{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T07:47:06Z","timestamp":1759132026652},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2012,7,13]],"date-time":"2012-07-13T00:00:00Z","timestamp":1342137600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2013,2]]},"DOI":"10.1007\/s00500-012-0890-9","type":"journal-article","created":{"date-parts":[[2012,7,12]],"date-time":"2012-07-12T06:34:36Z","timestamp":1342074876000},"page":"255-263","source":"Crossref","is-referenced-by-count":39,"title":["A Pareto-based multi-objective evolutionary algorithm for automatic rule generation in network intrusion detection systems"],"prefix":"10.1007","volume":"17","author":[{"given":"J.","family":"G\u00f3mez","sequence":"first","affiliation":[]},{"given":"C.","family":"Gil","sequence":"additional","affiliation":[]},{"given":"R.","family":"Ba\u00f1os","sequence":"additional","affiliation":[]},{"given":"A. L.","family":"M\u00e1rquez","sequence":"additional","affiliation":[]},{"given":"F. G.","family":"Montoya","sequence":"additional","affiliation":[]},{"given":"M. G.","family":"Montoya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,7,13]]},"reference":[{"key":"890_CR1","unstructured":"Anchor KP, Zydallis JB, Gunsch GH, Lamont GB (2002) Extending the computer defense immune system: network intrusion detection with a multiobjective evolutionary programming approach. In: Proceedings of the First International Conference on artificial immune systems, pp 12\u201321"},{"issue":"3","key":"890_CR2","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1016\/j.compeleceng.2008.12.005","volume":"35","author":"MA Aydin","year":"2009","unstructured":"Aydin MA, Zaim AH, Ceylan KG (2009) A hybrid intrusion detection system design for computer network security. Comput Electr Eng 35(3):517\u2013526","journal-title":"Comput Electr Eng"},{"key":"890_CR3","doi-asserted-by":"crossref","unstructured":"Bace R, Mell P (2001) Special publication on intrusion detection systems. Technical Report SP 800-31, National Institute of Standards and Technology, Gaithersburg","DOI":"10.6028\/NIST.SP.800-31"},{"key":"890_CR4","doi-asserted-by":"crossref","unstructured":"Barbara D, Wu N, Jajodia S (2001) Detecting novel network intrusions using Bayes estimators. In: Proceedings of first SIAM Conference on data mining, Chicago, pp 24\u201329","DOI":"10.1137\/1.9781611972719.28"},{"key":"890_CR5","doi-asserted-by":"crossref","unstructured":"Beale J (2004) Snort 2.1 intrusion detection, 2nd edn. Syngress, USA","DOI":"10.1016\/B978-193183604-3\/50006-0"},{"key":"890_CR6","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-5184-0","volume-title":"Evolutionary algorithms for solving multi-objective problems","author":"CA Coello","year":"2002","unstructured":"Coello CA, Van Veldhuizen DA, Lamont GB (2002) Evolutionary algorithms for solving multi-objective problems. Kluwer Academic, New York"},{"key":"890_CR7","volume-title":"Evolutionary computation: a unified approach","author":"KA Jong De","year":"2006","unstructured":"De Jong KA (2006) Evolutionary computation: a unified approach. MIT Press, Cambridge"},{"issue":"2","key":"890_CR8","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"13","author":"DE Denning","year":"1987","unstructured":"Denning DE (1987) An intrusion-detection model. IEEE Trans Softw Eng 13(2):222\u2013232","journal-title":"IEEE Trans Softw Eng"},{"issue":"6","key":"890_CR9","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1109\/TLA.2007.4395226","volume":"5","author":"JE D\u00edaz-Verdejo","year":"2007","unstructured":"D\u00edaz-Verdejo JE, Garc\u00eda-Teodoro P, Mu\u00f1oz P, Maci\u00e1-Fern\u00e1ndez G, De Toro F (2007) A Snort-based approach for the development and deployment of hybrid IDS. IEEE Lat Am Trans 5(6):386\u2013392","journal-title":"IEEE Lat Am Trans"},{"key":"890_CR10","unstructured":"Edge KS, Lamont GB, Raines RA (2006) Multi-objective mobile network anomaly intrusion. Int J Comput Sci Netw Secur 6(3B):187\u2013192"},{"key":"890_CR11","volume-title":"Genetic algorithms in search, optimization and machine learning","author":"D Goldberg","year":"1989","unstructured":"Goldberg D (1989) Genetic algorithms in search, optimization and machine learning. Addison Wesley, New York"},{"key":"890_CR12","doi-asserted-by":"crossref","unstructured":"G\u00f3mez J, Gil C, Padilla N, Ba\u00f1os R, Gim\u00e9nez C (2009) Design of a Snort-based hybrid intrusion detection system. In: Proceedings of distributed computing, artificial intelligence, bioinformatics, soft computing, and ambient assisted living. Lecture Notes in computer science, vol 5518. Springer, pp 515\u2013522","DOI":"10.1007\/978-3-642-02481-8_75"},{"key":"890_CR13","doi-asserted-by":"crossref","unstructured":"G\u00f3mez J, Gil C, Ba\u00f1os R, M\u00e1rquez AL, Montoya FG, Montoya MG (2011) A multi-objective evolutionary algorithm for network intrusion detection systems. In: Proceedings of the International Work-Conference on artificial neural networks. Lecture Notes in computer science, vol 6691. Springer, pp 73\u201380","DOI":"10.1007\/978-3-642-21501-8_10"},{"key":"890_CR100","doi-asserted-by":"crossref","unstructured":"Haag CR, Lamont GB, Williams PD, Peterson GL (2007) An artificial immune system-inspired multiobjective evolutionary algorithm with application to the detection of distributed computer network intrusions. In: Proceedings of the genetic and evolutionary computation conference, pp 