{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T22:28:55Z","timestamp":1775341735746,"version":"3.50.1"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030242640","type":"print"},{"value":"9783030242657","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24265-7_7","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T23:03:34Z","timestamp":1563404614000},"page":"75-86","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["A Comparative Study of Machine Learning Classifiers for Network Intrusion Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7023-7172","authenticated-orcid":false,"given":"Farrukh Aslam","family":"Khan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8512-9687","authenticated-orcid":false,"given":"Abdu","family":"Gumaei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Li, G., Yan, Z., Fu, Y., Chen, H.: Data fusion for network intrusion detection: a review. Secur. Commun. Netw. 2018, 16 pages (2018)","DOI":"10.1155\/2018\/8210614"},{"issue":"10","key":"7_CR2","doi-asserted-by":"publisher","first-page":"1310","DOI":"10.1109\/TPDS.2007.70817","volume":"19","author":"C Gong","year":"2008","unstructured":"Gong, C., Sarac, K.: A more practical approach for single-packet IP traceback using packet logging and marking. IEEE Trans. Parallel Distrib. Syst. 19(10), 1310\u20131324 (2008)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"9","key":"7_CR3","doi-asserted-by":"crossref","first-page":"197","DOI":"10.12700\/APH.11.09.2014.09.12","volume":"11","author":"V Murugesan","year":"2014","unstructured":"Murugesan, V., Shalinie, M., Neethimani, N.: A brief survey of IP traceback methodologies. Acta Polytech. Hung. 11(9), 197\u2013216 (2014)","journal-title":"Acta Polytech. Hung."},{"key":"7_CR4","unstructured":"Song, D.X., Perrig, A.: Advanced and authenticated marking schemes for IP traceback. In: Proceedings of IEEE Conference on Computer Communications (INFOCOM 2001), Anchorage, Alaska, USA, pp. 878\u2013886 (2001)"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Crotti, M., Gringoli, F., Pelosato, P., Salgarelli, L.: A statistical approach to IP-level classification of network traffic. In: Proceedings of 2006 IEEE International Conference on Communications (ICC 2006), Istanbul, Turkey, pp. 170\u2013176 (2006)","DOI":"10.1109\/ICC.2006.254723"},{"issue":"4","key":"7_CR6","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/SURV.2008.080406","volume":"10","author":"TT Nguyen","year":"2008","unstructured":"Nguyen, T.T., Armitage, G.: A survey of techniques for internet traffic classification using machine learning. IEEE Commun. Surv. Tutorials 10(4), 56\u201376 (2008)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"3","key":"7_CR7","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/SURV.2009.090304","volume":"11","author":"A Callado","year":"2009","unstructured":"Callado, A., et al.: A survey on internet traffic identification. IEEE Commun. Surv. Tutorials 11(3), 37\u201352 (2009)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"7_CR8","unstructured":"Zhou, M., Lang, S.-d.: Mining frequency content of network traffic for intrusion detection. In: Proceedings of IASTED International Conference on Communication, Network and Information Security (CNIS 2003), New York, USA, pp. 101\u2013107 (2003)"},{"issue":"10","key":"7_CR9","doi-asserted-by":"publisher","first-page":"1781","DOI":"10.1109\/JSAC.2006.877131","volume":"24","author":"S Dharmapurikar","year":"2006","unstructured":"Dharmapurikar, S., Lockwood, J.W.: Fast and scalable pattern matching for network intrusion detection systems. IEEE J. Sel. Areas Commun. 24(10), 1781\u20131792 (2006)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"2","key":"7_CR10","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1109\/TIFS.2009.2019154","volume":"4","author":"L Chen","year":"2009","unstructured":"Chen, L., Leneutre, J.: A game theoretical framework on intrusion detection in heterogeneous networks. IEEE Trans. Inf. Forensics Secur. 4(2), 165\u2013178 (2009)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"7_CR11","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/TIFS.2007.916288","volume":"3","author":"A Das","year":"2008","unstructured":"Das, A., Nguyen, D., Zambreno, J., Memik, G., Choudhary, A.: An FPGA-based network intrusion detection architecture. IEEE Trans. Inf. Forensics Secur. 