{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T08:08:01Z","timestamp":1726042081452},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030295158"},{"type":"electronic","value":"9783030295165"}],"license":[{"start":{"date-parts":[[2019,8,24]],"date-time":"2019-08-24T00:00:00Z","timestamp":1566604800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-29516-5_45","type":"book-chapter","created":{"date-parts":[[2019,8,23]],"date-time":"2019-08-23T12:03:48Z","timestamp":1566561828000},"page":"577-589","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Impact of the Structure of Data Pre-processing Pipelines on the Performance of Classifiers When Applied to Imbalanced Network Intrusion Detection System Dataset"],"prefix":"10.1007","author":[{"given":"I.","family":"Al-Mandhari","sequence":"first","affiliation":[]},{"given":"L.","family":"Guan","sequence":"additional","affiliation":[]},{"given":"E. A.","family":"Edirisinghe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,24]]},"reference":[{"key":"45_CR1","first-page":"145","volume-title":"Advances in Intelligent Systems and Computing","author":"Intisar S. Al-Mandhari","year":"2018","unstructured":"Al-Mandhari, I.S., Guan, L., Edirisinghe, E.A.: Investigating the effective use of machine learning algorithms in network intruder detection systems. In: Advances in Information and Communication Networks, pp. 145\u2013161 (2019)"},{"issue":"2","key":"45_CR2","doi-asserted-by":"publisher","first-page":"251","DOI":"10.3233\/IDA-2010-0466","volume":"15","author":"V Engen","year":"2011","unstructured":"Engen, V., Vincent, J., Phalp, K.: Exploring discrepancies in findings obtained with the KDD Cup \u201999 data set. Intell. Data Anal. 15(2), 251\u2013276 (2011)","journal-title":"Intell. Data Anal."},{"key":"45_CR3","first-page":"1","volume":"17","author":"TM Mitchell","year":"2006","unstructured":"Mitchell, T.M.: The discipline of machine learning. Mach. Learn. 17, 1\u20137 (2006)","journal-title":"Mach. Learn."},{"key":"45_CR4","unstructured":"Grossman, R., Kasif, S., Moore, R., Rocke, D., Ullman, J.: Data mining research: opportunities and challenges, vol. 1998 (1999)"},{"key":"45_CR5","unstructured":"Portillo, S.P.: Ph.D. thesis attacks against intrusion detection networks: evasion, reverse engineering and optimal countermeasures, June 2014"},{"key":"45_CR6","unstructured":"Long, L., Wang, X., Zhu, X.: Machine learning in network intrusion detection, vol. 11, no. 2, p. 9941 (2015)"},{"key":"45_CR7","doi-asserted-by":"crossref","unstructured":"Sommer, R., Paxson, V.: Outside the closed world: on using machine learning for network intrusion detection, pp. 305\u2013316 (2010)","DOI":"10.1109\/SP.2010.25"},{"key":"45_CR8","doi-asserted-by":"crossref","unstructured":"Naiping, S.N.S., Genyuan, Z.G.Z.: A study on intrusion detection based on data mining. In: International Conference of Information Science and Management Engineering, ISME 2010, vol. 1, pp. 8\u201315 (2010)","DOI":"10.1109\/ISME.2010.47"},{"key":"45_CR9","unstructured":"Tavallaee, M.: An adaptive intrusion detection system. Sdstate.Edu (2011)"},{"key":"45_CR10","doi-asserted-by":"crossref","unstructured":"Kubat, M.: Neural networks: a comprehensive foundation by Simon Haykin, Macmillan, 1994, ISBN 0-02-352781-7. Knowl. Eng. Rev. 13(4), 409\u2013412 (1999)","DOI":"10.1017\/S0269888998214044"},{"key":"45_CR11","first-page":"9","volume-title":"Lecture Notes in Computer Science","author":"Yann A. LeCun","year":"2012","unstructured":"LeCun, Y.A., Bottou, L., Orr, G.B., M\u00fcller, K.R.: Efficient backprop. