{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:04:13Z","timestamp":1760709853013,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030150341"},{"type":"electronic","value":"9783030150358"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-15035-8_75","type":"book-chapter","created":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T08:30:46Z","timestamp":1552552246000},"page":"776-785","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Using Feature Selection to Improve Performance of Three-Tier Intrusion Detection System"],"prefix":"10.1007","author":[{"given":"Yi-Jen","family":"Su","sequence":"first","affiliation":[]},{"given":"Pei-Yu","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Wu-Chih","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Hsuan-Yu","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Chen-Yu","family":"Kao","sequence":"additional","affiliation":[]},{"given":"Shan-Hsiung","family":"Hsieh","sequence":"additional","affiliation":[]},{"given":"Chun-Li","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,15]]},"reference":[{"key":"75_CR1","unstructured":"Anderson, J.P.: Computer Security Threat Monitoring and Surveillance (1980)"},{"issue":"2","key":"75_CR2","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"13","author":"DE Denning","year":"1987","unstructured":"Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. 13(2), 222\u2013232 (1987)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"75_CR3","unstructured":"Hall, M.A.: Correlation-based feature selection for machine learning. Doctoral Dissertation, University of Waikato, Department of Computer Science (1999)"},{"key":"75_CR4","doi-asserted-by":"crossref","unstructured":"Mukkamala, S., Janoski, G., Sung, A.: Intrusion detection using neural networks and support vector machines. In: Proceedings of the International Joint Conference on Neural Networks. vol. 2, pp. 1702\u20131707 (2002)","DOI":"10.1007\/978-3-7908-1782-9_10"},{"key":"75_CR5","unstructured":"Sung, A.H., Mukkamala, S.: Identifying important features for intrusion detection using support vector machines and neural networks. In: Proceedings of International Symposium on Applications and the Internet.vol. 217, pp. 209\u2013216 (2003)"},{"issue":"12","key":"75_CR6","first-page":"1","volume":"150","author":"K Kumar","year":"2016","unstructured":"Kumar, K., Batth, J.S.: Network intrusion detection with feature selection techniques using machine-learning algorithms. Int. J. Comput. Appl. 150(12), 1\u201313 (2016)","journal-title":"Int. J. Comput. Appl."},{"issue":"4","key":"75_CR7","doi-asserted-by":"publisher","first-page":"1184","DOI":"10.1016\/j.jnca.2011.01.002","volume":"34","author":"F Amiri","year":"2011","unstructured":"Amiri, F., Yousefi, M.R., Lucas, C., Shakery, A., Yazdani, N.: Mutual information-based feature selection for intrusion detection systems. J. Netw. Comput. Appl. 34(4), 1184\u20131199 (2011)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"75_CR8","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1016\/j.eswa.2011.07.032","volume":"39","author":"Y Li","year":"2012","unstructured":"Li, Y., Xia, J., Zhang, S., Yan, J., Ai, X., Dai, K.: An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Syst. Appl. 39(1), 424\u2013430 (2012)","journal-title":"Expert Syst. Appl."},{"issue":"10","key":"75_CR9","doi-asserted-by":"publisher","first-page":"2986","DOI":"10.1109\/TC.2016.2519914","volume":"65","author":"MA Ambusaidi","year":"2016","unstructured":"Ambusaidi, M.A., He, X., Nanda, P., Tan, Z.: Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans. Comput. 65(10), 2986\u20132998 (2016)","journal-title":"IEEE Trans. Comput."},{"key":"75_CR10","doi-asserted-by":"crossref","unstructured":"Scarfone, K., Mell, P.: Guide to intrusion detection and prevention systems (IDPS). NIST Special Publication, 800-94 (2007)","DOI":"10.6028\/NIST.SP.800-94"},{"key":"75_CR11","doi-asserted-by":"crossref","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR), 41(3) (2009)","DOI":"10.1145\/1541880.1541882"},{"issue":"4","key":"75_CR12","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1016\/j.eswa.2005.05.002","volume":"29","author":"O Depren","year":"2005","unstructured":"Depren, O., Topallar, M., Anarim, E., Ciliz, M.K.: An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Expert Syst. Appl. 29(4), 713\u2013722 (2005)","journal-title":"Expert Syst. Appl."},{"issue":"4","key":"75_CR13","doi-asserted-by":"publisher","first-page":"1690","DOI":"10.1016\/j.eswa.2013.08.066","volume":"41","author":"G Kim","year":"2014","unstructured":"Kim, G., Lee, S., Kim, S.: A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Syst. Appl. 41(4), 1690\u20131700 (2014)","journal-title":"Expert Syst. Appl."