3(1), 118\u2013132 (2008)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"7_CR12","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1109\/TSMCB.2007.914695","volume":"38","author":"W Hu","year":"2008","unstructured":"Hu, W., Hu, W., Maybank, S.: AdaBoost-based algorithm for network intrusion detection. IEEE Trans. Syst. Man Cybern. Part B Cybern. 38(2), 577\u2013583 (2008)","journal-title":"IEEE Trans. Syst. Man Cybern. Part B Cybern."},{"issue":"1","key":"7_CR13","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/TSMCC.2010.2050685","volume":"41","author":"S Mabu","year":"2011","unstructured":"Mabu, S., Chen, C., Lu, N., Shimada, K., Hirasawa, K.: An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev. 41(1), 130\u2013139 (2011)","journal-title":"IEEE Trans. Syst. Man Cybern. Part C Appl. Rev."},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Hadlington, L.: Human factors in cybersecurity; examining the link between internet addition, impulsivity, attitudes towards cybersecurity, and risk cybersecurity behaviors. Heliyon 3(7), e00346 (2017)","DOI":"10.1016\/j.heliyon.2017.e00346"},{"key":"7_CR15","first-page":"2721","volume":"7","author":"JZ Kolter","year":"2006","unstructured":"Kolter, J.Z., Maloof, M.A.: Learning to detect and classify malicious executables in the wild. J. Mach. Learn. Res. 7, 2721\u20132744 (2006)","journal-title":"J. Mach. Learn. Res."},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Siddiqui, S., Khan, M.S., Ferens, K., Kinsner, W.: Detecting advanced persistent threats using fractal dimension based machine learning classification. In: Proceedings of the 2016 International Workshop on Security and Privacy Analytics (IWSPA 2016), New Orleans, Louisiana, USA, pp. 64\u201369 (2016)","DOI":"10.1145\/2875475.2875484"},{"key":"7_CR17","unstructured":"Mukkamala, S., Janoski, G., Sung, A.: Intrusion detection using neural networks and support vector machines. In: Proceedings of the 2002 International Joint Conference on Neural Networks, IJCNN 2002, vol. 2, pp. 1702\u20131707. IEEE (2002)"},{"issue":"5","key":"7_CR18","doi-asserted-by":"publisher","first-page":"1575","DOI":"10.3390\/s18051575","volume":"18","author":"A Gumaei","year":"2018","unstructured":"Gumaei, A., Sammouda, R., Al-Salman, A.M., Alsanad, A.: An effective palmprint recognition approach for visible and multispectral sensor images. Sensors 18(5), 1575 (2018)","journal-title":"Sensors"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Gumaei, A., Sammouda, R., Al-Salman, A.M.S., Alsanad, A.: An improved multispectral palmprint recognition system using autoencoder with regularized extreme learning machine. Comput. Intell. Neurosci. 2018, 13 pages (2018)","DOI":"10.1155\/2018\/8041609"},{"key":"7_CR20","unstructured":"Weiss, S.M., Kulikowski, C.A.: Computer Systems That Learn: Classification and Prediction Methods from Statistics, Neural Nets, Machine Learning, and Expert Systems. Morgan Kaufmann Publishers Inc., San Francisco (1991)"},{"key":"7_CR21","volume-title":"Rough-Fuzzy Hybridization: A New Trend in Decision Making","author":"SK Pal","year":"1999","unstructured":"Pal, S.K., Skowron, A.: Rough-Fuzzy Hybridization: A New Trend in Decision Making. Springer, Singapore (1999)"},{"issue":"4","key":"7_CR22","first-page":"79","volume":"18","author":"A Alsanad","year":"2018","unstructured":"Alsanad, A.: Forecasting daily demand of orders using random forest classifier. Int. J. Comput. Sci. Netw. Secur. 18(4), 79\u201383 (2018)","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"7_CR23","unstructured":"Solanki, M., Dhamdhere, V.: Intrusion detection system using means of data mining by using C 4.5 algorithm. Int. J. Appl. Innov. Eng. Manag. (IJAIEM) 4(5), 2319\u20132484 (2015)"},{"key":"7_CR24","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/978-3-540-88623-5_41","volume-title":"Challenges for Next Generation Network Operations and Service Management (APNOMS 2008)","author":"HA Nguyen","year":"2008","unstructured":"Nguyen, H.A., Choi, D.: Application of data mining to network intrusion detection: classifier selection model. In: Ma, Y., Choi, D., Ata, S. (eds.) Challenges for Next Generation Network Operations and Service Management (APNOMS 2008). LNCS, vol. 5297, pp. 399\u2013408. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-88623-5_41"},{"key":"7_CR25","unstructured":"Gao, B., Ma, H.-Y., Yang, Y.