<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>LSTM-RNN method for Anomaly-Based Intrusion Detection Systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Alexander Alexandrov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Robotics - Bulgarian Academy of Sciences</institution>
          ,
          <addr-line>Acad. Georgi Bonchev Str., Bl. 2, Sofia, 1113</addr-line>
          ,
          <country country="BG">Bulgaria</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Intrusion Detection Systems (IDS) play a key role in protecting networks and systems from malicious activities and unauthorized access. With the increasing complexity of cyber threats, traditional methods for detecting intrusions often fail to meet the demands of modern network security. This paper proposes a method based on version of Recurrent Neural Networks (RNNs) called Long Short-Term Memory (LSTM) to improve the eficiency of Anomaly-Based Intrusion Detection Systems (AIDS). LSTM-RNNs approach are particularly well-suited for analyzing time-based network trafic and identifying deviations from normal behavior. The paper proposes a new method based on LSTM-RNNs of AIDS, to improve anomaly detection capabilities and the system's performance. The research also addresses the benefits and limitations of using LSTM-RNNs for intrusion detection, as well as potential future developments in this area.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;IDS</kwd>
        <kwd>AIDS</kwd>
        <kwd>ML</kwd>
        <kwd>LSTM-RNNs</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The proliferation of networked devices and the rise of digital platforms bring significant benefits to
modern society. At the same time, this also leads to a wide range of cyber threats. Intrusion Detection
Systems (IDS) are software tools that monitor network or system activities for malicious actions or
policy violations [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Once detected, these activities are either reported to a system administrator or
handled autonomously. The main goal of IDS is to identify unauthorized use, misuse, and abuse of
computer systems by both internal and external parties. Traditionally, IDS are classified into two main
categories: signature-based detection and anomaly-based detection. Signature-based detection methods
rely on predefined models or signatures of known attacks. This type of IDS relies on a database of
known attack signatures or patterns [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        When network trafic matches a pattern in the database, the system alerts the control center and/or
performs procedures to protect against the attack. Although the Signature-Based Detection (SBD)
approach is efective against known threats, it fails to detect new, unknown attacks or "zero-day"
exploits, as there is no predefined signature for these intrusions. Anomaly-based intrusion detection
systems monitor the normal behavior of a network or system and raise an alert when deviations
from this baseline are observed. This approach is especially useful for detecting unknown attacks,
such as "zero-day attacks" and other emerging threats, as it does not require prior knowledge of the
attack’s signature [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ]. With the increase in the volume of Big Data and the growing complexity of
cyber-attacks, machine learning (ML) techniques have become a promising approach to enhancing the
capabilities of IDS.
      </p>
      <p>
        Machine learning (ML) is emerging as a powerful tool for improving IDS performance [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. By learning
from historical data, machine learning models can detect patterns and identify deviations that may
indicate an intrusion. Moreover, machine learning algorithms can adapt to evolving network behavior,
improving the detection of new and unknown attacks [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. The development of algorithms based on
Machine Deep Learning, such as Recurrent Neural Networks (RNNs), shows significant potential in
      </p>
      <p>
        IDS due to their ability to process sequential and temporal data, making them particularly suitable for
detecting anomalies in network trafic, which often follows temporal patterns [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        Recurrent Neural Networks (RNNs) are a class of artificial neural networks designed to recognize
patterns in sequences of data, such as time series. Unlike feedforward neural networks, RNNs have
loops that allow information to persist as a form of memory. This memory enables RNNs to capture
temporal dependencies and process sequences of inputs in a more context-aware manner [
        <xref ref-type="bibr" rid="ref8 ref9">8, 9</xref>
        ]. RNNs
are particularly useful for tasks related to sequential data, such as network trafic analysis, language
analysis, etc., where the order of inputs significantly afects the output [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Related Works</title>
      <p>
        The implementation of reliable IDS is crucial for the network security of systems handling data, as it
can detect attempts by hackers and bots to hack the network, steal sensitive data, or initiate DOS or
DDOS attacks. The present study focuses on the development of a new method and software algorithm
based on Machine Deep Learning, which can be implemented in Anomaly-based Intrusion Detection
Systems to improve eficiency by reducing False Positives. The authors in [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] propose an IDS using a
classification algorithm SVM with SGD technology, DT, and LR. The chi-square criterion is applied for
feature selection. The results show that the proposed method, with SVM and SGD, significantly improves
intrusion detection accuracy. The authors in [12] propose an anomaly IDS based on a combination of
the Support Vector Machine (SVM) algorithm and the Information Gain Ratio (IGR) method for feature
selection.
