{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:07:12Z","timestamp":1742926032284,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":38,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789048136612"},{"type":"electronic","value":"9789048136629"}],"license":[{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-90-481-3662-9_86","type":"book-chapter","created":{"date-parts":[[2010,1,30]],"date-time":"2010-01-30T11:23:45Z","timestamp":1264850625000},"page":"501-505","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Data Mining Based Network Intrusion Detection System: A Survey"],"prefix":"10.1007","author":[{"given":"Rasha G. Mohammed","family":"Helali","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,12,12]]},"reference":[{"key":"86_CR1","unstructured":"Zhu, Dan, Premkumar, G, Zhang, Xiaoning, Chu, Chao-Hsien (2001) A comparison of alternative methods. [Online] Available from: http:\/\/findarticles.com\/p\/articles\/mi_qa3713\/is_200110\/ai_n8954240."},{"key":"86_CR2","unstructured":"Marinova V,(2007) A Short Survey of Intrusion Detection Systems*, problems of engineering cybernetics and robotics, 58."},{"key":"86_CR3","unstructured":"Brugger ,T(June 9, 2004) University of California, Davis Data Mining Methods for Network Intrusion Detection 1...56."},{"issue":"1","key":"86_CR4","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/273244.273257","volume":"17","author":"C. Kuok","year":"2001","unstructured":"Kuok C., Fu A., Wong M.,(2001) \u201cMining fuzzy association rules in databases\u201d SIGMOD Record 17 (1) 41\u201346.","journal-title":"SIGMOD Record"},{"key":"86_CR5","doi-asserted-by":"crossref","unstructured":"Julisch, K. & Dacier, M. (2002). Mining Intrusion Detection Alarms for Actionable Knowledge. Proc. of SIGKDD02, 366\u2013375.","DOI":"10.1145\/775047.775101"},{"key":"86_CR6","unstructured":"Dunham M (2003) Data mining Introductory and advance Topics, Pearson Education. Inc."},{"issue":"10","key":"86_CR7","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/262793.262811","volume":"40","author":"S. Forrest","year":"1997","unstructured":"Forrest, S., S. A. Hofmeyr, and A. Somayaji (1997, October). Computer immunology. Communications of the ACM 40 (10), 88\u201396.","journal-title":"Communications of the ACM"},{"key":"86_CR8","unstructured":"Hofmeyr, S. A. and S. Forrest (1999). Immunizing computer networks: Getting all the machines in your network to fight the hacker disease. In Proc. of the 1999 IEEE Symp. on Security and Privacy, Oakland, CA. IEEE Computer Society Press."},{"key":"86_CR9","unstructured":"Dokas P., Ertoz L.(2002), Data Mining for Network intrusion detection ,- Proc.NFS workshop on next generation data mining , csee.umbc.edu , 21\u201329."},{"issue":"4","key":"86_CR10","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1145\/382912.382914","volume":"3","author":"W. Lee","year":"2000","unstructured":"Lee, W. and S. J. Stolfo (2000). A framework for constructing features and models for intrusion detection systems. Information and System Security 3 (4), 227\u2013261.","journal-title":"Information and System Security"},{"key":"86_CR11","unstructured":"Chandola V, Eilertson E, Ertoz L, Simon G, and Kumar V,, Data Mining for Cyber Security,(2006) Data Warehousing and Data Mining Techniques for Computer Security, editor Anoop Singhal, Springer."},{"key":"86_CR12","unstructured":"Lee, W. K. W. Mok, and S. J. Stolfo(1998). Mining sequential patterns: Techniques, visualization, and applications. Submitted for publication, August 1998.1\u20139."