{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T23:48:22Z","timestamp":1778111302735,"version":"3.51.4"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1-3","license":[{"start":{"date-parts":[[2014,12,4]],"date-time":"2014-12-04T00:00:00Z","timestamp":1417651200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mach Learn"],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1007\/s10994-014-5473-9","type":"journal-article","created":{"date-parts":[[2014,12,3]],"date-time":"2014-12-03T18:38:14Z","timestamp":1417631894000},"page":"59-84","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":162,"title":["Analysis of network traffic features for anomaly detection"],"prefix":"10.1007","volume":"101","author":[{"given":"F\u00e9lix","family":"Iglesias","sequence":"first","affiliation":[]},{"given":"Tanja","family":"Zseby","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,4]]},"reference":[{"key":"5473_CR1","unstructured":"Bhuyan, M., Bhattacharyya, D., & Kalita, J. (2013) Network anomaly detection: Methods, systems and tools. IEEE Communication Surveys and Tutorials, 16(1), 1\u201334."},{"issue":"1\u20132","key":"5473_CR2","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/S0004-3702(97)00063-5","volume":"97","author":"AL Blum","year":"1997","unstructured":"Blum, A. L., & Langley, P. (1997). Selection of relevant features and examples in machine learning. Artificial Intelligence, 97(1\u20132), 245\u2013271.","journal-title":"Artificial Intelligence"},{"issue":"1\u20133","key":"5473_CR3","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1023\/A:1012450327387","volume":"46","author":"O Chapelle","year":"2002","unstructured":"Chapelle, O., Vapnik, V., Bousquet, O., & Mukherjee, S. (2002). Choosing multiple parameters for support vector machines. Machine Learning, 46(1\u20133), 131\u2013159.","journal-title":"Machine Learning"},{"issue":"4","key":"5473_CR4","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/j.cose.2004.09.008","volume":"24","author":"S Chebrolu","year":"2005","unstructured":"Chebrolu, S., Abraham, A., & Thomas, J. P. (2005). Feature deduction and ensemble design of intrusion detection systems. Computers & Security, 24(4), 295\u2013307.","journal-title":"Computers & Security"},{"key":"5473_CR5","unstructured":"Claise, B., Trammell, B., & Aitken, P. (2013). Specification of the IP Flow Information Export (IPFIX) protocol for the exchange of flow information. In RFC 7011 (INTERNET STANDARD). http:\/\/www.ietf.org\/rfc\/rfc7011.txt ."},{"key":"5473_CR6","unstructured":"DARPA intrusion detection evaluation data sets. (1998). http:\/\/www.ll.mit.edu\/mission\/communications\/cyber\/CSTcorpora\/ideval\/data\/ ."},{"key":"5473_CR7","doi-asserted-by":"crossref","unstructured":"Ding, C., & Peng, H. (2003). Minimum redundancy feature selection from microarray gene expression data. In Proceedings of the IEEE bioinformatics conference (pp. 523\u2013528).","DOI":"10.1109\/CSB.2003.1227396"},{"key":"5473_CR8","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1214\/009053604000000067","volume":"32","author":"B Efron","year":"2004","unstructured":"Efron, B., Hastie, T., Johnstone, I., & Tibshirani, R. (2004). Least angle regression. Annals of Statistics, 32, 407\u2013499.","journal-title":"Annals of Statistics"},{"issue":"8","key":"5473_CR9","doi-asserted-by":"crossref","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","volume":"27","author":"T Fawcett","year":"2006","unstructured":"Fawcett, T. (2006). An introduction to ROC analysis. Pattern Recognition Letters, 27(8), 861\u2013874.","journal-title":"Pattern Recognition Letters"},{"key":"5473_CR10","first-page":"1157","volume":"3","author":"I Guyon","year":"2003","unstructured":"Guyon, I., & Elisseeff, A. (2003). An