{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:22:50Z","timestamp":1774369370980,"version":"3.50.1"},"publisher-location":"Cham","reference-count":50,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031160776","type":"print"},{"value":"9783031160783","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-16078-3_42","type":"book-chapter","created":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:16:25Z","timestamp":1661991385000},"page":"609-629","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":38,"title":["Intrusion Detection Systems Using Support Vector Machines on the KDDCUP\u201999 and NSL-KDD Datasets: A Comprehensive Survey"],"prefix":"10.1007","author":[{"given":"Mikel K.","family":"Ngueajio","sequence":"first","affiliation":[]},{"given":"Gloria","family":"Washington","sequence":"additional","affiliation":[]},{"given":"Danda B.","family":"Rawat","sequence":"additional","affiliation":[]},{"given":"Yolande","family":"Ngueabou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,1]]},"reference":[{"issue":"2","key":"42_CR1","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"SE-13","author":"DE Denning","year":"1987","unstructured":"Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. SE-13(2), 222\u2013232 (1987)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"1\u20132","key":"42_CR2","first-page":"49","volume":"2","author":"X Xu","year":"2006","unstructured":"Xu, X.: Adaptive intrusion detection based on machine learning: feature extraction, classifier construction and sequential pattern prediction. Int. J. Web Serv. Pract. 2(1\u20132), 49\u201358 (2006)","journal-title":"Int. J. Web Serv. Pract."},{"key":"42_CR3","doi-asserted-by":"publisher","unstructured":"Sarvari, H., Keikha, M.M.: Improving the accuracy of intrusion detection systems by using the combination of machine learning approaches. In: 2010 International Conference of Soft Computing and Pattern Recognition, pp. 334\u2013337 (2010). https:\/\/doi.org\/10.1109\/SOCPAR.2010.5686163","DOI":"10.1109\/SOCPAR.2010.5686163"},{"key":"42_CR4","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.protcy.2012.05.017","volume":"4","author":"S Mukherjee","year":"2012","unstructured":"Mukherjee, S., Sharma, N.: Intrusion detection using naive Bayes classifier with feature reduction. Procedia Technol. 4, 119\u2013128 (2012)","journal-title":"Procedia Technol."},{"key":"42_CR5","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.procs.2016.06.047","volume":"89","author":"N Farnaaz","year":"2016","unstructured":"Farnaaz, N., Jabbar, M.A.: Random forest modeling for network intrusion detection system. Procedia Comput. Sci. 89, 213\u2013217 (2016)","journal-title":"Procedia Comput. Sci."},{"key":"42_CR6","doi-asserted-by":"crossref","unstructured":"Lee, J.H., Lee, J.H., Sohn, S.G., Ryu, J.H., Chung, T.M.: Effective value of decision tree with KDD 99 intrusion detection datasets for intrusion detection system. In: 2008 10th International Conference on Advanced Communication Technology, vol. 2, pp. 1170\u20131175. IEEE, February 2008","DOI":"10.1109\/ICACT.2008.4493974"},{"issue":"1","key":"42_CR7","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1016\/j.patcog.2009.05.017","volume":"43","author":"CF Tsai","year":"2010","unstructured":"Tsai, C.F., Lin, C.Y.: A triangle area based nearest neighbors approach to intrusion detection. Pattern Recogn. 43(1), 222\u2013229 (2010)","journal-title":"Pattern Recogn."},{"key":"42_CR8","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.cose.2017.06.005","volume":"70","author":"C Khammassi","year":"2017","unstructured":"Khammassi, C., Krichen, S.: A GA-LR wrapper approach for feature selection in network intrusion detection. Comput. Secur. 