{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T01:13:44Z","timestamp":1725844424922},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319264486"},{"type":"electronic","value":"9783319264509"}],"license":[{"start":{"date-parts":[[2015,12,20]],"date-time":"2015-12-20T00:00:00Z","timestamp":1450569600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-26450-9_9","type":"book-chapter","created":{"date-parts":[[2015,12,18]],"date-time":"2015-12-18T19:51:32Z","timestamp":1450468292000},"page":"225-248","source":"Crossref","is-referenced-by-count":3,"title":["Semi-Supervised Classification System for the Detection of Advanced Persistent Threats"],"prefix":"10.1007","author":[{"given":"F\u00e0tima","family":"Barcel\u00f3-Rico","sequence":"first","affiliation":[]},{"given":"Anna I.","family":"Esparcia-Alc\u00e1zar","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Villal\u00f3n-Huerta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,20]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Virvilis, N., Gritzalis, D., Apostolopoulos, T.: Trusted computing versus advanced persistent threats: can a defender win this game?. In: IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 10th International Conference on Autonomic and Trusted Computing (UIC\/ATC) (2013)","DOI":"10.1109\/UIC-ATC.2013.80"},{"key":"9_CR2","unstructured":"Sullivan, D.: Beyond the hype: advanced persistent threats. Technical Report, TrendMICRO, 2011"},{"key":"9_CR3","unstructured":"Lemos, R.: Stuxnet attack more effective than bombs (2011). \n                    http:\/\/goo.gl\/cnthbC"},{"key":"9_CR4","unstructured":"Symantec, W32.duqu\u2014the precursor to the next stuxnet. (2011). \n                    http:\/\/www.symantec.com\/connect\/w32_duqu_precursor_next_stuxnet"},{"issue":"4","key":"9_CR5","doi-asserted-by":"publisher","first-page":"971","DOI":"10.3390\/fi4040971","volume":"4","author":"B Bencsath","year":"2012","unstructured":"Bencsath, B., Pek, G., Buttyan, L., Felegyhazi, M.: The cousins of stuxnet: Duqu, flame, and gauss. Future Internet 4(4), 971\u20131003 (2012)","journal-title":"Future Internet"},{"key":"9_CR6","unstructured":"Labs, K.: \u201cRed october\u201d diplomatic cyber attacks investigation. (2013). \n                    http:\/\/goo.gl\/JbLuOa"},{"key":"9_CR7","unstructured":"Tivadar, M., Balazs, B., Istrate, C.: A closer look at miniduke. (2013). \n                    http:\/\/goo.gl\/YKoupm"},{"key":"9_CR8","unstructured":"Binde, B., McRee, R., OConnor, T.: Assessing outbound traffic to uncover advanced persistent threads, Technical Report, SANS Technology Institute, 2011"},{"key":"9_CR9","unstructured":"Lee, M., Lewis, D.: Clustering disparate attacks: Mapping the activities of the advanced persistent threat. In: Virus Bulletin Conference (2011)"},{"key":"9_CR10","unstructured":"Cutler, T.: The anatomy of an advanced persistent threat (2010). \n                    http:\/\/www.securityweek.com\/anatomy-advanced-persistent-threat"},{"key":"9_CR11","unstructured":"Molok, N., Chang, S., Ahmad, A.: Information leakage through online social networking: opening the doorway for advanced persistence threats. In: Australian Information Security Management Conference (2010)"},{"issue":"3","key":"9_CR12","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 15 (2009)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"10","key":"9_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/MDSO.2005.53","volume":"6","author":"V Kumar","year":"2005","unstructured":"Kumar, V.: Parallel and distributed computing for cybersecurity. IEEE Distrib. Syst. 6(10), 1\u20139 (2005)","journal-title":"IEEE Distrib. Syst."