},{"key":"86_CR13","unstructured":"Ert\u00a8oz, L , Eilertson, E, Aleksandar Lazarevic, Pang-Ning Tan_ , Vipin Kumar (2004) MINDS - Minnesota Intrusion Detection System , Technical report at university of Minnesota 1..21."},{"key":"86_CR14","unstructured":"Chittur, A. (2001). Model generation for an intrusion detection system using genetic algorithms. High School Honors Thesis, Ossining High School. In cooperation with Columbia University, 3 \u2013 19."},{"key":"86_CR15","doi-asserted-by":"crossref","unstructured":"Neri, F. (2000a, 16\u201319 July). Comparing local search with respect to genetic evolution to detect intrusion in computer networks. In Proc. of the 2000 Congress on Evolutionary Computation CEC00, La Jolla, CA, pp. 238\u2013 243. IEEE Press.","DOI":"10.1109\/CEC.2000.870301"},{"key":"86_CR16","unstructured":"Fan, W. (2001). Cost-Sensitive, Scalable and Adaptive Learning Using Ensemble- based Methods. Ph. D. thesis, Columbia Univ."},{"key":"86_CR17","doi-asserted-by":"crossref","unstructured":"Yeung, D.-Y. And C. Chow (2002, 11\u201315 August). Parzen- window network intrusion detectors. In Proc. of the Sixteenth International Conference on Pattern Recognition, Volume 4, Quebec City, Canada, pp. 385\u2013388. IEEE Computer Society.","DOI":"10.1109\/ICPR.2002.1047476"},{"key":"86_CR18","unstructured":"Peng, \u2020. T, Zuo, W,(February 2006) IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.2B."},{"key":"86_CR19","unstructured":"Phua1C, lee1 V, Smith1 K & ross gayler2, A Comprehensive Survey of Data Mining-based Fraud Detection Research Final version 2: 9\/02\/2005"},{"key":"86_CR20","doi-asserted-by":"crossref","unstructured":"Mukkamala, S., A. H. Sung, and A. Abraham (2002). Identifying key variables for intrusion detection using soft computing. http:\/\/citeseer.nj.nec.com\/544845.html.","DOI":"10.1007\/978-3-540-44999-7_23"},{"issue":"2","key":"86_CR21","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/TSMCC.2002.801356","volume":"32","author":"S. Cho","year":"2002","unstructured":"Cho, S. (2002). Incorporating Soft Computing Techniques into a Probabilitistic Intrusion Detection System. IEEE Transactions on Systems, Man and Cybernetics 32(2): 154\u2013160.","journal-title":"IEEE Transactions on Systems, Man and Cybernetics"},{"key":"86_CR22","unstructured":"Lee, W., S. J. Stolfo, P. K. Chan, E. Eskin, W. Fan, M. Miller, S. Hershkop, and J. Zhang (2001, June). Real time data mining- based intrusion detection. In Proc. Second DARPA Information Survivability Conference and Exposition, Anaheim, CA, pp. 85\u2013100. IEEE Computer Society."},{"key":"86_CR23","unstructured":"Jiawei, H, and Micheline Kamber(2001). Data Mining:Concepts and Techniques. Higher Educa-tion Press,3\u201310"},{"key":"86_CR24","doi-asserted-by":"crossref","unstructured":"Sequeira, K. & Zaki, M. (2002). ADMIT: Anomaly-based Data Mining for Intrusions. Proc. of SIGKDD02, 386\u2013395.","DOI":"10.1145\/775047.775103"},{"key":"86_CR25","unstructured":"Fortuna c, Fortuna b, mohor\u010di\u010d m,(2007) anomaly detection in computer networks using linear svms"},{"key":"86_CR26","doi-asserted-by":"crossref","unstructured":"Hawkins, S., He, H., Williams, G. & Baxter, R. (2002). Outlier Detection Using Replicator Neural Networks. Proc. of DaWaK2002, 170\u2013180.","DOI":"10.1007\/3-540-46145-0_17"},{"key":"86_CR27","doi-asserted-by":"crossref","unstructured":"Williams, G., Baxter, R., He, H. & Hawkins, S. (2002). A Comparative Study of RNN for Outlier Detection in Data Mining. Proc. of ICDM02, 709\u2013712.","DOI":"10.1109\/ICDM.2002.1184035"},{"key":"86_CR28","unstructured":"Lee W. Salvatore J. Stolfo Kui W. Mok.