      </p>
      <p>The authors in [13] propose an IDS using the Support Vector Machine (SVM) for classification
and the multiple learning automata (MLA) method for identifying optimal and significant features,
removing redundant features, and fully accounting for the redundancy of one function and multiple
embedded functions. The authors in [14] demonstrate the use of ML-based technologies such as the
restricted Boltzmann machine (RBM) in combination with Persistent Contrastive Divergence (PCD)
and Contrastive Divergence (CD) for tuning intrusion detection parameters. The authors in [15] use
LSTM-RNN as the algorithm for their proposed Anomaly IDS for the Internet of Drones (IoD) network,
but the focus in this study is on implementation rather than performance and accuracy of the proposed
algorithm.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Architecture of LSTM-RNNs</title>
      <p>The basic architecture of an RNN consists of a series of nodes (neurons) arranged in layers, similar
to a traditional feedforward neural network [16]. At the same time, the type of RNNs called LSTM
(Long Short-Term Memory) difer in that each node in a hidden layer not only receives input from the
previous layer but also from the previous step of the same layer [17] as is shown in Fig. 1.</p>
      <p>This recurrent connection allows the network to retain information from previous inputs when
processing new ones. Mathematically, the hidden state ℎ at time  in an RNN is defined as:
ℎ =  (ℎℎℎ − 1 + ℎ)
(1)
where ℎ is the hidden state at time , ℎℎ and ℎ are weight matrices, is the input at time , and 
is the activation function.</p>
      <p>The key to the ability of LSTM-RNNs to process sequential data lies in their hidden state, which acts
as memory, capturing relevant information from previous time steps.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Theoretical background about Long Short-Term Memory (LSTM)</title>
    </sec>
    <sec id="sec-5">
      <title>RNNs</title>
      <p>One of the main limitations of standard LSTM-RNNs is the vanishing gradient problem, which makes it
dificult for the network to retain information over long sequences. To address this, Long Short-Term</p>
      <sec id="sec-5-1">
        <title>Memory (LSTM) networks were introduced.</title>
        <p>An LSTM cell contains several components that regulate the flow of information through the network,
allowing it to decide what information to keep, update, or discard. These components include:</p>
        <p>Forget Gate: Decides how much of the previous memory to retain.</p>
        <p>Input Gate: Controls how much of the current input should be stored in the cell.
 =  (  + ℎ ℎ− 1 +  )
 =  ( + ℎℎ− 1 + )
˜ = tanh ( + ℎℎ− 1 + )</p>
        <p>=  ⊙ − 1 +  ⊙ ˜
 =  ( + ℎℎ− 1 + 0)
(2)
(3)
(4)
(5)
(6)</p>
        <p>Cell State: The memory of the LSTM cell that carries relevant information across time steps. It is
updated as follows:</p>
        <p>Output Gate: Determines how much of the memory should be used to compute the current output.</p>
        <p>The memory cell  allows LSTM networks to capture long-term dependencies, while the gating
mechanisms control the flow of information, ensuring that irrelevant or outdated information is
discarded.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>5. LSTM-RNNs approach in AIDS</title>
      <sec id="sec-6-1">
        <title>Network Trafic as Sequential Data</title>
        <p>In an anomaly-based intrusion detection system, network trafic can be modeled as a sequence of
feature vectors over time. These feature vectors are typically derived from network packets and can
include attributes such as packet size, protocol type, connection duration, and more.</p>
        <p>Since network trafic naturally occurs in a temporal order, LSTM-RNNs, particularly LSTMs, are
well-suited for learning and modeling normal network behavior over time. An LSTM network processes
the sequence of network features and captures the underlying patterns.</p>
        <p>By training the LSTM on normal trafic data, the network learns to recognize the typical behavior of
the system. Any significant deviations from this learned behavior are flagged as potential anomalies,
signaling the presence of an intrusion or malicious activity.
