{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:48:13Z","timestamp":1743101293964,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031213847"},{"type":"electronic","value":"9783031213854"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-21385-4_20","type":"book-chapter","created":{"date-parts":[[2022,12,13]],"date-time":"2022-12-13T05:03:52Z","timestamp":1670907832000},"page":"227-240","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A System for Network Based Intrusion Avoidance Using Dedicated Machine Learning and Artificial Intelligence-Based Model for Application and Data Safety"],"prefix":"10.1007","author":[{"given":"H.","family":"Manjunath","sequence":"first","affiliation":[]},{"given":"S.","family":"Saravana Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,14]]},"reference":[{"issue":"3","key":"20_CR1","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/65.283931","volume":"8","author":"B Mukherjee","year":"1994","unstructured":"Mukherjee, B., Heberlein, L.T., Levitt, K.N.: Network intrusion detection. IEEE Netw. 8(3), 26\u201341 (1994)","journal-title":"IEEE Netw."},{"key":"20_CR2","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1353-4858(16)30026-5","volume":"3","author":"D Larson","year":"2016","unstructured":"Larson, D.: Distributed denial of service attacks\u2013holding back the flood. Netw. Secur. 3, 5\u20137 (2016)","journal-title":"Netw. Secur."},{"key":"20_CR3","doi-asserted-by":"publisher","unstructured":"Venkatraman, S., Alazab, M.: Use of data visualisation for zero-day Malware detection. Secur. Commun. Netw. (2018), Dec. 2018, Art. no. 1728303. [Online]. Available: https:\/\/doi.org\/10.1155\/2018\/1728303","DOI":"10.1155\/2018\/1728303"},{"key":"20_CR4","doi-asserted-by":"publisher","unstructured":"Mishra, P., Varadharajan, V., Tupakula, U., Pilli, E. S.: A detailed investigation and analysis of using machine learning techniques for intrusion detection, IEEE Commun. Surveys Tuts., to be published. https:\/\/doi.org\/10.1109\/comst.2018.2847722","DOI":"10.1109\/comst.2018.2847722"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Othman, S.M., Ba-Alwi, F.M., Alsohybe, N.T., Al-Hashida, A.Y.: Intrusion detection model using machine learning algorithm on Big Data environment. J. Big Data 5(1), 1\u201312 (2018)","DOI":"10.1186\/s40537-018-0145-4"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Das, V., Pathak, V., Sharma, S., Srikanth, M.V.V.N.S., Gireesh Kumar, T.: Network intrusion detection system based on machine learning algorithms. AIRCC's Int. J. Comput. Sci. Inf. Technol. 2(6), 138\u2013151 (2010)","DOI":"10.5121\/ijcsit.2010.2613"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Ulya, S., Heydari, S.S., Elgazzar, Khalid, El-Khatib, Khalil.: Building an intrusion detection system to detect atypical cyberattack flows. EEE Access 9, 94352\u201394370 (2021)","DOI":"10.1109\/ACCESS.2021.3093830"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Alzahrani, A.O., Alenazi, Mohammed J.F.: Designing a network intrusion detection system based on machine learning for software defined networks. Futur. Internet 13(5), 111 (2021)","DOI":"10.3390\/fi13050111"},{"issue":"1","key":"20_CR9","first-page":"314","volume":"9","author":"N Pise","year":"2021","unstructured":"Pise, N.: Application of machine learning for intrusion detection system. Inf. Technol. Ind. 9(1), 314\u2013323 (2021)","journal-title":"Inf. Technol. Ind."},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Hsu, C.Y., Wang, S., Qiao, Y.: Intrusion detection by machine learning for multimedia platform. Multimed. Tools Appl. 80(19), 29643\u201329656 (2021)","DOI":"10.1007\/s11042-021-11100-x"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Jayasri, P., Atchaya, A., Sanfeeya, P.M., Ramprasath, J.: Intrusion detection system in software defined networks using machine learning approach. Int. J. Adv. Eng. Res. Sci. 8(4), (2021)","DOI":"10.22161\/ijaers.84.16"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Bozcan, I., Oymak, Y., Alemdar, I.Z., Kalkan, S.: What is (missing or wrong) in the scene? A hybrid deep Boltzmann machine for contextualized scene modeling. In: 2018 IEEE International Conference on Robotics and Automation (ICRA), pp. 1\u20136 (2018)","DOI":"10.1109\/ICRA.2018.8460828"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Kim, J.J., Kim, H.L., Thu, T., Kim, H.: Long short term memory recurrent neural network classifier for intrusion detection. In: Proceedings of International Conference on Platform Technology and Service (PlatCon), pp. 1\u20135 (2016)","DOI":"10.1109\/PlatCon.2016.7456805"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Ali, F.A.B.H., Len, Y.Y.: Development of host based intrusion detection system for log files. In: Proceedings of 2011 IEEE Symposium on Business, Engineering and Industrial Applications (ISBEIA), pp. 281\u2013285 (2011)","DOI":"10.1109\/ISBEIA.2011.6088821"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Deng, L.: Deep learning: methods and applications, found. Trends Signal Process 7(3\u20134), 197\u2013387 (2014)","DOI":"10.1561\/2000000039"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Javaid, A.Q., Niyaz, W.S., Alam, M.A.: Deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (BIONETICS), pp. 21\u201326 (2016)","DOI":"10.4108\/eai.3-12-2015.2262516"}],"container-title":["Communications in Computer and Information Science","Artificial Intelligence and Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-21385-4_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,10]],"date-time":"2024-10-10T07:49:50Z","timestamp":1728546590000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-21385-4_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031213847","9783031213854"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-21385-4_20","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"14 December 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Data Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hyderabad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icaids2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/icaids.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"195","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}