{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T14:18:56Z","timestamp":1778077136902,"version":"3.51.4"},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789811984440","type":"print"},{"value":"9789811984457","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-19-8445-7_8","type":"book-chapter","created":{"date-parts":[[2022,12,2]],"date-time":"2022-12-02T14:10:23Z","timestamp":1669990223000},"page":"119-133","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Enhancing Port Scans Attack Detection Using Principal Component Analysis and Machine Learning Algorithms"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9091-3513","authenticated-orcid":false,"given":"Emmanuel Kwesi","family":"Baah","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3834-9200","authenticated-orcid":false,"given":"Steven","family":"Yirenkyi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4393-4148","authenticated-orcid":false,"given":"Dominic","family":"Asamoah","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1024-5680","authenticated-orcid":false,"given":"Stephen Opoku","family":"Oppong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1152-0082","authenticated-orcid":false,"given":"Edward","family":"Opoku-Mensah","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5783-0596","authenticated-orcid":false,"given":"Benjamin Tei","family":"Partey","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5228-3813","authenticated-orcid":false,"given":"Anthony Kingsley","family":"Sackey","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8886-7853","authenticated-orcid":false,"given":"Oliver","family":"Kornyo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3528-0933","authenticated-orcid":false,"given":"Evans","family":"Obu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,3]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Mell, P.: Understanding intrusion detection systems. Auerbach Publications (2003)","DOI":"10.1201\/9781420031393.ch32"},{"key":"8_CR2","unstructured":"Cyber Kill Chain\u00ae, https:\/\/www.lockheedmartin.com\/en-us\/capabilities\/cyber\/cyber-kill-chain.html. Accessed 05 Aug 2022"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Sridharan, A., Ye, T., Bhattacharyya, S.: Connectionless port scan detection on the backbone. In: 2006 IEEE International Performance Computing and Communications Conference, pp. 567\u2013576. IEEE, Phoenix, AX, USA (2006)","DOI":"10.1109\/.2006.1629454"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Nisa, M.u., Kifayat, K.: Detection of slow port scanning attacks. In: 2020 International Conference on Cyber Warfare and Security (ICCWS), pp. 1\u20137. IEEE, Islamabad (2020)","DOI":"10.1109\/ICCWS48432.2020.9292389"},{"issue":"10","key":"8_CR5","doi-asserted-by":"publisher","first-page":"1565","DOI":"10.1093\/comjnl\/bxr035","volume":"54","author":"MH Bhuyan","year":"2011","unstructured":"Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Surveying port scans and their detection methodologies. Comput. J. 54(10), 1565\u20131581 (2011)","journal-title":"Comput. J."},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"1251","DOI":"10.1016\/j.procs.2020.04.133","volume":"171","author":"T Saranya","year":"2020","unstructured":"Saranya, T., Sridevi, S., Deisy, C., Chung, T.D., Khan, M.K.A.A.: Performance analysis of machine learning algorithms in intrusion detection system: a review. Procedia Comput. Sci. 171, 1251\u20131260 (2020)","journal-title":"Procedia Comput. Sci."},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Saidi, F., Trabelsi, Z., Ghazela, H.B.: Fuzzy logic based intrusion detection system as a service for malicious port scanning traffic detection. In: 2019 IEEE\/ACS 16th International Conference on Computer Systems and Applications (AICCSA), pp. 1\u20139. IEEE, Abu Dhabi (2019)","DOI":"10.1109\/AICCSA47632.2019.9035263"},{"key":"8_CR8","doi-asserted-by":"publisher","first-page":"113081","DOI":"10.1109\/ACCESS.2019.2935154","volume":"7","author":"J Camacho","year":"2019","unstructured":"Camacho, J., Theron, R., Garcia-Gimenez, J.M., Macia-Fernandez, G., Garcia-Teodoro, P.: Group-wise principal component analysis for exploratory intrusion detection. IEEE Access 7, 113081\u2013113093 (2019)","journal-title":"IEEE Access"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Aksu, D., Ali Aydin, M.: Detecting port scan attempts with comparative analysis of deep learning and support vector machine algorithms. In: 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), Ankara, Turkey, pp. 77\u201380 (2018)","DOI":"10.1109\/IBIGDELFT.2018.8625370"},{"issue":"9","key":"8_CR10","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0204507","volume":"13","author":"M Ring","year":"2018","unstructured":"Ring, M., Landes, D., Hotho, A.: Detection of slow port scans in flow-based network traffic. PLoS ONE 13(9), e0204507 (2018)","journal-title":"PLoS ONE"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Kumar, M.S., Ben-Othman, J., Srinivasagan, K.G., Krishnan, G.U.: Artificial intelligence managed network defense system against port scanning outbreaks. In: 2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN), Vellore, India, pp. 1\u20135 (2019)","DOI":"10.1109\/ViTECoN.2019.8899380"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Liu, J., Kantarci, B., Adams, C.: Machine learning-driven intrusion detection for Contiki-NG-based IoT networks exposed to NSL-KDD dataset. In: Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning, pp. 25\u201330. ACM, Linz (2020)","DOI":"10.1145\/3395352.3402621"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Algaolahi, A.Q.M., Hasan, A.A., Sallam, A., Sharaf, A.M., Abdu, A.A., Alqadi, A.A.: Port-scanning attack detection using supervised machine learning classifiers. In: 2021 1st International Conference on Emerging Smart Technologies and Applications (eSmarTA), pp. 1\u20135. IEEE, Sana'a (2021)","DOI":"10.1109\/eSmarTA52612.2021.9515743"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Al-Haija, Q. A., Saleh, E., Alnabhan, M.: Detecting port scan attacks using logistic regression. In: 2021 4th International Symposium on Advanced Electrical and Communication Technologies (ISAECT), pp. 1\u20135. IEEE, Alkhobar (2021)","DOI":"10.1109\/ISAECT53699.2021.9668562"},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"106790","DOI":"10.1109\/ACCESS.2021.3101188","volume":"9","author":"GDC Bertoli","year":"2021","unstructured":"Bertoli, G.D.C., et al.: An end-to-end framework for machine learning-based network intrusion detection system. IEEE Access 9, 106790\u2013106805 (2021)","journal-title":"IEEE Access"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A. H., Ghorbani, A. A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy, pp. 108\u2013116. IEEE, Funchal (2018)","DOI":"10.5220\/0006639801080116"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Ibrahimi, K., Ouaddane, M.: Management of intrusion detection systems based-KDD99: analysis with LDA and PCA. In: 2017 International Conference on Wireless Networks and Mobile Communications (WINCOM), pp. 1\u20136. IEEE, Rabat (2017)","DOI":"10.1109\/WINCOM.2017.8238171"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Kumar, A., Lim, T. J.: EDIMA: Early detection of iot malware network activity using machine learning techniques. In: 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), pp. 289\u2013294. IEEE, Limerick (2019)","DOI":"10.1109\/WF-IoT.2019.8767194"}],"container-title":["Communications in Computer and Information Science","Frontiers in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-19-8445-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T21:32:24Z","timestamp":1728509544000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-19-8445-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811984440","9789811984457"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-19-8445-7_8","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"3 December 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Frontiers in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kumasi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ghana","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fcs2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fcs.knust.edu.gh\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"65","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}