{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T06:23:08Z","timestamp":1756189388308},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319076911"},{"type":"electronic","value":"9783319076928"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07692-8_58","type":"book-chapter","created":{"date-parts":[[2014,5,29]],"date-time":"2014-05-29T16:19:57Z","timestamp":1401380397000},"page":"613-622","source":"Crossref","is-referenced-by-count":9,"title":["The Effectiveness of Sampling Methods for the Imbalanced Network Intrusion Detection Data Set"],"prefix":"10.1007","author":[{"given":"Kok-Chin","family":"Khor","sequence":"first","affiliation":[]},{"given":"Choo-Yee","family":"Ting","sequence":"additional","affiliation":[]},{"given":"Somnuk","family":"Phon-Amnuaisuk","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"ACM KDD Cup 1999. Computer Network Intrusion Detection (1999), \n                  \n                    http:\/\/www.sigkdd.org\/kddcup\/","key":"58_CR1"},{"issue":"1","key":"58_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1007730.1007733","volume":"6","author":"N.V. Chawla","year":"2004","unstructured":"Chawla, N.V., Japckowicz, N., Kolcz, A.: Editorial: Special Issue on Learning from Imbalanced Data sets. ACM SIGKDD Explorations Newsletter\u00a06(1), 1\u20136 (2004)","journal-title":"ACM SIGKDD Explorations Newsletter"},{"key":"58_CR3","first-page":"25","volume":"30","author":"S. Kotsiantis","year":"2006","unstructured":"Kotsiantis, S., Kanellopoulos, D., Pintelas, P.: Handling Imbalanced Data sets: A Review. GESTS International Transactions on Computer Science and Engineering\u00a030, 25\u201336 (2006)","journal-title":"GESTS International Transactions on Computer Science and Engineering"},{"doi-asserted-by":"crossref","unstructured":"Chawla, N.V.: Data Mining for Imbalanced Data sets: An Overview. In: Data Mining and Knowledge Discovery Handbook, 2nd edn., pp. 875\u2013886. Springer Science + Business Media (2000)","key":"58_CR4","DOI":"10.1007\/978-0-387-09823-4_45"},{"issue":"4","key":"58_CR5","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1145\/382912.382923","volume":"3","author":"J. McHugh","year":"2000","unstructured":"McHugh, J.: Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory. ACM Transactions on Information and System Security\u00a03(4), 262\u2013294 (2000)","journal-title":"ACM Transactions on Information and System Security"},{"unstructured":"Brugger, S.T., Chow, J.: An assessment of the DARPA IDS Evaluation Data set using Snort. Technical Report CSE-2007-1, University of California, Department of Computer Science, Davis, CA (2007)","key":"58_CR6"},{"key":"58_CR7","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1016\/j.eswa.2010.06.066","volume":"38","author":"S.J. Horng","year":"2011","unstructured":"Horng, S.J., Su, M.Y., Chen, Y.H., Kao, T.W., Chen, R.J., Lai, J.L., Perkasa, C.D.: A Novel Intrusion Detection System Based on Hierachical Clustering and Support Vector Machine. Expert Systems with Applications\u00a038, 306\u2013313 (2011)","journal-title":"Expert Systems with Applications"},{"issue":"1","key":"58_CR8","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/TDSC.2008.20","volume":"7","author":"K.K. Gupta","year":"2010","unstructured":"Gupta, K.K., Nath, B.: Layered Approach Using Conditional Random Fields for Intrusion Detection. IEEE Transaction on Dependable and Secure Computing\u00a07(1), 35\u201349 (2010)","journal-title":"IEEE Transaction on Dependable and Secure Computing"},{"key":"58_CR9","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/s10489-010-0263-y","volume":"36","author":"K.C. Khor","year":"2012","unstructured":"Khor, K.C., Ting, C.Y., Phon-Amnuaisuk, S.: A Cascaded Classifier Approach for Improving Detection Rates on Rare Attack Categories in Network Intrusion Detection. Applied Intelligence\u00a036, 320\u2013329 (2012)","journal-title":"Applied Intelligence"},{"issue":"6","key":"58_CR10","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1016\/j.cose.2009.01.001","volume":"28","author":"Y. Li","year":"2009","unstructured":"Li, Y., Wang, J.L., Tian, Z.H., Lu, T.B., Young, C.: Building Lightweight Intrusion Detection System Using Wrapper-based Feature Selection Mechanisms. Computers & Security\u00a028(6), 466\u2013475 (2009)","journal-title":"Computers & Security"},{"issue":"4","key":"58_CR11","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1016\/j.eswa.2005.05.002","volume":"29","author":"O. Depren","year":"2005","unstructured":"Depren, O., Topallar, M., Anarim, E., Kemal Ciliz, M.: An Intelligent Intrusion Detection System (IDS) for Anomaly and Misuse Detection in Computer Networks. Expert Systems with Applications\u00a029(4), 713\u2013722 (2005)","journal-title":"Expert Systems with Applications"},{"issue":"7","key":"58_CR12","doi-asserted-by":"publisher","first-page":"918","DOI":"10.1016\/j.patrec.2008.01.008","volume":"29","author":"C. Xiang","year":"2008","unstructured":"Xiang, C., Png, C.Y., Lim, S.M.: Design of Multiple-level Hybrid Classifiers for Intrusion Detection