70, 255\u2013277 (2017)","journal-title":"Comput. Secur."},{"key":"42_CR9","unstructured":"Osuna, E., Freund, R., Girosi, F.: An improved training algorithm for support vector machines. In: Neural Networks for Signal Processing VII. Proceedings of the 1997 IEEE Signal Processing Society Workshop, pp. 276\u2013285. IEEE, September 1997"},{"issue":"10","key":"42_CR10","doi-asserted-by":"publisher","first-page":"11994","DOI":"10.1016\/j.eswa.2009.05.029","volume":"36","author":"CF Tsai","year":"2009","unstructured":"Tsai, C.F., Hsu, Y.F., Lin, C.Y., Lin, W.Y.: Intrusion detection by machine learning: a review. Expert Syst. Appl. 36(10), 11994\u201312000 (2009)","journal-title":"Expert Syst. Appl."},{"issue":"12","key":"42_CR11","doi-asserted-by":"publisher","first-page":"3448","DOI":"10.1016\/j.comnet.2007.02.001","volume":"51","author":"A Patcha","year":"2007","unstructured":"Patcha, A., Park, J.M.: An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput. Netw. 51(12), 3448\u20133470 (2007)","journal-title":"Comput. Netw."},{"issue":"1","key":"42_CR12","first-page":"1","volume":"2","author":"S Mandala","year":"2007","unstructured":"Mandala, S., Ngadi, M.A., Abdullah, A.H.: A survey on MANET intrusion detection. Int. J. Comput. Sci. Secur. 2(1), 1\u201311 (2007)","journal-title":"Int. J. Comput. Sci. Secur."},{"key":"42_CR13","unstructured":"Ahmed, G., Hussain, M., Khan, M.N.A.: Characterizing strengths of snort-based IDPS. Res. J. Recent Sci. (2014). ISSN 2277-2502"},{"issue":"11","key":"42_CR14","doi-asserted-by":"publisher","first-page":"180","DOI":"10.3390\/fi12110180","volume":"12","author":"A Mahfouz","year":"2020","unstructured":"Mahfouz, A., Abuhussein, A., Venugopal, D., Shiva, S.: Ensemble classifiers for network intrusion detection using a novel network attack dataset. Future Internet 12(11), 180 (2020)","journal-title":"Future Internet"},{"issue":"2","key":"42_CR15","first-page":"247","volume":"1","author":"G MeeraGandhi","year":"2010","unstructured":"MeeraGandhi, G.: Machine learning approach for attack prediction and classification using supervised learning algorithms. Int. J. Comput. Sci. Commun. 1(2), 247\u2013250 (2010)","journal-title":"Int. J. Comput. Sci. Commun."},{"issue":"4","key":"42_CR16","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/s00778-006-0002-5","volume":"16","author":"L Khan","year":"2007","unstructured":"Khan, L., Awad, M., Thuraisingham, B.: A new intrusion detection system using support vector machines and hierarchical clustering. VLDB J. 16(4), 507\u2013521 (2007)","journal-title":"VLDB J."},{"issue":"1","key":"42_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-020-00318-5","volume":"7","author":"IH Sarker","year":"2020","unstructured":"Sarker, I.H., Kayes, A.S.M., Badsha, S., Alqahtani, H., Watters, P., Ng, A.: Cybersecurity data science: an overview from machine learning perspective. J. Big Data 7(1), 1\u201329 (2020). https:\/\/doi.org\/10.1186\/s40537-020-00318-5","journal-title":"J. Big Data"},{"key":"42_CR18","unstructured":"Hsu, C.W., Chang, C.C., Lin, C.J.: A practical guide to support vector classification (2003)"},{"key":"42_CR19","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.asoc.2014.01.028","volume":"18","author":"F Kuang","year":"2014","unstructured":"Kuang, F., Xu, W., Zhang, S.: A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl. Soft Comput. 18, 178\u2013184 (2014)","journal-title":"Appl. Soft Comput."