introduction to variable and feature selection. Journal of Machine Learning Research, 3, 1157\u20131182.","journal-title":"Journal of Machine Learning Research"},{"issue":"1","key":"5473_CR11","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/s10994-009-5119-5","volume":"77","author":"D Hand","year":"2009","unstructured":"Hand, D. (2009). Measuring classifier performance: A coherent alternative to the area under the ROC curve. Machine Learning, 77(1), 103\u2013123.","journal-title":"Machine Learning"},{"key":"5473_CR12","unstructured":"Imran, H. M., Abdullah, A. B., Hussain, M., Palaniappan, S., & Ahmad, I. (2012). Intrusions detection based on optimum features subset and efficient dataset selection. International Journal of Engineering and Innovative Technology, 2(6), 265\u2013270."},{"key":"5473_CR13","doi-asserted-by":"crossref","unstructured":"Joachims, T. (1998). Text categorization with support vector machines: Learning with many relevant features. In C. N\u00e9dellec, & C. Rouveirol (Eds.), Machine learning: ECML-98, Lecture Notes in Computer Science (vol. 1398, pp. 137\u2013142). Berlin: Springer.","DOI":"10.1007\/BFb0026683"},{"key":"5473_CR14","unstructured":"KDD cup \u201999 data. (1999). https:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html ."},{"key":"5473_CR15","doi-asserted-by":"crossref","unstructured":"Khor, K. C., Ting, C. Y., & Amnuaisuk, S. P. (2009). A feature selection approach for network intrusion detection. In International conference on information management and engineering (ICIME\u201909) (pp. 133\u2013137).","DOI":"10.1109\/ICIME.2009.68"},{"issue":"1\u20132","key":"5473_CR16","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/S0004-3702(97)00043-X","volume":"97","author":"R Kohavi","year":"1997","unstructured":"Kohavi, R., & John, G. H. (1997). Wrappers for feature subset selection. Artificial Intelligence, 97(1\u20132), 273\u2013324.","journal-title":"Artificial Intelligence"},{"key":"5473_CR17","doi-asserted-by":"crossref","unstructured":"Lewis, D. D. (1998). Naive (bayes) at forty: The independence assumption in information retrieval. In C. N\u00e9dellec, & C. Rouveirol (Eds.), Machine learning.: ECML-98, Lecture Notes in Computer Science (vol. 1398, pp. 4\u201315). Berlin: Springer.","DOI":"10.1007\/BFb0026666"},{"issue":"4","key":"5473_CR18","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1145\/382912.382923","volume":"3","author":"J McHugh","year":"2000","unstructured":"McHugh, J. (2000). Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Transactions on Information and System Security, 3(4), 262\u2013294.","journal-title":"ACM Transactions on Information and System Security"},{"issue":"4","key":"5473_CR19","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1111\/j.1467-9868.2010.00740.x","volume":"72","author":"N Meinshausen","year":"2010","unstructured":"Meinshausen, N., & B\u00fchlmann, P. (2010). Stability selection. Journal of the Royal Statistical Society: Series B (Statistical Methodology), 72(4), 417\u2013473.","journal-title":"Journal of the Royal Statistical Society: Series B (Statistical Methodology)"},{"key":"5473_CR20","doi-asserted-by":"crossref","unstructured":"Nguyen, H. T., Franke, K., & Petrovic, S. (2010). Towards a generic feature-selection measure for intrusion detection. In 20th International conference on pattern recognition (ICPR) (pp. 1529\u20131532).","DOI":"10.1109\/ICPR.2010.378"},{"issue":"4","key":"5473_CR21","doi-asserted-by":"crossref","first-page":"347","DOI":"10.3233\/IDT-2011-0117","volume":"5","author":"M Panda","year":"2011","unstructured":"Panda, M., Abraham, A., Das, S., & Patra, M. R. (2011). Network intrusion detection system: A machine learning approach. Int