{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:16:27Z","timestamp":1766578587157,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":45,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811310553"},{"type":"electronic","value":"9789811310560"}],"license":[{"start":{"date-parts":[[2018,7,24]],"date-time":"2018-07-24T00:00:00Z","timestamp":1532390400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-1056-0_48","type":"book-chapter","created":{"date-parts":[[2018,7,23]],"date-time":"2018-07-23T16:30:31Z","timestamp":1532363431000},"page":"475-484","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Anomaly Detection Using Agglomerative Hierarchical Clustering Algorithm"],"prefix":"10.1007","author":[{"given":"Fokrul Alom","family":"Mazarbhuiya","sequence":"first","affiliation":[]},{"given":"Mohammed Y.","family":"AlZahrani","sequence":"additional","affiliation":[]},{"given":"Lilia","family":"Georgieva","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,24]]},"reference":[{"key":"48_CR1","unstructured":"Hartigan JA (1975) Clustering algorithms. Wiley"},{"key":"48_CR2","unstructured":"Gibson D, Kleinberg J, Raghavan P (1998) Clustering categorical data: an approach based on dynamical systems. In: Proceedings of the 24th international conference on very large databases, New York, pp 311\u2013323"},{"key":"48_CR3","first-page":"144","volume-title":"Efficient and effective clustering methods for spatial data mining","author":"RT Ng","year":"1994","unstructured":"Ng RT, Han J (1994) Efficient and effective clustering methods for spatial data mining. Santiago, Chile, In Proc. of the VLDB Conf, pp 144\u2013155"},{"key":"48_CR4","doi-asserted-by":"crossref","unstructured":"Ganti V, Gehrke J, Ramakrishnan R (1999) CACTUS-clustering categorical data using summaries. In: Proceedings of the international conference on knowledge discovery and data mining, San Diego, CA, USA, pp 73\u201383","DOI":"10.1145\/312129.312201"},{"key":"48_CR5","doi-asserted-by":"crossref","unstructured":"Guha S, Rastogi R, Shim K, Rock (1999) A robust clustering algorithm for categorical attributes. In: Proceedings of the IEEE international conference on data engineering, Sydney, pp 512\u2013521","DOI":"10.1109\/ICDE.1999.754967"},{"key":"48_CR6","doi-asserted-by":"crossref","unstructured":"Pamula R, Deka JK, Nandi S (2011) An outlier detection method based on clustering. In: Proceedings of 2011 second international conference on emerging applications of information technology, India, Feb 2011, pp 253\u2013256","DOI":"10.1109\/EAIT.2011.25"},{"key":"48_CR7","doi-asserted-by":"crossref","unstructured":"Zhang Y, Liu J, Li H (2010) An outlier detection algorithm based on clustering analysis. In: The proceedings of 2010 first international conference on pervasive computing, signal processing and applications, China, Sept 2010","DOI":"10.1109\/PCSPA.2010.277"},{"key":"48_CR8","unstructured":"Sharma D (2011) Fuzzy clustering as an intrusion detection technique. Int J Comput Sci Commun Netw 1(1), 69\u201375"},{"key":"48_CR9","unstructured":"Xie L, Wang Y, Chen L, Yue G (2010) An anomaly detection method based on fuzzy c-means clustering algorithms. In: Proceedings of the second symposium on networking and network security, China, pp 89\u201392"},{"key":"48_CR10","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1016\/S1389-1286(98)00017-6","volume":"31","author":"H Debar","year":"1999","unstructured":"Debar H, Dacier M, Wespi A (1999) Towards a taxonomy of intrusion detection systems. Comput Netw 31:805\u2013822","journal-title":"Comput Netw"},{"key":"48_CR11","volume-title":"Intrusion detection: network security beyond the firewall","author":"T Escamilla","year":"1998","unstructured":"Escamilla T (1998) Intrusion detection: network security beyond the firewall. Wiley, New York"},{"key":"48_CR12","unstructured":"Munz G, Li S, Carle G (2007) Traffic anomaly detection using k-means clustering. Allen Institute for Artificial Intelligence"},{"key":"48_CR13","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-3-642-31513-8_14","volume-title":"Advances in Computing and Information Technology","author":"Nur Al Hasan Haldar","year":"2012","unstructured":"Haldar NA, Abulaish M, Pasha SA (2012) A statistical pattern mining approach for identifying wireless network intruders. In: Advances in Intelligent Systems and Computing: Preface, July 2012, pp 131\u2013140"},{"key":"48_CR14","unstructured":"Linquan X, Ying W, Liping C, Guangxue Y (2010) An anomaly detection method based on fuzzy c-means clustering algorithm. In: Proceedings of the second international symposium on networking