{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T14:45:23Z","timestamp":1777301123093,"version":"3.51.4"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319289090","type":"print"},{"value":"9783319289106","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-28910-6_24","type":"book-chapter","created":{"date-parts":[[2016,1,28]],"date-time":"2016-01-28T15:49:44Z","timestamp":1453996184000},"page":"267-278","source":"Crossref","is-referenced-by-count":5,"title":["An Anomaly Detection Model for Network Intrusions Using One-Class SVM and Scaling Strategy"],"prefix":"10.1007","author":[{"given":"Ming","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Boyi","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Dongxia","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,29]]},"reference":[{"key":"24_CR1","unstructured":"Symantec Enterprise.: Internet Security Threat Report 2014. http:\/\/www.symantec.com\/content\/en\/us\/enterprise\/other_resources\/b-istr_main_report_v19_21291018.en-us.pdf . accessed 15 April 2015"},{"key":"24_CR2","unstructured":"Cenzic.: Application Vulnerability Trends Report 2014. http:\/\/www.cenzic.com\/downloads\/Cenzic_Vulnerability_Report_2014.pdf . accessed 15 April 2015"},{"key":"24_CR3","unstructured":"Anderson, J.P.: Computer security threat monitoring and surveillance. vol. 17. Technical report, James P. Anderson Company, Fort Washington, Pennsylvania (1980)"},{"key":"24_CR4","unstructured":"Axelsson, S.: Intrusion detection systems: A survey and taxonomy. vol. 99. Technical report, 2000"},{"key":"24_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-540-45248-5_10","volume-title":"Recent Advances in Intrusion Detection","author":"C Kruegel","year":"2003","unstructured":"Kruegel, C., T\u00f3th, T.: Using decision trees to improve signature-based intrusion detection. In: Vigna, G., Kruegel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, pp. 173\u2013191. Springer, Heidelberg (2003)"},{"issue":"12","key":"24_CR6","doi-asserted-by":"publisher","first-page":"3448","DOI":"10.1016\/j.comnet.2007.02.001","volume":"51","author":"A Patcha","year":"2007","unstructured":"Patcha, A., Park, J.-M.: An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput. Netw. 51(12), 3448\u20133470 (2007)","journal-title":"Comput. Netw."},{"issue":"1","key":"24_CR7","first-page":"463","volume":"4","author":"Y Li","year":"2012","unstructured":"Li, Y., Li, W., Wu, G.: An intrusion detection approach using SVM and multiple kernel method. Int. J Adv. Comput. Technol. IJACT 4(1), 463\u2013469 (2012)","journal-title":"Int. J Adv. Comput. Technol. IJACT"},{"issue":"1","key":"24_CR8","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1016\/j.eswa.2011.07.032","volume":"39","author":"Y Li","year":"2012","unstructured":"Li, Y., et al.: An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Syst. Appl. 39(1), 424\u2013430 (2012)","journal-title":"Expert Syst. Appl."},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Taylor, C., Alves-Foss, J.: Low cost network intrusion detection (2000)","DOI":"10.1016\/S1353-4858(00)10012-1"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Barbara, D., Wu, N., Jajodia, S.: Detecting novel network intrusions using Bayes estimators. In: SDM (2001)","DOI":"10.1137\/1.9781611972719.28"},{"key":"24_CR11","unstructured":"Shyu, M.-L., et al.: A novel anomaly detection scheme based on principal component classifier. Miami Univ Coral Gables FL Dept of Electrical and Computer Engineering (2003)"},{"key":"24_CR12","unstructured":"Qin, M., Hwang, K.: Frequent episode rules for intrusive anomaly detection with internet datamining. In: USENIX Security Symposium (2004)"},{"key":"24_CR13","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"2","author":"DE Denning","year":"1987","unstructured":"Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. 2, 222\u2013232 (1987)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"9","key":"24_CR14","doi-asserted-by":"publisher","first-page":"6225","DOI":"10.1016\/j.eswa.2010.02.102","volume":"37","author":"G Wang","year":"2010","unstructured":"Wang, G., et al.: A new approach to intrusion detection using artificial neural networks and fuzzy clustering. Expert Syst. Appl. 37(9), 6225\u20136232 (2010)","journal-title":"Expert Syst. Appl."},{"key":"24_CR15","unstructured":"Sinclair, C., Pierce, L., Matzner, S.: An application of machine learning to network intrusion detection. In: 15th Annual Computer Security Applications Conference (ACSAC 1999) Proceedings. IEEE (1999)"},{"issue":"10","key":"24_CR16","doi-asserted-by":"publisher","first-page":"11994","DOI":"10.1016\/j.eswa.2009.05.029","volume":"36","author":"C-F Tsai","year":"2009","unstructured":"Tsai, C.