{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T20:36:48Z","timestamp":1725914208098},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319700090"},{"type":"electronic","value":"9783319700106"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-70010-6_69","type":"book-chapter","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T21:02:51Z","timestamp":1509138171000},"page":"750-761","source":"Crossref","is-referenced-by-count":0,"title":["Analyzing and Detecting Network Intrusion Behavior Using Packet Capture"],"prefix":"10.1007","author":[{"given":"Zahidan","family":"Zabri","sequence":"first","affiliation":[]},{"given":"Puteri N. E.","family":"Nohuddin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,29]]},"reference":[{"key":"69_CR1","doi-asserted-by":"crossref","unstructured":"Alfayyadh, B., Ponting, J., Alzomai, M., J\u00f8sang, A.: Vulnerabilities in personal firewalls caused by poor security usability. In: 2010 IEEE International Conference on Information Theory and Information Security (ICITIS) (2010)","DOI":"10.1109\/ICITIS.2010.5689490"},{"key":"69_CR2","doi-asserted-by":"crossref","unstructured":"Stavroulakis, P., Stamp, M.: Handbook of Information and Communication Security (2010)","DOI":"10.1007\/978-3-642-04117-4"},{"key":"69_CR3","doi-asserted-by":"crossref","unstructured":"Peng, X., Zhao, H.: A framework of attacker centric cyber attack behavior analysis. In: 2007 IEEE International Conference on Communications (2007)","DOI":"10.1109\/ICC.2007.243"},{"key":"69_CR4","unstructured":"Portnoy, L., Eskin, E., Stolfo, S.: Intrusion detection with unlabeled data using clustering. Department of Computer Science, Columbia University (2001)"},{"key":"69_CR5","unstructured":"Cecil, A.: A summary of network traffic monitoring and analysis techniques. Whitepaper (2006)"},{"key":"69_CR6","doi-asserted-by":"crossref","unstructured":"Oluwabukola, O., Oludele, A., Ogbonna, A.C., Chigozirim, A., Amarachi, A.: A Packet Sniffer (PSniffer) Application for network security in Java. In: Cohen, E., Boyd, E. (eds.) Proceedings of Informing Science and Information Technology Education Conference 2013, pp. 389\u2013400 (2013)","DOI":"10.28945\/1818"},{"key":"69_CR7","first-page":"185","volume":"2014","author":"Y Turk","year":"2014","unstructured":"Turk, Y., Demir, O., G\u00f6ren, S.: Real time wireless packet monitoring with raspberry Pi sniffer. Inf. Sci. Syst. 2014, 185\u2013192 (2014)","journal-title":"Inf. Sci. Syst."},{"key":"69_CR8","unstructured":"Sondwale, P.P.: Overview of predictive and descriptive data mining techniques. Int. J. Advanced Research in Computer Science and Software Engineering, IJARCSSE, vol. 5 no. 4 (2015)"},{"key":"69_CR9","unstructured":"Bloedorn, E., Christiansen, A.D., Hill, W., Skorupka, C., Talbot, L.M., Tivel, J.: Data mining for network intrusion detection: how to get started (2001)"},{"key":"69_CR10","doi-asserted-by":"crossref","unstructured":"Gupta, D., Singhai, S., Malik, S., Singh, A.: Network intrusion detection system using various data mining techniques. In: IEEE International Conference on Research Advances in Integrated Navigation Systems (RAINS) (2016)","DOI":"10.1109\/RAINS.2016.7764418"},{"key":"69_CR11","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/j.eswa.2011.06.013","volume":"39","author":"S Sindhu","year":"2012","unstructured":"Sindhu, S., Geetha, S., Kannan, A.: Decision tree based light weight intrusion detection using a wrapper approach. Expert Syst. Appl. 39, 129\u2013141 (2012)","journal-title":"Expert Syst. Appl."},{"key":"69_CR12","unstructured":"Aggarwal, M., Amrita: Performance analysis of different feature selection methods in intrusion detection. Int. J. Sci. Technol. Res. 2(6), 225\u2013231 (2013)"},{"key":"69_CR13","first-page":"90","volume":"4","author":"AGK Janecek","year":"2008","unstructured":"Janecek, A.G.K., Gansterer, W.N., Demel, M.A., Ecker, G.F.: On the relationship between feature selection and classification accuracy. J. Mach. Learn. Res. 4, 90\u2013105 (2008)","journal-title":"J. Mach. Learn. Res."