-H.: HMMs (Hidden Markov models) based on anomaly intrusion detection method. In: Proceedings of 2002 International Conference on Machine Learning and Cybernetics, Beijing, China (2002)"},{"key":"7_CR26","unstructured":"Gomez, J., Dasgupta, D.: Evolving fuzzy classifiers for intrusion detection. In: Proceedings of the 2002 IEEE Workshop on Information Assurance, New York, USA (2001)"},{"key":"7_CR27","unstructured":"Ye, N., Li, X., Chen, Q., Emran, S., Xu, M.: Probabilistic techniques for intrusion detection based on computer audit data. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 31, 266\u2013274 (2001)"},{"issue":"1","key":"7_CR28","first-page":"255","volume":"23","author":"R Goonatilake","year":"2007","unstructured":"Goonatilake, R., Herath, A., Herath, S., Herath, S., Herath, J.: Intrusion detection using the chi-square goodness-of-fit test for information assurance, network, forensics and software security. J. Comput. Sci. Coll. 23(1), 255\u2013263 (2007)","journal-title":"J. Comput. Sci. Coll."},{"issue":"1&2","key":"7_CR29","first-page":"201","volume":"10","author":"VN Dao","year":"2002","unstructured":"Dao, V.N., Vemuri, V.R.: Computer network intrusion detection: a comparison of neural network methods. Differ. Equ. Dyn. Syst. 10(1&2), 201\u2013214 (2002)","journal-title":"Differ. Equ. Dyn. Syst."},{"key":"7_CR30","doi-asserted-by":"publisher","unstructured":"Malik, A.J., Khan, F.A.: A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection. Cluster Comput. (2017). https:\/\/doi.org\/10.1007\/s10586-017-0971-8","DOI":"10.1007\/s10586-017-0971-8"},{"issue":"16","key":"7_CR31","doi-asserted-by":"publisher","first-page":"2646","DOI":"10.1002\/sec.508","volume":"8","author":"AJ Malik","year":"2015","unstructured":"Malik, A.J., Shahzad, W., Khan, F.A.: Network intrusion detection using hybrid binary PSO and random forests algorithm. Secur. Commun. Netw. 8(16), 2646\u20132660 (2015)","journal-title":"Secur. Commun. Netw."},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"Malik, A.J., Khan, F.A.: A hybrid technique using multi-objective particle swarm optimization and random forests for PROBE attacks detection in a network. In: IEEE Conference on Systems, Man, and Cybernetics, Manchester, UK, 13\u201316 October 2013 (2013)","DOI":"10.1109\/SMC.2013.422"},{"key":"7_CR33","doi-asserted-by":"crossref","unstructured":"Malik, A.J., Shahzad, W., Khan, F.A.: Binary PSO and random forests algorithm for PROBE attacks detection in a network. In: IEEE Congress on Evolutionary Computation (CEC 2011), New Orleans, USA, 5\u20138 June 2011 (2011)","DOI":"10.1109\/CEC.2011.5949682"},{"issue":"05","key":"7_CR34","doi-asserted-by":"publisher","first-page":"119","DOI":"10.4236\/jcc.2018.65010","volume":"6","author":"S Ryu","year":"2018","unstructured":"Ryu, S., Yang, B.: A comparative study of machine learning algorithms and their ensembles for Botnet detection. J. Comput. Commun. 6(05), 119 (2018)","journal-title":"J. Comput. Commun."},{"key":"7_CR35","doi-asserted-by":"crossref","unstructured":"Bansal, A., Mahapatra, S.: A comparative analysis of machine learning techniques for botnet detection. In: Proceedings of the 10th International Conference on Security of Information and Networks, pp. 91\u201398. ACM, October 2017","DOI":"10.1145\/3136825.3136874"},{"issue":"3","key":"7_CR36","first-page":"1","volume":"68","author":"A Ali","year":"2017","unstructured":"Ali, A., Hu, Y.H., Hsieh, C.C.G., Khan, M.: A comparative study on machine learning algorithms for network defense. Va. J. Sci. 68(3), 1 (2017)","journal-title":"Va. J. Sci."},{"key":"7_CR37","unstructured":"KDD Cup 1999 Data. Kdd.ics.uci.edu (2018). https:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html . Accessed 23 Mar 2018"},{"key":"7_CR38","unstructured":"UNSW-NB15 Dataset: UNSW Canberra at the Australian Defense Force Academy, Canberra, Australia (2015). https:\/\/www.unsw.adfa.edu.au\/australian-centre-for-cybersecurity\/cybersecurity\/ADFA-NB15-Datasets\/ . Accessed 23 Mar 2018"},{"key":"7_CR39","unstructured":"WEKA: Data Mining Software in Java (2018). http:\/\/www.cs.waikato.ac.nz\/ml\/weka . Accessed 25 Sept 2018"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24265-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T10:26:53Z","timestamp":1695032813000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24265-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242640","9783030242657"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24265-7_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}