-F., et al.: Intrusion detection by machine learning: a review. Expert Syst. Appl. 36(10), 11994\u201312000 (2009)","journal-title":"Expert Syst. Appl."},{"key":"24_CR17","unstructured":"Ryan, J., Lin, M.-J., Miikkulainen, R.: Intrusion detection with neural networks. In: Advances in neural information processing systems 943\u2013949 (1998)"},{"key":"24_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1007\/978-3-540-45235-5_73","volume-title":"Information Networking","author":"DS Kim","year":"2003","unstructured":"Kim, D.S., Park, J.S.: Network-based intrusion detection with support vector machines. In: Kahng, H.-K. (ed.) ICOIN 2003. LNCS, vol. 2662, pp. 747\u2013756. Springer, Heidelberg (2003)"},{"key":"24_CR19","doi-asserted-by":"crossref","unstructured":"Sung, A.H., Mukkamala, S.: Identifying important features for intrusion detection using support vector machines and neural networks. In: 2003 Symposium on Applications and the Internet, Proceedings, pp. 209\u2013216. IEEE (2003)","DOI":"10.1109\/SAINT.2003.1183050"},{"key":"24_CR20","doi-asserted-by":"crossref","unstructured":"Mukkamala, S., Janoski, G., Sung, A.: Intrusion detection using neural networks and support vector machines. In: Proceedings of the 2002 International Joint Conference on Neural Networks, IJCNN 2002. vol. 2. IEEE (2002)","DOI":"10.1007\/978-3-7908-1782-9_10"},{"key":"24_CR21","doi-asserted-by":"crossref","unstructured":"Ambwani, T.: Multi class support vector machine implementation to intrusion detection. In: Proceedings of the International Joint Conference on Neural Networks, vol. 3. IEEE (2003)","DOI":"10.1109\/IJCNN.2003.1223770"},{"issue":"4","key":"24_CR22","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1007\/s00778-006-0002-5","volume":"16","author":"Latifur Khan","year":"2006","unstructured":"Khan, L., Awad, M., Thuraisingham, B.: A new intrusion detection system using support vector machines and hierarchical clustering. Int. J. Very Large Data Bases 16(4), 507\u2013521 (2007)","journal-title":"The VLDB Journal"},{"issue":"1","key":"24_CR23","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1016\/j.eswa.2010.06.066","volume":"38","author":"Shi-Jinn Horng","year":"2011","unstructured":"Horng, S.-J., et al.: A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert Syst. Appl. 38(1), 306\u2013313 (2011)","journal-title":"Expert Systems with Applications"},{"issue":"7","key":"24_CR24","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1162\/089976601750264965","volume":"13","author":"B Sch\u00f6lkopf","year":"2001","unstructured":"Sch\u00f6lkopf, B., et al.: Estimating the support of a high-dimensional distribution. Neural Comput. 13(7), 1443\u20131471 (2001)","journal-title":"Neural Comput."},{"key":"24_CR25","unstructured":"Platt, J.: Sequential minimal optimization: a fast algorithm for training support vector machines (1998)"},{"key":"24_CR26","unstructured":"UCI KDD Archive.: KDDCUP99 dataset. http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/ . accessed 15 April 2015"},{"key":"24_CR27","unstructured":"MIT Lincoln Laboratory.: DARPA Intrusion Detection Data Sets. http:\/\/www.ll.mit.edu\/mission\/communications\/cyber\/CSTcorpora\/ideval\/data\/index.html . accessed 15 April 2015"},{"issue":"1","key":"24_CR28","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/0893-6080(90)90049-Q","volume":"3","author":"DF Specht","year":"1990","unstructured":"Specht, D.F.: Probabilistic neural networks. Neural Netw. 3(1), 109\u2013118 (1990)","journal-title":"Neural Netw."},{"issue":"3","key":"24_CR29","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273\u2013297 (1995)","journal-title":"Mach. Learn."},{"issue":"3","key":"24_CR30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1961189.1961199","volume":"2","author":"Chih-Chung Chang","year":"2011","unstructured":"Chang, C.-C., Lin, C.-J.: LIBSVM : a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2, 27:1\u201327:27 (2011). http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm","journal-title":"ACM Transactions on Intelligent Systems and Technology"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Collaborative Computing: Networking, Applications, and Worksharing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-28910-6_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T07:42:05Z","timestamp":1748763725000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-28910-6_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319289090","9783319289106"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-28910-6_24","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}