},{"key":"69_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1007\/978-3-642-17316-5_35","volume-title":"Advanced Data Mining and Applications","author":"PNE Nohuddin","year":"2010","unstructured":"Nohuddin, P.N.E., Christley, R., Coenen, F., Patel, Y., Setzkorn, C., Williams, S.: Frequent pattern trend analysis in social networks. In: Cao, L., Feng, Y., Zhong, J. (eds.) ADMA 2010. LNCS, vol. 6440, pp. 358\u2013369. Springer, Heidelberg (2010). doi:\n10.1007\/978-3-642-17316-5_35"},{"key":"69_CR15","unstructured":"M\u00fcnz, G., Carle, G.: Traffic anomaly detection using kmeans clustering. In: GI\/ITG Workshop MMBnet (2016)"},{"key":"69_CR16","first-page":"11","volume":"2","author":"T Phutane","year":"2014","unstructured":"Phutane, T., Pathan, A.: A survey of intrusion detection system using different data mining techniques. Int. J. Innov. Res. Comput. Commun. Eng. 2, 11 (2014)","journal-title":"Int. J. Innov. Res. Comput. Commun. Eng."},{"key":"69_CR17","doi-asserted-by":"crossref","unstructured":"Bo, L., Dong-Dong, J.: The research of intrusion detection model based on clustering analysis. In: 2009 International Conference on Computer and Communications Security (2009)","DOI":"10.1109\/ICCCS.2009.40"},{"issue":"2","key":"69_CR18","first-page":"185","volume":"2","author":"H Kaur","year":"2013","unstructured":"Kaur, H., Sing, G., Minhas, J.: A review of machine learning based anomaly detection techniques. Int. J. Comput. Appl. Technol. Res. 2(2), 185\u2013187 (2013)","journal-title":"Int. J. Comput. Appl. Technol. Res."},{"key":"69_CR19","first-page":"6","volume":"9","author":"P Srinivasulu","year":"2009","unstructured":"Srinivasulu, P., Nagaraju, D., Kumar, P.R., Rao, K.N.: Classifying the network intrusion attacks using data mining classification methods and their performance comparison. IJCSNS Int. J. Comput. Sci. Netw. Secur. 9, 6 (2009)","journal-title":"IJCSNS Int. J. Comput. Sci. Netw. Secur."},{"key":"69_CR20","unstructured":"Pervez, S., Ahmad, I., Akram, A., Swati, S.U.: Comparative analysis of artificial neural network technologies in intrusion detection systems. In: Proceedings of 6th WSEAS International Conference on Multimedia, Internet & Video Technologies (2006)"},{"key":"69_CR21","doi-asserted-by":"crossref","unstructured":"Moore, A.W., Zuev, D.: Internet traffic classification using bayesian analysis techniques. In: Proceedings of 2005 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems - SIGMETRICS 2005 (2005)","DOI":"10.1145\/1064212.1064220"},{"key":"69_CR22","first-page":"1","volume":"2","author":"A Gupta","year":"2013","unstructured":"Gupta, A., Kumar, M., Rangra, A., Tiwari, V.K., Saxena, P.: Network intrusion detection types and analysis of their tools. Int. J. Eng. Res. Dev. 2, 1 (2013)","journal-title":"Int. J. Eng. Res. Dev."},{"issue":"6","key":"69_CR23","first-page":"87","volume":"3","author":"A Youssef","year":"2011","unstructured":"Youssef, A., Emam, A.: Network intrusion detection using data mining and network behaviour analysis. Int. J. Comput. Sci. Inf. Technol. 3(6), 87\u201398 (2011)","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"key":"69_CR24","volume-title":"Network Intrusion Detection","author":"S Northcutt","year":"2002","unstructured":"Northcutt, S., Novak, J.: Network Intrusion Detection, 3rd edn. Sams, Indianapolis (2002)","edition":"3"},{"key":"69_CR25","unstructured":"Reelsen, A.: Using Elasticsearch, Logstash and Kibana to Create Realtime Dashboards. Elasticsearch (2014)"},{"key":"69_CR26","unstructured":"Hargrave, V.: Packet Capture with Pyshark and Elasticsearch (2015)"},{"key":"69_CR27","volume-title":"Elasticsearch: The Definitive Guide","author":"C Gormley","year":"2017","unstructured":"Gormley, C., Tong, Z.: Elasticsearch: The Definitive Guide. O\u2019Reilly Media, Inc., Sebastopol (2017)"}],"container-title":["Lecture Notes in Computer Science","Advances in Visual Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-70010-6_69","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T21:36:48Z","timestamp":1509140208000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-70010-6_69"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319700090","9783319700106"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-70010-6_69","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}