},{"key":"9_CR14","unstructured":"Spence, C., Parra, L., Sajda, P.: Detection, synthesis and compression in mammographic image analysis with a hierarchical image probability model. In: IEEE Workshop on Mathematical Methods in Biomedical Image Analysis (2001)"},{"key":"9_CR15","unstructured":"Aleskerov, E., Freisleben, B., Rao, B.: Cardwatch: A neural network based database mining system for credit card fraud detection. In: IEEE Conference on Computational Intelligence for Financial Engineering (1997)"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Fujimaki, R. Yairi, T., Machida, K.: An approach to spacecraft anomaly detection problem using kernel feature space. In: 11th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining (2005)","DOI":"10.1145\/1081870.1081917"},{"key":"9_CR17","unstructured":"Duda, R.O., Hart, P., Stork, D.: Pattern Classification, Wiley-Interscience (2001)"},{"issue":"1","key":"9_CR18","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/5326.827457","volume":"30","author":"CD Stefano","year":"2000","unstructured":"Stefano, C.D., Sansone, C., Vento, M.: To reject or not to reject: that is the question: an answer in the case of neural classifiers. IEEE Trans. Syst. Man Cybern. 30(1), 84\u201394 (2000)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Barbara, D., Wu, N., Jajodia, S.: Detecting novel network intrusions using bayes estimators. In: 1st SIAM International Conference on Data Mining (2001)","DOI":"10.1137\/1.9781611972719.28"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Eskin, E., Arnold, A., Prerau, M., Portnoy, L., Stolfo, S.: Ageometric framework for unsupervised anomaly detection. In: Conference on Applications of Data Mining in Computer Security, Kluwer Academics (2002)","DOI":"10.1007\/978-1-4615-0953-0_4"},{"key":"9_CR21","unstructured":"Tan, P., Steinbach, M.K.: Introduction to Data Mining, Addison-Wesley (2005)"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Ramaswamy, S., Rastogi, R., Shim, K.: Efficient algorithms for mining outliers from large data sets, In: CMSIGMOD International Conference on Management of Data (2000)","DOI":"10.1145\/342009.335437"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Breunig, M., Kriegel, H. Ng, R. Sander, J.: Lof: Identifying density-based local outliers. In: ACM SIGMOD International Conference on Management of Data (2000)","DOI":"10.1145\/342009.335388"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Guha, S., Rastogi, R., Shim, K.: Rock: A robust clustering algorithm for categorical attributes. In: IEEE 15th International Conference on Data Engineering. vol. 25 no. 5 (1999)","DOI":"10.1016\/S0306-4379(00)00022-3"},{"key":"9_CR25","unstructured":"Eskin, E.: Anomaly detection over noisy data using learned probability distributions, In: 17th International Conference on Machine Learning (2000)"},{"issue":"8","key":"9_CR26","first-page":"687","volume":"212","author":"M Desforges","year":"1998","unstructured":"Desforges, M., Jacob, P., Cooper, J.: Applications of probability density estimation to the detection of abnormal conditions in engineering, institution of Mechanical Engineers. Part C: J. Mech. Eng. Sci. 212(8), 687\u2013703 (1998)","journal-title":"Part C: J. Mech. Eng. Sci."},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Keogh, E., Lonardi, S., Ratanamahatana, C.: Towards parameter-free data mining. In: 10th ACMSIG-KDD International Conference on Knowledge Discovery and Data Mining (2004)","DOI":"10.1145\/1014052.1014077"},{"key":"9_CR28","doi-asserted-by":"crossref","unstructured":"Agovic, A., Banerjee, A., Ganguly, A.: Ch6 Anomaly detection in transportation corridors using manifold embedding. Knowledge Discovery from Sensor Data (2007)","DOI":"10.1201\/9781420082333.ch6"},{"key":"9_CR29","volume-title":"Recent Advances in Intrusion Detection","author":"K Ingham","year":"2007","unstructured":"Ingham, K., Inoue, H.: Comparing anomaly detection techniques for http. Recent Advances in Intrusion Detection. Springer, Berlin (2007)"},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"Kruegel, C., Vigna, G.: Anomaly detection of web-based attacks. In: 10th ACM Conference on Computer and Communications Security (2003)","DOI":"10.1145\/948109.948144"},{"key":"9_CR31","volume-title":"Genetic Programming: On the Programming of Computers by Means of Natural Selection","author":"JR Koza","year":"1992","unstructured":"Koza, J.R.: Genetic Programming: On the Programming of Computers by Means of Natural Selection. MIT Press, Cambridge (1992)"},{"issue":"2","key":"9_CR32","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1109\/TSMCC.2009.2033566","volume":"40","author":"P Espejo","year":"2010","unstructured":"Espejo, P., Ventura, S., Herrera, F.: A survey on the application of genetic programming to classification. IEEE Trans. Syst. Man Cybern. Part C: Appl. Rev. 40(2), 121\u2013144 (2010)","journal-title":"IEEE Trans. Syst. Man Cybern. Part C: Appl. Rev."