Decision Technologies, 5(4), 347\u2013356.","journal-title":"Int Decision Technologies"},{"issue":"1","key":"5473_CR22","first-page":"81","volume":"1","author":"J Quinlan","year":"1986","unstructured":"Quinlan, J. (1986). Induction of decision trees. Machine Learning, 1(1), 81\u2013106.","journal-title":"Machine Learning"},{"issue":"3","key":"5473_CR23","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1016\/0920-5489(94)90017-5","volume":"16","author":"M Riedmiller","year":"1994","unstructured":"Riedmiller, M. (1994). Advanced supervised learning in multi-layer perceptrons from backpropagation to adaptive learning algorithms. Computer Standards & Interfaces, 16(3), 265\u2013278.","journal-title":"Computer Standards & Interfaces"},{"key":"5473_CR24","doi-asserted-by":"crossref","unstructured":"Salama, M. A., Eid, H. F., Ramadan, R. A., Darwish, A., & Hassanien, A. E. (2011). Hybrid intelligent intrusion detection scheme. In A. Gaspar-Cunha, R. Takahashi, G. Schaefer, & L. Costa (Eds.), Soft computing in industrial applications, no. 96 in advances in intelligent and soft computing (pp. 293\u2013303). Berlin: Springer.","DOI":"10.1007\/978-3-642-20505-7_26"},{"issue":"5","key":"5473_CR25","doi-asserted-by":"crossref","first-page":"2733","DOI":"10.1214\/12-AOS1049","volume":"40","author":"RJ Samworth","year":"2012","unstructured":"Samworth, R. J. (2012). Optimal weighted nearest neighbour classifiers. The Annals of Statistics, 40(5), 2733\u20132763.","journal-title":"The Annals of Statistics"},{"key":"5473_CR26","doi-asserted-by":"crossref","unstructured":"Stein, G., Chen, B., Wu, A. S., & Hua, K. A. (2005). Decision tree classifier for network intrusion detection with GA-based feature selection. In Proceedings of the 43rd annual Southeast regional conference, ACMACM-SE 43 (vol. 2, pp. 136\u2013141). New York, NY, USA.","DOI":"10.1145\/1167253.1167288"},{"key":"5473_CR27","doi-asserted-by":"crossref","unstructured":"Sung, A., & Mukkamala, S. (2003). Identifying important features for intrusion detection using support vector machines and neural networks. In Proceedings of the symposium on applications and the internet (pp. 209\u2013216).","DOI":"10.1109\/SAINT.2003.1183050"},{"key":"5473_CR28","doi-asserted-by":"crossref","unstructured":"Sung, A., & Mukkamala, S. (2004). The feature selection and intrusion detection problems. In Proceedings of the 9th Asian computing science conference on advances in computer science (ASIAN\u201904) (pp. 468\u2013482). Berlin: Springer.","DOI":"10.1007\/978-3-540-30502-6_34"},{"issue":"2","key":"5473_CR29","first-page":"70","volume":"3","author":"I Syarif","year":"2012","unstructured":"Syarif, I., Prugel-Bennett, A., & Wills, G. (2012). Data mining approaches for network intrusion detection: From dimensionality reduction to misuse and anomaly detection. Journal of Information Technology Review, 3(2), 70\u201383.","journal-title":"Journal of Information Technology Review"},{"key":"5473_CR30","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. (2009). A detailed analysis of the KDD CUP 99 data set. In IEEE symposium on computational intelligence for security and defense applications (CISDA) (pp. 1\u20136).","DOI":"10.1109\/CISDA.2009.5356528"},{"issue":"5","key":"5473_CR31","doi-asserted-by":"crossref","first-page":"516","DOI":"10.1109\/TSMCC.2010.2048428","volume":"40","author":"M Tavallaee","year":"2010","unstructured":"Tavallaee, M., Stakhanova, N., & Ghorbani, A. (2010). Toward credible evaluation of anomaly-based intrusion-detection methods. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 40(5), 516\u2013524.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews"},{"key":"5473_CR32","unstructured":"The NSL-KDD dataset. (2009). http:\/\/nsl.cs.unb.ca\/NSL-KDD\/ ."