{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:59:25Z","timestamp":1743019165713,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030765071"},{"type":"electronic","value":"9783030765088"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-76508-8_15","type":"book-chapter","created":{"date-parts":[[2021,5,15]],"date-time":"2021-05-15T07:02:58Z","timestamp":1621062178000},"page":"201-219","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Data Mining Approach for Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Mohamed","family":"Azalmad","sequence":"first","affiliation":[]},{"given":"Youssef","family":"Fakir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,16]]},"reference":[{"key":"15_CR1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-94","author":"B Rebecca","year":"2001","unstructured":"Rebecca, B., Peter, M.M.: Intrusion Detection Systems. National Institute of Standards and Technology. (2001). https:\/\/doi.org\/10.6028\/NIST.SP.800-94","journal-title":"National Institute of Standards and Technology."},{"key":"15_CR2","unstructured":"Debar, H.: An Introduction to Intrusion-Detection Systems (2009)"},{"key":"15_CR3","doi-asserted-by":"publisher","unstructured":"Rahul-Vigneswaran, K., Poornachandran, Prabaharan, Soman, K.P.: A compendium on network and host based intrusion detection systems. In: Kumar, Amit, Paprzycki, Marcin, Gunjan, Vinit Kumar (eds.) ICDSMLA 2019. LNEE, vol. 601, pp. 23\u201330. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-1420-3_3","DOI":"10.1007\/978-981-15-1420-3_3"},{"issue":"2","key":"15_CR4","first-page":"84","volume":"1","author":"P Kabiri","year":"2005","unstructured":"Kabiri, P., Ghorbani, A.: Research on intrusion detection and response: a survey. Int. J. Netw. Secur. 1(2), 84\u2013102 (2005)","journal-title":"Int. J. Netw. Secur."},{"issue":"2","key":"15_CR5","first-page":"2266","volume":"6","author":"T Sarkar","year":"2014","unstructured":"Sarkar, T., Das, N.: Survey on host and network based intrusion detection system. Int. J. Adv. Netw. Appl. 6(2), 2266\u20132269 (2014)","journal-title":"Int. J. Adv. Netw. Appl."},{"key":"15_CR6","unstructured":"Axelsson, S.: Intrusion Detection Systems: A Survey and Taxonomy (2000)"},{"key":"15_CR7","unstructured":"Landge, R.S., Wadhe, A.: PMisuse detection system using various techniques: a review. Int. J. Adv. Res. Comput. Sci. 4(6) (2013)"},{"issue":"01","key":"15_CR8","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1016\/j.procs.2015.08.220","volume":"60","author":"S Agrawal","year":"2015","unstructured":"Agrawal, S., Agrawal, J.: Survey on anomaly detection using data mining techniques. Procedia Comput. Sci. 60(01), 708\u2013713 (2015). https:\/\/doi.org\/10.1016\/j.procs.2015.08.220","journal-title":"Procedia Comput. Sci."},{"key":"15_CR9","doi-asserted-by":"publisher","unstructured":"Dahima, S., Shitlani, D.: A survey on various data mining technique in intrusion detection system. IOSR J.Comput. Eng. 19(01), 65\u201372 (2017). https:\/\/doi.org\/10.9790\/0661-1901016572","DOI":"10.9790\/0661-1901016572"},{"key":"15_CR10","unstructured":"Lee, W., Stolfo, S.: Data Mining Approaches for Intrusion Detection. 7 (1998)"},{"key":"15_CR11","doi-asserted-by":"publisher","unstructured":"Tom, M.M.: Machine Learning. McGraw\u2010Hill, Maidenhead, U.K. (1997). https:\/\/doi.org\/10.1002\/(SICI)1099-1689(199909)9:3<191::AID-STVR184>3.0.CO;2-E","DOI":"10.1002\/(SICI)1099-1689(199909)9:3<191::AID-STVR184>3.0.CO;2-E"},{"key":"15_CR12","unstructured":"Tan, P.-N., Steinbach, M., Kumar, V.: Introduction to Data Mining. Pearson Education (2006)"},{"key":"15_CR13","unstructured":"Alexandre, K.: Support Vector Machines Succinctly. Syncfusion, Inc. (2017)"},{"key":"15_CR14","unstructured":"Tariq, R.: Make Your Own Neural Network. CreateSpace Independent Publishing Platform (2016)"},{"key":"15_CR15","unstructured":"Leung, K., Leckie, C.: Unsupervised anomaly detection in network intrusion detection using clusters. In: Proceedings of the Twenty-Eighth Australasian Conference on Computer Science, pp. 333\u2013342 (2005)"},{"key":"15_CR16","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1109\/SURV.2013.052213.00046","volume":"16","author":"M Bhuyan","year":"2014","unstructured":"Bhuyan, M., Bhattacharyya, D.K., Kalita, J.: Network