{"id":"https://openalex.org/W2775267780","doi":"https://doi.org/10.1109/icacci.2017.8126017","title":"Learning mechanisms for anomaly-based intruson detection: Updated review","display_name":"Learning mechanisms for anomaly-based intruson detection: Updated review","publication_year":2017,"publication_date":"2017-09-01","ids":{"openalex":"https://openalex.org/W2775267780","doi":"https://doi.org/10.1109/icacci.2017.8126017","mag":"2775267780"},"language":"en","primary_location":{"id":"doi:10.1109/icacci.2017.8126017","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2017.8126017","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057893924","display_name":"El-Sayed M. El-Alfy","orcid":"https://orcid.org/0000-0001-6279-9776"},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"El-Sayed M. El-Alfy","raw_affiliation_strings":["Information and Computer Science Department College of Computer Sciences and Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia","Information and Computer Science Department, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Information and Computer Science Department College of Computer Sciences and Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]},{"raw_affiliation_string":"Information and Computer Science Department, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067154136","display_name":"Khaled A. Al-Utaibi","orcid":"https://orcid.org/0000-0002-3965-5018"},"institutions":[{"id":"https://openalex.org/I4210088963","display_name":"University of Ha'il","ror":"https://ror.org/013w98a82","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210088963"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Khaled A. Al-Utaibi","raw_affiliation_strings":["College of Computer Sciences and Engineerng University of Ha'il Ha'il 81451, Saudi Arabia","College of Computer Sciences and Engineering, University of Ha'il, Ha'il, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"College of Computer Sciences and Engineerng University of Ha'il Ha'il 81451, Saudi Arabia","institution_ids":["https://openalex.org/I4210088963"]},{"raw_affiliation_string":"College of Computer Sciences and Engineering, University of Ha'il, Ha'il, Saudi Arabia","institution_ids":["https://openalex.org/I4210088963"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5057893924"],"corresponding_institution_ids":["https://openalex.org/I134085113"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.21873829,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1273","last_page":"1281"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7660852074623108},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7547215223312378},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7465068101882935},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.591620683670044},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.541957437992096},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5395383834838867},{"id":"https://openalex.org/keywords/magic","display_name":"MAGIC (telescope)","score":0.5162089467048645},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4823293387889862},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4301195442676544},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4247360825538635},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.41659659147262573},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.38423073291778564},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2135864496231079}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7660852074623108},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7547215223312378},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7465068101882935},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.591620683670044},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.541957437992096},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5395383834838867},{"id":"https://openalex.org/C2777704519","wikidata":"https://www.wikidata.org/wiki/Q45732","display_name":"MAGIC (telescope)","level":2,"score":0.5162089467048645},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4823293387889862},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4301195442676544},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4247360825538635},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.41659659147262573},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.38423073291778564},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2135864496231079},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icacci.2017.8126017","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2017.8126017","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.41999998688697815}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":139,"referenced_works":["https://openalex.org/W363934082","https://openalex.org/W433644524","https://openalex.org/W1196375415","https://openalex.org/W1489073918","https://openalex.org/W1528653255","https://openalex.org/W1543815398","https://openalex.org/W1591480890","https://openalex.org/W1601795611","https://openalex.org/W1894114027","https://openalex.org/W1908122868","https://openalex.org/W1964549039","https://openalex.org/W1966809779","https://openalex.org/W1967376128","https://openalex.org/W1969466477","https://openalex.org/W1974102697","https://openalex.org/W1975191191","https://openalex.org/W1976816362","https://openalex.org/W1981738628","https://openalex.org/W1982180492","https://openalex.org/W1982354667","https://openalex.org/W1983200726","https://openalex.org/W1985987493","https://openalex.org/W1988918299","https://openalex.org/W1990368529","https://openalex.org/W1991510770","https://openalex.org/W1991830413","https://openalex.org/W1993467749","https://openalex.org/W1994212840","https://openalex.org/W1997741525","https://openalex.org/W1999427165","https://openalex.org/W2000685160","https://openalex.org/W2002016471","https://openalex.org/W2002181184","https://openalex.org/W2002900768","https://openalex.org/W2006862475","https://openalex.org/W2007087405","https://openalex.org/W2008224380","https://openalex.org/W2009250942","https://openalex.org/W2011778831","https://openalex.org/W2022282473","https://openalex.org/W2023459473","https://openalex.org/W2024454892","https://openalex.org/W2028070713","https://openalex.org/W2030553727","https://openalex.org/W2031163547","https://openalex.org/W2032620230","https://openalex.org/W2034265047","https://openalex.org/W2035729859","https://openalex.org/W2039377530","https://openalex.org/W2042495914","https://openalex.org/W2047350783","https://openalex.org/W2047379279","https://openalex.org/W2055452710","https://openalex.org/W2056243682","https://openalex.org/W2058614926","https://openalex.org/W2062687230","https://openalex.org/W2063911227","https://openalex.org/W2066664409","https://openalex.org/W2068692579","https://openalex.org/W2074209220","https://openalex.org/W2079873736","https://openalex.org/W2080299502","https://openalex.org/W2093622232","https://openalex.org/W2097034581","https://openalex.org/W2099940443","https://openalex.org/W2100320761","https://openalex.org/W2100537916","https://openalex.org/W2100805904","https://openalex.org/W2101109743","https://openalex.org/W2101756295","https://openalex.org/W2102343477","https://openalex.org/W2110106247","https://openalex.org/W2111072639","https://openalex.org/W2111890927","https://openalex.org/W2122590816","https://openalex.org/W2122646361","https://openalex.org/W2125523891","https://openalex.org/W2126630550","https://openalex.org/W2127218421","https://openalex.org/W2130802299","https://openalex.org/W2134603844","https://openalex.org/W2139669429","https://openalex.org/W2139836766","https://openalex.org/W2142720090","https://openalex.org/W2142889610","https://openalex.org/W2144963861","https://openalex.org/W2147457514","https://openalex.org/W2153381643","https://openalex.org/W2155806188","https://openalex.org/W2155883880","https://openalex.org/W2157665255","https://openalex.org/W2158330599","https://openalex.org/W2160598920","https://openalex.org/W2161183304","https://openalex.org/W2161630727","https://openalex.org/W2167240430","https://openalex.org/W2167917621","https://openalex.org/W2169041657","https://openalex.org/W2172187504","https://openalex.org/W2187034790","https://openalex.org/W2191006491","https://openalex.org/W2278186031","https://openalex.org/W2332804323","https://openalex.org/W2334853001","https://openalex.org/W2341170143","https://openalex.org/W2342408547","https://openalex.org/W2346714907","https://openalex.org/W2414564754","https://openalex.org/W2517266538","https://openalex.org/W2525336835","https://openalex.org/W2527999453","https://openalex.org/W2529525882","https://openalex.org/W2560162835","https://openalex.org/W2576897537","https://openalex.org/W2600328926","https://openalex.org/W2602255610","https://openalex.org/W2607252931","https://openalex.org/W2612398564","https://openalex.org/W2627181799","https://openalex.org/W2678934292","https://openalex.org/W2728509750","https://openalex.org/W2789592242","https://openalex.org/W3016607949","https://openalex.org/W4232814967","https://openalex.org/W4236137412","https://openalex.org/W4239510810","https://openalex.org/W4245066853","https://openalex.org/W4245176872","https://openalex.org/W4245460974","https://openalex.org/W4250278758","https://openalex.org/W4251512373","https://openalex.org/W4253794406","https://openalex.org/W6639491236","https://openalex.org/W6678914141","https://openalex.org/W6679935922","https://openalex.org/W6683235873","https://openalex.org/W6686578234","https://openalex.org/W6704475261","https://openalex.org/W6735644715"],"related_works":["https://openalex.org/W2378211422","https://openalex.org/W2745001401","https://openalex.org/W4321353415","https://openalex.org/W2130974462","https://openalex.org/W972276598","https://openalex.org/W4246352526","https://openalex.org/W2028665553","https://openalex.org/W2086519370","https://openalex.org/W2087343574","https://openalex.org/W4283314094"],"abstract_inverted_index":{"With":[0],"the":[1,68,86,110],"proliferation":[2],"of":[3,21,50,113,123],"Internet":[4],"connectivity":[5],"to":[6,19,45,61,84,105],"share":[7],"information":[8],"and":[9,15,53,116,121],"provide":[10],"online":[11],"services,":[12],"detecting":[13],"malicious":[14],"misbehavior":[16],"activities":[17],"continues":[18],"be":[20,42],"major":[22],"importance":[23],"in":[24,128],"cyber":[25],"security.":[26],"However,":[27],"countering":[28],"intrusive":[29],"attacks":[30],"is":[31],"a":[32,36,93,118],"challenging":[33],"problem":[34],"without":[35],"universal":[37],"magic":[38],"solution":[39],"that":[40],"can":[41,98],"successfully":[43],"applied":[44,60],"all":[46],"scenarios.":[47],"A":[48],"variety":[49],"machine":[51,70],"learning":[52,71],"computational":[54],"intelligence":[55],"techniques":[56],"have":[57],"been":[58],"extensively":[59],"detect":[62],"these":[63],"attacks.":[64],"This":[65],"paper":[66],"reviews":[67],"state-of-the-art":[69],"mechanisms":[72],"for":[73],"anomaly-based":[74],"intrusion":[75,88],"detection.":[76],"It":[77],"also":[78],"covers":[79],"several":[80],"related":[81],"datasets":[82],"adopted":[83],"benchmark":[85],"proposed":[87],"detection":[89],"systems.":[90],"Besides":[91],"offering":[92],"critical":[94],"up-to-date":[95],"summary,":[96],"it":[97],"serve":[99],"as":[100],"an":[101],"instrumental":[102],"pedagogical":[103],"tool":[104],"help":[106],"junior":[107],"researchers":[108],"conceive":[109],"vast":[111],"amount":[112],"research":[114,126],"work":[115],"gain":[117],"holistic":[119],"view":[120],"awareness":[122],"various":[124],"contemporary":[125],"directions":[127],"this":[129],"vital":[130],"domain.":[131]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
