307768821716},{"id":"https://openalex.org/keywords/anomaly-based-intrusion-detection-system","display_name":"Anomaly-based intrusion detection system","score":0.47972291707992554},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.46479955315589905},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4643424451351166},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.45563334226608276},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4048842489719391},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.37268131971359253}],"concepts":[{"id":"https://openalex.org/C52003472","wikidata":"https://www.wikidata.org/wiki/Q1022655","display_name":"C4.5 algorithm","level":4,"score":0.8601065874099731},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7788829803466797},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.777673065662384},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.7375175952911377},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7211676836013794},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.6775559186935425},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6557964086532593},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.6143515110015869},{"id":"https://openalex.org/C60908668","wikidata":"https://www.wikidata.org/wiki/Q690207","display_name":"Perceptron","level":3,"score":0.6045099496841431},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5432795286178589},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.48956307768821716},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.47972291707992554},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.46479955315589905},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4643424451351166},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.45563334226608276},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4048842489719391},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.37268131971359253}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/his.2013.6920485","is_oa":false,"landing_page_url":"https://doi.org/10.1109/his.2013.6920485","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"13th International Conference on Hybrid Intelligent Systems (HIS 2013)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities","score":0.6299999952316284}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W42722137","https://openalex.org/W262970172","https://openalex.org/W349770100","https://openalex.org/W1042671528","https://openalex.org/W1540989013","https://openalex.org/W1541288193","https://openalex.org/W1554891714","https://openalex.org/W1873332500","https://openalex.org/W1983291981","https://openalex.org/W2006721374","https://openalex.org/W2017828086","https://openalex.org/W2026253357","https://openalex.org/W2092338089","https://openalex.org/W2102609268","https://openalex.org/W2119306157","https://openalex.org/W2131690936","https://openalex.org/W2142720090","https://openalex.org/W2142889610","https://openalex.org/W2168666945","https://openalex.org/W2185338613","https://openalex.org/W2382109857","https://openalex.org/W4292023222","https://openalex.org/W6611762666","https://openalex.org/W6639175750","https://openalex.org/W6675706226"],"related_works":["https://openalex.org/W4214653893","https://openalex.org/W2149097950","https://openalex.org/W3124731355","https://openalex.org/W3036853918","https://openalex.org/W3211372245","https://openalex.org/W2505282017","https://openalex.org/W3013263334","https://openalex.org/W3133985961","https://openalex.org/W2997511728","https://openalex.org/W2995276271"],"abstract_inverted_index":{"Intrusion":[0],"detection":[1,10,32,45,117],"systems":[2,53],"(IDS)":[3],"are":[4,82,130],"well-known":[5],"research":[6],"area":[7],"for":[8,69,209,214],"the":[9,44,59,92,116,124,136,141,155,158,186,198,218],"of":[11,149,157,188],"anomalous":[12,89,144],"activities":[13],"in":[14,91,139,185,217],"a":[15,26],"system":[16,33,162],"from":[17],"both":[18,140],"inside":[19],"and":[20,36,42,46,88,111,119,132,143,195,212],"outside":[21],"intruders.":[22],"In":[23,58],"this":[24,150],"article,":[25],"multi-layer":[27,160],"hybrid":[28],"machine":[29],"learning":[30],"intrusion":[31],"is":[34,96,152],"designed":[35],"developed":[37],"to":[38,77,84,114,134,153,207],"achieve":[39],"high":[40,204],"efficiency":[41],"improve":[43],"classification":[47,100,183],"rate":[48],"accuracy":[49,118,184,205],"inspired":[50],"by":[51,98,163,170],"immune":[52],"with":[54],"negative":[55],"selection":[56],"approach.":[57],"first":[60],"layer,":[61],"principal":[62],"component":[63],"analysis":[64],"(PCA)":[65],"algorithm":[66,74],"was":[67,75],"used":[68,169],"feature":[70],"selection.":[71],"Then,":[72],"genetic":[73],"applied":[76,133],"generate":[78],"anomaly":[79,219],"detectors,":[80],"which":[81],"able":[83],"discriminate":[85],"between":[86],"normal":[87,142],"behaviors":[90],"second":[93],"layer.":[94],"It":[95],"followed":[97],"applying":[99],"using":[101,164],"several":[102],"classifiers":[103,129],"including":[104],"naive":[105,178],"bayes,":[106],"multilayer":[107],"perceptron":[108],"neural":[109],"network,":[110],"decision":[112,200],"trees":[113],"increase":[115],"obtain":[120],"more":[121],"information":[122],"on":[123],"detected":[125,137],"anomalies.":[126],"The":[127,146,173],"selected":[128],"trained":[131],"label":[135],"anomalies":[138],"traffic.":[145,220],"principle":[147],"interest":[148],"work":[151],"benchmark":[154,166],"performance":[156],"proposed":[159],"IDS":[161,171],"NSL-KDD":[165],"data":[167],"set":[168],"researchers.":[172],"obtained":[174],"results":[175],"demonstrated":[176],"that":[177],"bayes":[179],"classifier":[180,202],"has":[181],"better":[182],"case":[187],"lower":[189],"presented":[190],"attacks":[191,211,216],"such":[192],"as":[193],"U2R":[194],"R2L,":[196],"while":[197],"J48":[199],"tree":[201],"gives":[203],"up":[206],"82%":[208],"DoS":[210],"65.4%":[213],"probe":[215]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":4},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
