{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T12:37:11Z","timestamp":1771677431460,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,10,2]],"date-time":"2020-10-02T00:00:00Z","timestamp":1601596800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,10,2]],"date-time":"2020-10-02T00:00:00Z","timestamp":1601596800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,2]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>With the growth of data mining and machine learning approaches in recent years, many efforts have been made to generalize these sciences so that researchers from any field can easily utilize these sciences. One of the most important of these efforts is the development of data mining tools that try to hide the complexities from researchers so that they can achieve a professional output with any level of knowledge. This paper is focused on reviewing and comparing data mining and machine learning tools including WEKA, KNIME, Keel, Orange, Azure, IBM SPSS Modeler, R and Scikit-Learn to show what approach each of these methods has taken in the face of the complexities and problems of different scenarios of generalization of data mining and machine learning. In addition, for a more detailed review, this paper examines the challenge of network intrusion detection in two tools, Knime with graphical interface and Scikit-Learn with coding environment.<\/jats:p>","DOI":"10.1007\/s11042-020-09916-0","type":"journal-article","created":{"date-parts":[[2020,10,2]],"date-time":"2020-10-02T20:02:25Z","timestamp":1601668945000},"page":"4999-5019","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Data mining tools -a case study for network intrusion detection"],"prefix":"10.1007","volume":"80","author":[{"given":"Soodeh","family":"Hosseini","sequence":"first","affiliation":[]},{"given":"Saman Rafiee","family":"Sardo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,2]]},"reference":[{"key":"9916_CR1","first-page":"1","volume":"36","author":"M Abdar","year":"2015","unstructured":"Abdar M (2015) A survey and compare the performance of IBM SPSS modeler and rapid miner software for predicting liver disease by using various data mining algorithms. J Sci (CSJ) 36:1\u201312","journal-title":"J Sci (CSJ)"},{"key":"9916_CR2","first-page":"255","volume":"17","author":"J Alcal\u00e1-Fdez","year":"2011","unstructured":"Alcal\u00e1-Fdez J, Fern\u00e1ndez A, Luengo J, Derrac J, Garc\u00eda S, S\u00e1nchez L, Herrera F (2011) Keel data-mining software tool: data set repository, integration of algorithms and experimental analysis framework. J Multiple-Valued Logic Soft Comput 17:255\u2013287","journal-title":"J Multiple-Valued Logic Soft Comput"},{"issue":"3","key":"9916_CR3","first-page":"e1204","volume":"7","author":"AH Altalhi","year":"2017","unstructured":"Altalhi AH, Luna JM, Vallejo M, Ventura S (2017) Evaluation and comparison of open source software suites for data mining and knowledge discovery. Wiley Interdisc Rev: Data Mining Knowl Discov 7(3):e1204","journal-title":"Wiley Interdisc Rev: Data Mining Knowl Discov"},{"issue":"5\u20136","key":"9916_CR4","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1080\/713827181","volume":"17","author":"GE Batista","year":"2003","unstructured":"Batista GE, Monard MC (2003) An analysis of four missing data treatment methods for supervised learning. Appl Artif Intell 17(5\u20136):519\u2013533","journal-title":"Appl Artif Intell"},{"issue":"1","key":"9916_CR5","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1145\/1656274.1656280","volume":"11","author":"MR Berthold","year":"2009","unstructured":"Berthold MR, Cebron N, Dill F, Gabriel TR, K\u00f6tter T, Meinl T, Ohl P, Thiel K, Wiswedel B (2009) KNIME-the Konstanz information miner: version 2.0 and beyond. AcM SIGKDD Explorations Newslett 11(1):26\u201331","journal-title":"AcM SIGKDD Explorations Newslett"},{"issue":"7","key":"9916_CR6","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1016\/j.comcom.2012.01.016","volume":"35","author":"P