{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:26:16Z","timestamp":1743081976907,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030170646"},{"type":"electronic","value":"9783030170653"}],"license":[{"start":{"date-parts":[[2019,4,10]],"date-time":"2019-04-10T00:00:00Z","timestamp":1554854400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-17065-3_33","type":"book-chapter","created":{"date-parts":[[2019,4,9]],"date-time":"2019-04-09T01:38:22Z","timestamp":1554773902000},"page":"329-337","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Survey on the Use of Data Points in IDS Research"],"prefix":"10.1007","author":[{"given":"Heini","family":"Ahde","sequence":"first","affiliation":[]},{"given":"Sampsa","family":"Rauti","sequence":"additional","affiliation":[]},{"given":"Ville","family":"Leppanen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,10]]},"reference":[{"key":"33_CR1","doi-asserted-by":"crossref","unstructured":"Al-Jarrah, O., Arafat, A.: Network intrusion detection system using attack behavior classification. In: 5th International Conference on Information and Communication Systems (ICICS), pp. 1\u20136. IEEE (2014)","DOI":"10.1109\/IACS.2014.6841978"},{"key":"33_CR2","unstructured":"Alanazi, H., Noor, R., Zaidan, B., Zaidan, A.: Intrusion detection system: overview. arXiv preprint \n                  arXiv:1002.4047\n                  \n                 (2010)"},{"issue":"1","key":"33_CR3","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1109\/SURV.2013.052213.00046","volume":"16","author":"MH Bhuyan","year":"2014","unstructured":"Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutor. 16(1), 303\u2013336 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"33_CR4","doi-asserted-by":"crossref","unstructured":"Erman, J., Mahanti, A., Arlitt, M.: Qrp05-4: Internet traffic identification using machine learning. In: 2006 Global Telecommunications Conference, GLOBECOM 2006, pp. 1\u20136. IEEE (2006)","DOI":"10.1109\/GLOCOM.2006.443"},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"Estan, C., Savage, S., Varghese, G.: Automatically inferring patterns of resource consumption in network traffic. In: Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 137\u2013148. ACM (2003)","DOI":"10.1145\/863969.863972"},{"key":"33_CR6","doi-asserted-by":"crossref","unstructured":"Feroz, M.N., Mengel, S.: Phishing URL detection using URL ranking. In: 2015 IEEE International Congress on Big Data (BigData Congress), pp. 635\u2013638. IEEE (2015)","DOI":"10.1109\/BigDataCongress.2015.97"},{"issue":"1\u20132","key":"33_CR7","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P Garcia-Teodoro","year":"2009","unstructured":"Garcia-Teodoro, P., Diaz-Verdejo, J., Maci\u00e1-Fern\u00e1ndez, G., V\u00e1zquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1\u20132), 18\u201328 (2009)","journal-title":"Comput. Secur."},{"key":"33_CR8","doi-asserted-by":"crossref","unstructured":"Gonzalez, R., Manco, F., Garcia-Duran, A., Mendes, J., Huici, F., Niccolini, S., Niepert, M.: Net2Vec: deep learning for the network. In: Proceedings of the Workshop on Big Data Analytics and Machine Learning for Data Communication Networks, pp. 13\u201318. ACM (2017)","DOI":"10.1145\/3098593.3098596"},{"key":"33_CR9","doi-asserted-by":"crossref","unstructured":"Hammerschmidt, C., Marchal, S., State, R., Pellegrino, G., Verwer, S.: Efficient learning of communication profiles from IP flow records. In: 2016 41st Conference on Local Computer Networks (LCN), pp. 559\u2013562. IEEE (2016)","DOI":"10.1109\/LCN.2016.92"},{"issue":"4","key":"33_CR10","first-page":"48","volume":"16","author":"A Hotho","year":"2002","unstructured":"Hotho, A., Maedche, A., Staab, S.: Ontology-based text document clustering. K\u00fcnsliche Intelligenz (KI) 16(4), 48\u201354 (2002)","journal-title":"K\u00fcnsliche Intelligenz (KI)"},{"issue":"4","key":"33_CR11","doi-asserted-by":"publisher","first-page":"supl27","DOI":"10.1109\/MC.2002.1012428","volume":"35","author":"RA Kemmerer","year":"2002","unstructured":"Kemmerer, R.A., Vigna, G.: Intrusion detection: a brief history and overview. Computer 35(4), supl27\u2013supl30 (2002)","journal-title":"Computer"},{"key":"33_CR12","doi-asserted-by":"crossref","unstructured":"Liu, Y., Li, W., Li, Y.C.: Network traffic classification using k-means clustering. In: 2007 Second International Multi-Symposiums on Computer and Computational Sciences, IMSCCS 2007, pp. 360\u2013365. IEEE (2007)","DOI":"10.1109\/IMSCCS.2007.4392626"},{"key":"33_CR13","doi-asserted-by":"crossref","unstructured":"Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Beyond blacklists: learning to detect malicious web sites from suspicious URLs. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1245\u20131254. ACM (2009)","DOI":"10.1145\/1557019.1557153"},{"key":"33_CR14","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.comcom.2017.06.003","volume":"109","author":"P Magdalinos","year":"2017","unstructured":"Magdalinos, P., Barmpounakis, S., Spapis, P., Kaloxylos, A., Kyprianidis, G., Kousaridas, A., Alonistioti, N., Zhou, C.: A context extraction and profiling engine for 5G network resource mapping. Comput. Commun. 