K. Desale and R. Ade, Genetic algorithm based feature selection approach for effective intrusion detection system, 2015 International Conference on Computer Communication and Informatics (ICCCI), pp.1-6, 2015.

M. Monshizadeh and Z. Yan, Security Related Data Mining, IEEE International Conference on Computer and Information Technology, pp.775-782, 2014.

D. Pietro and A. , Dynamic deep packet inspection for anomaly detection, US Patent, vol.2017099310, issue.A1, 2017.

J. Vasseur, Anomaly detection in a network coupling state information with machine learning outputs, US Patent, vol.20170104774, issue.A1, 2017.

D. Pietro and A. , Signature creation for unknown attacks, US Patent, vol.20160028750, issue.A1, p.28

N. Yadav, Network behavior data collection and analytics for anomaly detection, US Patent, vol.20160359695, issue.A1, 2016.

B. Atli, Anomaly-Based Intrusion Detection by Modeling Probability Distributions of Flow Characteristics, 2017.

. Iscx-2012,

, The UNSW-NB15 data set

M. Monshizadeh, V. Khatri, and R. Kantola, Detection as a service: An SDN application, 19th International Conference on Advanced Communication Technology (ICACT), pp.285-290, 2017.

I. Sharafaldin, Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization, 4th International Conference on Information Systems Security and Privacy (ICISSP), 2018.

L. Yann, Deep learning, vol.521, p.436, 2015.