},{"key":"42_CR20","doi-asserted-by":"crossref","unstructured":"Mayhew, M., Atighetchi, M., Adler, A., Greenstadt, R.: Use of machine learning in big data analytics for insider threat detection. In: MILCOM 2015\u20132015 IEEE Military Communications Conference, pp. 915\u2013922. IEEE, October 2015","DOI":"10.1109\/MILCOM.2015.7357562"},{"issue":"1","key":"42_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-019-0038-7","volume":"2","author":"A Khraisat","year":"2019","unstructured":"Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J.: Survey of intrusion detection systems: techniques, datasets, and challenges. Cybersecurity 2(1), 1\u201322 (2019)","journal-title":"Cybersecurity"},{"issue":"1","key":"42_CR22","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.jnca.2012.09.004","volume":"36","author":"HJ Liao","year":"2013","unstructured":"Liao, H.J., Lin, C.H.R., Lin, Y.C., Tung, K.Y.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 16\u201324 (2013)","journal-title":"J. Netw. Comput. Appl."},{"key":"42_CR23","doi-asserted-by":"publisher","first-page":"1561","DOI":"10.1016\/j.procs.2020.03.367","volume":"167","author":"S Choudhary","year":"2020","unstructured":"Choudhary, S., Kesswani, N.: Analysis of KDD-Cup\u201999, NSL-KDD and UNSW-NB15 datasets using deep learning in IoT. Procedia Comput. Sci. 167, 1561\u20131573 (2020)","journal-title":"Procedia Comput. Sci."},{"key":"42_CR24","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1\u20136. IEEE, July 2009","DOI":"10.1109\/CISDA.2009.5356528"},{"issue":"5","key":"42_CR25","doi-asserted-by":"publisher","first-page":"1187","DOI":"10.1007\/s00500-014-1332-7","volume":"19","author":"F Kuang","year":"2014","unstructured":"Kuang, F., Zhang, S., Jin, Z., Xu, W.: A novel SVM by combining kernel principal component analysis and improved chaotic particle swarm optimization for intrusion detection. Soft. Comput. 19(5), 1187\u20131199 (2014). https:\/\/doi.org\/10.1007\/s00500-014-1332-7","journal-title":"Soft. Comput."},{"issue":"7-8","key":"42_CR26","doi-asserted-by":"publisher","first-page":"1671","DOI":"10.1007\/s00521-013-1370-6","volume":"24","author":"I Ahmad","year":"2013","unstructured":"Ahmad, I., Hussain, M., Alghamdi, A., Alelaiwi, A.: Enhancing SVM performance in intrusion detection using optimal feature subset selection based on genetic principal components. Neural Comput. Appl. 24(7\u20138), 1671\u20131682 (2013). https:\/\/doi.org\/10.1007\/s00521-013-1370-6","journal-title":"Neural Comput. Appl."},{"issue":"3","key":"42_CR27","first-page":"69","volume":"4","author":"M Bijone","year":"2016","unstructured":"Bijone, M.: A survey on secure network: intrusion detection & prevention approaches. Am. J. Inf. Syst. 4(3), 69\u201388 (2016)","journal-title":"Am. J. Inf. Syst."},{"key":"42_CR28","unstructured":"Atefi, K., Yahya, S., Dak, A.Y., Atefi, A.: A hybrid intrusion detection system based on different machine learning algorithms (2013)"},{"key":"42_CR29","doi-asserted-by":"crossref","unstructured":"Zhao, G., Song, J., Song, J.: Analysis about performance of multiclass SVM applying in IDS. In: International Conference on Information, Business and Education Technology ICIBIT, March 2013","DOI":"10.2991\/icibet.2013.46"},{"issue":"10","key":"42_CR30","first-page":"84","volume":"8","author":"P Nerlikar","year":"2020","unstructured":"Nerlikar, P., Pandey, S., Sharma, S., Bagade, S.: Analysis of intrusion detection using machine learning techniques. Int. J. Comput. Netw. Commun. Secur. 8(10), 84\u201393 (2020)","journal-title":"Int. J. Comput. Netw. Commun. Secur."},{"key":"42_CR31","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1016\/j.asoc.2015.10.011","volume":"38","author":"AA Aburomman","year":"2016","unstructured":"Aburomman, A.A., Reaz, M.B.I.: A novel SVM-kNN-PSO ensemble method for intrusion detection system. Appl. Soft Comput. 