2717\u20132724","DOI":"10.1145\/1274000.1274035"},{"key":"890_CR15","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/BF01759923","volume":"4","author":"P Hajela","year":"1992","unstructured":"Hajela P, Y-Lin C (1992) Genetic search strategies in multi-criterion optimal design. Struct Optim 4:99\u2013107","journal-title":"Struct Optim"},{"key":"890_CR16","doi-asserted-by":"crossref","unstructured":"Heady R, Luger G, Maccabe A, Servilla M (1990) The architecture of a network level network intrusion detection system. Technical report CS90-20, Department of Computer Science, University of New Mexico, Mexico","DOI":"10.2172\/425295"},{"key":"890_CR17","volume-title":"Network security monitor (NSM)\u2014final report","author":"LT Heberlein","year":"1995","unstructured":"Heberlein LT (1995) Network security monitor (NSM)\u2014final report. Lawrence Livermore National Laboratory, Davis"},{"issue":"1","key":"890_CR18","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/TDSC.2007.9","volume":"4","author":"K Hwang","year":"2007","unstructured":"Hwang K, Cai M, Chen Y, Qin M (2007) Hybrid intrusion detection with weighted signature generation over anomalous internet episodes. IEEE Trans Depend Secur Comput 4(1):41\u201355","journal-title":"IEEE Trans Depend Secur Comput"},{"key":"890_CR19","unstructured":"Lawrence Livermore National Laboratory (1998) Network intrusion detector (NID) overview. Computer Security Technology Center"},{"issue":"4","key":"890_CR20","doi-asserted-by":"crossref","first-page":"579","DOI":"10.1016\/S1389-1286(00)00139-0","volume":"34","author":"R Lippmann","year":"2000","unstructured":"Lippmann R, Haines JW, Fried DJ, Korba J, Das K (2000) The 1999 DARPA off-line intrusion detection evaluation. Comput Netw 34(4):579\u2013595","journal-title":"Comput Netw"},{"issue":"4","key":"890_CR21","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1007\/s10922-008-9102-4","volume":"16","author":"S Ohta","year":"2008","unstructured":"Ohta S, Kurebayashi R, Kobayashi K (2008) Minimizing false positives of a decision tree classifier for intrusion detection on the Internet. J Netw Syst Manag 16(4):399\u2013419","journal-title":"J Netw Syst Manag"},{"key":"890_CR22","first-page":"669","volume":"6","author":"SA Onashoga","year":"2009","unstructured":"Onashoga SA, Akinde AD, Sodiya AS (2009) A strategic review of existing mobile agent-based intrusion detection systems. Issues Inf Sci Inf Technol 6:669\u2013682","journal-title":"Issues Inf Sci Inf Technol"},{"key":"890_CR24","doi-asserted-by":"crossref","unstructured":"Pathak LD, Soh B (2006) Incorporating data mining tools into a new hybrid-IDS to detect known and unknown attacks. In: Proceedings of ubiquitous intelligence and computing. Lecture Notes in computer science, vol 4159. Springer, pp 826\u2013834","DOI":"10.1007\/11833529_84"},{"key":"890_CR25","unstructured":"Ptacek TH, Newsham TN (1998) Insertion, evasion, and denial of service: eluding network intrusion detection. Secure Networks, Inc., Japan"},{"issue":"8","key":"890_CR26","doi-asserted-by":"crossref","first-page":"699","DOI":"10.1007\/s00500-005-0513-9","volume":"10","author":"P Ramasubramanian","year":"2006","unstructured":"Ramasubramanian P, Kannan A (2006) A genetic-algorithm based neural network short-term forecasting framework for database intrusion prediction system. Soft Comput 10(8):699\u2013714","journal-title":"Soft Comput"},{"issue":"7","key":"890_CR27","first-page":"1848","volume":"11","author":"PK Sree","year":"2008","unstructured":"Sree PK, Babu IR, Murty JVR, Ramachandran R, Devi NSSSNU (2008) Power-aware hybrid intrusion detection system (PHIDS) using cellular automata in wireless ad hoc networks. WSEAS Trans Comput 11(7):1848\u20131874","journal-title":"WSEAS Trans Comput"},{"key":"890_CR28","unstructured":"Tian W, Liu J (2010) Network intrusion detection analysis with neural network and particle swarm optimization algorithm. In: Proceedings of control and decision conference, pp 1749\u20131752"},{"issue":"10","key":"890_CR29","doi-asserted-by":"crossref","first-page":"1699","DOI":"10.1016\/j.jss.2006.12.546","volume":"80","author":"LC Wuu","year":"2007","unstructured":"Wuu LC, Hung CH, Chen SF (2007) Building intrusion pattern miner for Snort network intrusion detection system. J Syst Softw 80(10):1699\u20131715","journal-title":"J Syst Softw"},{"key":"890_CR30","unstructured":"Ye N, Emran SM, Li X, Chen Q (2001) Statistical process control for computer intrusion detection. In: Proceedings of DARPA information survivability conference and exposition II, pp 3\u201314"},{"issue":"4","key":"890_CR31","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1109\/4235.797969","volume":"3","author":"E Zitzler","year":"1999","unstructured":"Zitzler E, Thiele L (1999) Multiobjective evolutionary algorithms: a comparative case study and the strength Pareto approach. IEEE Trans Evol Comput 3(4):257\u2013271","journal-title":"IEEE Trans Evol Comput"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-012-0890-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-012-0890-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-012-0890-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,30]],"date-time":"2019-06-30T21:15:09Z","timestamp":1561929309000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-012-0890-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7,13]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,2]]}},"alternative-id":["890"],"URL":"https:\/\/doi.org\/10.1007\/s00500-012-0890-9","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,7,13]]}}}