and network security, China, Apr 2010, pp 089\u2013092"},{"issue":"1","key":"48_CR15","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1093\/comjnl\/9.1.60","volume":"9","author":"GN Lance","year":"1966","unstructured":"Lance GN, Williams WT (1966) Computer programs for hierarchical polythetic classification (\u201csimilarity analysis\u201d). Comput J 9(1):60\u201364","journal-title":"Comput J"},{"key":"48_CR16","unstructured":"Lance GN, Williams WT (1967) Mixed-data classificatory programs I agglomerative systems. Aust Comput J 15\u201320"},{"key":"48_CR17","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/B978-0-12-176750-1.50006-3","volume-title":"An Introduction to Numerical Classification","author":"H.T. CLIFFORD","year":"1975","unstructured":"Clifford TH, Stephenson W (1975) An introduction to numerical classification. Academic Press. New York, San Fransisco, London"},{"key":"48_CR18","unstructured":"Emran SM, Ye N (2001) Robustness of Canberra metric in computer intrusion detection. In: Proceedings of 2001 IEEE workshop on information assurance and security, US Military Academy, NY, June 2001, pp 80\u201384"},{"key":"48_CR19","unstructured":"Dutta M, Mahanta AK, Mazumder M (2001) An algorithm for clustering of categorical data using concept of neighours. In: Proceedings of the 1st national workshop on soft data mining and intelligent systems, Tezpur University, India, pp 103\u2013105"},{"key":"48_CR20","unstructured":"Dutta M, Mahanta AK (2006) An algorithm for clustering large categorical databases using a fuzzy set based approach. In: Proceedings national workshop on trends in advanced computing, Tezpur University, India"},{"key":"48_CR21","unstructured":"Mazarbhuiya FA, AlZahrani MY (2017) An efficient method for clustering periodic patterns. In: Computing conference 2017, SAI Conference, London, UK"},{"key":"48_CR22","unstructured":"Sheikholeslami G, Chatterjee S, Zhang A (1998) WaveCluster: a multi-resolution clustering approach for large spatial databases. In: Proceedings of 24th VLDB conference, New York, USA"},{"issue":"10","key":"48_CR23","doi-asserted-by":"publisher","first-page":"21","DOI":"10.5120\/ijca2016911923","volume":"151","author":"Kabita Thaoroijam","year":"2016","unstructured":"Thaoroijam K, Mahanta AK (2016) A fuzzy based document clustering algorithm. Int J Comput Appl (0975\u20138887) 151(10):21\u201324","journal-title":"International Journal of Computer Applications"},{"issue":"8","key":"48_CR24","first-page":"1203","volume":"26","author":"J Li","year":"2004","unstructured":"Li J, Gao XB, Jiao LC (2004) A GA-based clustering algorithm for large datasets with mixed numerical and categorical values. J Electron Inf Technol 26(8):1203\u20131209","journal-title":"J Electron Inf Technol"},{"issue":"4","key":"48_CR25","first-page":"14","volume":"30","author":"SS Bama","year":"2011","unstructured":"Bama SS, Ahmed MSI, Saravanan A (2011) Network intrusion detection using clustering: a data mining approach. Int J Comput Appl 30(4):14\u201317","journal-title":"Int J Comput Appl"},{"key":"48_CR26","unstructured":"Lee W, Stolfo SJ (1998) Data mining approaches for intrusion detection. In: 7th conference on USENIX security symposium"},{"key":"48_CR27","unstructured":"Dokas P, Ertos L, Kumar V, Lazarevic A, Srivastava J, Tan PN (2002) Data mining for network intrusion detection. In: Proceedings of the NSF workshop on next generation data mining, Nov 2002"},{"key":"48_CR28","unstructured":"Bloedorn E, Christiansen AD, Hill W, Skorupka C, Talbot LM (2001) Data mining for network intrusion detection: how to get started. Technical report, MITRE"},{"key":"48_CR29","unstructured":"Esposito M, Mazzariello C, Oliviero F, Romano SP, Sansone C (2005) Evaluating pattern recognition techniques in intrusion detection systems. In: Proceedings of the 5th international workshop on pattern recognition in information systems (PRIS) 2005, May 2005, pp 144\u2013153"},{"issue":"8","key":"48_CR30","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1002\/1098-111X(200008)15:8<687::AID-INT1>3.0.CO;2-X","volume":"15","author":"J Luo","year":"2000","unstructured":"Luo J, Bridges S (2000) Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection. Int J Intell Syst 15(8):687\u2013704","journal-title":"Int J Intell Syst"},{"key":"48_CR31","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1137\/1.9781611972733.3","volume-title":"Proceedings of the 2003 SIAM International Conference on Data Mining","author":"Aleksandar Lazarevic","year":"2003","unstructured":"Lazarevic A, Ert\u00f6z L, Kumar V, Ozgur A, Srivastava J (2003) A comparative study of