{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T01:34:30Z","timestamp":1768440870099,"version":"3.49.0"},"publisher-location":"Cham","reference-count":48,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030870485","type":"print"},{"value":"9783030870492","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-87049-2_27","type":"book-chapter","created":{"date-parts":[[2022,3,3]],"date-time":"2022-03-03T05:04:20Z","timestamp":1646283860000},"page":"733-754","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Machine Learning Methods for Enhanced Cyber Security Intrusion Detection System"],"prefix":"10.1007","author":[{"given":"M","family":"Satheesh Kumar","sequence":"first","affiliation":[]},{"given":"Jalel","family":"Ben-Othman","sequence":"additional","affiliation":[]},{"given":"K G","family":"Srinivasagan","sequence":"additional","affiliation":[]},{"given":"P","family":"Umarani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,3]]},"reference":[{"issue":"3","key":"27_CR1","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/65.283931","volume":"8","author":"B Mukherjee","year":"2002","unstructured":"Mukherjee, B., Heberlein, L.T., Levitt, K.N.: Network intrusion detection. IEEE Netw. 8(3), 26\u201341 (2002). https:\/\/doi.org\/10.1109\/65.283931","journal-title":"IEEE Netw."},{"key":"27_CR2","unstructured":"Chaturvedi, P.: A Systematic Literature Survey on IDS, pp. 671\u2013676"},{"issue":"4","key":"27_CR3","doi-asserted-by":"publisher","first-page":"1011","DOI":"10.1109\/SURV.2011.092311.00082","volume":"14","author":"TH Cheng","year":"2012","unstructured":"Cheng, T.H., Lin, Y.D., Lai, Y.C., Lin, P.C.: Evasion techniques: sneaking through your intrusion detection\/prevention systems. IEEE Commun. Surv. Tutorials 14(4), 1011\u20131020 (2012). https:\/\/doi.org\/10.1109\/SURV.2011.092311.00082","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"1","key":"27_CR4","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1108\/09685221311314400","volume":"21","author":"T Sommestad","year":"2013","unstructured":"Sommestad, T., Hunstad, A.: Intrusion detection and the role of the system administrator. Inf. Manag. Comput. Secur. 21(1), 30\u201340 (2013). https:\/\/doi.org\/10.1108\/09685221311314400","journal-title":"Inf. Manag. Comput. Secur."},{"key":"27_CR5","doi-asserted-by":"publisher","unstructured":"Liao, H.J., Richard Lin, C.H., Lin, Y.C., Tung, K.Y.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 16\u201324 (2013). https:\/\/doi.org\/10.1016\/j.jnca.2012.09.004","DOI":"10.1016\/j.jnca.2012.09.004"},{"issue":"6","key":"27_CR6","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/mdso.2006.39","volume":"7","author":"JM Estevez-Tapiador","year":"2006","unstructured":"Estevez-Tapiador, J.M.: Book review: practical intrusion prevention. IEEE Distrib. Syst. Online 7(6), 5\u20135 (2006). https:\/\/doi.org\/10.1109\/mdso.2006.39","journal-title":"IEEE Distrib. Syst. Online"},{"key":"27_CR7","doi-asserted-by":"publisher","unstructured":"Satheesh Kumar, M., Ben-Othman, J., Srinivasagan, K.G.: An investigation on wannacry ransomware and its detection. In: Proceedings\u2014IEEE Symposium on Computers and Communications, vol. 2018-June (2018). https:\/\/doi.org\/10.1109\/ISCC.2018.8538354","DOI":"10.1109\/ISCC.2018.8538354"},{"issue":"4","key":"27_CR8","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MSP.2012.60","volume":"10","author":"FT Sheldon","year":"2012","unstructured":"Sheldon, F.T., Weber, J.M., Yoo, S.M., Pan, W.D.: The insecurity of wireless networks. IEEE Secur. Priv. 10(4), 54\u201361 (2012). https:\/\/doi.org\/10.1109\/MSP.2012.60","journal-title":"IEEE Secur. Priv."