{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T14:44:39Z","timestamp":1776869079227,"version":"3.51.2"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319982038","type":"print"},{"value":"9783319982045","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-98204-5_11","type":"book-chapter","created":{"date-parts":[[2018,7,26]],"date-time":"2018-07-26T07:40:12Z","timestamp":1532590812000},"page":"130-141","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Network Intrusion Detection on Apache Spark with Machine Learning Algorithms"],"prefix":"10.1007","author":[{"given":"Elif Merve","family":"Kurt","sequence":"first","affiliation":[]},{"given":"Ya\u015far","family":"Becerikli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,27]]},"reference":[{"key":"11_CR1","unstructured":"\u00c7evik, M.: Intrusion detection with pattern classification. Ph.D. thesis, Istanbul Technical University, Institute of Science and Technology (2005)"},{"key":"11_CR2","unstructured":"Becerikli, Y.: Advanced pattern recognition. Doctorate Lecture, Computer Engineering Departmant, Kocaeli University, Kocaeli, Turkey (2016)"},{"issue":"Supplement C","key":"11_CR3","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1016\/j.procs.2016.07.238","volume":"93","author":"GP Gupta","year":"2016","unstructured":"Gupta, G.P., Kulariya, M.: A framework for fast and efficient cyber security network intrusion detection using apache spark. Procedia Comput. Sci. 93(Supplement C), 824\u2013831 (2016)","journal-title":"Procedia Comput. Sci."},{"issue":"9","key":"11_CR4","doi-asserted-by":"publisher","first-page":"197","DOI":"10.3390\/sym9090197","volume":"9","author":"K Siddique","year":"2017","unstructured":"Siddique, K., Akhtar, Z., Lee, H.G., Kim, W., Kim, Y.: Toward bulk synchronous parallel-based machine learning techniques for anomaly detection in high-speed big data networks. Symmetry 9(9), 197 (2017)","journal-title":"Symmetry"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-319-61845-6_7","volume-title":"Data Mining and Big Data","author":"S Harifi","year":"2017","unstructured":"Harifi, S., Byagowi, E., Khalilian, M.: Comparative study of apache spark MLlib clustering algorithms. In: Tan, Y., Takagi, H., Shi, Y. (eds.) DMBD 2017. LNCS, vol. 10387, pp. 61\u201373. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-61845-6_7"},{"key":"11_CR6","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"590","DOI":"10.1007\/978-3-319-61542-4_58","volume-title":"Innovative Mobile and Internet Services in Ubiquitous Computing","author":"H-DJ Jeong","year":"2018","unstructured":"Jeong, H.-D.J., et al.: A search for computationally efficient supervised learning algorithms of anomalous traffic. In: Barolli, L., Enokido, T. (eds.) IMIS 2017. AISC, vol. 612, pp. 590\u2013600. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-319-61542-4_58"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Oh, S.W., Kim, H.S., Lee, H.S., Kim, S.J., Park, H., You, W.: Study on the multi-modal data preprocessing for knowledge-converged super brain. In: 2016 International Conference on Information and Communication Technology Convergence (ICTC), pp. 1088\u20131093. IEEE (2016)","DOI":"10.1109\/ICTC.2016.7763375"},{"key":"11_CR8","unstructured":"Lightning-fast cluster computing. \nhttps:\/\/spark.apache.org\/\n\n. Accessed 14 Mar 2018"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2009, pp. 1\u20136. IEEE (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"11_CR10","unstructured":"Intrusion Detector Learning. \nhttp:\/\/archive.ics.uci.edu\/ml\/machine-learning-databases\/kddcup99-mld\/task.html\n\n. Accessed 08 Jan 2018"},{"key":"11_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3264-1","volume-title":"The Nature of Statistical Learning Theory","author":"V Vapnik","year":"2013","unstructured":"Vapnik, V.: The Nature of Statistical Learning Theory. Springer, New York (2013). \nhttps:\/\/doi.org\/10.1007\/978-1-4757-3264-1"},{"key":"11_CR12","volume-title":"Data Mining Methods","author":"Y \u00d6zkan","year":"2008","unstructured":"\u00d6zkan, Y.: Data Mining Methods. Papatya Publishing, Istanbul (2008)"},{"key":"11_CR13","volume-title":"Support Vector Machines: Training and Applications","author":"E Osuna","year":"1997","unstructured":"Osuna, E., Freund, R., Girosi, F.: Support Vector Machines: Training and Applications. Massachusetts Institute of Technology, Cambridge (1997)"},{"key":"11_CR14","unstructured":"P\u00f6yh\u00f6nen, S.: Support vector machine based classification in condition monitoring of induction motors. Helsinki University of Technology (2004)"},{"key":"11_CR15","unstructured":"Ilhan Omurca, S.: Machine learning. Master Lecture, Computer Engineering Departmant, Kocaeli University, Kocaeli, Turkey (2016)"},{"key":"11_CR16","doi-asserted-by":"publisher","first-page":"139","DOI":"10.9733\/jgg.241212.1t","volume":"1","author":"\u00d6 Akar","year":"2012","unstructured":"Akar, \u00d6., G\u00fcng\u00f6r, O.: Classification of multispectral images using random forest algorithm. J. Geod. Geoinf. 1, 139\u2013146 (2012)","journal-title":"J. Geod. Geoinf."},{"key":"11_CR17","unstructured":"\u00d6zdar\u0131c\u0131 Ok, A., Akar, \u00d6., G\u00fcng\u00f6r, O.: Classification of crops in agricultural lands using random forest classification method. In: TUFUAB 2011 VI. Technical Symposium, Antalya, Turkey (2011)"},{"issue":"4","key":"11_CR18","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1016\/j.patrec.2005.08.011","volume":"27","author":"PO Gislason","year":"2006","unstructured":"Gislason, P.O., Benediktsson, J.A., Sveinsson, J.R.: Random forests for land cover classification. Pattern Recogn. Lett. 27(4), 294\u2013300 (2006)","journal-title":"Pattern Recogn. Lett."},{"issue":"1","key":"11_CR19","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1080\/01431160412331269698","volume":"26","author":"M Pal","year":"2005","unstructured":"Pal, M.: Random forest classifier for remote sensing classification. Int. J. Remote Sens. 26(1), 217\u2013222 (2005)","journal-title":"Int. J. Remote Sens."},{"key":"11_CR20","unstructured":"Breiman, L.: Manual on setting up, using, and understanding random forests v3.1. Statistics Department, University of California Berkeley, CA, USA (2002)"},{"issue":"4","key":"11_CR21","doi-asserted-by":"publisher","first-page":"2249","DOI":"10.1016\/j.csda.2007.08.015","volume":"52","author":"KJ Archer","year":"2008","unstructured":"Archer, K.J., Kimes, R.V.: Empirical characterization of random forest variable importance measures. Comput. Stat. Data Anal. 52(4), 2249\u20132260 (2008)","journal-title":"Comput. Stat. Data Anal."},{"issue":"1","key":"11_CR22","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001)","journal-title":"Mach. Learn."},{"key":"11_CR23","first-page":"45","volume":"06","author":"MAM Hasan","year":"2014","unstructured":"Hasan, M.A.M., Nasser, M., Pal, B., Ahmad, S.: Support vector machine and random forest modeling for intrusion detection system (IDS). J. Intell. Learn. Syst. Appl. 06, 45\u201352 (2014)","journal-title":"J. Intell. Learn. Syst. Appl."}],"container-title":["Communications in Computer and Information Science","Engineering Applications of Neural Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-98204-5_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,26]],"date-time":"2018-07-26T07:45:38Z","timestamp":1532591138000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-98204-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319982038","9783319982045"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-98204-5_11","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}