(1999) A Data Mining Framework for Building Intrusion Detection Models (1This research is supported in part by grants from DARPA (F30602\u201396-1\u20130311) and NSF (IRI-96\u201332225 and CDA-96\u201325374).submitted to the 1999 IEEE Symposium on Security and Privacy."},{"key":"86_CR29","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1023\/A:1021830128811","volume":"51","author":"T. Lane","year":"2003","unstructured":"Lane, T. & Brodley, C. (2003). An Empirical Study of Two Approaches to Sequence Learning for Anomaly Detection. Machine Learning 51:73\u2013107.","journal-title":"Machine Learning"},{"key":"86_CR30","unstructured":"Didaci, L., G. Giacinto, and F. Roli (2002). Ensemble learning for intrusion detection in computer networks. http:\/\/citeseer.nj.nec.com\/533620.html."},{"key":"86_CR31","unstructured":"Bloedorn E, Alan D. Christiansen, William Hill, Clement Skorupka, Lisa M. Talbot, and Jonathan Tivel(2002). Data mining for network intrusion detection: How to get started. Technical report, The MITRE Corporation, 2001. 1\u20139."},{"key":"86_CR32","unstructured":"Minnesota university, Minnesota Intrusion Detection System.[Online] Available from: www.cs.umn.edu\/research\/MINDS [Accessed 15 November 2007] ."},{"key":"86_CR33","doi-asserted-by":"crossref","unstructured":"Rajeswari, L. Prema; Kannan, A., (4\u20136 Jan. 2008) An Intrusion Detection System Based on Multiple Level Hybrid Classifier using Enhanced C4.5 , Communications and Networking, 2008. ICSCN apos, International Conference, Page(s):75 \u2013 79.","DOI":"10.1109\/ICSCN.2008.4447164"},{"key":"86_CR34","unstructured":"Idris , N, Shanmugam ,B, (2006) Novel Attack Detection Using Fuzzy Logic and Data Mining. Security and Management: 26\u201331."},{"key":"86_CR35","unstructured":"Prasad G, Dhanalakshmi Y, Dr.Vijaya V Kumar Dr Babu R, Modeling An Intrusion Detection System Using Data Mining And Genetic Algorithms Based On Fuzzy Logic, IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.7, July 2008."},{"key":"86_CR36","unstructured":"Dhanalakshmi and Babu,(February 2008) Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms, IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.2."},{"key":"86_CR37","doi-asserted-by":"crossref","unstructured":"Cheung-Leung Lui\u2009\u2009 Tak-Chung Fu\u2009\u2009Ting-Yee Cheung\u2009Agent-based network intrusion detection system using data mining approaches, Information Technology and Applications, 2005. ICITA 2005.Publication Date: 4\u20137 July 2005: 131- 136 vol.1, ISBN: 0\u20137695-2316\u20131.","DOI":"10.1109\/ICITA.2005.57"},{"key":"86_CR38","unstructured":"Barto\u0161 K, Grill M, Krm\u00ed\u02c7cek V, Reh\u00e1k M, Celeda P,(July 2008) Flow Based Network Intrusion Detection System using Hardware-Accelerated NetFlow Probes, abriela Kr\u02c7cma\u02c7rov\u00e1, Petr Sojka (Eds.): CESNET Conference 2008, Proceedings, pp. 49\u201356."}],"container-title":["Novel Algorithms and Techniques in Telecommunications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-90-481-3662-9_86","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T03:13:51Z","timestamp":1739762031000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-90-481-3662-9_86"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12,12]]},"ISBN":["9789048136612","9789048136629"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-90-481-3662-9_86","relation":{},"subject":[],"published":{"date-parts":[[2009,12,12]]},"assertion":[{"value":"12 December 2009","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}