{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:58:01Z","timestamp":1773511081513,"version":"3.50.1"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319907741","type":"print"},{"value":"9783319907758","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-90775-8_10","type":"book-chapter","created":{"date-parts":[[2018,5,8]],"date-time":"2018-05-08T08:43:57Z","timestamp":1525769037000},"page":"116-126","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["An Approach for Host-Based Intrusion Detection System Design Using Convolutional Neural Network"],"prefix":"10.1007","author":[{"given":"Nam Nhat","family":"Tran","sequence":"first","affiliation":[]},{"given":"Ruhul","family":"Sarker","sequence":"additional","affiliation":[]},{"given":"Jiankun","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,9]]},"reference":[{"key":"10_CR1","unstructured":"A Guide to TF Layers: Building a Convolutional Neural Network. https:\/\/www.tensorflow.org\/tutorials\/layers . Accessed 08 Mar 2017"},{"key":"10_CR2","unstructured":"A path to unsupervised learning through adversarial networks. https:\/\/code.facebook.com\/posts\/1587249151575490\/a-path-to-unsupervised-learning-through-adversarial-networks\/ . Accessed 03 Mar 2017"},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.jnca.2015.11.016","volume":"60","author":"M Ahmed","year":"2016","unstructured":"Ahmed, M., Mahmood, A.N., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19\u201331 (2016)","journal-title":"J. Netw. Comput. Appl."},{"key":"10_CR4","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1016\/j.ins.2016.04.019","volume":"378","author":"Rana Aamir Raza Ashfaq","year":"2017","unstructured":"Ashfaq, R.A.R., et al.: Fuzziness based semi-supervised learning approach for intrusion detection system. Inf. Sci. 378, 484\u2013497 (2017)","journal-title":"Information Sciences"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Canzanese, R., Mancoridis, S., Kam, M.: System call-based detection of malicious processes. In: 2015 IEEE International Conference on Software Quality, Reliability and Security (QRS), pp. 119\u2013124. IEEE (2015)","DOI":"10.1109\/QRS.2015.26"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Ciregan, D., Meier, U., Schmidhuber, J.: Multi-column deep neural networks for image classification. In: 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 3642\u20133649. IEEE (2012)","DOI":"10.1109\/CVPR.2012.6248110"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Ciresan, D.C., et al.: Convolutional neural network committees for handwritten character classification. In: 2011 International Conference on Document Analysis and Recognition (ICDAR), pp. 1135\u20131139. IEEE (2011)","DOI":"10.1109\/ICDAR.2011.229"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Collobert, R., Weston, J.: A unified architecture for natural language processing: deep neural networks with multitask learning. In: Proceedings of the 25th International Conference on Machine Learning, pp. 160\u2013167. ACM (2008)","DOI":"10.1145\/1390156.1390177"},{"key":"10_CR9","unstructured":"Convolutional Neural Networks Matlab Documentation. https:\/\/au.mathworks.com\/help\/nnet\/convolutional-neural-networks.html . Accessed 08 Mar 2017"},{"key":"10_CR10","unstructured":"DARPA Intrusion Detection Data Sets. https:\/\/www.ll.mit.edu\/ideval\/data\/ . Accessed 28 Feb 2017"},{"issue":"10","key":"10_CR11","doi-asserted-by":"publisher","first-page":"2279","DOI":"10.1016\/S0031-3203(01)00178-9","volume":"35","author":"M. Egmont-Petersen","year":"2002","unstructured":"Egmont-Petersen, M., de Ridder, D., Handels, H.: Image processing with neural networks\u2014a review. Pattern Recogn. 35(10), 2279\u20132301 (2002)","journal-title":"Pattern Recognition"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Fan, S., et al.: A dynamic on-line sliding window support vector machine for tunnel settlement prediction. In: 2013 3rd International Conference on Computer Science and Network Technology (ICCSNT), pp. 547\u2013551. IEEE (2013)","DOI":"10.1109\/ICCSNT.2013.6967173"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Forrest, S., Hofmeyr, S., Somayaji, A.: The evolution of system-call monitoring. In: Annual Computer Security Applications Conference, ACSAC 2008, pp. 418\u2013430. IEEE (2008)","DOI":"10.1109\/ACSAC.2008.54"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Forrest, S., et al.: A sense of self for unix processes. In: Proceedings of 1996 IEEE Symposium on Security and Privacy, pp. 120\u2013128. IEEE (1996)","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Graves, A., Mohamed, A., Hinton, G.: Speech recognition with deep recurrent neural networks. In: 2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 6645\u20136649. IEEE (2013)","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"10_CR16","unstructured":"Hoang, X.D., Hu, J., Bertok, P.: A multi-layer model for anomaly intrusion detection using program sequences of system calls. In: Proceedings of 11th IEEE International Conference. Citeseer (2003)"},{"issue":"3","key":"10_CR17","doi-asserted-by":"publisher","first-page":"151","DOI":"10.3233\/JCS-980109","volume":"6","author":"Steven A. Hofmeyr","year":"1998","unstructured":"Hofmeyr, S.A., Forrest, S., Somayaji, A.: Intrusion detection using sequences of system calls. J. Comput. Secur. 6(3), 151\u2013180 (1998)","journal-title":"Journal of Computer Security"},{"issue":"1","key":"10_CR18","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1016\/j.eswa.2010.06.066","volume":"38","author":"Shi-Jinn Horng","year":"2011","unstructured":"Horng, S.