Casas","year":"2012","unstructured":"Casas P, Mazel J, Owezarski P (2012) Unsupervised network intrusion detection systems: detecting the unknown without knowledge. Comput Commun 35(7):772\u2013783","journal-title":"Comput Commun"},{"key":"9916_CR7","doi-asserted-by":"crossref","unstructured":"Chappel, D. (2015) Introduction Azure machine learning: a guide for technical professionals. Chappel & Associates 2015: 1\u201317","DOI":"10.1002\/9781119183464.ch2"},{"key":"9916_CR8","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.compag.2018.10.024","volume":"155","author":"D Elavarasan","year":"2018","unstructured":"Elavarasan D, Vincent DR, Sharma V, Zomaya AY, Srinivasan K (2018) Forecasting yield by integrating agrarian factors and machine learning models: a survey. Comput Electron Agric 155:257\u2013282","journal-title":"Comput Electron Agric"},{"key":"9916_CR9","unstructured":"Elder JF, Abbott DW (1998) A comparison of leading data mining tools. Fourth International Conference on Knowledge Discovery and Data Mining, pp. 1\u201368"},{"key":"9916_CR10","doi-asserted-by":"publisher","first-page":"958","DOI":"10.1016\/j.neucom.2015.08.051","volume":"173","author":"G-F Fan","year":"2016","unstructured":"Fan G-F, Peng L-L, Hong W-C, Sun F (2016) Electric load forecasting by the SVR model with differential empirical mode decomposition and auto regression. Neurocomputing 173:958\u2013970","journal-title":"Neurocomputing"},{"issue":"1","key":"9916_CR11","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/846170.846172","volume":"1","author":"M Goebel","year":"1999","unstructured":"Goebel M, Gruenwald L (1999) A survey of data mining and knowledge discovery software tools. ACM SIGKDD Explorations Newslett 1(1):20\u201333","journal-title":"ACM SIGKDD Explorations Newslett"},{"key":"9916_CR12","doi-asserted-by":"crossref","unstructured":"Graczyk M, Lasota T, Trawi\u0144ski B (2009) Comparative analysis of premises valuation models using KEEL, RapidMiner, and WEKA. International conference on computational collective intelligence: Springer. pp. 800-812","DOI":"10.1007\/978-3-642-04441-0_70"},{"key":"9916_CR13","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1016\/j.ins.2019.10.069","volume":"513","author":"MM Hassan","year":"2020","unstructured":"Hassan MM, Gumaei A, Alsanad A, Alrubaian M, Fortino G (2020) A hybrid deep learning model for efficient intrusion detection in big data environment. Inf Sci 513:386\u2013396","journal-title":"Inf Sci"},{"key":"9916_CR14","unstructured":"Hodo E, Bellekens X, Hamilton A, Tachtatzis C, Atkinson R (2017) Shallow and deep networks intrusion detection system: A taxonomy and survey. arXiv preprint arXiv:1701.02145"},{"issue":"9","key":"9916_CR15","doi-asserted-by":"publisher","first-page":"5568","DOI":"10.1016\/j.energy.2011.07.015","volume":"36","author":"W-C Hong","year":"2011","unstructured":"Hong W-C (2011) Electric load forecasting by seasonal recurrent SVR (support vector regression) with chaotic artificial bee colony algorithm. Energy 36(9):5568\u20135578","journal-title":"Energy"},{"issue":"1","key":"9916_CR16","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1016\/j.ijepes.2012.08.010","volume":"44","author":"W-C Hong","year":"2013","unstructured":"Hong W-C, Dong Y, Zhang WY, Chen L-Y, Panigrahi B (2013) Cyclic electric load forecasting by seasonal SVR with chaotic genetic algorithm. Int J Electr Power Energy Syst 44(1):604\u2013614","journal-title":"Int J Electr Power Energy Syst"},{"key":"9916_CR17","doi-asserted-by":"crossref","unstructured":"Jovic A, Brkic K, Bogunovic N (2014) An overview of free software tools for general data mining. 2014 37th international Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO): IEEE. pp. 1112\u20131117","DOI":"10.1109\/MIPRO.2014.6859735"},{"key":"9916_CR18","unstructured":"Juniper Networks (2015) Juniper Networks - How many Packets per Second per port are needed to achieve Wire-Speed?