{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:08:45Z","timestamp":1743142125120,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811031526"},{"type":"electronic","value":"9789811031533"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-3153-3_17","type":"book-chapter","created":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T03:13:59Z","timestamp":1489634039000},"page":"169-179","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["PDA-CS: Profile Distance Assessment-Centric Cuckoo Search for Anomaly-Based Intrusion Detection in High-Speed Networks"],"prefix":"10.1007","author":[{"given":"Kanaka Raju","family":"Gariga","sequence":"first","affiliation":[]},{"given":"A. Rama Mohan","family":"Reddy","sequence":"additional","affiliation":[]},{"given":"N. Sambasiva","family":"Rao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,17]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"D.S Bauer, M. K. (1988). NIDX- an expert system for real-time network intrusion detection. Proceedings of the Computer Networking Symposium, 98\u2013106.","DOI":"10.1109\/CNS.1988.4983"},{"key":"17_CR2","unstructured":"Mell, R. B. (2001). Intrusion Detection Systems. NIST Special Publication on Intrusion Detection System."},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"A. Sundaram. (1996). An introduction to intrusion detection. The ACM student magazine.","DOI":"10.1145\/332159.332161"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Denning, D. (1986). An intrusion-detection model. In IEEE computer society symposium on research in security and privacy, 118\u2013131.","DOI":"10.1109\/SP.1986.10010"},{"key":"17_CR5","unstructured":"T.Lane. (2000). Machine Learning techniques for the computer Security. Purdue University."},{"key":"17_CR6","unstructured":"Stolfo, W. L. (1998). Data mining approaches for intrusion detection. Proc. of the 7th USENIX security symposium."},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"W. H. Chen, S. H. (2005). Application of SVM and ANN for intrusion detection. Comput Oper Res Vol-ume 32, Issue 10, 2617\u20132634.","DOI":"10.1016\/j.cor.2004.03.019"},{"key":"17_CR8","unstructured":"Kennedy, J. (2010). Particle swarm optimization. Encyclopedia of Machine Learning, 760\u2013766."},{"key":"17_CR9","unstructured":"Katar, C. (2006). Combining multiple techniques for intrusion detection. Int J Comput Sci Network Security, 208\u2013218."},{"key":"17_CR10","unstructured":"Chen Y, A. A. (2005). Feature deduction and intrusion detection using flexible neural trees. Second IEEE International Symposium on Neural Networks, 2617\u20132634."},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"A. Abraham, R. J. (2007). D-scids: distributed soft computing intrusion detection system. J Network Computer, 81\u201398.","DOI":"10.1016\/j.jnca.2005.06.001"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Hassan, M. M. (2013). Current studies on intrusion detection system, genetic algorithm and fuzzy logic. International Journal of Distributed and Parallel Systems, 35\u201348. Retrieved from arXiv.","DOI":"10.5121\/ijdps.2013.4204"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Sindhu, S. S. (2012). Decision tree based light weight intrusion detection using a wrapper approach. Expert Systems with applications, 129\u2013141.","DOI":"10.1016\/j.eswa.2011.06.013"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Li, Y. X. (2012). An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Systems with Applications, 424\u2013430.","DOI":"10.1016\/j.eswa.2011.07.032"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Bhatti, D. G. (2012). Conceptual Framework for Soft Computing based Intrusion Detection to Reduce False Positive Rate. International Journal of Computer Applications, 1\u20133.","DOI":"10.5120\/6320-8667"},{"key":"17_CR16","unstructured":"ISCX, U. (2012). UNB ISCX Intrusion Detection Evaluation DataSet. Retrieved from Information Security Centre of Excellence: \n                  http:\/\/www.unb.ca\/research\/iscx\/dataset\/iscx-IDS-dataset.html\n                  \n                ."},{"key":"17_CR17","unstructured":"Brunswick, U. o. (n.d.). Information Security Centre of Excellence. Retrieved from University of new Brunswick: \n                  http:\/\/www.unb.ca\/research\/iscx\/index.html\n                  \n                ."},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Goodman, N. R. (1963). Statistical analysis based on a certain multivariate complex Gaussian distribution. Annals of mathematical statistics, 152\u2013177.","DOI":"10.1214\/aoms\/1177704250"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Leys, C. L. (2013). Detecting outliers: do not use standard deviation around the mean, use absolute deviation around the median. Journal of Experimental Social Psychology, 764\u2013766.","DOI":"10.1016\/j.jesp.2013.03.013"},{"key":"17_CR20","unstructured":"Powers, D. M. (2006). Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation. 23rd International conference on machine learning. Pitsburg."}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3153-3_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T14:08:36Z","timestamp":1558447716000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3153-3_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811031526","9789811031533"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3153-3_17","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"17 March 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}