{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T13:40:05Z","timestamp":1746279605085,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":42,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662436158"},{"type":"electronic","value":"9783662436165"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43616-5_9","type":"book-chapter","created":{"date-parts":[[2014,6,26]],"date-time":"2014-06-26T08:04:57Z","timestamp":1403769897000},"page":"225-247","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Multilayer Machine Learning-Based Intrusion Detection System"],"prefix":"10.1007","author":[{"given":"Amira Sayed A.","family":"Aziz","sequence":"first","affiliation":[]},{"given":"Aboul Ella","family":"Hassanien","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,6,27]]},"reference":[{"key":"9_CR1","unstructured":"Teller, T.: The Biggest Cybersecurity Threats of 2013, Forbes magazine, May 2012"},{"key":"9_CR2","unstructured":"2013 Cisco Annual Security Report, Cisco Systems"},{"key":"9_CR3","unstructured":"Worldwide Infrastructure Security Report, 2012 vol. VIII, ARBOR Networks"},{"issue":"1","key":"9_CR4","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.jnca.2005.06.003","volume":"30","author":"S Peddabachigari","year":"2007","unstructured":"Peddabachigari, S., Abraham, A., Grosan, C., Thomas, J.: Modeling intrusion detection system using hybrid intelligent systems. J. Netw. Comput. Appl. 30(1), 114\u2013132 (2007)","journal-title":"J. Netw. Comput. Appl."},{"key":"9_CR5","unstructured":"Farid, D., Harbi, N., Rahman, M.Z.: Combining naive bayes and decision tree for adaptive intrusion detection. arXiv, preprint arXiv:1005.4496 (2010)"},{"issue":"7","key":"9_CR6","doi-asserted-by":"publisher","first-page":"918","DOI":"10.1016\/j.patrec.2008.01.008","volume":"29","author":"C Xiang","year":"2008","unstructured":"Xiang, C., Yong, P.C., Meng, L.S.: Design of multiple-level hybrid classifier for intrusion detection system using Bayesian clustering and decision trees. Pattern Recogn. Lett. 29(7), 918\u2013924 (2008)","journal-title":"Pattern Recogn. Lett."},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Omar, S., Ngadi, A., Jebur, H.H.: An adaptive intrusion detection model based on machine learning techniques. Int. J. Comput. Appl. 70 (2013)","DOI":"10.5120\/11971-6640"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Mukkamala, S., Janoski, G., Sung, A.: Intrusion detection using neural networks and support vector machines. In: Proceedings of the 2002 International Joint Conference on Neural Networks, IJCNN\u201902, IEEE, vol. 2, pp. 1702\u20131707 (2002)","DOI":"10.1109\/IJCNN.2002.1007774"},{"key":"9_CR9","unstructured":"Aleksandar, L., Vipin, K., Jaideep, S.: Intrusion detection: a survey. In: Kumar, V. et al. (eds.) Managing Cyber Threats Issues, Approaches, and Challenges, vol. 5, pp. 19\u201378 (2005)"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Murali, A., Roa, M.: A survey on intrusion detection approaches. First International Conference on Information and Communication Technologies. pp. 233\u2013240 (2005)","DOI":"10.1109\/ICICT.2005.1598592"},{"issue":"1\u20132","key":"9_CR11","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P Garcia-Teodora","year":"2009","unstructured":"Garcia-Teodora, P., Diaz-Verdejo, J., Macia-Fernandez, G., Vazquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1\u20132), 18\u201328 (2009)","journal-title":"Comput. Secur."