{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T11:51:04Z","timestamp":1778759464388,"version":"3.51.4"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,10,29]],"date-time":"2019-10-29T00:00:00Z","timestamp":1572307200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,10,29]],"date-time":"2019-10-29T00:00:00Z","timestamp":1572307200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s10586-019-03008-x","type":"journal-article","created":{"date-parts":[[2019,10,30]],"date-time":"2019-10-30T22:05:50Z","timestamp":1572473150000},"page":"1397-1418","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":200,"title":["An integrated rule based intrusion detection system: analysis on UNSW-NB15 data set and the real time online dataset"],"prefix":"10.1007","volume":"23","author":[{"given":"Vikash","family":"Kumar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3115-4750","authenticated-orcid":false,"given":"Ditipriya","family":"Sinha","sequence":"additional","affiliation":[]},{"given":"Ayan Kumar","family":"Das","sequence":"additional","affiliation":[]},{"given":"Subhash Chandra","family":"Pandey","sequence":"additional","affiliation":[]},{"given":"Radha Tamal","family":"Goswami","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,29]]},"reference":[{"key":"3008_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-014-0309-2","author":"M Agarwal","year":"2016","unstructured":"Agarwal, M., Pasumarthi, D., Biswas, S., Nandi, S.: Machine learning approach for detection of flooding DoS attacks in 802.11 networks and attacker localization. Int. J. Mach. Learn. Cybern. (2016). \nhttps:\/\/doi.org\/10.1007\/s13042-014-0309-2","journal-title":"Int. J. Mach. Learn. Cybern."},{"issue":"3","key":"3008_CR2","first-page":"420","volume":"18","author":"MH Aghdam","year":"2016","unstructured":"Aghdam, M.H., Kabiri, P.: Feature selection for intrusion detection system using ant colony optimization. IJ Netw. Secur. 18(3), 420\u2013432 (2016)","journal-title":"IJ Netw. Secur."},{"issue":"10","key":"3008_CR3","first-page":"18249","volume":"5","author":"P Akshaya","year":"2016","unstructured":"Akshaya, P.: Intrusion detection system using machine learning approach. Int. J. Eng. Comput. Sci. 5(10), 18249\u201318254 (2016)","journal-title":"Int. J. Eng. Comput. Sci."},{"key":"3008_CR4","doi-asserted-by":"crossref","unstructured":"Alomari, E., Manickam, S., Gupta, B.B., Karuppayah, S., Alfaris, R.: Botnet-based distributed denial of service (DDoS) attacks on web servers: classification and art. arXiv preprint \narXiv:1208.0403\n\n (2012)","DOI":"10.5120\/7640-0724"},{"issue":"7","key":"3008_CR5","first-page":"1","volume":"6","author":"U Banerjee","year":"2010","unstructured":"Banerjee, U., Vashishtha, A., Saxena, M.: Evaluation of the capabilities of WireShark as a tool for intrusion detection. Int. J. Comput. Appl. 6(7), 1\u20135 (2010)","journal-title":"Int. J. Comput. Appl."},{"key":"3008_CR6","unstructured":"Chowdhury, M.N., Ferens, K., Ferens, M.: Network Intrusion Detection Using Machine Learning. In: Proceedings of the International Conference on Security and Management (SAM), p. 30 (2016)"},{"key":"3008_CR7","doi-asserted-by":"publisher","DOI":"10.5121\/ijcsit.2010.2613","author":"V Das","year":"2010","unstructured":"Das, V., Pathak, V., Sharma, S., Srikanth, M.V.V.N.S., Kumar, G., Nadu, T.: Network intrusion detection system based on machine learning algorithms. Int. J. Comput. Sci. Inf. Technol. (2010). \nhttps:\/\/doi.org\/10.5121\/ijcsit.2010.2613","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"key":"3008_CR8","doi-asserted-by":"publisher","DOI":"10.5626\/JCSE.2011.5.4.305","author":"AH Fares","year":"2011","unstructured":"Fares, A.H., Sharawy, M.I., Zayed, H.H.: Intrusion detection: supervised machine learning. J. Comput. Sci. Eng. (2011). \nhttps:\/\/doi.org\/10.5626\/JCSE.2011.5.4.305","journal-title":"J. Comput. Sci. Eng."},{"key":"3008_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003","author":"P Garcia-Teodoro","year":"2009","unstructured":"Garcia-Teodoro, P., Diaz-Verdejo, J., Maci\u00e1-Fern\u00e1ndez, G., V\u00e1zquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. (2009). \nhttps:\/\/doi.org\/10.1016\/j.cose.2008.08.003","journal-title":"Comput. Secur."