},{"issue":"4","key":"27_CR9","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/s10044-011-0255-5","volume":"16","author":"K Shafi","year":"2013","unstructured":"Shafi, K., Abbass, H.A.: Evaluation of an adaptive genetic-based signature extraction system for network intrusion detection. Pattern Anal. Appl. 16(4), 549\u2013566 (2013). https:\/\/doi.org\/10.1007\/s10044-011-0255-5","journal-title":"Pattern Anal. Appl."},{"issue":"60773192","key":"27_CR10","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.ins.2013.04.009","volume":"258","author":"W Xiong","year":"2014","unstructured":"Xiong, W., et al.: Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications. Inf. Sci. (Ny) 258(60773192), 403\u2013415 (2014). https:\/\/doi.org\/10.1016\/j.ins.2013.04.009","journal-title":"Inf. Sci. (Ny)"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Atighetchi, M., Pal, P., Webber, F., Schantz, R., Jones, C., Loyall, J.: For Survival and,\\\u201d no. December, pp. 25\u201333 (2004)","DOI":"10.1109\/MIC.2004.54"},{"issue":"16","key":"27_CR12","doi-asserted-by":"publisher","first-page":"30","DOI":"10.5120\/13608-1412","volume":"78","author":"S KishorWagh","year":"2013","unstructured":"KishorWagh, S., Pachghare, V.K., Kolhe, S.R.: Survey on intrusion detection system using machine learning techniques. Int. J. Comput. Appl. 78(16), 30\u201337 (2013). https:\/\/doi.org\/10.5120\/13608-1412","journal-title":"Int. J. Comput. Appl."},{"key":"27_CR13","doi-asserted-by":"publisher","unstructured":"Borkar, A., Donode, A., Kumari, A.: A survey on intrusion detection system (IDS) and internal intrusion detection and protection system (IIDPS). In: Proceedings of International Conference on Inventive Computing and Informatics (ICICI 2017), no. Icici, pp. 949\u2013953 (2018). https:\/\/doi.org\/10.1109\/ICICI.2017.8365277","DOI":"10.1109\/ICICI.2017.8365277"},{"key":"27_CR14","doi-asserted-by":"publisher","first-page":"104650","DOI":"10.1109\/ACCESS.2020.3000179","volume":"8","author":"H Hindy","year":"2020","unstructured":"Hindy, H., et al.: A taxonomy of network threats and the effect of current datasets on intrusion detection systems. IEEE Access 8, 104650\u2013104675 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3000179","journal-title":"IEEE Access"},{"key":"27_CR15","doi-asserted-by":"publisher","unstructured":"Danda, J.M.R., Hota, C.: Attack identification framework for IoT devices. In: Advances in Intelligent Systems and Computing, vol. 434 (2016). https:\/\/doi.org\/10.1007\/978-81-322-2752-6_49","DOI":"10.1007\/978-81-322-2752-6_49"},{"key":"27_CR16","doi-asserted-by":"publisher","unstructured":"Toumi, H., Talea, M., Sabiri, K., Eddaoui, A.: Toward a trusted framework for cloud computing (2015). https:\/\/doi.org\/10.1109\/CloudTech.2015.7337013","DOI":"10.1109\/CloudTech.2015.7337013"},{"key":"27_CR17","doi-asserted-by":"publisher","unstructured":"Guerroumi, M., Derhab, A., Saleem, K.: Intrusion Detection System against Sink Hole Attack in Wireless Sensor Networks with Mobile Sink (2015). https:\/\/doi.org\/10.1109\/ITNG.2015.56","DOI":"10.1109\/ITNG.2015.56"},{"key":"27_CR18","doi-asserted-by":"publisher","unstructured":"Modi, C., Patel, D.: A feasible approach to intrusion detection in virtual network layer of Cloud computing. Sadhana\u2014Acad. Proc. Eng. Sci. 