{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T16:33:21Z","timestamp":1767890001575,"version":"3.49.0"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030730499","type":"print"},{"value":"9783030730505","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-73050-5_27","type":"book-chapter","created":{"date-parts":[[2021,4,16]],"date-time":"2021-04-16T13:16:33Z","timestamp":1618578993000},"page":"270-279","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["An Isolation Forest Learning Based Outlier Detection Approach for Effectively Classifying Cyber Anomalies"],"prefix":"10.1007","author":[{"given":"Rony Chowdhury","family":"Ripan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1740-5517","authenticated-orcid":false,"given":"Iqbal H.","family":"Sarker","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Md Musfique","family":"Anwar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Md. Hasan","family":"Furhad","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fazle","family":"Rahat","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8806-708X","authenticated-orcid":false,"given":"Mohammed Moshiul","family":"Hoque","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Muhammad","family":"Sarfraz","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,4,17]]},"reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Aggarwal, C.C., Yu, P.S.: Outlier detection for high dimensional data. In: Proceedings of the 2001 ACM SIGMOD International Conference on Management of data, pp. 37\u201346 (2001)","DOI":"10.1145\/376284.375668"},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Ben-Gal, I.: Outlier detection. In: Data Mining and Knowledge Discovery Handbook, pp. 131\u2013146. Springer (2005)","DOI":"10.1007\/0-387-25465-X_7"},{"key":"27_CR3","unstructured":"Bhosale, S.: Network intrusion detection, October 2018. https:\/\/www.kaggle.com\/sampadab17\/network-intrusion-detection"},{"issue":"2","key":"27_CR4","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2015","unstructured":"Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153\u20131176 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.H.: Isolation forest. In: 2008 Eighth IEEE International Conference on Data Mining, pp. 413\u2013422. IEEE (2008)","DOI":"10.1109\/ICDM.2008.17"},{"issue":"1","key":"27_CR6","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.ijar.2013.03.012","volume":"55","author":"S Mascaro","year":"2014","unstructured":"Mascaro, S., Nicholso, A.E., Korb, K.B.: Anomaly detection in vessel tracks using Bayesian networks. Int. J. Approximate Reason. 55(1), 84\u201398 (2014)","journal-title":"Int. J. Approximate Reason."},{"key":"27_CR7","unstructured":"Mohamed, M.S., Kavitha, T.: Outlier detection using support vector machine in wireless sensor network real time data. Int. J. Soft Comput. Eng. 1(2) (2011)"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Samrin, R., Vasumathi, D.: Review on anomaly based network intrusion detection system. In: 2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT), pp. 141\u2013147. IEEE (2017)","DOI":"10.1109\/ICEECCOT.2017.8284655"},{"key":"27_CR9","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1016\/j.iot.2019.01.007","volume":"5","author":"IH Sarker","year":"2019","unstructured":"Sarker, I.H.: A machine learning based robust prediction model for real-life mobile phone data. Internet of Things 5, 180\u2013193 (2019)","journal-title":"Internet of Things"},{"issue":"5","key":"27_CR10","doi-asserted-by":"publisher","first-page":"754","DOI":"10.3390\/sym12050754","volume":"12","author":"IH Sarker","year":"2020","unstructured":"Sarker, I.H., Abushark, Y.B., Alsolami, F., Khan, A.I.: Intrudtree: a machine learning based cyber security intrusion detection model. Symmetry 12(5), 754 (2020)","journal-title":"Symmetry"},{"issue":"1","key":"27_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-019-0278-0","volume":"7","author":"IH Sarker","year":"2020","unstructured":"Sarker, I.H., Alqahtani, H., Alsolami, F., Khan, A.I., Abushark, Y.B., Siddiqui, M.K.: Context pre-modeling: an empirical analysis for classification based user-centric context-aware predictive modeling. J. Big Data 7(1), 1\u201323 (2020)","journal-title":"J. Big Data"},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Sarker, I.H., Hoque, M.M., Uddin, M.K., Alsanoosy, T.: Mobile data science and intelligent apps: concepts, AI-based modeling and research directions. Mobile Netw. Appl. pp. 1\u201319 (2020)","DOI":"10.1007\/s11036-020-01650-z"},{"issue":"1","key":"27_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-019-0278-0","volume":"7","author":"IH Sarker","year":"2020","unstructured":"Sarker, I.H., Kayes, A., Badsha, S., Alqahtani, H., Watters, P., Ng, A.: Cybersecurity data science: an overview from machine learning perspective. J. Big Data 7(1), 1\u201329 (2020)","journal-title":"J. Big Data"},{"issue":"1","key":"27_CR14","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1186\/s40537-019-0219-y","volume":"6","author":"IH Sarker","year":"2019","unstructured":"Sarker, I.H., Kayes, A., Watters, P.: Effectiveness analysis of machine learning classification models for predicting personalized context-aware smartphone usage. J. Big Data 6(1), 57 (2019)","journal-title":"J. Big Data"},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"Seufert, S., O\u2019Brien, D.: Machine learning for automatic defence against distributed denial of service attacks. In: 2007 IEEE International Conference on Communications, pp. 1217\u20131222. IEEE (2007)","DOI":"10.1109\/ICC.2007.206"},{"issue":"1","key":"27_CR16","first-page":"5","volume":"173","author":"H Shapoorifard","year":"2017","unstructured":"Shapoorifard, H., Shamsinejad, P.: Intrusion detection using a novel hybrid method incorporating an improved knn. Int. J. Comput. Appl. 173(1), 5\u20139 (2017)","journal-title":"Int. J. Comput. Appl."},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Song, H.M., Woo, J., Kim, H.K.: In-vehicle network intrusion detection using deep convolutional neural network. Veh. Commun. 21, 100198 (2020)","DOI":"10.1016\/j.vehcom.2019.100198"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Stripling, E., Baesens, B., Chizi, B., vanden Broucke, S.: Isolation-based conditional anomaly detection on mixed-attribute data to uncover workers\u2019 compensation fraud. Decis. Support Syst. 111, 13\u201326 (2018)","DOI":"10.1016\/j.dss.2018.04.001"},{"key":"27_CR19","unstructured":"Sun, L., Versteeg, S., Boztas, S., Rao, A.: Detecting anomalous user behavior using an extended isolation forest algorithm: an enterprise case study. arXiv preprint arXiv:1609.06676 (2016)"},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Yan, M., Liu, Z.: A new method of transductive SVM-based network intrusion detection. In: International Conference on Computer and Computing Technologies in Agriculture, pp. 87\u201395. Springer (2010)","DOI":"10.1007\/978-3-642-18333-1_12"},{"key":"27_CR21","doi-asserted-by":"publisher","first-page":"21954","DOI":"10.1109\/ACCESS.2017.2762418","volume":"5","author":"C Yin","year":"2017","unstructured":"Yin, C., Zhu, Y., Fei, J., He, X.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954\u201321961 (2017)","journal-title":"IEEE Access"}],"container-title":["Advances in Intelligent Systems and Computing","Hybrid Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-73050-5_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,16]],"date-time":"2021-04-16T14:14:40Z","timestamp":1618582480000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-73050-5_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030730499","9783030730505"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-73050-5_27","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"17 April 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Hybrid Intelligent Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"his2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/his20\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}