{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:26:03Z","timestamp":1743132363840,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030711863"},{"type":"electronic","value":"9783030711870"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-71187-0_128","type":"book-chapter","created":{"date-parts":[[2021,6,2]],"date-time":"2021-06-02T05:04:54Z","timestamp":1622610294000},"page":"1383-1393","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Antlion Optimization-Based Feature Selection Scheme for Cloud Intrusion Detection Using Na\u00efve Bayes Algorithm"],"prefix":"10.1007","author":[{"given":"Haruna Atabo","family":"Christopher","sequence":"first","affiliation":[]},{"given":"Shafi\u2019i Muhammad","family":"Abdulhamid","sequence":"additional","affiliation":[]},{"given":"Sanjay","family":"Misra","sequence":"additional","affiliation":[]},{"given":"Isaac","family":"Odun-Ayo","sequence":"additional","affiliation":[]},{"given":"Mayank Mohan","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,3]]},"reference":[{"key":"128_CR1","doi-asserted-by":"crossref","unstructured":"Mehmood, Y., Ayesha, K.: Distributed intrusion detection system using mobile agents in cloud computing environment. In: 2015 Conference on Information Assurance and Cyber Security, pp. 1\u20138. IEEE (2015). ISBN 978-1-4673-7914-4","DOI":"10.1109\/CIACS.2015.7395559"},{"key":"128_CR2","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1016\/j.asoc.2017.08.048","volume":"61","author":"M Abdulhamid","year":"2017","unstructured":"Abdulhamid, M., Shafie, M., Latiff, A.: A checkpointed league championship algorithm-based cloud scheduling scheme with secure fault tolerance responsiveness. Appl. Soft Comput. J. 61, 670\u2013680 (2017). https:\/\/doi.org\/10.1016\/j.asoc.2017.08.048","journal-title":"Appl. Soft Comput. J."},{"key":"128_CR3","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.jnca.2016.04.016","volume":"68","author":"S Hamid","year":"2016","unstructured":"Hamid, S., Madni, H., Sha, M., Latiff, A., Coulibaly, Y.: Resource scheduling for infrastructure as a service (IaaS) in cloud computing: challenges and opportunities. J. Net. Comput. Appl. 68, 173\u2013200 (2016). https:\/\/doi.org\/10.1016\/j.jnca.2016.04.016","journal-title":"J. Net. Comput. Appl."},{"key":"128_CR4","doi-asserted-by":"publisher","unstructured":"Mahajan, V., Peddoju, S.K.: Integration of network intrusion detection systems and honeypot networks for cloud security. In: Mahajan, V., Peddoju, S.K. (eds.) 2017 International Conference on Integration of Network Intrusion Detection Systems and Honeypot Networks for Cloud Security. 2017 International Conference on Computing, Communication and Automation, pp. 829\u2013834 (2017). https:\/\/doi.org\/10.1109\/CCAA.2017.8229911","DOI":"10.1109\/CCAA.2017.8229911"},{"key":"128_CR5","doi-asserted-by":"publisher","unstructured":"Nagar, U., He, X., Nanda, P., Tan, Z.: A framework for data security in cloud using collaborative intrusion detection scheme. In: ACM International Conference Proceedings Series, vol. 1338 (Part F) (2017). https:\/\/doi.org\/10.1145\/3136825.3136905","DOI":"10.1145\/3136825.3136905"},{"key":"128_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TCC.2018.2829202","volume":"7161","author":"P Mishra","year":"2018","unstructured":"Mishra, P., Varadharajan, V., Member, S., Pilli, E.S., Tupakula, U.: VMGuard\u202f: A VMI-based security architecture for intrusion detection in cloud environment. IEEE Trans. Cloud Comput. 7161, 1\u201314 (2018). https:\/\/doi.org\/10.1109\/TCC.2018.2829202","journal-title":"IEEE Trans. Cloud Comput."},{"key":"128_CR7","doi-asserted-by":"publisher","unstructured":"Hawedi, M., Talhi, C., Boucheneb, H.: Security as a service for public cloud tenants (SaaS). In: 9th International Conference on Ambient Systems, Networks and Technologies, ANT-2018 and The 8th International Conference on Sustainable Energy Information Technology, SEIT 2018, 8\u201311 May 2018, Porto, Portugal, vol. 130, pp. 1025\u20131030 (2018). https:\/\/doi.org\/10.1016\/j.procs.2018.04.143","DOI":"10.1016\/j.procs.2018.04.143"},{"key":"128_CR8","doi-asserted-by":"publisher","unstructured":"Singh, T., Verma, S., Kulshrestha, V., Katiyar, S.: Intrusion detection system using genetic algorithm for cloud. In: Proceedings of the 2nd International Conference on Information and Communication Technology for Competitive Strategies, ICTCS 2016, pp. 1\u20136 (2016). https:\/\/doi.org\/10.1145\/2905055.2905175","DOI":"10.1145\/2905055.2905175"},{"key":"128_CR9","doi-asserted-by":"crossref","unstructured":"Raj, R.S.: Securing cloud environment using a string based intrusion detection system (2017)","DOI":"10.1109\/ICACCS.2017.8014645"},{"key":"128_CR10","doi-asserted-by":"crossref","unstructured":"Zahra Salek, F.M.M.: Multi-level Intrusion detection system in cloud environment based on trust level. In: 6th International Conference on Computer and Knowledge Engineering, ICCKE 2016, 20\u201321 October 2016, Ferdowsi University Mashhad, pp. 94\u201399. IEEE (2016). ISBN 978-1-5090-3586-1","DOI":"10.1109\/ICCKE.2016.7802122"},{"issue":"1","key":"128_CR11","doi-asserted-by":"publisher","first-page":"012035","DOI":"10.1088\/1742-6596\/1299\/1\/012035","volume":"1299","author":"J Oluranti","year":"2019","unstructured":"Oluranti, J., Omoregbe, N., Misra, S.: Effect of feature selection on performance of internet traffic classification on NIMS multi-class dataset. J. Phys. Conf. Ser. 1299(1), 012035 (2019)","journal-title":"J. Phys. Conf. Ser."