43(7) (2018). https:\/\/doi.org\/10.1007\/s12046-018-0910-2","DOI":"10.1007\/s12046-018-0910-2"},{"key":"27_CR19","doi-asserted-by":"publisher","unstructured":"Vaid, C., Verma, H.K.: Anomaly-based IDS implementation in cloud environment using BOAT algorithm (2015). https:\/\/doi.org\/10.1109\/ICRITO.2014.7014762","DOI":"10.1109\/ICRITO.2014.7014762"},{"key":"27_CR20","doi-asserted-by":"publisher","unstructured":"Alheeti, K.M.A., Gruebler, A., McDonald-Maier, K.D.: An intrusion detection system against malicious attacks on the communication network of driverless cars (2015). https:\/\/doi.org\/10.1109\/CCNC.2015.7158098","DOI":"10.1109\/CCNC.2015.7158098"},{"key":"27_CR21","doi-asserted-by":"publisher","unstructured":"Hong, J., Liu, C.C., Govindarasu, M.: Detection of cyber intrusions using network-based multicast messages for substation automation (2014). https:\/\/doi.org\/10.1109\/ISGT.2014.6816375","DOI":"10.1109\/ISGT.2014.6816375"},{"key":"27_CR22","doi-asserted-by":"publisher","unstructured":"Satam, P.: Cross layer anomaly based intrusion detection system (2015). https:\/\/doi.org\/10.1109\/SASOW.2015.31","DOI":"10.1109\/SASOW.2015.31"},{"key":"27_CR23","doi-asserted-by":"publisher","unstructured":"Haider, W., Hu, J., Yu, X., Xie, Y.: Integer Data Zero-Watermark Assisted System Calls Abstraction and Normalization for Host Based Anomaly Detection Systems (2016). https:\/\/doi.org\/10.1109\/CSCloud.2015.11","DOI":"10.1109\/CSCloud.2015.11"},{"key":"27_CR24","doi-asserted-by":"publisher","unstructured":"Narsingyani, D., Kale, O.: Optimizing false positive in anomaly based intrusion detection using Genetic algorithm (2016). https:\/\/doi.org\/10.1109\/MITE.2015.7375291","DOI":"10.1109\/MITE.2015.7375291"},{"key":"27_CR25","doi-asserted-by":"publisher","unstructured":"Aissa, N.B., Guerroumi, M.: A genetic clustering technique for Anomaly-based Intrusion Detection Systems (2015). https:\/\/doi.org\/10.1109\/SNPD.2015.7176182","DOI":"10.1109\/SNPD.2015.7176182"},{"key":"27_CR26","doi-asserted-by":"publisher","unstructured":"Vasudeo, S.H., Patil, P., Kumar, R.V.: IMMIX-intrusion detection and prevention system (2015). https:\/\/doi.org\/10.1109\/ICSTM.2015.7225396","DOI":"10.1109\/ICSTM.2015.7225396"},{"key":"27_CR27","doi-asserted-by":"publisher","unstructured":"Banerjee, S., Nandi, R., Dey, R., Saha, H.N.: A review on different Intrusion Detection Systems for MANET and its vulnerabilities (2015). https:\/\/doi.org\/10.1109\/IEMCON.2015.7344466","DOI":"10.1109\/IEMCON.2015.7344466"},{"key":"27_CR28","doi-asserted-by":"publisher","unstructured":"Liu, H., Lang, B.: Machine learning and deep learning methods for intrusion detection systems: a survey. Appl. Sci. 9(20) (2019). https:\/\/doi.org\/10.3390\/app9204396","DOI":"10.3390\/app9204396"},{"issue":"2","key":"27_CR29","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2016","unstructured":"Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutorials 18(2), 1153\u20131176 (2016). https:\/\/doi.org\/10.1109\/COMST.2015.2494502","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"27_CR30","unstructured":"Hodo, E., Bellekens, X., Hamilton, A., Tachtatzis, C., Atkinson, R.: Shallow and deep networks intrusion detection system: a taxonomy and survey, arXiv, pp. 1\u201343 (2017)"},{"issue":"3","key":"27_CR31","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/MCC.2014.53","volume":"1","author":"Z Tan","year":"2014","unstructured":"Tan, Z., et al.: Enhancing big data security with collaborative intrusion detection. IEEE Cloud Comput. 