{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T04:11:48Z","timestamp":1751602308093,"version":"3.41.0"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031877711"},{"type":"electronic","value":"9783031877728"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87772-8_22","type":"book-chapter","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T07:36:36Z","timestamp":1745307396000},"page":"257-268","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["MIDPS: A Multi-agent Host Intrusion Detection and\u00a0Prevention System"],"prefix":"10.1007","author":[{"given":"Saad","family":"El Jaouhari","sequence":"first","affiliation":[]},{"given":"Andrei","family":"Vavilov","sequence":"additional","affiliation":[]},{"given":"Julia","family":"Soloveva","sequence":"additional","affiliation":[]},{"given":"Alexandru","family":"Archip","sequence":"additional","affiliation":[]},{"given":"Nour","family":"El Madhoun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,23]]},"reference":[{"key":"22_CR1","unstructured":"Arp, D., et al.: Dos and don\u2019ts of machine learning in computer security. arXiv preprint arXiv:2010.09470 (2020)"},{"key":"22_CR2","first-page":"1339","volume":"99","author":"D Hoang","year":"2021","unstructured":"Hoang, D., Hung, N.: Detecting common web attacks based on supervised machine learning using web logs. J. Theor. Appl. Inf. Technol. 99, 1339\u20131350 (2021)","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Kruegel, C., Vigna, G.: Anomaly detection of web-based attacks. In: 10th ACM conference on Computer and Communications Security, pp. 251\u2013261 (2003)","DOI":"10.1145\/948109.948144"},{"key":"22_CR4","doi-asserted-by":"publisher","unstructured":"Landauer, M., Wurzenberger, M., Skopik, F., Hotwagner, W., H\u00f6ld, G.: Aminer: a modular log data analysis pipeline for anomaly-based intrusion detection. Digit. Threats 4(1) (2023). https:\/\/doi.org\/10.1145\/3567675","DOI":"10.1145\/3567675"},{"key":"22_CR5","unstructured":"Lee, W.: A data mining framework for constructing features and models for intrusion detection systems. Columbia University (1999)"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Mironeanu, C., Archip, A., Atomei, G.: Application of association rule mining in preventing cyberattacks. Bull. Polytechnic Inst. Iai. Electr. Eng. Power Eng. Electron. Sect. 67(4), 25\u201341 (2021)","DOI":"10.2478\/bipie-2021-0020"},{"key":"22_CR7","unstructured":"Ross, K.: SQL Injection Detection Using Machine Learning Techniques and Multiple Data Sources. San Jose State University (2018)"},{"key":"22_CR8","unstructured":"SHAH, S.S.H.: SQL injection dataset. Kaggle (2022). https:\/\/www.kaggle.com\/datasets\/syedsaqlainhussain\/sql-injection-dataset"},{"key":"22_CR9","doi-asserted-by":"publisher","unstructured":"Sommer, R., Paxson, V.: Outside the closed world: on using machine learning for network intrusion detection. In: 2010 IEEE Symposium on Security and Privacy, pp. 305\u2013316 (2010). https:\/\/doi.org\/10.1109\/SP.2010.25","DOI":"10.1109\/SP.2010.25"},{"key":"22_CR10","doi-asserted-by":"publisher","unstructured":"Wan, W., Shi, X., Wei, J., Zhao, J., Long, C.: Elsv: an effective anomaly detection system from web access logs. In: 2021 IEEE International Performance, Computing, and Communications Conference (IPCCC), pp.\u00a01\u20136 (2021). https:\/\/doi.org\/10.1109\/IPCCC51483.2021.9679413","DOI":"10.1109\/IPCCC51483.2021.9679413"},{"key":"22_CR11","doi-asserted-by":"publisher","unstructured":"Zolotukhin, M., H\u00e4m\u00e4l\u00e4inen, T., Kokkonen, T., Siltanen, J.: Analysis of http requests for anomaly detection of web attacks. In: 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing, pp. 406\u2013411 (2014). https:\/\/doi.org\/10.1109\/DASC.2014.79","DOI":"10.1109\/DASC.2014.79"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87772-8_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T18:38:09Z","timestamp":1751567889000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87772-8_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031877711","9783031877728"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87772-8_22","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"23 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"39","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}