38, 360\u2013372 (2016)","journal-title":"Appl. Soft Comput."},{"key":"42_CR32","unstructured":"Wang, J., Hong, X., Ren, R.R., Li, T.H.: A real-time intrusion detection system based on PSO-SVM. In: Proceedings of the 2009 International Workshop on Information Security and Application (IWISA 2009), p. 319. Academy Publisher (2009)"},{"issue":"10","key":"42_CR33","doi-asserted-by":"publisher","first-page":"3285","DOI":"10.1016\/j.asoc.2012.05.004","volume":"12","author":"SW Lin","year":"2012","unstructured":"Lin, S.W., Ying, K.C., Lee, C.Y., Lee, Z.J.: An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection. Appl. Soft Comput. 12(10), 3285\u20133290 (2012)","journal-title":"Appl. Soft Comput."},{"key":"42_CR34","doi-asserted-by":"crossref","unstructured":"Mulay, S.A., Devale, P.R., Garje, G.V.: Decision tree based support vector machine for intrusion detection. In: 2010 International Conference on Networking and Information Technology, pp. 59\u201363. IEEE, June 2010","DOI":"10.1109\/ICNIT.2010.5508557"},{"issue":"1","key":"42_CR35","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1016\/j.eswa.2011.07.032","volume":"39","author":"Y Li","year":"2012","unstructured":"Li, Y., Xia, J., Zhang, S., Yan, J., Ai, X., Dai, K.: An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Syst. Appl. 39(1), 424\u2013430 (2012)","journal-title":"Expert Syst. Appl."},{"issue":"10","key":"42_CR36","doi-asserted-by":"publisher","first-page":"2617","DOI":"10.1016\/j.cor.2004.03.019","volume":"32","author":"WH Chen","year":"2005","unstructured":"Chen, W.H., Hsu, S.H., Shen, H.P.: Application of SVM and ANN for intrusion detection. Comput. Oper. Res. 32(10), 2617\u20132634 (2005)","journal-title":"Comput. Oper. Res."},{"key":"42_CR37","unstructured":"Mukkamala, S., Janoski, G., Sung, A.: Intrusion detection using neural networks and support vector machines. In: Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN 2002 (Cat. No. 02CH37290), vol. 2, pp. 1702\u20131707. IEEE, May 2002"},{"key":"42_CR38","doi-asserted-by":"crossref","unstructured":"Ahanger, A.S., Khan, S.M., Masoodi, F.: An effective intrusion detection system using supervised machine learning techniques. In: 2021 5th International Conference on Computing Methodologies and Communication (ICCMC), pp. 1639\u20131644. IEEE, April 2021","DOI":"10.1109\/ICCMC51019.2021.9418291"},{"issue":"3","key":"42_CR39","first-page":"581","volume":"3","author":"YB Bhavsar","year":"2013","unstructured":"Bhavsar, Y.B., Waghmare, K.C.: Intrusion detection system using data mining technique: support vector machine. Int. J. Emerg. Technol. Adv. Eng. 3(3), 581\u2013586 (2013)","journal-title":"Int. J. Emerg. Technol. Adv. Eng."},{"issue":"4","key":"42_CR40","doi-asserted-by":"publisher","first-page":"2371","DOI":"10.1007\/s13369-019-03970-z","volume":"45","author":"BS Bhati","year":"2020","unstructured":"Bhati, B.S., Rai, C.S.: Analysis of support vector machine-based intrusion detection techniques. Arab. J. Sci. Eng. 45(4), 2371\u20132383 (2020)","journal-title":"Arab. J. Sci. Eng."