1(3), 27\u201333 (2014). https:\/\/doi.org\/10.1109\/MCC.2014.53","journal-title":"IEEE Cloud Comput."},{"key":"27_CR32","doi-asserted-by":"publisher","unstructured":"Aburomman, A.A., Reaz, M.B.I.: Survey of learning methods in intrusion detection system. In: 2016 International Conference on Advances in Electrical, Electronic and Systems Engineering, ICAEES 2016, no. Ml, pp. 362\u2013365 (2017). https:\/\/doi.org\/10.1109\/ICAEES.2016.7888070","DOI":"10.1109\/ICAEES.2016.7888070"},{"issue":"6","key":"27_CR33","doi-asserted-by":"publisher","first-page":"13","DOI":"10.5120\/4823-7074","volume":"39","author":"B Shah","year":"2012","unstructured":"Shah, B., Trivedi, B.H.: Artificial neural network based intrusion detection system: a survey. Int. J. Comput. Appl. 39(6), 13\u201318 (2012). https:\/\/doi.org\/10.5120\/4823-7074","journal-title":"Int. J. Comput. Appl."},{"issue":"8","key":"27_CR34","doi-asserted-by":"publisher","first-page":"6882","DOI":"10.1109\/JIOT.2020.2970501","volume":"7","author":"M Eskandari","year":"2020","unstructured":"Eskandari, M., Janjua, Z.H., Vecchio, M., Antonelli, F.: Passban IDS: an intelligent anomaly-based intrusion detection system for IoT edge devices. IEEE Internet Things J. 7(8), 6882\u20136897 (2020). https:\/\/doi.org\/10.1109\/JIOT.2020.2970501","journal-title":"IEEE Internet Things J."},{"key":"27_CR35","unstructured":"Sarnovsky, M., Paralic, J.: SS symmetry Learning and Knowledge Model, pp. 1\u201314 (2020)"},{"key":"27_CR36","doi-asserted-by":"publisher","unstructured":"Liu, Z., Ghulam, M.-U.-D., Zhu, Y., Yan, X., Wang, L., Jiang, Z., Luo, J.: Deep Learning Approach for IDS (2020), pp. 471\u2013479. https:\/\/doi.org\/10.1007\/978-981-15-0637-6_40","DOI":"10.1007\/978-981-15-0637-6_40"},{"key":"27_CR37","doi-asserted-by":"publisher","unstructured":"Vinayakumar, R., Alazab, M., Soman, K.P., Poornachandran, P., Al-Nemrat, A., Venkatraman, S.: Deep learning approach for intelligent intrusion detection system. IEEE Access 7(c), 41525\u201341550 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2895334","DOI":"10.1109\/ACCESS.2019.2895334"},{"key":"27_CR38","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.comnet.2018.11.010","volume":"148","author":"F Salo","year":"2019","unstructured":"Salo, F., Nassif, A.B., Essex, A.: Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection. Comput. Networks 148, 164\u2013175 (2019). https:\/\/doi.org\/10.1016\/j.comnet.2018.11.010","journal-title":"Comput. Networks"},{"key":"27_CR39","doi-asserted-by":"publisher","unstructured":"Sonewar, P.A., Thosar, S.D.: Detection of SQL injection and XSS attacks in three tier web applications. In: Proceedings\u20142nd International Conference on Computing Communication Control and automation (ICCUBEA). ICCUBEA 2016 (2017). https:\/\/doi.org\/10.1109\/ICCUBEA.2016.7860069","DOI":"10.1109\/ICCUBEA.2016.7860069"},{"key":"27_CR40","doi-asserted-by":"publisher","unstructured":"Masduki, B.W., Ramli, K., Saputra, F.A., Sugiarto, D.: Study on implementation of machine learning methods combination for improving attacks detection accuracy on Intrusion Detection System (IDS). In: 14th Int. Conf. QiR (Quality Res. QiR 2015\u2014conjunction with 4th Asian Symp. Mater. Process. ASMP 2015 Int. Conf. Sav. Energy Refrig. Air Cond. ICSERA 2015, pp. 56\u201364 (2016). https:\/\/doi.org\/10.1109\/QiR.2015.7374895","DOI":"10.1109\/QiR.2015.7374895"},{"issue":"15","key":"27_CR41","doi-asserted-by":"publisher","first-page":"5916","DOI":"10.1016\/j.eswa.2013.05.021","volume":"40","author":"Y