},{"key":"9_CR33","unstructured":"Lotz, M.: Modelling of process systems with genetic programming. Master\u2019s thesis, University of Stellenbosch (2006)"},{"key":"9_CR34","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0055923","volume-title":"Genetic Programming: An Introduction","author":"W Banzhaf","year":"1998","unstructured":"Banzhaf, W., Nordin, P., Keller, R., Francone, F.: Genetic Programming: An Introduction, vol. 1. Morgan Kaufmann, San Francisco (1998)"},{"key":"9_CR35","unstructured":"Silva, S.: GPLAB A Genetic Programming Toolbox for MATLAB, ECOS - Evolutionary and Complex Systems Group University of Coimbra Portugal, version 3 edn"},{"issue":"3","key":"9_CR36","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/21.97458","volume":"21","author":"S Safavian","year":"1991","unstructured":"Safavian, S., Landgrebe, D.: A survey of decision tree classifier methodology. IEEE Trans. Syst. Man Cybern. 21(3), 660\u2013674 (1991)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"key":"9_CR37","volume-title":"Classification and Regression Trees","author":"L Breiman","year":"1984","unstructured":"Breiman, L., Friedman, J., Stone, C., Olshen, R.: Classification and Regression Trees. CRC press, Boca Raton (1984)"},{"key":"9_CR38","unstructured":"Timofeev, R.: Classification and regression trees (cart) theory and applications. Master\u2019s thesis, Humboldt University, Berlin (2004)"},{"issue":"1","key":"9_CR39","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001)","journal-title":"Mach. Learn."},{"issue":"4","key":"9_CR40","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/5254.708428","volume":"13","author":"M Hearst","year":"1998","unstructured":"Hearst, M., Dumais, S., Osman, E., Platt, J., Scholkopf, B.: Support vector machines. Intell. Syst. Appl. IEEE 13(4), 18\u201328 (1998)","journal-title":"Intell. Syst. Appl. IEEE"},{"issue":"2","key":"9_CR41","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1023\/A:1009715923555","volume":"2","author":"C Burges","year":"1998","unstructured":"Burges, C.: A tutorial on support vector machines for pattern recognition. Data Min. Knowl. Discov. 2(2), 121\u2013167 (1998)","journal-title":"Data Min. Knowl. Discov."},{"key":"9_CR42","doi-asserted-by":"crossref","unstructured":"Alfaro-Cid, E., Sharman, K., Esparcia-Alcazar, A.: A genetic programming approach for bankruptcy prediction using a highly unbalanced database. Applications of Evolutionary Computing, pp. 169\u2013178. Springer, Berlin (2007)","DOI":"10.1007\/978-3-540-71805-5_19"},{"issue":"4","key":"9_CR43","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1162\/evco.1999.7.4.331","volume":"7","author":"D Thierens","year":"1999","unstructured":"Thierens, D.: Scalability problems of simple genetic algorithms. Evol. Comput. 7(4), 331\u2013352 (1999)","journal-title":"Evol. Comput."}],"container-title":["Studies in Computational Intelligence","Recent Advances in Computational Intelligence in Defense and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26450-9_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T21:18:56Z","timestamp":1559337536000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26450-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,20]]},"ISBN":["9783319264486","9783319264509"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26450-9_9","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2015,12,20]]}}}