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). LECTU, vol. 7700, pp. 9\u201348 (2012)"},{"key":"45_CR12","unstructured":"Engen, V.: Machine learning for network based intrusion detection. Int. J. (2010)"},{"key":"45_CR13","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.ins.2013.07.007","volume":"250","author":"V L\u00f3pez","year":"2013","unstructured":"L\u00f3pez, V., Fern\u00e1ndez, A., Garc\u00eda, S., Palade, V., Herrera, F.: An insight into classification with imbalanced data: empirical results and current trends on using data intrinsic characteristics. Inf. Sci. (Ny) 250, 113\u2013141 (2013)","journal-title":"Inf. Sci. (Ny)"},{"key":"45_CR14","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1016\/S0031-3203(02)00257-1","volume":"36","author":"R Barandela","year":"2003","unstructured":"Barandela, R., Sanchez, J.S., Garcia, V., Rangel, E.: Strategies for learning in class imbalance problems. Pattern Recognit. 36, 849\u2013851 (2003)","journal-title":"Pattern Recognit."},{"issue":"7","key":"45_CR15","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1007\/s00500-009-0460-y","volume":"14","author":"P Ducange","year":"2010","unstructured":"Ducange, P., Lazzerini, B., Marcelloni, F.: Multi-objective genetic fuzzy classifiers for imbalanced and cost-sensitive datasets. Soft Comput. 14(7), 713\u2013728 (2010)","journal-title":"Soft Comput."},{"issue":"1","key":"45_CR16","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1093\/bib\/bbs006","volume":"14","author":"WJ Lin","year":"2013","unstructured":"Lin, W.J., Chen, J.J.: Class-imbalanced classifiers for high-dimensional data. Brief. Bioinform. 14(1), 13\u201326 (2013)","journal-title":"Brief. Bioinform."},{"issue":"3","key":"45_CR17","doi-asserted-by":"publisher","first-page":"1136","DOI":"10.1016\/j.patcog.2011.09.004","volume":"45","author":"J Wang","year":"2012","unstructured":"Wang, J., You, J., Li, Q., Xu, Y.: Extract minimum positive and maximum negative features for imbalanced binary classification. Pattern Recognit. 45(3), 1136\u20131145 (2012)","journal-title":"Pattern Recognit."},{"key":"45_CR18","doi-asserted-by":"crossref","unstructured":"Batuwita, R., Palade, V.: Class imbalance learning methods for support vector. Imbalanced Learn. Found. Algorithms Appl. 83\u2013100 (2013)","DOI":"10.1002\/9781118646106.ch5"},{"issue":"1","key":"45_CR19","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.knosys.2011.05.002","volume":"25","author":"N Garc\u00eda-Pedrajas","year":"2012","unstructured":"Garc\u00eda-Pedrajas, N., P\u00e9rez-Rodr\u00edguez, J., Garc\u00eda-Pedrajas, M., Ortiz-Boyer, D., Fyfe, C.: Class imbalance methods for translation initiation site recognition in DNA sequences. Knowl.-Based Syst. 25(1), 22\u201334 (2012)","journal-title":"Knowl.-Based Syst."},{"key":"45_CR20","doi-asserted-by":"crossref","unstructured":"Domingos, P.: MetaCost: a general method for making classifiers cost-sensitive. In: Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, vol. 55, pp. 155\u2013164 (1999)","DOI":"10.1145\/312129.312220"},{"issue":"1","key":"45_CR21","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/TKDE.2006.17","volume":"18","author":"ZH Zhou","year":"2006","unstructured":"Zhou, Z.H., Liu, X.Y.: Training cost-sensitive neural networks with methods addressing the class imbalance problem. IEEE Trans. Knowl. Data Eng. 18(1), 63\u201377 (2006)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"45_CR22","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-13529-3_17","volume-title":"Rough Sets and Current Trends in Computing","author":"Jerzy B\u0142aszczy\u0144ski","year":"2010","unstructured":"B\u0142aszczy\u0144ski, J., Deckert, M., Stefanowski, J., Wilk, S.: Integrating selective pre-processing of imbalanced data with Ivotes ensemble. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). LNAI, vol. 6086, pp. 148\u2013157 (2010)"},{"key":"45_CR23","doi-asserted-by":"crossref","unstructured":"Chawla, N.V., Lazarevic, A., Hall, L.O., Bowyer, K.W.: SMOTEBoost: improving prediction of the minority class in boosting. In: Lecture Notes in Computer Science, vol. 2838, pp. 107\u2013119 (2003)","DOI":"10.1007\/978-3-540-39804-2_12"},{"issue":"1","key":"45_CR24","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1109\/TSMCA.2009.2029559","volume":"40","author":"Chris Seiffert","year":"2010","unstructured":"Seiffert, C., Khoshgoftaar, T.M., Van Hulse, J., Napolitano, A.: RUSBoost: a hybrid approach to alleviating class imbalance. