{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T20:57:42Z","timestamp":1773521862705,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2016,9,30]],"date-time":"2016-09-30T00:00:00Z","timestamp":1475193600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Parallel Prog"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1007\/s10766-016-0456-z","type":"journal-article","created":{"date-parts":[[2016,9,30]],"date-time":"2016-09-30T05:23:02Z","timestamp":1475212982000},"page":"1194-1213","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["Hadoop Based Parallel Binary Bat Algorithm for Network Intrusion Detection"],"prefix":"10.1007","volume":"45","author":[{"given":"P.","family":"Natesan","sequence":"first","affiliation":[]},{"given":"R. R.","family":"Rajalaxmi","sequence":"additional","affiliation":[]},{"given":"G.","family":"Gowrison","sequence":"additional","affiliation":[]},{"given":"P.","family":"Balasubramanie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,30]]},"reference":[{"issue":"1","key":"456_CR1","first-page":"33","volume":"2","author":"MS Abadeh","year":"2010","unstructured":"Abadeh, M.S., Habibi, J.: A hybridization of evolutionary fuzzy systems and ant colony optimization for intrusion detection. ISC Int. J. Inf. Secur. 2(1), 33\u201346 (2010)","journal-title":"ISC Int. J. Inf. Secur."},{"key":"456_CR2","doi-asserted-by":"crossref","unstructured":"Chu, C.T., Kim, S., Lin, Y.A.: MapReduce for machine learning on multicore. In: Proceedings of the 20th Conference on Advances in Neural Information Processing Systems, NIPS, pp. 281\u2013288 (2006)","DOI":"10.7551\/mitpress\/7503.003.0040"},{"issue":"1","key":"456_CR3","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1145\/1327452.1327492","volume":"51","author":"J Dean","year":"2008","unstructured":"Dean, J., Ghemawat, S.: MapReduce: simplified data processing on large clusters. Commun. ACM 51(1), 107\u2013113 (2008)","journal-title":"Commun. ACM"},{"key":"456_CR4","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1007\/978-3-642-16248-0_49","volume-title":"Rough Set and Knowledge Technology. Lecture Notes in Computer Science","author":"DY Deng","year":"2010","unstructured":"Deng, D.Y., Yan, D.X., Wang, J.Y.: Parallel reducts based on attribute significance. In: Yu, J., Greco, S., Lingras, P., et al. (eds.) Rough Set and Knowledge Technology. Lecture Notes in Computer Science, vol. 6401, pp. 336\u2013343. Springer, Berlin (2010)"},{"key":"456_CR5","doi-asserted-by":"crossref","first-page":"713","DOI":"10.1016\/j.eswa.2005.05.002","volume":"29","author":"O Depren","year":"2005","unstructured":"Depren, O., Topllar, M., Anarim, E., Ciliz, M.K.: An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Expert Syst. Appl. 29, 713\u2013722 (2005)","journal-title":"Expert Syst. Appl."},{"key":"456_CR6","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1023\/A:1007413511361","volume":"29","author":"P Domingos","year":"1997","unstructured":"Domingos, P., Pazzani, M.: On the optimality of the simple Bayesian classifier under zero-one loss. Mach. Learn. 29, 103\u2013130 (1997)","journal-title":"Mach. Learn."},{"key":"456_CR7","doi-asserted-by":"crossref","first-page":"921","DOI":"10.1016\/j.asoc.2012.09.017","volume":"13","author":"G Gowrison","year":"2013","unstructured":"Gowrison, G., Ramar, K., Muneeswaran, K., Revathi, T.: Minimal complexity attack classification intrusion detection system. Appl. Soft Comput. 13, 921\u2013927 (2013)","journal-title":"Appl. Soft Comput."},{"key":"456_CR8","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/s10489-013-0452-6","volume":"40","author":"C Guo","year":"2014","unstructured":"Guo, C., Zhou, Y., Ping, Y., Zhang, Z., Liu, G., Yang, Y.: A distance sum-based hybrid method for intrusion detection. Appl. Intell. 40, 178\u2013188 (2014). doi: 10.1007\/s10489-013-0452-6","journal-title":"Appl. Intell."},{"key":"456_CR9","unstructured":"Hadoop MapReduce. http:\/\/hadoop.apache.org\/ (2015)"},{"key":"456_CR10","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1016\/j.parco.2011.02.006","volume":"37","author":"LX Han","year":"2011","unstructured":"Han, L.X., Liew, C.C., Hemert, J.V., Atkinson, M.: A generic parallel processing model for facilitating data mining and integration. Parallel Comput. 37, 157\u2013171 (2011)","journal-title":"Parallel Comput."},{"key":"456_CR11","unstructured":"Harb, H.M., Desuky, A.S.: Adaboost ensemble with genetic algorithm post optimization for intrusion detection. Int. J. Comput. Sci. Issues 8(5), 28\u201333 (2011)"},{"issue":"1","key":"456_CR12","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1016\/j.eswa.2010.06.066","volume":"38","author":"S-J Horng","year":"2011","unstructured":"Horng, S.