},{"key":"9_CR12","unstructured":"Li, W.: Using genetic algorithm for network intrusion detection. Proceedings of the United States Department of Energy Cyber Security Grou, Training Conference vol. 8, pp. 24\u201327 (2004)"},{"key":"9_CR13","unstructured":"Sinclair, C., Pierce, L., Matzner, S.: An application of machine learning to network intrusion detection. In: Proceedings of 15th Annual Computer Security Applications Conference, ACSAC\u201999, pp. 371\u2013377, IEEE (1999)"},{"key":"9_CR14","volume-title":"Principal Component Analysis","author":"I Jolliffe","year":"2005","unstructured":"Jolliffe, I.: Principal Component Analysis. John Wiley & Sons Ltd, New York (2005)"},{"key":"9_CR15","unstructured":"Smith, L.I.: A tutorial on principal components analysis. Cornell University, USA vol. 51, pp. 52 (2002)"},{"key":"9_CR16","unstructured":"Hofmeyr, S.A., Forrest, S.: Immunity by design: an artificial immune system. Proceedings of Genetic and Evolutionary Computation Conference, pp. 1289\u20131296 (1999)"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Aickelin, U., Dasgupta, D.: Artificial immune systems tutorial. In: Burke, E., Kendall, G. (eds.) Search Methodologies Introductory Tutorials in Optimization and Decision Support Techniques. Kluwer, pp. 375\u2013399 (2005)","DOI":"10.1007\/0-387-28356-0_13"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Greensmith, J., Whitbrook, A., Aickelin, U.: Artificial immune systems. Handbook of Metaheuristics, pp. 421\u2013448. Springer, US (2010)","DOI":"10.1007\/978-1-4419-1665-5_14"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Forrest, S.: Self-nonself discrimination in a computer. IEEE Computer Society Symposium on Research in Security and Privacy, pp. 202\u2013212 (1994)","DOI":"10.1109\/RISP.1994.296580"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Shen, X., Gao, X.Z., Bie, R., Jin, X.: Artificial immune networks: models and applications. International Conference on Computational Intelligence and Security, vol. 1, pp. 394\u2013397 (2006)","DOI":"10.1109\/ICCIAS.2006.294161"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Galeano, G.C., Veloza-Suan, A., Gonzalez, F.A.: A comparative analysis of artificial immune network models. Proceedings of the Conference on Genetic and Evolutionary Computation, GECCO \u201905, pp. 361\u2013368 (2005)","DOI":"10.1145\/1068009.1068066"},{"issue":"2","key":"9_CR22","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/s10462-011-9206-1","volume":"36","author":"BH Ulutas","year":"2011","unstructured":"Ulutas, B.H., Kulturel-Konak, S.: A review of clonal selection algorithm and its applications. Artif. Intell. Rev. 36(2), 117\u2013138 (2011)","journal-title":"Artif. Intell. Rev."},{"key":"9_CR23","unstructured":"Iqbal, A., Maarof, M.A.: Danger theory and intelligent data processing. World Academy of Science, Engineering and Technology vol. 3 (2005)"},{"key":"9_CR24","unstructured":"Aickelin, U., Cayzer, S.: The danger theory and its application to artificial immune systems. Computing Research Repository\u2014CORR 0801.3 (2008)"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Greensmith, J., Aickelin, U., Cayzer, S.: Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection. Proceedings ICARIS-2005, 4th International Conference on Artificial Immune Systems, LNCS 3627, pp. 153\u2013167, Springer (2005)","DOI":"10.1007\/11536444_12"},{"key":"9_CR26","unstructured":"de Castro, L.N., Timmis, J.: Artificial Immune System: A Novel Paradigm to Pattern Recognition. University of Paisley, vol. 2, pp. 67\u201384 (2002)"},{"key":"9_CR27","unstructured":"de Castro, L.N., Von Zuben, F.J.: Artificial Immune Systems: Part I Basic Theory and Applications, pp. 57\u201358. Springer, Berlin (1999)"},{"key":"9_CR28","unstructured":"Burke, E.K., Kendall, G. (eds.): Search Methodologies: Introductory Tutorials in Optimization and Decision Support Techniques. Springer, Berlin (2005)"},{"key":"9_CR29","unstructured":"Middlemiss, M.: Positive and Negative Selection in a Multilayer Artificial Immune System. The Information Science Discussion Paper Series 2006\/03, University of Otago (2006)"},{"key":"9_CR30","unstructured":"Dasgupta, D.: Immunity-based intrusion detection system: a general