{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T11:16:22Z","timestamp":1762341382058},"publisher-location":"Singapore","reference-count":16,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811500343"},{"type":"electronic","value":"9789811500350"}],"license":[{"start":{"date-parts":[[2019,11,28]],"date-time":"2019-11-28T00:00:00Z","timestamp":1574899200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-0035-0_31","type":"book-chapter","created":{"date-parts":[[2019,11,27]],"date-time":"2019-11-27T07:04:06Z","timestamp":1574838246000},"page":"391-403","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Hybrid Approach for Intrusion Detection System"],"prefix":"10.1007","author":[{"given":"Neelam","family":"Hariyale","sequence":"first","affiliation":[]},{"given":"Manjari Singh","family":"Rathore","sequence":"additional","affiliation":[]},{"given":"Ritu","family":"Prasad","sequence":"additional","affiliation":[]},{"given":"Praneet","family":"Saurabh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,28]]},"reference":[{"issue":"6","key":"31_CR1","doi-asserted-by":"publisher","first-page":"1669","DOI":"10.1007\/s00521-015-1964-2","volume":"27","author":"BM Aslahi-Shahri","year":"2016","unstructured":"Aslahi-Shahri, B.M., Rahmani, R., Chizari, M., Maralani, A., Eslami, M., Golkar, M.J., Ebrahim, A.: A hybrid method consisting of GA and SVM for intrusion detection system. Neural Comput. Appl. 27(6), 1669\u20131676 (2016)","journal-title":"Neural Comput. Appl."},{"key":"31_CR2","unstructured":"Isaiah, O.A., Johnson, O.V., Mutiu, G.: Denial of service (DoS) attacks using PART Rule and decision table rule. J. Electr. Electron. Syst. 6(2), 1\u20134 (2017)"},{"issue":"2","key":"31_CR3","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s11063-015-9457-y","volume":"44","author":"MSM Pozi","year":"2015","unstructured":"Pozi, M.S.M., Sulaiman, N.M., Mustapha, N., Perumal, T.: Improving anomalous rare attack detection rate for intrusion detection system using support vector machine and genetic programming. Neural Process. Lett. 44(2), 279\u2013290 (2015)","journal-title":"Neural Process. Lett."},{"issue":"1","key":"31_CR4","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/TSMCC.2010.2050685","volume":"41","author":"S Mabu","year":"2011","unstructured":"Mabu, S., Chen, C., Lu, N., Shimada, K., Hirasawa, K.: An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming. IEEE Trans. Syst. Man Cybern. Part-C: Appl. Rev. 41(1), 130\u2013139 (2011)","journal-title":"IEEE Trans. Syst. Man Cybern. Part-C: Appl. Rev."},{"issue":"3","key":"31_CR5","first-page":"420","volume":"18","author":"HM Aghdam","year":"2016","unstructured":"Aghdam, H.M., Kabiri, P.: Feature selection for intrusion detection system using ant colony optimization. Int. J. Netw. Secur. 18(3), 420\u2013432 (2016)","journal-title":"Int. J. Netw. Secur."},{"issue":"10","key":"31_CR6","doi-asserted-by":"publisher","first-page":"11994","DOI":"10.1016\/j.eswa.2009.05.029","volume":"36","author":"Chih-Fong Tsai","year":"2009","unstructured":"Tsai, C.F., Hsu, Y.F., Lin, C.Y., Lin, W.Y.: Intrusion detection by machine learning: a review. Expert. Syst. Appl. Elseveir, 11994\u201312000 (2009)","journal-title":"Expert Systems with Applications"},{"key":"31_CR7","doi-asserted-by":"crossref","unstructured":"Ravale, U., Marathe, N., Padiya, P.: Feature selection based hybrid anomaly intrusion detection system using K means and RBF kernel function. In: International Conference on Advanced Computing Technologies and Applications, Elsevier, pp. 428\u2013435 (2015)","DOI":"10.1016\/j.procs.2015.03.174"},{"key":"31_CR8","unstructured":"Farhat, V., McCarthy, B., Raysman, R., Holland & Knight L.L.P.: Cyber Attacks: Prevention and Proactive Responses, Practical Law Company on Its Intellectual Property & Technology web services at \nhttp:\/\/us.practicallaw.com\/3-511-5848\n\n (2016)"},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"Heba, F.E., Darwish, A., Hassanien, E.A., Abraham, A.: Principle components analysis and support vector machine based intrusion detection system. In: IEEE International Conference on Intelligent Systems Design and Applications, pp. 363\u2013367 (2010)","DOI":"10.1109\/ISDA.2010.5687239"},{"issue":"10","key":"31_CR10","doi-asserted-by":"publisher","first-page":"2986","DOI":"10.1109\/TC.2016.2519914","volume":"65","author":"Mohammed A. Ambusaidi","year":"2016","unstructured":"Ambusaidi, A.M., He, X., Nanda, P., Tan, Z.: Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans. Comput. 2986\u20132998 (2016)","journal-title":"IEEE Transactions on Computers"},{"issue":"1","key":"31_CR11","first-page":"1","volume":"1","author":"R Chen","year":"2009","unstructured":"Chen, R., Cheng, F., Hsieh, C.: Using rough set and support vector machine for network intrusion detection. Int. J. Netw. Secur. Appl. (IJNSA) 1(1), 1\u201312 (2009)","journal-title":"Int. J. Netw. Secur. Appl. (IJNSA)"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"Saurabh, P., Verma, B., Sharma, S.: Biologically inspired computer security system: the way ahead, recent trends in computer networks and distributed systems security, CCIS, vol. 335, pp. 474-484. Springer (2011)","DOI":"10.1007\/978-3-642-34135-9_46"},{"key":"31_CR13","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/j.eswa.2016.03.042","volume":"60","author":"P Saurabh","year":"2016","unstructured":"Saurabh, P., Verma, B.: An efficient proactive artificial immune system based anomaly detection and prevention system. Expert. Syst. Appl., Elsevier 60, 311\u2013320 (2016)","journal-title":"Expert. Syst. Appl., Elsevier"},{"issue":"2","key":"31_CR14","first-page":"289","volume":"15","author":"P Saurabh","year":"2018","unstructured":"Saurabh, P., Verma, B.: Immunity inspired cooperative agent based security system. Int. Arab. J. Inf. Technol. 15(2), 289\u2013295 (2018)","journal-title":"Int. Arab. J. Inf. Technol."},{"key":"31_CR15","doi-asserted-by":"crossref","unstructured":"Saurabh, P., Verma, B., Sharma, S.: An Immunity inspired anomaly detection system: a general framework a general framework. In: 7th International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA 2012), vol. 202, AISC, Springer, pp. 417\u2013428 (2012)","DOI":"10.1007\/978-81-322-1041-2_36"},{"issue":"1","key":"31_CR16","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1504\/IJBIC.2009.022775","volume":"1","author":"H Shah-Hosseini","year":"2009","unstructured":"Shah-Hosseini, H.: The intelligent water drops algorithm: a nature-inspired swarm-based optimization algorithm. Int. J. Bio-Inspired Comput. 1(1), 71\u201379 (2009)","journal-title":"Int. J. Bio-Inspired Comput."}],"container-title":["Advances in Intelligent Systems and Computing","Soft Computing for Problem Solving"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-0035-0_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,27]],"date-time":"2019-11-27T07:15:58Z","timestamp":1574838958000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-0035-0_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,28]]},"ISBN":["9789811500343","9789811500350"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-0035-0_31","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,11,28]]},"assertion":[{"value":"28 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}