{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:50:00Z","timestamp":1743108600905,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176494"},{"type":"electronic","value":"9783642176500"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17650-0_32","type":"book-chapter","created":{"date-parts":[[2010,12,6]],"date-time":"2010-12-06T10:22:11Z","timestamp":1291630931000},"page":"459-471","source":"Crossref","is-referenced-by-count":3,"title":["A Two-Tier System for Web Attack Detection Using Linear Discriminant Method"],"prefix":"10.1007","author":[{"given":"Zhiyuan","family":"Tan","sequence":"first","affiliation":[]},{"given":"Aruna","family":"Jamdagni","sequence":"additional","affiliation":[]},{"given":"Xiangjian","family":"He","sequence":"additional","affiliation":[]},{"given":"Priyadarsi","family":"Nanda","sequence":"additional","affiliation":[]},{"given":"Ren Ping","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wenjing","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Wei-chang","family":"Yeh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","unstructured":"Corporation, M.: Common vulnerabilities and exposures, \n                    \n                      http:\/\/cve.mitre.org\/\n                    \n                    \n                   (accessed June 16, 2006)"},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Kay, J.: Low Volume Viruses: New Tools for Criminals. Network Security, 16\u201318 (2005)","DOI":"10.1016\/S1353-4858(05)70249-X"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Denning, D.E.: An Intrusion-detection Model. IEEE Transactions on Software Engineering, 222\u2013232 (2006)","DOI":"10.1109\/TSE.1987.232894"},{"key":"32_CR4","unstructured":"TippingPoint, \n                    \n                      http:\/\/www.tippingpoint.com\/"},{"key":"32_CR5","doi-asserted-by":"publisher","first-page":"2435","DOI":"10.1016\/S1389-1286(99)00112-7","volume":"31","author":"V. Paxson","year":"1999","unstructured":"Paxson, V.: Bro: A System for Detecting Network Intruders in Real-time. Computer Networks\u00a031, 2435\u20132463 (1999)","journal-title":"Computer Networks"},{"key":"32_CR6","doi-asserted-by":"publisher","first-page":"3448","DOI":"10.1016\/j.comnet.2007.02.001","volume":"51","author":"A. Patcha","year":"2007","unstructured":"Patcha, A., Park, J.M.: An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends. Computer Networks\u00a051, 3448\u20133470 (2007)","journal-title":"Computer Networks"},{"key":"32_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-540-30143-1_11","volume-title":"Recent Advances in Intrusion Detection","author":"K. Wang","year":"2004","unstructured":"Wang, K., Stolfo, S.J.: Anomalous Payload-based Network Intrusion Detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol.\u00a03224, pp. 203\u2013222. Springer, Heidelberg (2004)"},{"key":"32_CR8","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1145\/952532.952601","volume-title":"The 2003 ACM Symposium on Applied Computing","author":"M.V. Mahoney","year":"2003","unstructured":"Mahoney, M.V.: Network Traffic Anomaly Detection Based on Packet Bytes. In: The 2003 ACM Symposium on Applied Computing, pp. 346\u2013350. ACM, New York (2003)"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Shih, H.C., Ho, J.H., Chang, C.P., Pan, J.S., Liao, B.Y., Kuo, T.H.: Detection of Network Attack and Intrusion Using PCA-ICA. In: 3rd International Conference on Innovative Computing Information and Control, p. 564(2008)","DOI":"10.1109\/ICICIC.2008.225"},{"key":"32_CR10","first-page":"173","volume":"6","author":"S. Singh","year":"2009","unstructured":"Singh, S., Silakari, S.: Generalized Discriminant Analysis Algorithm for Feature Reduction in Cyber Attack Detection System. International Journal of Computer Science and Information Security\u00a06, 173\u2013180 (2009)","journal-title":"International Journal of Computer Science and Information Security"},{"key":"32_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/11937807_13","volume-title":"Information Security and Cryptology","author":"Y. Chen","year":"2006","unstructured":"Chen, Y., Li, Y., Cheng, X.Q., Guo, L.: Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System. In: Lipmaa, H., Yung, M., Lin, D. (eds.) Inscrypt 2006. LNCS, vol.\u00a04318, pp. 153\u2013167. Springer, Heidelberg (2006)"},{"key":"32_CR12","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1145\/508791.508835","volume-title":"The 2002 ACM Symposium on Applied Computing","author":"C. Krugel","year":"2002","unstructured":"Krugel, C., Toth, T., Kirda, E.: Service Specific Anomaly detection for Network Intrusion Detection. In: The 2002 ACM Symposium on Applied Computing, pp. 201\u2013208. ACM, New York (2002)"},{"key":"32_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/11856214_12","volume-title":"Recent Advances in Intrusion Detection","author":"K. Wang","year":"2006","unstructured":"Wang, K., Parekh, J., Stolfo, S.: Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. In: Zamboni, D., Kr\u00fcgel, C. (eds.) RAID 2006. LNCS, vol.\u00a04219, pp. 226\u2013248. Springer, Heidelberg (2006)"},{"key":"32_CR14","doi-asserted-by":"crossref","unstructured":"Nwanze, N., Summerville, D.: Detection of Anomalous Network Packets Using Lightweight Stateless Payload Inspection. In: The 33rd IEEE Conference on Local Computer Networks, pp. 911\u2013918 (2008)","DOI":"10.1109\/LCN.2008.4664303"},{"key":"32_CR15","first-page":"1","volume-title":"IEEE Globecom 2010 Workshop on Web and Pervasive Security","author":"Z. Tan","year":"2010","unstructured":"Tan, Z., Jamdagni, A., Nanda, P., He, X.: Network Intrusion Detection Based on LDA for Payload Feature Selection. In: IEEE Globecom 2010 Workshop on Web and Pervasive Security, pp. 1\u20135. IEEE Press, Los Alamitos (2010) (to appear)"},{"key":"32_CR16","first-page":"1193","volume-title":"The 6th International Wireless Communications and Mobile Computing Conference","author":"A. Jamdagni","year":"2010","unstructured":"Jamdagni, A., Tan, Z., Nanda, P., He, X., Liu, R.: Intrusion Detection Using GSAD Model for HTTP Traffic on Web Services. In: The 6th International Wireless Communications and Mobile Computing Conference, pp. 1193\u20131197. ACM, New York (2010)"},{"key":"32_CR17","unstructured":"1999 DARPA Intrusion Detection Evaluation Data Set, \n                    \n                      http:\/\/www.ll.mit.edu\/mission\/communications\/ist\/corpora\/ideval\/data\/1999data.html"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17650-0_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:16:32Z","timestamp":1566764192000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17650-0_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176494","9783642176500"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17650-0_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}