-J., Ming-Yang, S., Chen, Y.-H., Kao, T.-W., Chen, R.-J., Lai, J.-L., Perkasa, C.D.: A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert Syst. Appl. 38(1), 306\u2013313 (2011)","journal-title":"Expert Syst. Appl."},{"key":"456_CR13","doi-asserted-by":"crossref","unstructured":"Hu, W., Hu, W.: Network-based intrusion detection using Adaboost algorithm. In: Proceedings of the 2005 IEEE\/WIC\/ACM International Conference on Web Intelligence (WI\u201905) (2005)","DOI":"10.1109\/WI.2005.107"},{"issue":"3","key":"456_CR14","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1145\/331499.331504","volume":"31","author":"AK Jain","year":"1999","unstructured":"Jain, A.K., Murty, M.N., Flynn, P.J.: Data clustering: A review. ACM Comput. Surv. 31(3), 264\u2013323 (1999)","journal-title":"ACM Comput. Surv."},{"key":"456_CR15","doi-asserted-by":"crossref","unstructured":"Kennedy, J., Eberhart, R.C.: A discrete binary version of the particle swarm algorithm. In: IEEE International Conference on Computational Cybernetics and Simulation, pp 4104\u20134108 (1997)","DOI":"10.1109\/ICSMC.1997.637339"},{"key":"456_CR16","doi-asserted-by":"crossref","unstructured":"Levin, I.: KDD-99 classifier learning contest LLSoft\u2019s results overview. SIGKDD Explore. ACM SIGKDD (2000)","DOI":"10.1145\/846183.846201"},{"key":"456_CR17","unstructured":"Mahmud, W.M., Agiza, H.N., Radwan, E.: Intrusion detection using rough sets based parallel genetic algorithm hybrid model. In: Proceedings of the World Congress on Engineering and Computer Science (WCECS-2009), USA"},{"key":"456_CR18","doi-asserted-by":"crossref","unstructured":"McNabb, A.W., Monson, C.K., Seppi, K.D.: Parallel PSO Using MapReduce. In: Proceedings of 2007 IEEE Congress on Evolutionary Computation, CEC, IEEE Computer Society, pp. 7\u201316 (2007)","DOI":"10.1109\/CEC.2007.4424448"},{"key":"456_CR19","unstructured":"Mirjalili, S., Mohd Hashim, S.Z.: BMOA: binary magnetic optimization algorithm. In: 2011 3rd International Conference on Machine Learning and Computing (ICMLC 2011), Singapore, 2011, pp. 201\u2013206 (2011)"},{"key":"456_CR20","doi-asserted-by":"crossref","unstructured":"Mohammad, M.R., Dominik, S., Wr\u00f3blewski, J.: Parallel island model for attribute reduction. In: Pal, S.K., et al. (eds.) PReMI 2005. LNCS 3776, pp. 714\u2013719, Springer (2005)","DOI":"10.1007\/11590316_115"},{"issue":"8","key":"456_CR21","first-page":"2239","volume":"8","author":"P Natesan","year":"2012","unstructured":"Natesan, P., Balasubramanie, P., Gowrison, G.: Improving attack detection rate in network intrusion detection using adaboost algorithm with multiple weak classifiers. J. Inf. Comput. Sci. 8(8), 2239\u20132251 (2012)","journal-title":"J. Inf. Comput. Sci."},{"key":"456_CR22","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1016\/j.jnca.2005.06.003","volume":"30","author":"S Peddabachigari","year":"2007","unstructured":"Peddabachigari, S., Abraham, A., Grosan, C., Thomas, J.: Modelling intrusion detection system using hybrid systems. J. Netw. Comput. Appl. 30, 114\u2013132 (2007)","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"456_CR23","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1145\/846183.846200","volume":"1","author":"B Pfahringer","year":"2000","unstructured":"Pfahringer, B.: Winning the KDD99 classification cup: bagged boosting. SIGKDD Explor. 1(2), 67\u201375 (2000)","journal-title":"SIGKDD Explor."},{"key":"456_CR24","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1016\/j.ins.2014.04.019","volume":"279","author":"J Qian","year":"2014","unstructured":"Qian, J., Miao, D., Zhang, Z., Yue, X.: Parallel attribute reduction algorithms using MapReduce. J. Inf. Sci. 279, 671\u2013690 (2014)","journal-title":"J. Inf. Sci."},{"key":"456_CR25","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1007\/s11047-009-9175-3","volume":"9","author":"E Rashedi","year":"2009","unstructured":"Rashedi, E., Nezamabadi-pour, H., Saryazdi, S.: BGSA: binary gravitational search algorithm. Nat. Comput. 9, 727\u2013745 (2009)","journal-title":"Nat. Comput."},{"issue":"1","key":"456_CR26","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/s10994-011-5245-8","volume":"86","author":"A Srinivasan","year":"2012","unstructured":"Srinivasan, A., Faruquie, T.A., Sachindra, J.: Data and task parallelism in ILP using MapReduce. Mach. Learn. 86(1), 141\u2013168 (2012)","journal-title":"Mach. Learn."