},{"key":"42_CR41","doi-asserted-by":"publisher","unstructured":"Abrar, I., Ayub, Z., Masoodi, F., Bamhdi, A.M.: A machine learning approach for intrusion detection system on NSL-KDD dataset. In: 2020 International Conference on Smart Electronics and Communication (ICOSEC), pp. 919\u2013924 (2020). https:\/\/doi.org\/10.1109\/ICOSEC49089.2020.9215232","DOI":"10.1109\/ICOSEC49089.2020.9215232"},{"key":"42_CR42","doi-asserted-by":"publisher","unstructured":"Patgiri, R., Varshney, U., Akutota, T., Kunde, R.: An investigation on intrusion detection system using machine learning. In: 2018 IEEE Symposium Series on Computational Intelligence (SSCI), pp. 1684-1691 (2018). https:\/\/doi.org\/10.1109\/SSCI.2018.8628676","DOI":"10.1109\/SSCI.2018.8628676"},{"key":"42_CR43","doi-asserted-by":"crossref","unstructured":"Pervez, M.S., Farid, D.M.: Feature selection and intrusion classification in NSL-KDD cup 99 dataset employing SVMs. In: The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014), pp. 1\u20136. IEEE, December 2014","DOI":"10.1109\/SKIMA.2014.7083539"},{"key":"42_CR44","unstructured":"Calix, R.A., Sankaran, R.: Feature ranking and support vector machines classification analysis of the NSL-KDD intrusion detection corpus. In: The Twenty-Sixth International FLAIRS Conference, May 2013"},{"key":"42_CR45","first-page":"25","volume":"3","author":"J Jha","year":"2013","unstructured":"Jha, J., Ragha, L.: Intrusion detection system using support vector machine. Int. J. Appl. Inf. Syst. (IJAIS) 3, 25\u201330 (2013)","journal-title":"Int. J. Appl. Inf. Syst. (IJAIS)"},{"key":"42_CR46","unstructured":"Sapre, S., Ahmadi, P., Islam, K.: A robust comparison of the KDDCup99 and NSL-KDD IoT network intrusion detection datasets through various machine learning algorithms. arXiv preprint arXiv:1912.13204 (2019)"},{"issue":"12","key":"42_CR47","first-page":"1621","volume":"7","author":"A Alsadhan","year":"2013","unstructured":"Alsadhan, A., Khan, N.: A proposed optimized and efficient intrusion detection system for wireless sensor network. Int. J. Comput. Inf. Eng. 7(12), 1621\u20131624 (2013)","journal-title":"Int. J. Comput. Inf. Eng."},{"issue":"2","key":"42_CR48","doi-asserted-by":"publisher","first-page":"1559","DOI":"10.1007\/s12652-020-02228-z","volume":"12","author":"M Safaldin","year":"2020","unstructured":"Safaldin, M., Otair, M., Abualigah, L.: Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks. J. Ambient. Intell. Humaniz. Comput. 12(2), 1559\u20131576 (2020). https:\/\/doi.org\/10.1007\/s12652-020-02228-z","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"42_CR49","doi-asserted-by":"crossref","unstructured":"Cuong, T.D., Giang, N.L.: Intrusion detection under covariate shift using modified support vector machine and modified backpropagation. In: Proceedings of the Third Symposium on Information and Communication Technology, pp. 266\u2013271, August 2012","DOI":"10.1145\/2350716.2350756"},{"key":"42_CR50","doi-asserted-by":"crossref","unstructured":"Chowdhury, M.M.U., Hammond, F., Konowicz, G., Xin, C., Wu, H., Li, J.: A few-shot deep learning approach for improved intrusion detection. In: 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), pp. 456\u2013462. IEEE, October 2017","DOI":"10.1109\/UEMCON.2017.8249084"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-16078-3_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:30:09Z","timestamp":1661992209000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-16078-3_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,1]]},"ISBN":["9783031160776","9783031160783"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-16078-3_42","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,1]]},"assertion":[{"value":"1 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IntelliSys","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Proceedings of SAI Intelligent Systems Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Amsterdam","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"intellisys2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/saiconference.com\/IntelliSys","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}