{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:21:54Z","timestamp":1765887714321,"version":"3.41.0"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319229140"},{"type":"electronic","value":"9783319229157"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22915-7_44","type":"book-chapter","created":{"date-parts":[[2015,8,7]],"date-time":"2015-08-07T02:14:54Z","timestamp":1438913694000},"page":"483-495","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Anomaly Detection Through Comparison of Heterogeneous Machine Learning Classifiers vs KPCA"],"prefix":"10.1007","author":[{"given":"Goverdhan Reddy","family":"Jidiga","sequence":"first","affiliation":[]},{"given":"P.","family":"Sammulal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,8]]},"reference":[{"issue":"2","key":"44_CR1","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"13","author":"DE Denning","year":"1987","unstructured":"Denning, D.E.: An intrusion detection model. IEEE Trans. Softw. Eng. 13(2), 222\u2013232 (1987)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"44_CR2","unstructured":"Axelsson, S.: Intrusion Detection Systems: A Survey and Taxonomy. Chalmers University, Technical report, vol. 99(15), March 2000"},{"key":"44_CR3","unstructured":"Lee, W., Stolfo, S.J.: Data mining approaches for intrusion detection. In: 7th USENIX Security Symposium, pp. 79\u201394, Berkeley (1998)"},{"key":"44_CR4","unstructured":"Lane, T., Brodley, C.E.: An application of machine learning to anomaly detection. In: Proceedings of the 20th National Information Systems Security Conference, pp. 366\u2013377, October 1997"},{"key":"44_CR5","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45, 5\u201332 (2001)","journal-title":"Mach. Learn."},{"key":"44_CR6","volume-title":"Artificial Intelligence: A Modern Approach","author":"S Russell","year":"2009","unstructured":"Russell, S., Norvig, P.: Artificial Intelligence: A Modern Approach, 3rd edn. Prentice Hall, Saddle River (2009)","edition":"3"},{"key":"44_CR7","unstructured":"www.mathworks.in\/products\/matlab\/\u200e"},{"key":"44_CR8","unstructured":"UCI Machine Learning Repository. http:\/\/archive.ics.uci.edu\/ml"},{"key":"44_CR9","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1037\/h0071325","volume":"24","author":"H Hotelling","year":"1933","unstructured":"Hotelling, H.: Analysis of a complex statistical variable into principal components. J. Educ. Psychol. 24, 417\u2013441 (1933)","journal-title":"J. Educ. Psychol."},{"key":"44_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/11573937_51","volume-title":"Advanced Parallel Processing Technologies","author":"Z-J Bai","year":"2005","unstructured":"Bai, Z.-J., Chan, R.H., Luk, F.T.: Principal component analysis for distributed data sets with updating. In: Cao, J., Nejdl, W., Xu, M. (eds.) APPT 2005. LNCS, vol. 3756, pp. 471\u2013483. Springer, Heidelberg (2005)"},{"key":"44_CR11","doi-asserted-by":"crossref","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Diagnosing network-wide traffic anomalies. In: Proceedings of ACM Conference, Special Interest Group on Data Communication (2004)","DOI":"10.1145\/1015467.1015492"},{"key":"44_CR12","doi-asserted-by":"crossref","unstructured":"Eskin, E., Arnold, A., Prerau, M.: A Geometric framework for unsupervised anomaly detection: detecting intrusions in unlabeled data. In: Applications of Data Mining in Computer Security (2003)","DOI":"10.1007\/978-1-4615-0953-0_4"},{"key":"44_CR13","doi-asserted-by":"publisher","unstructured":"Lin, C.H., Chun Liu, J.. Ho, C.H.: Anomaly Detection Using LibSVM Training Tools. IEEE, Tunghai University, Taiwan. doi:10.1109\/ISA.2008.12, ISBN-978-0-7695-3126-7\/08 2008","DOI":"10.1109\/ISA.2008.12"},{"key":"44_CR14","volume-title":"Applied Regression Analysis and Multivariable Methods","author":"DG Kleinbaum","year":"1998","unstructured":"Kleinbaum, D.G.: Applied Regression Analysis and Multivariable Methods, 3rd edn. Brooks\/Cole Publishing Company, Pacific Grove (1998)","edition":"3"},{"issue":"3","key":"44_CR15","doi-asserted-by":"publisher","first-page":"863","DOI":"10.1016\/j.patcog.2006.07.009","volume":"40","author":"H Hoffmann","year":"2006","unstructured":"Hoffmann, H.: Kernel PCA for novelty detection. Pattern Recogn. 