},{"key":"456_CR27","doi-asserted-by":"crossref","unstructured":"Sung, A.H., Mukkamala, S.: The feature selection and intrusion detection problems. In Proceedings of advances in computer science\u2014ASIAN 2004: higher-level decision making. In: 9th Asian Computing Science Conference, vol. 3321, pp. 468-482 (2004)","DOI":"10.1007\/978-3-540-30502-6_34"},{"key":"456_CR28","doi-asserted-by":"crossref","unstructured":"Tsang, C.H., Kwong, S.: Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction. In: Proceedings of the IEEE International Conference on Industrial Technology 2005(ICIT2005), pp. 51\u201356 (2005)","DOI":"10.1109\/ICIT.2005.1600609"},{"issue":"1","key":"456_CR29","first-page":"30","volume":"9","author":"V Venkatachalam","year":"2008","unstructured":"Venkatachalam, V., Selvan, S.: Performance comparison of intrusion detection system classifiers using various feature reduction techniques. Int. J. Simul. 9(1), 30\u201339 (2008)","journal-title":"Int. J. Simul."},{"key":"456_CR30","doi-asserted-by":"crossref","unstructured":"Verma, A., Llora, X., Goldberg, D.E., Campbell, R.H.: Scaling genetic algorithms using MapReduce. In: Proceedings of the 2009 Ninth International Conference on Intelligent Systems Design and Applications, IEEE Computer Society, pp. 13\u201318 (2009)","DOI":"10.1109\/ISDA.2009.181"},{"issue":"9","key":"456_CR31","doi-asserted-by":"crossref","first-page":"6225","DOI":"10.1016\/j.eswa.2010.02.102","volume":"37","author":"G Wang","year":"2010","unstructured":"Wang, G., Hao, J., Ma, J., Huang, L.: A new approach to intrusion detection using artificial neural networks and fuzzy clustering. Expert Syst. Appl. 37(9), 6225\u20136232 (2010)","journal-title":"Expert Syst. Appl."},{"key":"456_CR32","unstructured":"Weaver, J.: A scalability metric for parallel computations on large, growing datasets (like the web). In: Proceedings of the Joint Workshop on Scalable and High-Performance Semantic Web Systems (2012)"},{"issue":"2","key":"456_CR33","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1109\/TSMCB.2007.914695","volume":"38","author":"H Weiming","year":"2008","unstructured":"Weiming, H., Wei, H., Maybank, S.: AdaBoost-based algorithm for network intrusion detection. IEEE Trans. Syst. Man Cybern. Part B Cybern. 38(2), 577\u2013583 (2008)","journal-title":"IEEE Trans. Syst. Man Cybern. Part B Cybern."},{"key":"456_CR34","doi-asserted-by":"crossref","unstructured":"Xiang, C., Chong, M.Y., Zhu, H.L.: Design of multiple-level tree classifiers for intrusion detection system. In: Proceedings of the 2004 IEEE Conference on Cybernetics and Intelligent Systems, December, Singapore, pp. 872\u2013877 (2004)","DOI":"10.1109\/ICCIS.2004.1460703"},{"key":"456_CR35","doi-asserted-by":"crossref","first-page":"918","DOI":"10.1016\/j.patrec.2008.01.008","volume":"29","author":"C Xiang","year":"2008","unstructured":"Xiang, C., Yong, P.C., Meng, L.S.: Design of multiple-level hybrid classifier for intrusion detection system using Bayesian clustering and decision trees. Pattern Recognit. Lett. 29, 918\u2013924 (2008)","journal-title":"Pattern Recognit. Lett."},{"key":"456_CR36","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/978-3-642-12538-6_6","volume-title":"Nature Inspired Cooperative Strategies for Optimization (NICSO 2010)","author":"XS Yang","year":"2010","unstructured":"Yang, X.S.: A new metaheuristic bat-inspired algorithm. In: Gonzalez, J.R., et al. (eds.) Nature Inspired Cooperative Strategies for Optimization (NICSO 2010), vol. 284, pp. 65\u201374. Springer, Berlin (2010)"},{"key":"456_CR37","doi-asserted-by":"crossref","first-page":"674","DOI":"10.1007\/978-3-642-10665-1_71","volume-title":"Cloud Computing, CloudCom2009","author":"WZ Zhao","year":"2009","unstructured":"Zhao, W.Z., Ma, H.F., He, Q.: Parallel K-means clustering based on MapReduce. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) Cloud Computing, CloudCom2009, pp. 674\u2013679. Springer, Berlin (2009)"}],"container-title":["International Journal of Parallel Programming"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10766-016-0456-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10766-016-0456-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10766-016-0456-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,20]],"date-time":"2023-08-20T08:41:07Z","timestamp":1692520867000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10766-016-0456-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,30]]},"references-count":37,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["456"],"URL":"https:\/\/doi.org\/10.1007\/s10766-016-0456-z","relation":{},"ISSN":["0885-7458","1573-7640"],"issn-type":[{"value":"0885-7458","type":"print"},{"value":"1573-7640","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9,30]]}}}