anomaly detection schemes in network intrusion detection. In: Proceedings of the third SIAM international conference on data mining, May 2003"},{"key":"48_CR32","unstructured":"Alvarenga SC, Zarpel\u00c3\u0192\u00c2\u00a3o BB, Junior SB, Miani RS, Cukier M (2015) Discovering attack strategies using process mining. In: The eleventh advanced international conference on telecommunications, AICT 2015, IARIA, pp 119\u2013125"},{"key":"48_CR33","doi-asserted-by":"crossref","unstructured":"de Alvarengaa SC, Juniora SB, Mianib RS, Cukierc M, Zarpel\u00e3oa BB (2017) Process mining and hierarchical clustering to help intrusion alert visualization. Comput Secur","DOI":"10.1016\/j.cose.2017.11.021"},{"issue":"2","key":"48_CR34","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1016\/j.comcom.2008.11.012","volume":"32","author":"SO Al-Mamory","year":"2009","unstructured":"Al-Mamory SO, Zhang H (2009) Intrusion detection alarms reduction using root cause analysis and clustering. Comput Commun 32(2):419\u2013430","journal-title":"Comput Commun"},{"key":"48_CR35","doi-asserted-by":"crossref","unstructured":"Lagzian S, Amiri F, Enayati A, Gharaee H (2012) Frequent item set mining-based alert correlation for extracting multi-stage attack scenarios. In: 2012 sixth international symposium on telecommunications (IST). IEEE, pp 1010\u20131014","DOI":"10.1109\/ISTEL.2012.6483134"},{"key":"48_CR36","doi-asserted-by":"crossref","unstructured":"Xuewei F, Dongxia W, Minhuan H, Xiaoxia S (2014) An approach of discovering causal knowledge for alert correlating based on data mining. In: 2014 IEEE 12th international conference on dependable, autonomic and secure computing (DASC). IEEE, pp 57\u201362","DOI":"10.1109\/DASC.2014.19"},{"issue":"3","key":"48_CR37","first-page":"581","volume":"3","author":"YB Bhavsar","year":"2013","unstructured":"Bhavsar YB, Waghmare KC (2013) Intrusion detection system using data mining technique: support vector machine. Int J Emerg Technol Adv Eng 3(3):581\u2013586","journal-title":"Int J Emerg Technol Adv Eng"},{"issue":"11","key":"48_CR38","doi-asserted-by":"publisher","first-page":"25","DOI":"10.5120\/ijca2016909397","volume":"139","author":"Rajesh Wankhede","year":"2016","unstructured":"Wankhede R, Chole V (2016) Intrusion detection system using classification technique. Int J Comput Appl (0975\u20138887) 139(11):25\u201328","journal-title":"International Journal of Computer Applications"},{"key":"48_CR39","doi-asserted-by":"crossref","unstructured":"Shun J, Malki HA (2008) Network intrusion detection systems using neural network. In: ICNC 2008. IEEE Explore","DOI":"10.1109\/ICNC.2008.900"},{"key":"48_CR40","doi-asserted-by":"crossref","unstructured":"Poojitha G, Kumar KN, Reddy RJ (2010) Intrusion detection using artificial neural network. In: Proceedings of ICCCN 2010. IEEE Explore","DOI":"10.1109\/ICCCNT.2010.5592568"},{"key":"48_CR41","unstructured":"Bahareth FA, Bamasak OO Constructing attack scenario using sequential pattern mining with correlated candidate sequences. Res Bull Jordan ACM, II(III):102\u2013108"},{"issue":"1","key":"48_CR42","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1016\/j.eswa.2010.06.066","volume":"38","author":"SJ Horng","year":"2011","unstructured":"Horng SJ, Su MY, Chen YH, Kao TW, Chen RJ, Lai JL, Perkasa CD (2011) A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert Syst Appl 38(1):306\u2013313","journal-title":"Expert Syst Appl"},{"key":"48_CR43","unstructured":"Liu X, Nielsen PS (2016) Regression-based online anomaly detection for smart grid data. Technical University of Denmark, Kgs. Lyngby, Denmark"},{"key":"48_CR44","doi-asserted-by":"crossref","unstructured":"Gladkykh T, Hnot T, Solskyy V (2016) Fuzzy logic inference for unsupervised anomaly detection. In: IEEE first international conference on data stream mining & processing, 23\u201327, pp 42\u201347","DOI":"10.1109\/DSMP.2016.7583504"},{"key":"48_CR45","unstructured":"Mane VD, Pawar SN (2016) Anomaly based IDS using back propagation neural network. Int J Comput Appl (0975\u20138887) 136(10):29\u201334"}],"container-title":["Lecture Notes in Electrical Engineering","Information Science and Applications 2018"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-1056-0_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T05:16:43Z","timestamp":1571635003000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-1056-0_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,24]]},"ISBN":["9789811310553","9789811310560"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-1056-0_48","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2018,7,24]]}}}