Sahin","year":"2013","unstructured":"Sahin, Y., Bulkan, S., Duman, E.: A cost-sensitive decision tree approach for fraud detection. Expert Syst. Appl. 40(15), 5916\u20135923 (2013). https:\/\/doi.org\/10.1016\/j.eswa.2013.05.021","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"27_CR42","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1016\/j.eswa.2012.07.057","volume":"40","author":"S Shin","year":"2013","unstructured":"Shin, S., Lee, S., Kim, H., Kim, S.: Advanced probabilistic approach for network intrusion forecasting and detection. Expert Syst. Appl. 40(1), 315\u2013322 (2013). https:\/\/doi.org\/10.1016\/j.eswa.2012.07.057","journal-title":"Expert Syst. Appl."},{"issue":"4","key":"27_CR43","doi-asserted-by":"publisher","first-page":"3899","DOI":"10.1016\/j.eswa.2011.06.033","volume":"39","author":"I Kang","year":"2012","unstructured":"Kang, I., Jeong, M.K., Kong, D.: A differentiated one-class classification method with applications to intrusion detection. Expert Syst. Appl. 39(4), 3899\u20133905 (2012). https:\/\/doi.org\/10.1016\/j.eswa.2011.06.033","journal-title":"Expert Syst. Appl."},{"issue":"10","key":"27_CR44","doi-asserted-by":"publisher","first-page":"1795","DOI":"10.1016\/j.cpc.2009.05.004","volume":"180","author":"X Tong","year":"2009","unstructured":"Tong, X., Wang, Z., Yu, H.: A research using hybrid RBF\/Elman neural networks for intrusion detection system secure model. Comput. Phys. Commun. 180(10), 1795\u20131801 (2009). https:\/\/doi.org\/10.1016\/j.cpc.2009.05.004","journal-title":"Comput. Phys. Commun."},{"key":"27_CR45","doi-asserted-by":"publisher","unstructured":"S\u00e1nchez, D., Vila, M.A., Cerda, L., Serrano, J.M.: Association rules applied to credit card fraud detection. Expert Syst. Appl. 36(2 PART 2), 3630\u20133640 (2009). https:\/\/doi.org\/10.1016\/j.eswa.2008.02.001","DOI":"10.1016\/j.eswa.2008.02.001"},{"key":"27_CR46","doi-asserted-by":"publisher","unstructured":"Das, K., Schneider, J., Neill, D.B.: Anomaly pattern detection in categorical datasets. In: Proceedings of ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp. 169\u2013176 (2008). https:\/\/doi.org\/10.1145\/1401890.1401915","DOI":"10.1145\/1401890.1401915"},{"issue":"1","key":"27_CR47","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/TNET.2006.890115","volume":"15","author":"RR Kompella","year":"2007","unstructured":"Kompella, R.R., Singh, S., Varghese, G.: On scalable attack detection in the network. IEEE\/ACM Trans. Netw. 15(1), 14\u201325 (2007). https:\/\/doi.org\/10.1109\/TNET.2006.890115","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"27_CR48","doi-asserted-by":"publisher","unstructured":"Satheesh Kumar, M., Srinivasagan, K.G. Ben-Othman, J.: Sniff-Phish: A novel framework for resource intensive computation in cloud to detect email scam. Trans. Emerg. Telecommun. Technol. 30(6) (2019). https:\/\/doi.org\/10.1002\/ett.3590","DOI":"10.1002\/ett.3590"}],"container-title":["Lecture Notes in Networks and Systems","Advances in Computing, Informatics, Networking and Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-87049-2_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,28]],"date-time":"2022-04-28T12:12:49Z","timestamp":1651147969000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-87049-2_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030870485","9783030870492"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-87049-2_27","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"3 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}