40(3), 863\u2013874 (2006)","journal-title":"Pattern Recogn."},{"key":"44_CR16","first-page":"299","volume":"2","author":"MG Genton","year":"2001","unstructured":"Genton, M.G.: Classes of kernels for machine learning: a statistics perspective. J. Mach. Learn. Res. 2, 299\u2013312 (2001)","journal-title":"J. Mach. Learn. Res."},{"key":"44_CR17","doi-asserted-by":"publisher","first-page":"1299","DOI":"10.1162\/089976698300017467","volume":"10","author":"B Scholkopf","year":"1998","unstructured":"Scholkopf, B., Smola, A.J., Muller, K.R.: Nonlinear component analysis as a kernel eigenvalue problem. Neural Comput. 10, 1299\u20131319 (1998)","journal-title":"Neural Comput."},{"key":"44_CR18","unstructured":"Jidiga, G.R., Sammulal, P.: Foundations of IDS: focus on role of anomaly detection using machine learning. In: ICACM-2013 Elsevier 2nd International Conference. August 2013. ISBN No: 9789351071495"},{"issue":"1","key":"44_CR19","first-page":"81","volume":"1","author":"JR Quinlan","year":"1986","unstructured":"Quinlan, J.R.: Induction of decision trees. Mach. Learn. 1(1), 81\u2013106 (1986)","journal-title":"Mach. Learn."},{"key":"44_CR20","volume-title":"C4.5: Programs for Machine Learning","author":"JR Quinlan","year":"1993","unstructured":"Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann, LosAltos (1993)"},{"key":"44_CR21","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/0890-5401(89)90010-2","volume":"80","author":"JR Quinlan","year":"1989","unstructured":"Quinlan, J.R., Rivest, R.L.: Inferring decision trees using the minimum description length principle. Inf. Comput. 80, 227\u2013248 (1989)","journal-title":"Inf. Comput."},{"key":"44_CR22","doi-asserted-by":"publisher","first-page":"1587","DOI":"10.1016\/j.eswa.2007.11.051","volume":"36","author":"K Polat","year":"2009","unstructured":"Polat, K., G\u00fcne, S.: A novel hybrid intelligent method based on C4.5 decision tree classifier and one against all approach for multi-class classification problems. Expert Syst. Appl. 36, 1587\u20131592 (2009)","journal-title":"Expert Syst. Appl."},{"key":"44_CR23","doi-asserted-by":"crossref","unstructured":"Yu, M., Ai, T.H.: Study of RS data classification based on rough sets and C4.5 algorithms. In: Proceedings of the SPIE Conference Series (2009)","DOI":"10.1117\/12.838637"},{"key":"44_CR24","unstructured":"Prema, R., Kannan, A.: An active rule approach for network intrusion detection with enhanced C4.5 Algorithm. In: IJCNS, pp. 285\u2013385 (2008)"},{"key":"44_CR25","unstructured":"Ghosh, A., Schwartzbard, A.: A study using NN for anomaly detection and misuse detection. Reliable Software Technologies. http:\/\/www.docshow.net\/ids\/usenix_sec99.zip"},{"key":"44_CR26","unstructured":"http:\/\/eric.univ-lyon2.fr\/~ricco\/sipina.html"},{"key":"44_CR27","first-page":"501","volume":"15","author":"L Daniel","year":"2014","unstructured":"Daniel, L., Davis, J.: Improving Markov network structure learning using decision trees. J. Mach. Learn. Res. 15, 501\u2013532 (2014)","journal-title":"J. Mach. Learn. Res."},{"key":"44_CR28","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1016\/0165-1684(94)90029-9","volume":"36","author":"P Comon","year":"1994","unstructured":"Comon, P.: ICA: a new concept. Signal Process. 36, 287\u2013314 (1994)","journal-title":"Signal Process."