System Using Bayesian Clustering and Decision Trees. Pattern Recognition\u00a029(7), 918\u2013924 (2008)","journal-title":"Pattern Recognition"},{"issue":"7-9","key":"58_CR13","doi-asserted-by":"publisher","first-page":"1561","DOI":"10.1016\/j.neucom.2006.10.146","volume":"70","author":"G. Liu","year":"2007","unstructured":"Liu, G., Yi, Z., Yang, S.: A Hierarchical Intrusion Detection Model Based on the PCA Neural Networks. Neurocomputing\u00a070(7-9), 1561\u20131568 (2007)","journal-title":"Neurocomputing"},{"doi-asserted-by":"crossref","unstructured":"Agarwal, R., Joshi, M.V.: PNRule: A New Framework for Learning Classifier Models in Data Mining (A Case-Study in Network Intrusion Detection). Technical Report, No. RC-21719, IBM Research Division (2001)","key":"58_CR14","DOI":"10.1137\/1.9781611972719.29"},{"issue":"2","key":"58_CR15","doi-asserted-by":"crossref","first-page":"251","DOI":"10.3233\/IDA-2010-0466","volume":"15","author":"V. Engen","year":"2011","unstructured":"Engen, V., Vincent, J., Phalp, K.: Exploring Discrepancies in Findings Obtained with the KDD Cup \u201999 Data Set. Journal of Intelligent Data Analysis\u00a015(2), 251\u2013276 (2011)","journal-title":"Journal of Intelligent Data Analysis"},{"key":"58_CR16","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1109\/TSMCB.2007.914695","volume":"38","author":"W.M. Hu","year":"2008","unstructured":"Hu, W.M., Hu, W., Maybank, S.: Adaboost-Based Algorithm for Network Intrusion Detection. IEEE Transaction on Systems, Man, and Cybernetics-Part B\u00a038, 577\u2013583 (2008)","journal-title":"IEEE Transaction on Systems, Man, and Cybernetics-Part B"},{"doi-asserted-by":"crossref","unstructured":"Pfahringer, B.: Winning the KDD99 Classification Cup: Bagged Boosting. SIGKDD Explorations 1, 65\u201366 (2000)","key":"58_CR17","DOI":"10.1145\/846183.846200"},{"key":"58_CR18","series-title":"IFIP","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/0-387-33406-8_22","volume-title":"Security and Privacy in Dynamic Environments","author":"Y. Bouzida","year":"2006","unstructured":"Bouzida, Y., Cuppens, F.: Detecting Known and Novel Network Intrusions. In: Fischer-H\u00fcbner, S., Rannenberg, K., Yngstr\u00f6m, L., Lindskog, S. (eds.) Security and Privacy in Dynamic Environments. IFIP, vol.\u00a0201, pp. 258\u2013270. Springer, Boston (2006)"},{"unstructured":"The University of Waikato, Weka 3, \n                  \n                    http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/","key":"58_CR19"},{"key":"58_CR20","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"N.V. Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: Synthetic Minority Over-sampling Technique. Journal of Artificial Intelligence Research\u00a016, 321\u2013357 (2002)","journal-title":"Journal of Artificial Intelligence Research"},{"doi-asserted-by":"crossref","unstructured":"Khor, K.C., Ting, C.Y., Phon-Amnuaisuk, S.: Forming an Optimal Feature Set for Classifying Network Intrusions Involving Multiple Feature Selection Methods. In: International Conference on Information Retrieval and Knowledge Management, pp. 178\u2013182 (2010)","key":"58_CR21","DOI":"10.1109\/INFRKM.2010.5466923"},{"doi-asserted-by":"crossref","unstructured":"Chawla, N.V., Hall, L.O., Joshi, A.: Wrapper-based computation and evaluation of sampling methods for imbalanced data sets. In: Proceedings of the 1st International Workshop on Utility-Based Data Mining, pp. 24\u201333 (2005)","key":"58_CR22","DOI":"10.1145\/1089827.1089830"},{"key":"58_CR23","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-56651-6","volume-title":"Pattern Recognition: Concepts, Methods And Applications","author":"J.P.M. S\u00e1 de","year":"2001","unstructured":"de S\u00e1, J.P.M.: Pattern Recognition: Concepts, Methods And Applications. Springer, New York (2001)"},{"unstructured":"Visa, S., Ralescu, A.: Issues in Mining Imbalanced Data Sets - A Review Paper. In: Sixteen Midwest Artificial Intelligence and Cognitive Science Conference, pp. 67\u201373 (2005)","key":"58_CR24"},{"issue":"1","key":"58_CR25","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/1007730.1007734","volume":"6","author":"G.M. Weiss","year":"2004","unstructured":"Weiss, G.M.: Mining with Rarity: A Unifying Framework. ACM SIGKDD Explorations Newsletter\u00a06(1), 7\u201319 (2004)","journal-title":"ACM SIGKDD Explorations Newsletter"},{"unstructured":"Bouzida, Y.: Principal Component Analysis for Intrusion Detection and Supervised Learning for New Attack Detection. PhD Thesis (2006)","key":"58_CR26"}],"container-title":["Advances in Intelligent Systems and Computing","Recent Advances on Soft Computing and Data Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07692-8_58","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T23:06:28Z","timestamp":1558911988000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07692-8_58"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319076911","9783319076928"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07692-8_58","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}