},{"issue":"8","key":"5473_CR33","doi-asserted-by":"crossref","first-page":"2191","DOI":"10.1109\/TSP.2003.814797","volume":"51","author":"M Thottan","year":"2003","unstructured":"Thottan, M., & Ji, C. (2003). Anomaly detection in IP networks. IEEE Transactions on Signal Processing, 51(8), 2191\u20132204.","journal-title":"IEEE Transactions on Signal Processing"},{"key":"5473_CR34","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1111\/j.2517-6161.1996.tb02080.x","volume":"58","author":"R Tibshirani","year":"1994","unstructured":"Tibshirani, R. (1994). Regression shrinkage and selection via the lasso. Journal of the Royal Statistical Society, Series B, 58, 267\u2013288.","journal-title":"Journal of the Royal Statistical Society, Series B"},{"key":"5473_CR35","unstructured":"Trammell, B., & Boschi, E. (2008). Bidirectional Flow Export Using IP Flow Information Export (IPFIX). RFC 5103 (Proposed Standard). http:\/\/www.ietf.org\/rfc\/rfc5103.txt ."},{"issue":"9","key":"5473_CR36","doi-asserted-by":"crossref","first-page":"5116","DOI":"10.1073\/pnas.091062498","volume":"98","author":"VG Tusher","year":"2001","unstructured":"Tusher, V. G., Tibshirani, R., & Chu, G. (2001). Significance analysis of microarrays applied to the ionizing radiation response. Proceedings of the National Academy of Sciences of the United States of America, 98(9), 5116\u20135121.","journal-title":"Proceedings of the National Academy of Sciences of the United States of America"},{"key":"5473_CR37","doi-asserted-by":"crossref","unstructured":"Wen, B., & Chen, G. (2012). Principal component analysis of network security data based on projection pursuit. In J. Lei, F. L. Wang, M. Li, & Y. Luo (Eds.) Network computing and information security, no. 345 in communications in computer and information science (pp. 380\u2013387). Berlin: Springer.","DOI":"10.1007\/978-3-642-35211-9_50"},{"key":"5473_CR38","unstructured":"Zadrozny, B., & Elkan, C. (2001). Obtaining calibrated probability estimates from decision trees and naive bayesian classifiers. In Proceedings of the eighteenth international conference on machine learning (pp. 609\u2013616), Morgan Kaufmann."},{"key":"5473_CR39","doi-asserted-by":"crossref","unstructured":"Zargari, S., Voorhis, D. (2012). Feature selection in the corrected KDD-dataset. In 2012 Third international conference on emerging intelligent data and web technologies (EIDWT) (pp. 174\u2013180).","DOI":"10.1109\/EIDWT.2012.10"},{"issue":"5","key":"5473_CR40","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1002\/sam.11161","volume":"5","author":"A Zimek","year":"2012","unstructured":"Zimek, A., Schubert, E., & Kriegel, H. P. (2012). A survey on unsupervised outlier detection in high-dimensional numerical data. Statistical Analysis and Data Mining, 5(5), 363\u2013387.","journal-title":"Statistical Analysis and Data Mining"}],"container-title":["Machine Learning"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10994-014-5473-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10994-014-5473-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10994-014-5473-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,5]],"date-time":"2024-06-05T15:48:57Z","timestamp":1717602537000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10994-014-5473-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,4]]},"references-count":40,"journal-issue":{"issue":"1-3","published-print":{"date-parts":[[2015,10]]}},"alternative-id":["5473"],"URL":"https:\/\/doi.org\/10.1007\/s10994-014-5473-9","relation":{},"ISSN":["0885-6125","1573-0565"],"issn-type":[{"value":"0885-6125","type":"print"},{"value":"1573-0565","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,12,4]]}}}