{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T15:44:28Z","timestamp":1725983068904},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319905112"},{"type":"electronic","value":"9783319905129"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-90512-9_10","type":"book-chapter","created":{"date-parts":[[2018,7,5]],"date-time":"2018-07-05T14:45:52Z","timestamp":1530801952000},"page":"149-168","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["One-Class Classification of Low Volume DoS Attacks with Genetic Programming"],"prefix":"10.1007","author":[{"given":"Stjepan","family":"Picek","sequence":"first","affiliation":[]},{"given":"Erik","family":"Hemberg","sequence":"additional","affiliation":[]},{"given":"Domagoj","family":"Jakobovic","sequence":"additional","affiliation":[]},{"given":"Una-May","family":"O\u2019Reilly","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,6]]},"reference":[{"key":"10_CR1","unstructured":"IEEE Standard for Floating-Point Arithmetic. IEEE Std 754-2008 pp. 1\u201370 (2008)"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Aggarwal, C.C.: Outlier Analysis. Springer Publishing Company, Incorporated (2013)","DOI":"10.1007\/978-1-4614-6396-2"},{"key":"10_CR3","first-page":"3","volume-title":"Lecture Notes in Computer Science","author":"Van Loi Cao","year":"2016","unstructured":"Cao, V.L., Nicolau, M., McDermott, J.: One-Class Classification for Anomaly Detection with Kernel Density Estimation and Genetic Programming. In: Genetic Programming - 19th European Conference, EuroGP 2016, Porto, Portugal, March 30 - April 1, 2016, Proceedings, pp. 3\u201318 (2016)"},{"issue":"3","key":"10_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1961189.1961199","volume":"2","author":"Chih-Chung Chang","year":"2011","unstructured":"Chang, C.C., Lin, C.J.: LIBSVM: A library for support vector machines. ACM Transactions on Intelligent Systems and Technology 2, 27:1\u201327:27 (2011). Software available at \nhttp:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm","journal-title":"ACM Transactions on Intelligent Systems and Technology"},{"key":"10_CR5","first-page":"1","volume-title":"Lecture Notes in Computer Science","author":"Robert Curry","year":"2009","unstructured":"Curry, R., Heywood, M.I.: One-Class Genetic Programming. In: Genetic Programming, 12th European Conference, EuroGP 2009, T\u00fcbingen, Germany, April 15\u201317, 2009, Proceedings, pp. 1\u201312 (2009)"},{"key":"10_CR6","unstructured":"Eddy, W.M.: Defenses Against TCP SYN Flooding Attacks - The Internet Protocol Journal - Volume 9, Number 4 (2017). URL \nhttp:\/\/www.cisco.com\/c\/en\/us\/about\/press\/internet-protocol-journal\/back-issues\/table-contents-34\/syn-flooding-attacks.html"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Elsayed, S., Sarker, R., Slay, J.: Evaluating the performance of a differential evolution algorithm in anomaly detection. In: 2015 IEEE Congress on Evolutionary Computation (CEC), pp. 2490\u20132497 (2015)","DOI":"10.1109\/CEC.2015.7257194"},{"key":"10_CR8","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/11551188_6","volume-title":"Pattern Recognition and Data Mining","author":"Gianluigi Folino","year":"2005","unstructured":"Folino, G., Pizzuti, C., Spezzano, G.: GP Ensemble for Distributed Intrusion Detection Systems. In: S. Singh, M. Singh, C. Apte, P. Perner (eds.) Pattern Recognition and Data Mining: Third International Conference on Advances in Pattern Recognition, ICAPR 2005, Bath, UK, August 22\u201325, 2005, Proceedings, Part I, pp. 54\u201362. Springer Berlin Heidelberg, Berlin, Heidelberg (2005)"},{"key":"10_CR9","unstructured":"Habibi, A., et al.: UNB ISCX NSL-KDD DataSet (2017). URL \nhttp:\/\/nsl.cs.unb.ca\/NSL-KDD\/"},{"key":"10_CR10","unstructured":"Jakobovic, D., et al.: Evolutionary Computation Framework (2016). URL \nhttp:\/\/ecf.zemris.fer.hr\/"},{"key":"10_CR11","unstructured":"Khan, S.S., Madden, M.G.: One-Class Classification: Taxonomy of Study and Review of Techniques. CoRR abs\/1312.0049 (2013). URL \nhttp:\/\/arxiv.org\/abs\/1312.0049"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Kuzmanovic, A., Knightly, E.W.: Low-rate tcp-targeted denial of service attacks: the shrew vs. the mice and elephants. In: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 75\u201386. ACM (2003)","DOI":"10.1145\/863955.863966"},{"key":"10_CR13","first-page":"212","volume-title":"Applied Cryptography and Network Security","author":"Xiejun Ni","year":"2016","unstructured":"Ni, X., He, D., Chan, S., Ahmad, F.: Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak Clustering. In: M. Manulis, A.R. Sadeghi, S. Schneider (eds.) Applied Cryptography and Network Security: 14th International Conference, ACNS 2016, Guildford, UK, June 19\u201322, 2016. Proceedings, pp. 212\u2013227. Springer International Publishing, Cham (2016)"},{"key":"10_CR14","first-page":"93","volume-title":"Lecture Notes in Computer Science","author":"Agustin Orfila","year":"2009","unstructured":"Orfila, A., Estevez-Tapiador, J.M., Ribagorda, A.: Evolving