},{"key":"3008_CR10","first-page":"345","volume-title":"European Conference on Information Retrieval","author":"C Goutte","year":"2005","unstructured":"Goutte, C., Gaussier, E.: A probabilistic interpretation of precision, recall and F-score, with implication for evaluation. European Conference on Information Retrieval, pp. 345\u2013359. Springer, Berlin (2005)"},{"key":"3008_CR11","doi-asserted-by":"crossref","unstructured":"Gou, Z., Ahmadon, M.A.B., Yamaguchi, S., Gupta, B.B.: A Petri net-based framework of intrusion detection systems. In: 2015 IEEE 4th Global Conference on Consumer Electronics (GCCE) (pp. 579\u2013583). IEEE (2015, October)","DOI":"10.1109\/GCCE.2015.7398575"},{"key":"3008_CR12","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-0105-3","volume-title":"Handbook of research on modern cryptographic solutions for computer and cyber security","author":"B Gupta","year":"2016","unstructured":"Gupta, B., Agrawal, D.P., Yamaguchi, S.: Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global, Pennsylvania (2016)"},{"key":"3008_CR13","doi-asserted-by":"crossref","unstructured":"Gupta, B.B., Misra, M., Joshi, R.C.: FVBA: a combined statistical approach for low rate degrading and high bandwidth disruptive DDoS attacks detection in ISP domain. In: 2008 16th IEEE International Conference on Networks (pp. 1\u20134). IEEE (2008, December)","DOI":"10.1109\/ICON.2008.4772654"},{"issue":"1","key":"3008_CR14","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MNET.2009.4804323","volume":"23","author":"J Hu","year":"2009","unstructured":"Hu, J., Yu, X., Qiu, D., Chen, H.H.: A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection. IEEE Netw. 23(1), 42\u201347 (2009)","journal-title":"IEEE Netw."},{"issue":"7","key":"3008_CR15","first-page":"10","volume":"56","author":"HE Ibrahim","year":"2012","unstructured":"Ibrahim, H.E., Badr, S.M., Shaheen, M.A.: Adaptive layered approach using machine learning techniques with gain ratio for intrusion detection systems. Int. J. Comput. Appl. 56(7), 10\u201316 (2012)","journal-title":"Int. J. Comput. Appl."},{"issue":"3","key":"3008_CR16","first-page":"25","volume":"ICWAC","author":"J Jha","year":"2013","unstructured":"Jha, J., Ragha, L.: Intrusion detection system using support vector machine. IJAIS. ICWAC(3), 25\u201330 (2013)","journal-title":"IJAIS"},{"issue":"2","key":"3008_CR17","doi-asserted-by":"publisher","first-page":"185","DOI":"10.15623\/ijret.2014.0302033","volume":"3","author":"A Kalekar","year":"2014","unstructured":"Kalekar, A., Kshatriya, N., Chakranarayan, S., Wadekar, S.: Real time intrusion detection system using machine learning. Int. J. Eng. Res. Technol. 3(2), 185\u2013187 (2014)","journal-title":"Int. J. Eng. Res. Technol."},{"key":"3008_CR18","unstructured":"KDD 99 data set. \nhttp:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html\n\n. Accessed Feb 14, 2018"},{"key":"3008_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2010.03.007","author":"P Ku\u0142akowski","year":"2010","unstructured":"Ku\u0142akowski, P., Vales-Alonso, J., Egea-L\u00f3pez, E., Ludwin, W., Garc\u00eda-Haro, J.: Angle-of-arrival localization based on antenna arrays for wireless sensor networks. Comput. Electr. Eng. (2010). \nhttps:\/\/doi.org\/10.1016\/j.compeleceng.2010.03.007","journal-title":"Comput. Electr. Eng."},{"issue":"1","key":"3008_CR20","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/TSMCC.2010.2050685","volume":"41","author":"S Mabu","year":"2011","unstructured":"Mabu, S., Chen, C., Lu, N., Shimada, K., Hirasawa, K.: An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming. IEEE Trans. Syst. Man Cybern. C 41(1), 130\u2013139 (2011)","journal-title":"IEEE Trans. Syst. Man Cybern. C"},{"key":"3008_CR21","doi-asserted-by":"crossref","unstructured":"Mishra, A., Gupta, B.B., Joshi, R.C.: A comparative study of distributed denial of service attacks, intrusion tolerance and mitigation techniques. In: 2011 European Intelligence and Security Informatics Conference (pp. 286\u2013289). IEEE (2011, September)","DOI":"10.1109\/EISIC.2011.15"},{"key":"3008_CR22","doi-asserted-by":"publisher","DOI":"10.5121\/ieij.2016.4203","author":"U Modi","year":"2016","unstructured":"Modi, U., Jain, A.: An improved method to detect intrusion. Inf. Eng. (2016). \nhttps:\/\/doi.org\/10.5121\/ieij.2016.4203","journal-title":"Inf. Eng."},{"key":"3008_CR23","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: Military Communications and Information Systems Conference (MilCIS), 2015. IEEE, pp. 1\u20136, (2015)"},{"key":"3008_CR24","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2015.1125974","author":"N Moustafa","year":"2016","unstructured":"Moustafa, N., Slay, J.: The evaluation of network anomaly detection systems: statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inf. Secur. J. (2016). \nhttps:\/\/doi.org\/10.1080\/19393555.2015.1125974","journal-title":"Inf. Secur. J."},{"key":"3008_CR25","unstructured":"Negi, P., Mishra, A., Gupta, B.B.: Enhanced CBF packet filtering method to detect DDoS attack in cloud computing environment. arXiv preprint \narXiv:1304.7073\n\n (2013)"},{"key":"3008_CR26","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1016\/j.future.2017.09.056","volume":"79","author":"D Papamartzivanos","year":"2018","unstructured":"Papamartzivanos, D., M\u00e1rmol, F.G., Kambourakis, G.: Dendron: genetic trees driven rule induction for network intrusion detection systems. Futur. Gener. Comput. Syst. 79, 558\u2013574 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"12","key":"3008_CR27","first-page":"1848","volume":"2","author":"S Revathi","year":"2013","unstructured":"Revathi, S., Malathi, A.: A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. Int. J. Eng. Res. Technol. 