5.1. Anomaly Detection Process
The typical process for using an LSTM-RNN in an Anomaly-based IDS can be broken down into the
following steps.</p>
      </sec>
      <sec id="sec-6-2">
        <title>Data Preprocessing.</title>
        <p>Network trafic data is collected and preprocessed to generate feature vectors that describe each
packet or flow. Common preprocessing steps include:
• Feature Extraction: Relevant features, such as packet size, flow duration, protocol, and flags,
are extracted from the raw network trafic data.
• Normalization: Feature values are often normalized to ensure that all features are on the same
scale, which helps improve the training eficiency of the LSTM model.
• Sequence Creation: The data is divided into overlapping sequences of fixed length. Each
sequence represents a window of consecutive feature vectors from the network trafic.</p>
      </sec>
      <sec id="sec-6-3">
        <title>Model Training</title>
        <p>The LSTM model is trained on sequences of normal network trafic. During training, the model learns
to predict the next data point in the sequence or reconstruct the input sequence itself. The goal is to
minimize the error between the predicted and actual values, efectively teaching the model the normal
patterns of network trafic.</p>
        <p>The loss function commonly used in this setting is Mean Squared Error (MSE):
where  is the actual input at time , ˆ is the predicted value,  is the total number of time steps in
the sequence.</p>
        <p>Anomaly Detection</p>
        <p>Once the LSTM model is trained, it can be deployed to monitor real-time network trafic. For each
sequence of input data, the model predicts the expected next data point or reconstructs the sequence.</p>
        <p>If the prediction error (or reconstruction error) exceeds a predefined threshold, the system flags the
current sequence as anomalous. The anomaly score  at time  can be defined as the magnitude of the
prediction error:</p>
        <p>= ‖ − ˆ‖</p>
        <p>If  exceeds a certain threshold  , the system raises an alert, indicating a potential intrusion.
5.2. Advantages of LSTM-RNNs for AIDS
LSTM-RNNs are well-suited for detecting anomalies in network trafic due to several key advantages:
• Temporal Context: LSTM-RNNs excel at capturing temporal dependencies, which are critical
for identifying patterns in network trafic over time.
• Adaptive Learning: LSTM-RNNs can adapt to changing network behavior and detect deviations
from normal patterns, even as normal behavior evolves.
• Sequential Data Processing: Network trafic is inherently sequential, and LSTM-RNNs are
designed to eficiently process sequential data, making them an ideal choice for IDS.
(7)
(8)</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>6. Proposed LSTM-RNNs Based Method for AIDS</title>
      <p>To build a reliable anomaly-based IDS using LSTM-RNNs, the following methodology is proposed.</p>
      <sec id="sec-7-1">
        <title>Preprocessing of network trafic data</title>
        <p>This includes the following tasks:
• Feature Extraction: Relevant features from network trafic, such as packet size, flow duration,
and protocol type, are extracted. These features serve as inputs to the RNN model.
• Normalization: The extracted features are often normalized to ensure that the RNN can process
the data eficiently.
• Labeling: If labeled data is available, attacks and normal trafic are labeled to create a training
dataset. Unlabeled data can also be used in an unsupervised learning approach.</p>
      </sec>
      <sec id="sec-7-2">
        <title>Model training</title>
        <p>The LSTM model is then trained on the preprocessed data. During training, the RNN learns the
normal behavior of the network by analyzing temporal patterns in network trafic. The goal of the
training process is to minimize the error between the predicted output and the actual output (e.g.,
normal or anomalous). Supervised learning techniques can be used if labeled data is available, where
the RNN is trained to classify network trafic as either normal or anomalous as is shown on Fig. 2.</p>
        <p>For this study, the training dataset UNSW-NB15 was used. This dataset was created at the Cyber
Range Lab of UNSW Canberra for generating a hybrid of real modern normal activities and synthetic
contemporary attack behaviors.</p>
        <p>The dataset contains a mix of normal and malicious trafic, covering nine diferent attack categories.