anomaly detection: methods, systems and tools. Commun. Surv. Tutorials IEEE 16, 303\u2013336 (2014). https:\/\/doi.org\/10.1109\/SURV.2013.052213.00046","journal-title":"Commun. Surv. Tutorials IEEE"},{"key":"15_CR17","unstructured":"Parsazad, S., Saboori, E., Allahyar, A.: Fast Feature Reduction in intrusion detection datasets (2013)"},{"key":"15_CR18","unstructured":"Antti, J.: Intrusion detection applications using knowledge discovery and data mining (2014)"},{"key":"15_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59081-3_59","author":"R Mahini","year":"2017","unstructured":"Mahini, R., Zhou, T., Li, P., Nandi, A., Li, H., Li, H., Cong, F.: Cluster Aggregation for Analyzing Event-Related. Potentials. (2017). https:\/\/doi.org\/10.1007\/978-3-319-59081-3_59","journal-title":"Potentials."},{"key":"15_CR20","doi-asserted-by":"publisher","first-page":"9","DOI":"10.5120\/ijca2016907841","volume":"134","author":"J Irani","year":"2016","unstructured":"Irani, J., Pise, N., Phatak, M.: Clustering techniques and the similarity measures used in clustering: a survey. Int. J. Comput. Appl. 134, 9\u201314 (2016). https:\/\/doi.org\/10.5120\/ijca2016907841","journal-title":"Int. J. Comput. Appl."},{"key":"15_CR21","doi-asserted-by":"publisher","unstructured":"Syarif, I., Prugel-Bennett, A., Wills, G.: Unsupervised Clustering Approach for Network Anomaly Detection. 293 (2012). https:\/\/doi.org\/10.1007\/978-3-642-30507-8_7","DOI":"10.1007\/978-3-642-30507-8_7"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Ring, M., Wunderlich, S., Scheuring, D., Landes, D., Hotho, A.: A Survey of Network-based Intrusion Detection Data Sets (2019)","DOI":"10.1016\/j.cose.2019.06.005"},{"key":"15_CR23","unstructured":"Abdulrazaq: AImproving intrusion detection systems using data mining techniques. Doctoral thesis, Loughborough University (2016)"},{"key":"15_CR24","unstructured":"Hindy, H., et al.: A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets (2018)"},{"key":"15_CR25","doi-asserted-by":"publisher","unstructured":"Jalil, K., Kamarudin, M.H., Masrek, M.: Comparison of machine learning algorithms performance in detecting network intrusion. In: ICNIT 2010 - 2010 International Conference on Networking and Information Technology, pp. 221\u2013226 (2010). https:\/\/doi.org\/10.1109\/ICNIT.2010.5508526","DOI":"10.1109\/ICNIT.2010.5508526"},{"key":"15_CR26","unstructured":"Juvonen, A., Sipola, T.: Anomaly Detection Framework Using Rule Extraction for Efficient Intrusion Detection (2014). https:\/\/arxiv.org\/pdf\/1410.7709.pdf"},{"key":"15_CR27","doi-asserted-by":"publisher","unstructured":"Laskov, P., D\u00fcssel, P., Sch\u00e4fer, C., Rieck, K.: Learning Intrusion Detection: Supervised or Unsupervised? 3617, 50\u201357 (2005). https:\/\/doi.org\/10.1007\/11553595_6","DOI":"10.1007\/11553595_6"},{"key":"15_CR28","doi-asserted-by":"publisher","unstructured":"Salo, F., Injadat, M., Nassif, A., Shami, A., Essex, A.: Data mining techniques in intrusion detection systems: a systematic literature review. IEEE Access PP, 1 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2872784. Author, F., Author, S.: Title of a proceedings paper. In: Editor, F., Editor, S. (eds.) CONFERENCE\u00a02016, LNCS, vol. 9999, pp.\u00a01\u201313. Springer, Heidelberg (2016)","DOI":"10.1109\/ACCESS.2018.2872784"}],"container-title":["Lecture Notes in Business Information Processing","Business Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-76508-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T15:24:26Z","timestamp":1709825066000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-76508-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030765071","9783030765088"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-76508-8_15","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"16 May 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CBI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Business Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beni-Mellal","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 May 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 May 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cbi2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.cbi-bm.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}