2(12), 1848\u20131853 (2013)","journal-title":"Int. J. Eng. Res. Technol."},{"key":"3008_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2011.07.001","author":"P Sangkatsanee","year":"2011","unstructured":"Sangkatsanee, P., Wattanapongsakorn, N., Charnsripinyo, C.: Practical real-time intrusion detection using machine learning approaches. Comput. Commun. (2011). \nhttps:\/\/doi.org\/10.1016\/j.comcom.2011.07.001","journal-title":"Comput. Commun."},{"key":"3008_CR29","doi-asserted-by":"publisher","DOI":"10.5121\/ijcsit.2016.8102","author":"HPS Sasan","year":"2016","unstructured":"Sasan, H.P.S., Sharma, M.: Intrusion detection using feature selection and machine learning algorithm with misuse detection. Int. J. Comput. Sci. Inf. Technol. (2016). \nhttps:\/\/doi.org\/10.5121\/ijcsit.2016.8102","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"key":"3008_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.06.013","author":"SSS Sindhu","year":"2012","unstructured":"Sindhu, S.S.S., Geetha, S., Kannan, A.: Decision tree based light weight intrusion detection using a wrapper approach. Expert Syst. Appl. (2012). \nhttps:\/\/doi.org\/10.1016\/j.eswa.2011.06.013","journal-title":"Expert Syst. Appl."},{"key":"3008_CR31","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/570964","author":"F Subhan","year":"2013","unstructured":"Subhan, F., Hasbullah, H., Ashraf, K.: Kalman filter-based hybrid indoor position estimation technique in bluetooth networks. Int. J. Navig. Observ. (2013). \nhttps:\/\/doi.org\/10.1155\/2013\/570964","journal-title":"Int. J. Navig. Observ."},{"key":"3008_CR32","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-017-0712-6","author":"C Wang","year":"2017","unstructured":"Wang, C., He, Q., Shao, M., Hu, Q.: Feature selection based on maximal neighborhood discernibility. Int. J. Mach. Learn. Cybern. (2017). \nhttps:\/\/doi.org\/10.1007\/s13042-017-0712-6","journal-title":"Int. J. Mach. Learn. Cybern."},{"key":"3008_CR33","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2097-9","author":"N Wattanapongsakorn","year":"2015","unstructured":"Wattanapongsakorn, N., Charnsripinyo, C.: Web-based monitoring approach for network-based intrusion detection and prevention. Multimed. Tools Appl. (2015). \nhttps:\/\/doi.org\/10.1007\/s11042-014-2097-9","journal-title":"Multimed. Tools Appl."},{"key":"3008_CR34","unstructured":"Weka 3.6.0 tools. \nhttp:\/\/www.cs.waikato.ac.nz\/ml\/weka\/\n\n. Accessed 15 January 2017"},{"key":"3008_CR35","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-009-0338-x","author":"Y Yasami","year":"2010","unstructured":"Yasami, Y., Mozaffari, S.P.: A novel unsupervised classification approach for network anomaly detection by k-Means clustering and ID3 decision tree learning methods. J. Supercomput. (2010). \nhttps:\/\/doi.org\/10.1007\/s11227-009-0338-x","journal-title":"J. Supercomput."},{"key":"3008_CR36","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3117-0","author":"C Yin","year":"2017","unstructured":"Yin, C., Ma, L., Feng, L.: Towards accurate intrusion detection based on improved clonal selection algorithm. Multimed. Tools Appl. (2017). \nhttps:\/\/doi.org\/10.1007\/s11042-015-3117-0","journal-title":"Multimed. Tools Appl."},{"key":"3008_CR37","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-018-0827-4","author":"J Zhan","year":"2018","unstructured":"Zhan, J., Malik, H.M., Akram, M.: Novel decision-making algorithms based on intuitionistic fuzzy rough environment. Int. J. Mach. Learn. Cybern. (2018). \nhttps:\/\/doi.org\/10.1007\/s13042-018-0827-4","journal-title":"Int. J. Mach. Learn. Cybern."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-019-03008-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-019-03008-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-019-03008-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,28]],"date-time":"2020-10-28T01:04:29Z","timestamp":1603847069000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-019-03008-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,29]]},"references-count":37,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["3008"],"URL":"https:\/\/doi.org\/10.1007\/s10586-019-03008-x","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10,29]]},"assertion":[{"value":"15 August 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 September 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 October 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 October 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}