109, 184\u2013201 (2017)","journal-title":"Comput. Commun."},{"issue":"6","key":"33_CR15","doi-asserted-by":"publisher","first-page":"752","DOI":"10.1109\/TKDE.2007.190725","volume":"20","author":"AN Mahmood","year":"2008","unstructured":"Mahmood, A.N., Leckie, C., Udaya, P.: An efficient clustering scheme to exploit hierarchical data in network traffic analysis. IEEE Trans. Knowl. Data Eng. 20(6), 752\u2013767 (2008)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"33_CR16","doi-asserted-by":"crossref","unstructured":"McGregor, A., Hall, M., Lorier, P., Brunskill, J.: Flow clustering using machine learning techniques. In: International Workshop on Passive and Active Network Measurement, pp. 205\u2013214. Springer (2004)","DOI":"10.1007\/978-3-540-24668-8_21"},{"key":"33_CR17","doi-asserted-by":"crossref","unstructured":"Sarmadi, S., Li, M., Chellappan, S.: On the feasibility of profiling internet users based on volume and time of usage. In: 2017 9th Latin-American Conference on Communications (LATINCOM), pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/LATINCOM.2017.8240155"},{"key":"33_CR18","doi-asserted-by":"crossref","unstructured":"Shadi, K., Natarajan, P., Dovrolis, C.: Hierarchical IP flow clustering. In: Proceedings of the Workshop on Big Data Analytics and Machine Learning for Data Communication Networks, pp. 25\u201330. ACM (2017)","DOI":"10.1145\/3098593.3098598"},{"key":"33_CR19","doi-asserted-by":"crossref","unstructured":"Singh, H.: Performance analysis of unsupervised machine learning techniques for network traffic classification. In: 2015 Fifth International Conference on Advanced Computing & Communication Technologies (ACCT), pp. 401\u2013404. IEEE (2015)","DOI":"10.1109\/ACCT.2015.54"},{"issue":"22","key":"33_CR20","doi-asserted-by":"publisher","first-page":"8609","DOI":"10.1016\/j.eswa.2015.07.015","volume":"42","author":"R Singh","year":"2015","unstructured":"Singh, R., Kumar, H., Singla, R.: An intrusion detection system using network traffic profiling and online sequential extreme learning machine. Expert Syst. Appl. 42(22), 8609\u20138624 (2015)","journal-title":"Expert Syst. Appl."},{"issue":"10","key":"33_CR21","doi-asserted-by":"publisher","first-page":"11994","DOI":"10.1016\/j.eswa.2009.05.029","volume":"36","author":"CF Tsai","year":"2009","unstructured":"Tsai, C.F., Hsu, Y.F., Lin, C.Y., Lin, W.Y.: Intrusion detection by machine learning: a review. Expert Syst. Appl. 36(10), 11994\u201312000 (2009)","journal-title":"Expert Syst. Appl."},{"key":"33_CR22","doi-asserted-by":"crossref","unstructured":"Valenti, S., Rossi, D., Dainotti, A., Pescap\u00e8, A., Finamore, A., Mellia, M.: Reviewing traffic classification. In: Data Traffic Monitoring and Analysis, pp. 123\u2013147. Springer (2013)","DOI":"10.1007\/978-3-642-36784-7_6"},{"key":"33_CR23","doi-asserted-by":"crossref","unstructured":"Wang, C., Song, Y., El-Kishky, A., Roth, D., Zhang, M., Han, J.: Incorporating world knowledge to document clustering via heterogeneous information networks. In: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1215\u20131224. ACM (2015)","DOI":"10.1145\/2783258.2783374"},{"issue":"11","key":"33_CR24","doi-asserted-by":"publisher","first-page":"2932","DOI":"10.1109\/TPDS.2013.307","volume":"25","author":"Y Wang","year":"2014","unstructured":"Wang, Y., Xiang, Y., Zhang, J., Zhou, W., Wei, G., Yang, L.T.: Internet traffic classification using constrained clustering. IEEE Trans. Parallel Distrib. Syst. 25(11), 2932\u20132943 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"6","key":"33_CR25","doi-asserted-by":"publisher","first-page":"1241","DOI":"10.1109\/TNET.2007.911438","volume":"16","author":"K Xu","year":"2008","unstructured":"Xu, K., Zhang, Z.L., Bhattacharyya, S.: Internet traffic behavior profiling for network security monitoring. IEEE\/ACM Trans. Netw. 16(6), 1241\u20131252 (2008)","journal-title":"IEEE\/ACM Trans. Netw."}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2018)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-17065-3_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T04:13:39Z","timestamp":1558152819000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-17065-3_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,10]]},"ISBN":["9783030170646","9783030170653"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-17065-3_33","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,4,10]]},"assertion":[{"value":"10 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SoCPaR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Soft Computing and Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Porto","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"socpar2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/socpar18\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}