{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T11:27:08Z","timestamp":1750850828394,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319606170"},{"type":"electronic","value":"9783319606187"}],"license":[{"start":{"date-parts":[[2017,8,19]],"date-time":"2017-08-19T00:00:00Z","timestamp":1503100800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-60618-7_26","type":"book-chapter","created":{"date-parts":[[2017,8,18]],"date-time":"2017-08-18T08:18:30Z","timestamp":1503044310000},"page":"262-269","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Anomaly-Based Network Intrusion Detection: An Outlier Detection Techniques"],"prefix":"10.1007","author":[{"given":"Neeraj","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Upendra","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,19]]},"reference":[{"key":"26_CR1","unstructured":"Gooi, P., et al.: A Survey of Outlier Detection Methods in Network Anomaly Identification (2011). \n                  http:\/\/www.cs.uccs.edu\/~jkalita\/papers\/2011\/GogoiPrasantaComputerJournal.pdf"},{"key":"26_CR2","unstructured":"Rene Beulah, J.: Applying outlier detection techniques in anomaly-based network intrusion systems \u2013 a theoretical analysis. In: International Journal of Computer Applications (0975 \u2013 8887), International Seminar on Computer Vision, ISCV 2013, pp. 6\u20139 (2013)"},{"issue":"1\u20132","key":"26_CR3","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P Garc\u00eda-Teodoro","year":"2009","unstructured":"Garc\u00eda-Teodoro, P., D\u00edaz-Verdejo, J., Maci\u00e1-Fern\u00e1ndez, G., V\u00e1zquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1\u20132), 18\u201328 (2009)","journal-title":"Comput. Secur."},{"key":"26_CR4","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1016\/j.eswa.2005.05.002","volume":"29","author":"O Depren","year":"2005","unstructured":"Depren, O., Topallar, M., Anarim, E., Kemal Ciliz, M.: An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Expert Syst. Appl. 29, 713\u2013722 (2005). Elsevier","journal-title":"Expert Syst. Appl."},{"key":"26_CR5","unstructured":"Manandhar, P., Aung, Z.: Intrusion detection based on outlier detection method. In: International Conference on Intelligent Systems, Data Mining and Information Technology, ICIDIT 2014, Bangkok, Thailand, 21\u201322 April 2014"},{"issue":"3","key":"26_CR6","doi-asserted-by":"publisher","first-page":"15:1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 15:1\u201315:58 (2009)","journal-title":"ACM Comput. Surv."},{"key":"26_CR7","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.jnca.2012.08.007","volume":"36","author":"A Patel","year":"2013","unstructured":"Patel, A., Taghavi, M., Bakhtiyari, K., Ju, J.C.: An intrusion detection and prevention system in cloud computing: a systematic review. J. Netw. Comput. Appl. 36, 25\u201341 (2013). Elsevier","journal-title":"J. Netw. Comput. Appl."},{"key":"26_CR8","doi-asserted-by":"publisher","unstructured":"Chen, C., Lin, X., et al.: ACM, Facebook traffic pattern analytics. In: Proceeding MISNC, SI, DS 2016 Proceedings of the 3rd Multidisciplinary International Social Networks Conference on Social Informatics 2016, Data Science 2016, Article No. 10. ACM, New York, NY, USA\u00a0\u00a92016 (2016). doi:\n                  10.1145\/2955129.2955161\n                  \n                . ISBN: 978-1-4503-4129-5","DOI":"10.1145\/2955129.2955161"},{"key":"26_CR9","unstructured":"Kumar, N., Jha, G., Sharma, K.G.: Density based outlier detection (DBOD) in data mining: a novel approach. In: International Conference at Central University of Bihar, ICRAMSCS 2015 (2015)"},{"key":"26_CR10","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s007780050006","volume":"8","author":"EM Knorr","year":"2000","unstructured":"Knorr, E.M., Ng, R.T., Tucakov, V.: Distance-based outliers: algorithms and applications. VLDB J. 8, 237\u2013253 (2000)","journal-title":"VLDB J."},{"key":"26_CR11","doi-asserted-by":"publisher","unstructured":"Ma, M.X., Ngan, H.Y.T., Liu, W.: Density-based outlier detection by local outlier factor on largescale traffic data. In: 2016 Society for Imaging Science and Technology, IS&T International Symposium on Electronic Imaging 2016 Image Processing: Machine Vision Applications IX, pp. IPMVA-385.1\u2013IPMVA-385.4 (2016). doi:\n                  10.2352\/ISSN.2470-1173.2016.14.IPMVA-385","DOI":"10.2352\/ISSN.2470-1173.2016.14.IPMVA-385"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Xi, J.: Outlier detection algorithms in data mining. In: Second International Symposium on Intelligent Information Technology Application \u00a9 2008 IEEE (2008)","DOI":"10.1109\/IITA.2008.26"},{"issue":"4","key":"26_CR13","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1504\/IJBIDM.2012.051713","volume":"7","author":"Q Jiang","year":"2012","unstructured":"Jiang, Q., Campbell, A., Tang, G., Pei, J.: Multi-level relationship outlier detection. Int. J. Bus. Intell. Data Min. 7(4), 253\u2013273 (2012). doi:\n                  10.1504\/IJBIDM.2012.051713\n                  \n                . Inderscience Publication","journal-title":"Int. J. Bus. Intell. Data Min."},{"key":"26_CR14","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.is.2014.03.001","volume":"44","author":"HD Kunaa","year":"2014","unstructured":"Kunaa, H.D., Martinezb, R.G., Villatoroc, F.R.: Outlier detection in audit logs for application systems. Elsevier J. Inf. Syst. 44, 22\u201333 (2014)","journal-title":"Elsevier J. Inf. Syst."},{"issue":"4","key":"26_CR15","doi-asserted-by":"publisher","first-page":"567","DOI":"10.15837\/ijccc.2016.4.2315","volume":"11","author":"H Yao","year":"2016","unstructured":"Yao, H., Liu, Y., Fang, C.: An abnormal network traffic detection algorithm based on big data analysis. Int. J. Comput. Commun. Control 11(4), 567\u2013579 (2016). ISSN 1841-9836","journal-title":"Int. J. Comput. Commun. Control"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Eighth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2016)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-60618-7_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T00:51:15Z","timestamp":1558140675000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-60618-7_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,19]]},"ISBN":["9783319606170","9783319606187"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-60618-7_26","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,8,19]]},"assertion":[{"value":"19 August 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SoCPaR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Soft Computing and Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vellore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 December 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"socpar2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}