It is widely used in research for machine learning and anomaly detection in network security, and it
has become one of the benchmarks for evaluating the performance of intrusion detection models.</p>
        <p>The UNSW-NB15 dataset consists of over 2 million records, with each record representing a network
connection or flow. Each connection in the dataset is characterized by a set of features extracted from
the network trafic. The dataset provides 49 features for each connection, plus a class label indicating
whether the trafic is normal or associated with an attack illustrated on Fig. 3.</p>
        <p>The used in the research data set has the following features:
• Source IP, Destination IP: The IP addresses of the source and destination hosts.
• Source Port, Destination Port: The port numbers used for the connection.
• Protocol: The network protocol used in the connection (e.g., TCP, UDP, ICMP).
• Service: The type of network service involved in the connection (e.g., HTTP, FTP, DNS).
• Packet Size: The size of the packets transmitted during the connection.
• Duration: The length of the connection or session.
• Flow Duration: The duration of trafic flow between the source and destination.
• Bytes Sent and Received: The total number of bytes transmitted from the source to the
destination and vice versa.</p>
        <p>• Label: Indicates whether the trafic is normal or belongs to one of the nine attack categories.</p>
        <p>The features in UNSW-NB15 include both continuous and categorical attributes, which are handled
diferently by machine learning models:</p>
        <p>Feature explanations:
• rc_ip: Source IP address.</p>
        <p>• dst_ip: Destination IP address.</p>
        <p>• src_port: Source port number.
• dst_port: Destination port number.
• proto: Protocol used for the connection (e.g., TCP, UDP).
• state: The state of the connection (e.g., FIN: finished, EST: established, CON: connected).
• dur: Duration of the connection (in seconds).
• sbytes: Number of bytes sent by the source.
• dbytes: Number of bytes received by the destination.
• service: Service or application type (e.g., HTTP, DNS, FTP).</p>
        <p>• label: Class label indicating whether the trafic is normal (0) or anomalous (1).</p>
        <p>Continuous Features: These include numeric features such as packet size, duration, and the number
of bytes transmitted.</p>
        <p>Categorical Features: These include attributes like protocol type and service type, which must be
converted to numerical representations (e.g., using one-hot encoding) for machine learning algorithms.</p>
        <p>The dataset has nine types of attacks, namely Fuzzers, Analysis, Backdoors, DoS, Exploits, Generic,
Reconnaissance, Shellcode, and Worms.</p>
        <p>Alternatively, learning techniques can also be applied where the RNN algorithm learns normal
behavior without any labeled data and marks deviations as potential anomalies, which are manually
processed during the training phase.</p>
        <p>Anomaly Detection</p>
        <p>Once trained, the LSTM model is deployed to monitor network trafic in real-time as is shown on Fig.
4.</p>
        <p>The model analyzes incoming trafic and compares it to the learned patterns of normal behavior. If the
network trafic deviates significantly from the expected behavior, the system raises an alert, indicating
a potential intrusion.</p>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>7. Experimental results</title>
      <p>To test the proposed LSTM-RNNs based method and algorithm was developed a test environment
including data server with installed UNSW-NB15 dataset, trafic generator, router, and computer with
installed Wireshark tool and software IDS with implemented the LSTM based algorithm written on
Python code with installed pandas, numpy, torch, and scikit-learn libraries.</p>
      <p>The main steps in the proposed algorithm include the following steps:
• Building the LSTM model
• Train the LSTM model
• Evaluate the LSTM model
• Run the trained model with mixed with real trafic UBSW-NB15 dataset.</p>
      <p>Scale the features UNSW-NB15 data set features.</p>
      <p>An example Python code related to the process of building the LSTM model is shown below:
#Build the LSTM model
model = Sequential()
# Add an LSTM layer with 1000 units
model.add(LSTM(units=1000, return_sequences=True,</p>
      <p>
        input_shape=(X_train.shape[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], X_train.shape[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ])))
model.add(Dropout(0.2))
# Add another LSTM layer
model.add(LSTM(units=1000))
model.add(Dropout(0.2))
# Add the output layer (binary classification:
# normal or anomaly)
model.add(Dense(1, activation=’sigmoid’))
# Compile the model
model.compile(optimizer=’test’,
loss=’binary_crossentropy’,metrics=[’accuracy’])
      </p>
      <p>The part of the 1000 records UNSW-NB15 dataset with extracted and specified anomalies is shown
bellow on Fig. 5.</p>
      <p>In the lab environment the experimental results on Fig. 6. illustrate that the proposed LSTM-RNN
model implemented in Anomaly-Based Intrussion Detection systems achieves 98.7% accuracy</p>
    </sec>
    <sec id="sec-9">
      <title>8. Challenges and Limitations</title>
      <p>While LSTM-RNNs ofer significant advantages for anomaly detection, several challenges must be
addressed:
• Data Imbalance: Network trafic data often sufers from class imbalance, where normal trafic
vastly outnumbers anomalous trafic. This can lead to models that are biased toward normal
trafic.