-J., et al.: A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert Syst. Appl. 38(1), 306\u2013313 (2011)","journal-title":"Expert Systems with Applications"},{"key":"10_CR19","unstructured":"Introducing DeepText: Facebook\u2019s text understanding engine. https:\/\/code.facebook.com\/posts\/181565595577955\/introducing-deeptext-facebook-s-text-understanding-engine\/ . Accessed 03 Mar 2017"},{"key":"10_CR20","unstructured":"Intrusion Detection System. https:\/\/en.wikipedia.org\/w\/index.php?title=Intrusion_detection_system . Accessed 30 Nov 2016"},{"key":"10_CR21","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1016\/j.procs.2015.07.250","volume":"56","author":"Manar Jaradat","year":"2015","unstructured":"Jaradat, M., et al.: The internet of energy: smart sensor networks and big data management for smart grid. Procedia Comput. Sci. 56, 592\u2013597 (2015)","journal-title":"Procedia Computer Science"},{"key":"10_CR22","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.eswa.2016.04.012","volume":"59","author":"Y Kaneda","year":"2016","unstructured":"Kaneda, Y., Mineno, H.: Sliding window-based support vector regression for predicting micrometeorological data. Expert Syst. Appl. 59, 217\u2013225 (2016)","journal-title":"Expert Syst. Appl."},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Karpathy, A., et al.: Large-scale video classification with convolutional neural networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1725\u20131732 (2014)","DOI":"10.1109\/CVPR.2014.223"},{"key":"10_CR24","unstructured":"KDD Cup 1999 Data. http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html . Accessed 28 Feb 2017"},{"issue":"4","key":"10_CR25","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/s00778-006-0002-5","volume":"16","author":"L Khan","year":"2007","unstructured":"Khan, L., Awad, M., Thuraisingham, B.: A new intrusion detection system using support vector machines and hierarchical clustering. VLDB J. Int. J. Very Large Data Bases 16(4), 507\u2013521 (2007)","journal-title":"VLDB J. Int. J. Very Large Data Bases"},{"key":"10_CR26","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems, pp. 1097\u20131105 (2012)"},{"issue":"5","key":"10_CR27","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1016\/S0167-4048(02)00514-X","volume":"21","author":"Yihua Liao","year":"2002","unstructured":"Liao, Y., Vemuri, V.R.: Use of k-nearest neighbor classifier for intrusion detection. Comput. Secur. 21(5), 439\u2013448 (2002)","journal-title":"Computers & Security"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Mukkamala, S., Janoski, G., Sung, A.: Intrusion detection using neural networks and support vector machines. In: Proceedings of the 2002 International Joint Conference on Neural Networks, IJCNN 2002, vol. 2, pp. 1702\u20131707. IEEE (2002)","DOI":"10.1109\/IJCNN.2002.1007774"},{"key":"10_CR30","doi-asserted-by":"crossref","unstructured":"Mukkamala, S., Sung, A.H.: Detecting denial of service attacks using support vector machines. In: The 12th IEEE International Conference on Fuzzy Systems, FUZZ 2003, vol. 2, pp. 1231\u20131236. IEEE (2003)","DOI":"10.1109\/FUZZ.2003.1206607"},{"key":"10_CR31","unstructured":"Next Generation Intrusion Detection Systems Data Set (NGIDS-DS): Overview. https:\/\/research.unsw.edu.au\/sites\/all\/files\/facultyadmin\/ngids-ds_overview_final.pdf . Accessed 28 Feb 2017"},{"key":"10_CR32","unstructured":"NSL-KDD Data Set. http:\/\/www.unb.ca\/cic\/research\/datasets\/nsl.html . Accessed 28 Feb 2017"},{"key":"10_CR33","unstructured":"Rectifier (neural networks). https:\/\/en.wikipedia.org\/wiki\/Rectifier_(neural_networks) . Accessed Mar 2017"},{"key":"10_CR34","doi-asserted-by":"publisher","first-page":"1615","DOI":"10.1016\/j.procs.2014.08.245","volume":"35","author":"Yuya Suzuki","year":"2014","unstructured":"Suzuki, Y., et al.: Proposal to sliding window-based support vector regression. Procedia Comput. Sci. 35, 1615\u20131624 (2014)","journal-title":"Procedia Computer Science"},{"key":"10_CR35","unstructured":"System Call Definition. http:\/\/www.linfo.org\/system_call.html . Accessed 01 Feb 2017"},{"key":"10_CR36","unstructured":"The ADFA Linux Dataset (ADFA-LD). https:\/\/www.unsw.adfa.edu.au\/australian-centre-for-cyber-security\/cybersecurity\/ADFA-IDS-Datasets\/ . Accessed 28 Feb 2017"},{"key":"10_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1007\/978-3-319-11698-3_44","volume-title":"Network and System Security","author":"M Xie","year":"2014","unstructured":"Xie, M., Hu, J., Yu, X., Chang, E.: Evaluating host-based anomaly detection systems: application of the frequency-based algorithms to ADFA-LD. In: Au, M.H., Carminati, B., Kuo, C.-C.J. (eds.) NSS 2014. LNCS, vol. 8792, pp. 542\u2013549. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11698-3_44"},{"key":"10_CR38","unstructured":"Zhang, Y., Wallace, B.: A sensitivity analysis of (and practitioners\u2019 guide to) convolutional neural networks for sentence classification. In: arXiv preprint arXiv:1510.03820 (2015)"},{"key":"10_CR39","doi-asserted-by":"crossref","unstructured":"Zuech, R., Khoshgoftaar, T.M., Wald, R.: Intrusion detection and big heterogeneous data: a survey. J. Big Data 2(1), 3 (2015)","DOI":"10.1186\/s40537-015-0013-4"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile Networks and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-90775-8_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,17]],"date-time":"2019-10-17T18:09:50Z","timestamp":1571335790000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-90775-8_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319907741","9783319907758"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-90775-8_10","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}