High-Speed, Easy-to-Understand Network Intrusion Detection Rules with Genetic Programming. In: M. Giacobini, A. Brabazon, S. Cagnoni, G.A. Di Caro, A. Ek\u00e1rt, A.I. Esparcia-Alc\u00e1zar, M. Farooq, A. Fink, P. Machado (eds.) Applications of Evolutionary Computing: EvoWorkshops 2009: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoINTERACTION, EvoMUSART, EvoNUM, EvoSTOC, EvoTRANSLOG, T\u00fcbingen, Germany, April 15\u201317, 2009. Proceedings, pp. 93\u201398. Springer Berlin Heidelberg, Berlin, Heidelberg (2009)"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Overton, M.L.: Numerical Computing with IEEE Floating Point Arithmetic. Society for Industrial and Applied Mathematics, Philadelphia, PA, USA (2001)","DOI":"10.1137\/1.9780898718072"},{"key":"10_CR16","unstructured":"Poli, R., Langdon, W.B., McPhee, N.F.: A field guide to genetic programming. Published via \nhttp:\/\/lulu.com\n\n and freely available at \nhttp:\/\/www.gp-field-guide.org.uk\n\n (2008). (With contributions by J. R. Koza)"},{"key":"10_CR17","unstructured":"R Development Core Team: R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria (2008). URL \nhttp:\/\/www.R-project.org\n\n. ISBN 3-900051-07-0"},{"issue":"7","key":"10_CR18","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1162\/089976601750264965","volume":"13","author":"B Sch\u00f6lkopf","year":"2001","unstructured":"Sch\u00f6lkopf, B., Platt, J.C., Shawe-Taylor, J.C., Smola, A.J., Williamson, R.C.: Estimating the Support of a High-Dimensional Distribution. Neural Comput. 13(7), 1443\u20131471 (2001)","journal-title":"Neural Comput."},{"issue":"3","key":"10_CR19","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.cose.2011.12.012","volume":"31","author":"A Shiravi","year":"2012","unstructured":"Shiravi, A., Shiravi, H., Tavallaee, M., Ghorbani, A.A.: Toward Developing a Systematic Approach to Generate Benchmark Datasets for Intrusion Detection. Comput. Secur. 31(3), 357\u2013374 (2012)","journal-title":"Comput. Secur."},{"issue":"3","key":"10_CR20","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1109\/TEVC.2004.841683","volume":"9","author":"D Song","year":"2005","unstructured":"Song, D., Heywood, M.I., Zincir-Heywood, A.N.: Training genetic programming on half a million patterns: an example from anomaly detection. IEEE Trans. Evolutionary Computation 9(3), 225\u2013239 (2005)","journal-title":"IEEE Trans. Evolutionary Computation"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A Detailed Analysis of the KDD CUP 99 Data Set. In: Proceedings of the Second IEEE International Conference on Computational Intelligence for Security and Defense Applications, CISDA\u201909, pp. 53\u201358. IEEE Press, Piscataway, NJ, USA (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"To, C., Elati, M.: A Parallel Genetic Programming for Single Class Classification. In: Proceedings of the 15th Annual Conference Companion on Genetic and Evolutionary Computation, GECCO \u201813 Companion, pp. 1579\u20131586. ACM, New York, NY, USA (2013)","DOI":"10.1145\/2464576.2466811"},{"issue":"10","key":"10_CR23","doi-asserted-by":"publisher","first-page":"11,994","DOI":"10.1016\/j.eswa.2009.05.029","volume":"36","author":"CF Tsai","year":"2009","unstructured":"Tsai, C.F., Hsu, Y.F., Lin, C.Y., Lin, W.Y.: Intrusion detection by machine learning: A review. Expert Systems with Applications 36(10), 11,994\u201312,000 (2009)","journal-title":"Expert Systems with Applications"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Wang, W., Gombault, S., Guyet, T.: Towards Fast Detecting Intrusions: Using Key Attributes of Network Traffic. In: Proceedings of the 2008 The Third International Conference on Internet Monitoring and Protection, ICIMP \u201808, pp. 86\u201391. IEEE Computer Society, Washington, DC, USA (2008)","DOI":"10.1109\/ICIMP.2008.13"},{"issue":"1","key":"10_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.asoc.2009.06.019","volume":"10","author":"SX Wu","year":"2010","unstructured":"Wu, S.X., Banzhaf, W.: The Use of Computational Intelligence in Intrusion Detection Systems: A Review. Appl. Soft Comput. 10(1), 1\u201335 (2010)","journal-title":"Appl. Soft Comput."},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Zargari, S., Voorhis, D.: Feature Selection in the Corrected KDD-dataset. In: 2012 Third International Conference on Emerging Intelligent Data and Web Technologies, pp. 174\u2013180 (2012)","DOI":"10.1109\/EIDWT.2012.10"}],"container-title":["Genetic and Evolutionary Computation","Genetic Programming Theory and Practice XV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-90512-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,5]],"date-time":"2018-07-05T14:56:54Z","timestamp":1530802614000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-90512-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319905112","9783319905129"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-90512-9_10","relation":{},"ISSN":["1932-0167"],"issn-type":[{"type":"print","value":"1932-0167"}],"subject":[],"published":{"date-parts":[[2018]]}}}