},{"key":"75_CR14","unstructured":"Cisco Visual Networking Index: Forecast and Trends, 2017\u20132022. \n                    https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/visual-networking-index-vni\/white-paper-c11-741490.html#_Toc529314175"},{"issue":"1\u20132","key":"75_CR15","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/S0004-3702(97)00063-5","volume":"97","author":"AL Blum","year":"1997","unstructured":"Blum, A.L., Langley, P.: Selection of relevant features and examples in machine learning. Artif. Intell. 97(1\u20132), 245\u2013271 (1997)","journal-title":"Artif. Intell."},{"key":"75_CR16","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: Proceedings of Military Communications and Information Systems Conference (MilCIS), pp. 1\u20136 (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"75_CR17","unstructured":"Moustafa, N., Slay, J.: A hybrid feature selection for network intrusion detection systems: Central points. In: Proceedings of the 16th Australian Information Warfare Conference, pp. 5\u201313 (2015)"},{"key":"75_CR18","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: The significant features of the UNSW-NB15 and the KDD99 data sets for network intrusion detection systems. In: Proceedings of 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), pp. 25\u201331 (2015)","DOI":"10.1109\/BADGERS.2015.014"},{"key":"75_CR19","unstructured":"Weka 3: Data Mining Software in Java. \n                    https:\/\/www.cs.waikato.ac.nz\/ml\/weka\/"},{"issue":"6","key":"75_CR20","doi-asserted-by":"publisher","first-page":"1437","DOI":"10.1109\/TKDE.2003.1245283","volume":"15","author":"MA Hall","year":"2003","unstructured":"Hall, M.A., Holmes, G.: Benchmarking attribute selection techniques for discrete class data mining. IEEE Trans. Knowl. Data Eng. 15(6), 1437\u20131447 (2003)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1","key":"75_CR21","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1023\/A:1022631118932","volume":"11","author":"RC Holte","year":"1993","unstructured":"Holte, R.C.: Very simple classification rules perform well on most commonly used datasets. Mach. Learn. 11(1), 63\u201390 (1993)","journal-title":"Mach. Learn."},{"key":"75_CR22","doi-asserted-by":"crossref","unstructured":"Kononenko I.: Estimating attributes: Analysis and extensions of RELIEF, Lecture Notes in Computer Science, vol. 784, pp. 171\u2013182. Springer, Heidelberg (1994)","DOI":"10.1007\/3-540-57868-4_57"},{"issue":"6","key":"75_CR23","first-page":"139","volume":"3","author":"C Prachi","year":"2016","unstructured":"Prachi, C.: Usage of machine learning for intrusion detection in a network. Int. J. Comput. Netw. Appl. 3(6), 139\u2013147 (2016)","journal-title":"Int. J. Comput. Netw. Appl."},{"key":"75_CR24","doi-asserted-by":"crossref","unstructured":"Al-Jarrah, O.Y., Siddiqui, A., Elsalamouny, M., Yoo, P.D., Muhaidat, S., Kim, K.: Machine-learning-based feature selection techniques for large-scale network intrusion detection. IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 177\u2013181 (2014)","DOI":"10.1109\/ICDCSW.2014.14"},{"issue":"9","key":"75_CR25","doi-asserted-by":"publisher","first-page":"3489","DOI":"10.1007\/s11227-015-1615-5","volume":"72","author":"MM Rathore","year":"2016","unstructured":"Rathore, M.M., Ahmad, A., Paul, A.: Real time intrusion detection system for ultra-high-speed big data environments. J. Supercomput. 72(9), 3489\u20133510 (2016)","journal-title":"J. Supercomput."}],"container-title":["Advances in Intelligent Systems and Computing","Web, Artificial Intelligence and Network Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-15035-8_75","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T02:57:38Z","timestamp":1558148258000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-15035-8_75"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030150341","9783030150358"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-15035-8_75","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"15 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WAINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Workshops of  the International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Matsue","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 March 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 March 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"33","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"waina2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2019\/workshops.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}