},{"issue":"1","key":"128_CR12","doi-asserted-by":"publisher","first-page":"012021","DOI":"10.1088\/1742-6596\/1235\/1\/012021","volume":"1235","author":"O Abayomi-Alli","year":"2019","unstructured":"Abayomi-Alli, O., Misra, S., Matthews, V.O., Odusami, M., Abayomi-Alli, A., Ahuja, R., Maskeliunas, R.: An improved feature selection method for short text classification. J. Phys. Conf. Ser. 1235(1), 012021 (2019)","journal-title":"J. Phys. Conf. Ser."},{"key":"128_CR13","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1007\/978-981-32-9949-8_48","volume-title":"Data Management, Analytics and Innovation: Proceedings of ICDMAI 2019, vol. 1","author":"NA Azeez","year":"2020","unstructured":"Azeez, N.A., Bada, T.M., Misra, S., Adewumi, A., Van der Vyver, C., Ahuja, R.: Intrusion detection and prevention systems: an updated review. In: Sharma, N., Chakrabarti, A., Balas, V.E. (eds.) Data Management, Analytics and Innovation: Proceedings of ICDMAI 2019, vol. 1, pp. 685\u2013696. Springer, Singapore (2020)"},{"issue":"4","key":"128_CR14","doi-asserted-by":"publisher","first-page":"86","DOI":"10.3390\/computers8040086","volume":"8","author":"NA Azeez","year":"2019","unstructured":"Azeez, N.A., Ayemobola, T.J., Misra, S., Maskeli\u016bnas, R., Dama\u0161evi\u010dius, R.: Network intrusion detection with a hashing based Apriori algorithm using Hadoop MapReduce. Computer 8(4), 86 (2019)","journal-title":"Computer"},{"key":"128_CR15","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.jnca.2014.03.012","volume":"42","author":"S Shamshirband","year":"2014","unstructured":"Shamshirband, S., Anuar, N.B., Kiah, M.L.M., Rohani, V.A., Petkovi\u0107, D., Misra, S., Khan, A.N.: Co-FAIS: cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks. J. Net. Comput. Appl. 42, 102\u2013117 (2014)","journal-title":"J. Net. Comput. Appl."},{"key":"128_CR16","doi-asserted-by":"publisher","first-page":"15650","DOI":"10.1109\/ACCESS.2017.2666785","volume":"5","author":"S Abdulhamid","year":"2017","unstructured":"Abdulhamid, S., Latiff, M., Chiroma, H., Osho, O., Abdul-Salaam, G., Abubakar, A., Herawan, T.: A review on mobile SMS spam filtering techniques. IEEE Access 5, 15650\u201315666 (2017). https:\/\/doi.org\/10.1109\/ACCESS.2017.2666785","journal-title":"IEEE Access"},{"key":"128_CR17","doi-asserted-by":"publisher","unstructured":"Modi, C.N., Patel, D.: A novel hybrid-network intrusion detection system (H-NIDS) in cloud computing. In: Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2013. 2013 IEEE Symposium Series on Computational Intelligence, SSCI 2013, pp. 23\u201330 (2013). https:\/\/doi.org\/10.1109\/CICYBS.2013.6597201","DOI":"10.1109\/CICYBS.2013.6597201"},{"key":"128_CR18","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.advengsoft.2015.01.010","volume":"83","author":"S Mirjalili","year":"2015","unstructured":"Mirjalili, S.: The ant lion optimizer. Adv. Eng. Softw. 83, 80\u201398 (2015). https:\/\/doi.org\/10.1016\/j.advengsoft.2015.01.010","journal-title":"Adv. Eng. Softw."},{"key":"128_CR19","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1186\/s13638-016-0623-3","volume":"2016","author":"O Osanaiye","year":"2016","unstructured":"Osanaiye, O., Cai, H., Choo, K.R., Dehghantanha, A., Xu, Z., Dlodlo, M.: Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing. EURASIP J. Wirel. Commun. Netw. 2016, 130 (2016). https:\/\/doi.org\/10.1186\/s13638-016-0623-3","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"128_CR20","unstructured":"Chae, H., Jo, B., Choi, S., Park, T.: Feature selection for intrusion detection using NSL-KDD, pp. 184\u2013187 (2013)"},{"key":"128_CR21","doi-asserted-by":"crossref","unstructured":"Deshmukh, D.H.: Improving classification using preprocessing and machine learning algorithms on NSL-KDD dataset (2015)","DOI":"10.1109\/ICCICT.2015.7045674"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Systems Design and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-71187-0_128","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,2]],"date-time":"2021-06-02T05:38:26Z","timestamp":1622612306000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-71187-0_128"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030711863","9783030711870"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-71187-0_128","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"3 June 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Systems Design and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isda2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/isda20\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}