},{"key":"44_CR29","volume-title":"Statistical Pattern Recognition","author":"K Fukunaga","year":"1989","unstructured":"Fukunaga, K.: Statistical Pattern Recognition. Academic Press, New York (1989)"},{"key":"44_CR30","unstructured":"Haeb\u2019h, R., Ney, H.: Linear discriminant analysis for improved large vocabulary speech recognition. In: Proceedings of ICASSP 1992, pp. 13\u201316, San Francisco, March 1992"},{"issue":"3","key":"44_CR31","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1109\/72.761722","volume":"10","author":"A Hyvarinen","year":"1999","unstructured":"Hyvarinen, A.: Fast and robust fixed-point algorithms for independent component analysis. IEEE Trans. Neural Netw. 10(3), 626\u2013634 (1999)","journal-title":"IEEE Trans. Neural Netw."},{"key":"44_CR32","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-1904-8","volume-title":"Principal Component Analysis","author":"IJ Jolliffe","year":"1986","unstructured":"Jolliffe, I.J.: Principal Component Analysis. Springer, New York (1986)"},{"key":"44_CR33","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/3-540-44805-5_33","volume-title":"Text, Speech and Dialogue","author":"A Kocsor","year":"2001","unstructured":"Kocsor, A., T\u00f3th, L., Paczolay, D.: A nonlinearized discriminant analysis and its application to speech impediment therapy. In: Matou\u0161ek, V., Mautner, P., Mou\u010dek, R., Tauser, K. (eds.) TSD 2001. LNCS (LNAI), vol. 2166, pp. 249\u2013257. Springer, Heidelberg (2001)"},{"key":"44_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/3-540-45627-9_24","volume-title":"SOFSEM 2001: Theory and Practice of Informatics","author":"A Kocsor","year":"2001","unstructured":"Kocsor, A., Csirik, J.A.: Fast independent component analysis in kernel feature spaces. In: Pacholski, L., Ru\u017ei\u010dka, P. (eds.) SOFSEM 2001. LNCS, vol. 2234, pp. 271\u2013281. Springer, Heidelberg (2001)"},{"key":"44_CR35","first-page":"327","volume-title":"Kernel Principal Component Analysis in Advances in Kernel Methods - Support Vector Learning","author":"B Scholkopf","year":"1999","unstructured":"Scholkopf, B., Smola, A.J., Muller, K.R.: Kernel Principal Component Analysis in Advances in Kernel Methods - Support Vector Learning, pp. 327\u2013352. MIT Press, Cambridge (1999)"},{"key":"44_CR36","doi-asserted-by":"crossref","unstructured":"Siohan, O.: On the robustness of linear discriminant analysis as a preprocessing step for noisy speech recognition. In: Proceedings of ICASSP 1995, pp. 125\u2013128, Detroit, May 1995","DOI":"10.1109\/ICASSP.1995.479289"},{"key":"44_CR37","doi-asserted-by":"crossref","unstructured":"Beveridge, J.R., She, K., Draper, B., Givens, G.H.: A nonparametric statistical comparison of principal component and linear discriminant subspaces for face recognition. In: Proceedings of the IEEE Conference on CVPR, pp. 535\u2013542, USA, December 2001","DOI":"10.1109\/CVPR.2001.990520"},{"issue":"2","key":"44_CR38","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1109\/34.908974","volume":"23","author":"A Martinez","year":"2001","unstructured":"Martinez, A., Kak, A.: PCA versus LDA. IEEE Trans. Pattern Anal. Mach. Intell. 23(2), 228\u2013233 (2001)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"44_CR39","doi-asserted-by":"crossref","unstructured":"Hang, Z., Greenberg, A., Roughan, M.: Network anomography. In: Proceedings of Internet Measurement Conference (IMC) (2005)","DOI":"10.1145\/1330107.1330146"}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22915-7_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T22:26:54Z","timestamp":1748557614000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22915-7_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319229140","9783319229157"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22915-7_44","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"8 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}