framework. In: Proceedings of the 22nd NISSC vol. 1, pp. 147\u2013160 (1999)"},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"Liang, G., Li, T., Ni, J., Jiang, Y., Yang, J., Gong, X.: An immunity-based dynamic multilayer intrusion detection system. In Computational Intelligence and Bioinformatics, pp. 641\u2013650. Springer, Berlin (2006)","DOI":"10.1007\/11816102_68"},{"key":"9_CR32","doi-asserted-by":"crossref","unstructured":"Aziz, A.S.A., Hassanien, A.E., Azar, A.T., Hanafi, S.E.O.: Machine learning techniques for anomalies detection and classification. Advances in Security of Information and Communication Networks, pp. 219\u2013229. Springer, Berlin (2013)","DOI":"10.1007\/978-3-642-40597-6_19"},{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"Aziz, A.S.A., Hassanien, A.E., Hanafy, S.E.O., Tolba M.F.: Multi-layer hybrid machine learning techniques for anomalies detection and classification approach (2013)","DOI":"10.1109\/HIS.2013.6920485"},{"key":"9_CR34","unstructured":"A. Aziz, A.S., Salama, M.A., Hassanien, A.E., Hanafy, S.E.O.: Artificial Immune System Inspired Intrusion Detection System Using Genetic Algorithm. Special Issue: Advances in Network Systems Guest Editors: Andrzej Chojnacki vol. 36, pp. 347\u2013357 (2012)"},{"key":"9_CR35","doi-asserted-by":"crossref","unstructured":"Aziz, A.S.A., Azar, A.T., Hassanien, A.E., Hanafi, S.E.O.: Continuous features discretizaion for anomaly intrusion detectors generation. In: WSC17 2012 Online Conference on Soft Computing in Industrial Applications (2012)","DOI":"10.1007\/978-3-319-00930-8_19"},{"issue":"3","key":"9_CR36","doi-asserted-by":"crossref","first-page":"309","DOI":"10.3233\/IDA-2005-9306","volume":"9","author":"TM Khoshgoftaar","year":"2005","unstructured":"Khoshgoftaar, T.M., Gao, K., Ibrahim, N.H.: Evaluating indirect and direct classification techniques for network intrusion detection. Intell. Data Anal. 9(3), 309\u2013326 (2005)","journal-title":"Intell. Data Anal."},{"key":"9_CR37","first-page":"249","volume":"31","author":"SB Kotsiantis","year":"2007","unstructured":"Kotsiantis, S.B.: Supervised machine learning: a review of classification techniques. Informatica 31, 249\u2013268 (2007)","journal-title":"Informatica"},{"key":"9_CR38","doi-asserted-by":"crossref","unstructured":"Krugel, C., Toth, T.: Using decision trees to improve signature-based intrusion detection. In: Recent Advances in Intrusion Detection, pp. 173\u2013191. Springer, Berlin (2003)","DOI":"10.1007\/978-3-540-45248-5_10"},{"key":"9_CR39","unstructured":"Mitchell, T.M.: Machine Learning. McGraw Hill, Burr Ridge (1997)"},{"key":"9_CR40","unstructured":"NSL-KDD Intrusion Detection data set, http:\/\/iscx.ca\/NSL-KDD\/ March 2009"},{"key":"9_CR41","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani A.A.: A detailed analysis of the KDD CUP 99 data set. In: Proceedings of the Second IEEE Symposium on Computational Intelligence for Security and Defence Applications (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"9_CR42","unstructured":"KDD Cup\u201999 Intrusion Detection data set, Available on: http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html Oct 2007"}],"container-title":["Intelligent Systems Reference Library","Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43616-5_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T13:26:02Z","timestamp":1746278762000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-43616-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662436158","9783662436165"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43616-5_9","relation":{},"ISSN":["1868-4394","1868-4408"],"issn-type":[{"type":"print","value":"1868-4394"},{"type":"electronic","value":"1868-4408"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"27 June 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}