{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T10:03:41Z","timestamp":1775383421131,"version":"3.50.1"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030249069","type":"print"},{"value":"9783030249076","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24907-6_21","type":"book-chapter","created":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T19:02:46Z","timestamp":1562785366000},"page":"277-288","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["Effectiveness of Machine Learning Based Intrusion Detection Systems"],"prefix":"10.1007","author":[{"given":"Mohammed","family":"Alrowaily","sequence":"first","affiliation":[]},{"given":"Freeh","family":"Alenezi","sequence":"additional","affiliation":[]},{"given":"Zhuo","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"21_CR1","doi-asserted-by":"publisher","first-page":"33789","DOI":"10.1109\/ACCESS.2018.2841987","volume":"6","author":"I Ahmad","year":"2018","unstructured":"Ahmad, I., Basheri, M., Iqbal, M.J., Rahim, A.: Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection. IEEE Access 6, 33789\u201333795 (2018)","journal-title":"IEEE Access"},{"key":"21_CR2","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-030-00840-6_16","volume-title":"Computer and Information Sciences","author":"D Aksu","year":"2018","unstructured":"Aksu, D., \u00dcstebay, S., Aydin, M.A., Atmaca, T.: Intrusion detection with comparative analysis of supervised learning techniques and fisher score feature selection algorithm. In: Czach\u00f3rski, T., Gelenbe, E., Grochla, K., Lent, R. (eds.) ISCIS 2018. CCIS, vol. 935, pp. 141\u2013149. Springer, Cham (2018). \n                    https:\/\/doi.org\/10.1007\/978-3-030-00840-6_16"},{"key":"21_CR3","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1007\/978-981-13-1810-8_37","volume-title":"Advances in Computing and Data Sciences","author":"A Bansal","year":"2018","unstructured":"Bansal, A., Kaur, S.: Extreme gradient boosting based tuning for classification in intrusion detection systems. In: Singh, M., Gupta, P.K., Tyagi, V., Flusser, J., \u00d6ren, T. (eds.) ICACDS 2018. CCIS, vol. 905, pp. 372\u2013380. Springer, Singapore (2018). \n                    https:\/\/doi.org\/10.1007\/978-981-13-1810-8_37"},{"key":"21_CR4","unstructured":"Boukhamla, A., Gaviro, J.C.: Cicids 2017 dataset: performance improvements and validation as a robust intrusion detection system testbed (2018)"},{"issue":"1","key":"21_CR5","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001)","journal-title":"Mach. Learn."},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Hastie, T., Tibshirani, R., Friedman, J.: The elements of statistical learning, Chapter 6 (2001)","DOI":"10.1007\/978-0-387-21606-5"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Hou, J., Fu, P., Cao, Z., Xu, A.: Machine learning based DDoS detection through netflow analysis. In: MILCOM 2018\u20132018 IEEE Military Communications Conference (MILCOM), pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/MILCOM.2018.8599738"},{"issue":"2","key":"21_CR8","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1109\/TSMCB.2007.914695","volume":"38","author":"W Hu","year":"2008","unstructured":"Hu, W., Hu, W., Maybank, S.: Adaboost-based algorithm for network intrusion detection. IEEE Trans. Syst. Man Cybern. Part B (Cybern.) 38(2), 577\u2013583 (2008)","journal-title":"IEEE Trans. Syst. Man Cybern. Part B (Cybern.)"},{"key":"21_CR9","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1109\/TSMC.1985.6313426","volume":"4","author":"JM Keller","year":"1985","unstructured":"Keller, J.M., Gray, M.R., Givens, J.A.: A fuzzy k-nearest neighbor algorithm. IEEE Trans. Syst. Man Cybern. 4, 580\u2013585 (1985)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"issue":"12","key":"21_CR10","first-page":"258","volume":"7","author":"M Panda","year":"2007","unstructured":"Panda, M., Patra, M.R.: Network intrusion detection using Naive Bayes. Int. J. Comput. Sci. Netw. Secur. 7(12), 258\u2013263 (2007)","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"21_CR11","doi-asserted-by":"publisher","first-page":"13546","DOI":"10.1109\/ACCESS.2019.2893871","volume":"7","author":"D Papamartzivanos","year":"2019","unstructured":"Papamartzivanos, D., M\u00e1rmol, F.G., Kambourakis, G.: Introducing deep learning self-adaptive misuse network intrusion detection systems. IEEE Access 7, 13546\u201313560 (2019)","journal-title":"IEEE Access"},{"issue":"1","key":"21_CR12","first-page":"81","volume":"1","author":"JR Quinlan","year":"1986","unstructured":"Quinlan, J.R.: Induction of decision trees. Mach. Learn. 1(1), 81\u2013106 (1986)","journal-title":"Mach. Learn."},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSP, pp. 108\u2013116 (2018)","DOI":"10.5220\/0006639801080116"},{"issue":"10","key":"21_CR14","doi-asserted-by":"publisher","first-page":"11994","DOI":"10.1016\/j.eswa.2009.05.029","volume":"36","author":"CF Tsai","year":"2009","unstructured":"Tsai, C.F., Hsu, Y.F., Lin, C.Y., Lin, W.Y.: Intrusion detection by machine learning: a review. Expert Syst. Appl. 36(10), 11994\u201312000 (2009)","journal-title":"Expert Syst. Appl."},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Ustebay, S., Turgut, Z., Aydin, M.A.: Intrusion detection system with recursive feature elimination by using random forest and deep learning classifier. In: 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), pp. 71\u201376. IEEE (2018)","DOI":"10.1109\/IBIGDELFT.2018.8625318"},{"issue":"1","key":"21_CR16","doi-asserted-by":"publisher","first-page":"265","DOI":"10.3390\/make1010017","volume":"1","author":"W Zegeye","year":"2019","unstructured":"Zegeye, W., Dean, R., Moazzami, F.: Multi-layer hidden markov model based intrusion detection system. Mach. Learn. Knowl. Extr. 1(1), 265\u2013286 (2019)","journal-title":"Mach. Learn. Knowl. Extr."}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24907-6_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T19:06:32Z","timestamp":1562785592000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24907-6_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030249069","9783030249076"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24907-6_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Atlanta, GA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cse.stfx.ca\/~cybermatics\/2019\/spaccs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}