{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T17:55:24Z","timestamp":1775066124305,"version":"3.50.1"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030335816","type":"print"},{"value":"9783030335823","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,11,2]],"date-time":"2019-11-02T00:00:00Z","timestamp":1572652800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-33582-3_69","type":"book-chapter","created":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T07:46:34Z","timestamp":1572594394000},"page":"734-747","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Normal Profile Updating Method for Enhanced Packet Header Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Walid Mohamed","family":"Alsharafi","sequence":"first","affiliation":[]},{"given":"Mohd Nizam","family":"Omar","sequence":"additional","affiliation":[]},{"given":"Nashwan Ahmed","family":"Al-Majmar","sequence":"additional","affiliation":[]},{"given":"Yousef","family":"Fazea","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,2]]},"reference":[{"issue":"2","key":"69_CR1","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2016","unstructured":"Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutorials 18(2), 1153\u20131176 (2016)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"69_CR2","doi-asserted-by":"crossref","unstructured":"Mahoney, M.V.: Network traffic anomaly detection based on packet bytes. In: Proceedings of the 2003 ACM Symposium on Applied Computing, pp. 346\u2013350. ACM (2003)","DOI":"10.1145\/952532.952601"},{"key":"69_CR3","unstructured":"Mahoney, M.V., Chan, P.K.: PHAD: packet header anomaly detection for identifying hostile network traffic (2001)"},{"issue":"3","key":"69_CR4","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1016\/j.compeleceng.2008.12.005","volume":"35","author":"MA Ayd\u0131n","year":"2009","unstructured":"Ayd\u0131n, M.A., Zaim, A.H., Ceylan, K.G.: A hybrid intrusion detection system design for computer network security. Comput. Electr. Eng. 35(3), 517\u2013526 (2009)","journal-title":"Comput. Electr. Eng."},{"key":"69_CR5","doi-asserted-by":"crossref","unstructured":"Garg, A., Maheshwari, P.: PHAD: packet header anomaly detection. In: 2016 10th International Conference on Intelligent Systems and Control (ISCO), pp. 1\u20135. IEEE (2016)","DOI":"10.1109\/ISCO.2016.7726920"},{"key":"69_CR6","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.jnca.2015.07.011","volume":"57","author":"RK Deka","year":"2015","unstructured":"Deka, R.K., Kalita, K.P., Bhattacharya, D.K., Kalita, J.K.: Network defense: approaches, methods and techniques. J. Netw. Comput. Appl. 57, 71\u201384 (2015)","journal-title":"J. Netw. Comput. Appl."},{"key":"69_CR7","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1016\/j.cose.2018.05.009","volume":"77","author":"N Al-Safwani","year":"2018","unstructured":"Al-Safwani, N., Fazea, Y., Ibrahim, H.: ISCP: In-depth model for selecting critical security controls. Comput. Secur. 77, 565\u2013577 (2018)","journal-title":"Comput. Secur."},{"issue":"4","key":"69_CR8","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1016\/j.asej.2013.01.003","volume":"4","author":"RM Elbasiony","year":"2013","unstructured":"Elbasiony, R.M., Sallam, E.A., Eltobely, T.E., Fahmy, M.M.: A hybrid network intrusion detection framework based on random forests and weighted k-means. Ain Shams Eng. J. 4(4), 753\u2013762 (2013)","journal-title":"Ain Shams Eng. J."},{"key":"69_CR9","doi-asserted-by":"publisher","unstructured":"Lee, K.-C., Chang, J., Chen, M.-S.: PAID: packet analysis for anomaly intrusion detection. In: Washio, T., Suzuki, E., Ting, K.M., Inokuchi, A. (eds.) PAKDD 2008. LNCS (LNAI), vol. 5012, pp. 626\u2013633. Springer, Heidelberg (2008). \n                    https:\/\/doi.org\/10.1007\/978-3-540-68125-0_58","DOI":"10.1007\/978-3-540-68125-0_58"},{"key":"69_CR10","doi-asserted-by":"publisher","unstructured":"Shamsuddin, S.B., Woodward, M.E.: Modeling protocol-based packet header anomaly detector for network and host intrusion detection systems. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007. LNCS, vol. 4856, pp. 209\u2013227. Springer, Heidelberg (2007). \n                    https:\/\/doi.org\/10.1007\/978-3-540-76969-9_14","DOI":"10.1007\/978-3-540-76969-9_14"},{"key":"69_CR11","doi-asserted-by":"publisher","unstructured":"Yassin, W., Udzir, N.I., Abdullah, A., Abdullah, M.T., Muda, Z., Zulzalil, H.: Packet header anomaly detection using statistical analysis. In: de la Puerta, J.G., et al. (eds.) International Joint Conference SOCO 2014-CISIS 2014-ICEUTE 2014. AISC, vol. 299, pp. 473\u2013482. Springer, Cham (2014). \n                    https:\/\/doi.org\/10.1007\/978-3-319-07995-0_47","DOI":"10.1007\/978-3-319-07995-0_47"},{"issue":"2539034","key":"69_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/2539034","volume":"2017","author":"MH Kamarudin","year":"2017","unstructured":"Kamarudin, M.H., Maple, C., Watson, T., Sohrabi, S.N.: A new unified intrusion anomaly detection in identifying unseen web attacks. Secur. Commun. Netw. 2017(2539034), 1\u201318 (2017)","journal-title":"Secur. Commun. Netw."},{"key":"69_CR13","unstructured":"Cao, X., Chen, B., Li, H., Fu, Y.: Packet header anomaly detection using Bayesian topic models (2016). \n                    http:\/\/eprint.iacr.org\/2016\/040.pdf"},{"issue":"3","key":"69_CR14","doi-asserted-by":"publisher","first-page":"578","DOI":"10.7763\/IJCTE.2013.V5.753","volume":"5","author":"M Mahboubian","year":"2013","unstructured":"Mahboubian, M., Udzir, N.I.: A naturally inspired statistical intrusion detection model. Int. J. Comput. Theor. Eng. 5(3), 578 (2013)","journal-title":"Int. J. Comput. Theor. Eng."},{"key":"69_CR15","doi-asserted-by":"crossref","unstructured":"Kamarudin, M.H., Maple, C., Watson, T., Sohrabi S.N.: Packet header intrusion detection with binary logistic regression approach in detecting R2L and U2R attacks. In: 2015 4th International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, pp. 101\u2013106 (2015)","DOI":"10.1109\/CyberSec.2015.28"},{"key":"69_CR16","unstructured":"Massachusetts Institute of Technology: DARPA intrusion detection scenario specific datasets. Lincoln Laboratory (1999). \n                    https:\/\/www.ll.mit.edu\/ideval\/data\/1999data.html"},{"key":"69_CR17","unstructured":"Alsharafi, W.M., Omar, M.N.: A detector generating algorithm for intrusion detection inspired by AIS. ARPN J. Eng. Appl. Sci. 10(2) (2015). ISSN-1819-6608"}],"container-title":["Advances in Intelligent Systems and Computing","Emerging Trends in Intelligent Computing and Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-33582-3_69","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T17:11:38Z","timestamp":1572628298000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-33582-3_69"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,2]]},"ISBN":["9783030335816","9783030335823"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-33582-3_69","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,2]]},"assertion":[{"value":"2 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IRICT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference of Reliable Information and Communication Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Johor","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"irict2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/irict.co\/irict2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}