• Computational Complexity: Training RNNs, especially LSTMs, can be computationally intensive
and may require significant resources, particularly for large-scale networks.
• Interpretability: Deep learning models like LSTM-RNNs are often considered "black boxes,"
making it dificult to interpret the model’s decisions. This lack of transparency can be a concern
in security applications where explainability is crucial.
LSTM-RNN based IDS for anomaly detection has been applied in various network security scenarios,
such as:
• DDoS Attack Detection: LSTM-RNNs can analyze network trafic patterns to identify abnormal
spikes in trafic that may indicate a DDoS attack.
• Insider Threat Detection: LSTM-RNNs can monitor user behavior within a network and detect
deviations from normal patterns, which may indicate insider threats.
• Botnet Detection: LSTM-RNNs can detect botnet activity by identifying anomalous
communication patterns between infected devices.</p>
    </sec>
    <sec id="sec-10">
      <title>9. Conclusion</title>
      <p>The proposed LSTM-RNNs based method ofer a powerful solution for intrusion detection in
Anomalybased Intrusion Detection Systems (AIDS). Their ability to capture temporal dependencies in network
trafic makes them particularly suited for detecting anomalous behavior that may indicate cyber-attacks.
While RNN-based IDS face challenges, such as data imbalance and computational complexity, they have
shown significant potential in improving the accuracy and eficiency of IDS. As cyber threats evolve,
the development and application of LSTM-RNNs in AIDS will play a key role in protecting modern
networks.</p>
      <p>Future research directions include combining LSTM-RNNs with other machine learning models, such
as Convolutional Neural Networks (CNNs) or auto encoders, to explore the accuracy and robustness of
AIDS. Further research should also investigate the reliability of RNN-based IDS deployed at the network
periphery to explore latency and improve real-time detection capabilities in distributed environments.</p>
    </sec>
    <sec id="sec-11">
      <title>Declaration on Generative AI</title>
      <sec id="sec-11-1">
        <title>The author have not employed any Generative AI tools.</title>
        <p>[12] S. Krishnaveni, P. Vigneshwar, S. Kishore, B. Jothi, S. Sivamohan, Anomaly-based intrusion
detection system using support vector machine, in: Artificial intelligence and evolutionary
computations in engineering systems, Springer, 2020, pp. 723–731.
[13] Y. Su, K. Qi, C. Di, Y. Ma, S. Li, Learning automata based feature selection for network trafic
intrusion detection, in: 2018 IEEE Third International Conference on Data Science in Cyberspace
(DSC), IEEE, 2018, pp. 622–627.
[14] T. Aldwairi, D. Perera, M. A. Novotny, An evaluation of the performance of restricted boltzmann
machines as a model for anomaly network intrusion detection, Computer Networks 144 (2018)
111–119.
[15] R. A. Ramadan, A.-H. Emara, M. Al-Sarem, M. Elhamahmy, Internet of drones intrusion detection
using deep learning, Electronics 10 (2021) 2633.
[16] G. Ciaburro, Machine fault detection methods based on machine learning algorithms: A review,</p>
        <p>Mathematical Biosciences and Engineering 19 (2022) 11453–11490.
[17] A. Sherstinsky, Fundamentals of recurrent neural network (rnn) and long short-term memory
(lstm) network, Physica D: Nonlinear Phenomena 404 (2020) 132306.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>N.</given-names>
            <surname>Dimitrijević</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mesterovic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Bogdanović</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Zdravković</surname>
          </string-name>
          ,
          <article-title>Fraud detection and malicious code injection analysis in autograding systems</article-title>
          ,
          <source>in: Proceedings of the Twelfth International Conference on Business Information Security</source>
          , Belgrade, 3rd
          <year>December 2021</year>
          .,
          <year>2021</year>
          , pp.