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 40(1), 185\u2013197 (2010)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans"},{"key":"45_CR25","doi-asserted-by":"crossref","unstructured":"Chawla, N.V.: Data mining for imbalanced datasets: an overview. In: Data Mining and Knowledge Discovery Handbook, pp. 853\u2013867 (2005)","DOI":"10.1007\/0-387-25465-X_40"},{"issue":"1","key":"45_CR26","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1145\/1007730.1007741","volume":"6","author":"Z Zheng","year":"2004","unstructured":"Zheng, Z., Wu, X., Srihari, R.: Feature selection for text categorization on imbalanced data. ACM SIGKDD Explor. Newsl. 6(1), 80 (2004)","journal-title":"ACM SIGKDD Explor. Newsl."},{"issue":"3","key":"45_CR27","doi-asserted-by":"publisher","first-page":"195","DOI":"10.2165\/00822942-200504030-00004","volume":"4","author":"A Al-Shahib","year":"2005","unstructured":"Al-Shahib, A., Breitling, R., Gilbert, D.: Feature selection and the class imbalance problem in predicting protein function from sequence. Appl. Bioinform. 4(3), 195\u2013203 (2005)","journal-title":"Appl. Bioinform."},{"key":"45_CR28","doi-asserted-by":"crossref","unstructured":"Khoshgoftaar, T.M., Gao, K., Seliya, N.: Attribute selection and imbalanced data: problems in software defect prediction. In: Proceedings - International Conference on Tools with Artificial Intelligence, ICTAI, vol. 1, pp. 137\u2013144 (2010)","DOI":"10.1109\/ICTAI.2010.27"},{"issue":"10","key":"45_CR29","doi-asserted-by":"publisher","first-page":"1388","DOI":"10.1109\/TKDE.2009.187","volume":"22","author":"M Wasikowski","year":"2010","unstructured":"Wasikowski, M., Chen, X.W.: Combating the small sample class imbalance problem using feature selection. IEEE Trans. Knowl. Data Eng. 22(10), 1388\u20131400 (2010)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"45_CR30","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/11875581_45","volume-title":"Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2006","author":"V. Garc\u00eda","year":"2006","unstructured":"Garc\u00eda, V., Alejo, R., S\u00e1nchez, J.S., Sotoca, J.M., Mollineda, R.A.: Combined effects of class imbalance and class overlap on instance-based classification. In: Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2006, vol. 4224, pp. 371\u2013378 (2006)"},{"key":"45_CR31","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1016\/j.procs.2010.12.198","volume":"3","author":"MN Mohammad","year":"2011","unstructured":"Mohammad, M.N., Sulaiman, N., Muhsin, O.A.: A novel intrusion detection system by using intelligent data mining in WEKA environment. Procedia Comput. Sci. 3, 1237\u20131242 (2011)","journal-title":"Procedia Comput. Sci."}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-29516-5_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,23]],"date-time":"2019-08-23T12:17:36Z","timestamp":1566562656000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-29516-5_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,24]]},"ISBN":["9783030295158","9783030295165"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-29516-5_45","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,8,24]]},"assertion":[{"value":"24 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IntelliSys","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Proceedings of SAI Intelligent Systems Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"London","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"intellisys2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/saiconference.com\/IntelliSys","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}