          <fpage>81</fpage>
          -
          <lpage>85</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>J. M.</given-names>
            <surname>Kizza</surname>
          </string-name>
          ,
          <article-title>System intrusion detection and prevention</article-title>
          , in: Guide to computer network security, Springer,
          <year>2024</year>
          , pp.
          <fpage>295</fpage>
          -
          <lpage>323</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M.</given-names>
            <surname>Swarnkar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. S.</given-names>
            <surname>Rajput</surname>
          </string-name>
          ,
          <source>Artificial Intelligence for Intrusion Detection Systems</source>
          , CRC Press,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>J.-x.</given-names>
            <surname>Zhou</surname>
          </string-name>
          , J.-h. Yan,
          <article-title>Secure and eficient identity-based batch verification signature scheme for ads-b system</article-title>
          ,
          <source>KSII Transactions on Internet and Information Systems (TIIS) 13</source>
          (
          <year>2019</year>
          )
          <fpage>6243</fpage>
          -
          <lpage>6259</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A.</given-names>
            <surname>Pinto</surname>
          </string-name>
          , L.-
          <string-name>
            <surname>C. Herrera</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          <string-name>
            <surname>Donoso</surname>
            ,
            <given-names>J. A.</given-names>
          </string-name>
          <string-name>
            <surname>Gutierrez</surname>
          </string-name>
          ,
          <article-title>Survey on intrusion detection systems based on machine learning techniques for the protection of critical infrastructure</article-title>
          ,
          <source>Sensors</source>
          <volume>23</volume>
          (
          <year>2023</year>
          )
          <fpage>2415</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>E.</given-names>
            <surname>Gyamfi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Jurcut</surname>
          </string-name>
          ,
          <article-title>Intrusion detection in internet of things systems: a review on design approaches leveraging multi-access edge computing, machine learning</article-title>
          ,
          <source>and datasets, Sensors</source>
          <volume>22</volume>
          (
          <year>2022</year>
          )
          <fpage>3744</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A.</given-names>
            <surname>Imanbayev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Tynymbayev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Odarchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Berdibayev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Baikenov</surname>
          </string-name>
          , N. Kaniyeva,
          <article-title>Research of machine learning algorithms for the development of intrusion detection systems in 5g mobile networks and beyond</article-title>
          ,
          <source>Sensors</source>
          <volume>22</volume>
          (
          <year>2022</year>
          )
          <fpage>9957</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>I.</given-names>
            <surname>Essop</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. C.</given-names>
            <surname>Ribeiro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Papaioannou</surname>
          </string-name>
          , G. Zachos, G. Mantas,
          <string-name>
            <given-names>J.</given-names>
            <surname>Rodriguez</surname>
          </string-name>
          ,
          <article-title>Generating datasets for anomaly-based intrusion detection systems in iot and industrial iot networks</article-title>
          ,
          <source>Sensors</source>
          <volume>21</volume>
          (
          <year>2021</year>
          )
          <fpage>1528</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>W.</given-names>
            <surname>Ma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Hou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Jin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Jian</surname>
          </string-name>
          ,
          <article-title>Anomaly based multi-stage attack detection method</article-title>
          ,
          <source>Plos one 19</source>
          (
          <year>2024</year>
          )
          <article-title>e0300821</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>Y.-C.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.-C.</given-names>
            <surname>Houng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.-X.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.-M.</given-names>
            <surname>Tseng</surname>
          </string-name>
          ,
          <article-title>Network anomaly intrusion detection based on deep learning approach</article-title>
          ,
          <source>Sensors</source>
          <volume>23</volume>
          (
          <year>2023</year>
          )
          <fpage>2171</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>S.</given-names>
            <surname>Saravanan</surname>
          </string-name>
          , et al.,
          <article-title>Performance evaluation of classification algorithms in the design of apache spark based intrusion detection system</article-title>
          ,
          <source>in: 2020 5th International Conference on Communication and Electronics Systems (ICCES)</source>
          , IEEE,
          <year>2020</year>
          , pp.
          <fpage>443</fpage>
          -
          <lpage>447</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>