\" https:\/\/www.kb.juniper.net\/InfoCenter\/index?page=contentfn&gid=KB14737. Accessed 22 Feb 2020"},{"issue":"9","key":"9916_CR19","first-page":"930","volume":"4","author":"BB Kadaru","year":"2017","unstructured":"Kadaru BB, UmaMaheswararao M (2017) An overview of general data mining tools. Int Res J Eng Technol 4(9):930\u2013936","journal-title":"Int Res J Eng Technol"},{"issue":"4","key":"9916_CR20","doi-asserted-by":"publisher","first-page":"2579","DOI":"10.1007\/s11071-019-05149-5","volume":"97","author":"M-W Li","year":"2019","unstructured":"Li M-W, Geng J, Hong W-C, Zhang L-D (2019) Periodogram estimation based on LSSVR-CCPSO compensation for forecasting ship motion. Nonlinear Dyn 97(4):2579\u20132594","journal-title":"Nonlinear Dyn"},{"issue":"4","key":"9916_CR21","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1023\/A:1016304305535","volume":"6","author":"H Liu","year":"2002","unstructured":"Liu H, Hussain F, Tan CL, Dash M (2002) Discretization: an enabling technique. Data Min Knowl Disc 6(4):393\u2013423","journal-title":"Data Min Knowl Disc"},{"issue":"4","key":"9916_CR22","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1145\/382912.382923","volume":"3","author":"J McHugh","year":"2000","unstructured":"McHugh J (2000) Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by Lincoln laboratory. ACM Trans Info System Secur (TISSEC) 3(4):262\u2013294","journal-title":"ACM Trans Info System Secur (TISSEC)"},{"issue":"5","key":"9916_CR23","first-page":"431","volume":"1","author":"R Mikut","year":"2011","unstructured":"Mikut R, Reischl M (2011) Data mining tools. Wiley Interdisc Rev: Data Mining Knowl Discov 1(5):431\u2013443","journal-title":"Wiley Interdisc Rev: Data Mining Knowl Discov"},{"key":"9916_CR24","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1016\/j.procs.2016.05.251","volume":"85","author":"A Naik","year":"2016","unstructured":"Naik A, Samant L (2016) Correlation review of classification algorithm using data mining tool: WEKA, Rapidminer, Tanagra, Orange and Knime. Procedia Comp Sci 85:662\u2013668","journal-title":"Procedia Comp Sci"},{"issue":"11","key":"9916_CR25","doi-asserted-by":"publisher","first-page":"1424","DOI":"10.1109\/TPAMI.2004.105","volume":"26","author":"I-S Oh","year":"2004","unstructured":"Oh I-S, Lee J-S, Moon B-R (2004) Hybrid genetic algorithms for feature selection. IEEE Trans Pattern Anal Mach Intell 26(11):1424\u20131437","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"9916_CR26","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V (2011) Scikit-learn: machine learning in Python. J Mach Learn Res 12:2825\u20132830","journal-title":"J Mach Learn Res"},{"key":"9916_CR27","unstructured":"Pop, D., & Iuhasz, G. Overview of machine learning tools and libraries. Inst. e-Austria Timisoara."},{"key":"9916_CR28","first-page":"128","volume":"2015","author":"R Raut","year":"2015","unstructured":"Raut R, Nathe A (2015) Comparative study of commercial data mining tools. Int J Electron Commun Soft Comput Sci Eng (IJECSCSE) 2015:128\u2013132","journal-title":"Int J Electron Commun Soft Comput Sci Eng (IJECSCSE)"},{"key":"9916_CR29","unstructured":"Rexer K, Gearan P, Allen H (2015) Data science survey. Rexer Analytics. Winchester, Massachusetts, 2015"},{"key":"9916_CR30","doi-asserted-by":"crossref","unstructured":"Rodr\u00edguez-Fdez I, Canosa A, Mucientes M, Bugar\u00edn A (2015) STAC: a web platform for the comparison of algorithms using statistical tests. 2015 IEEE international conference on fuzzy systems (FUZZ-IEEE): IEEE. pp. 1-8","DOI":"10.1109\/FUZZ-IEEE.2015.7337889"},{"key":"9916_CR31","unstructured":"Tan, P.-N., Steinbach, M., & Kumar, V (2006) Introduction to data mining, Pearson education. Inc., New Delhi."},{"key":"9916_CR32","doi-asserted-by":"crossref","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. IEEE symposium on computational intelligence for security and defense applications: IEEE. p. 1\u20136","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"9916_CR33","volume-title":"R language definition","author":"RC Team","year":"2000","unstructured":"Team RC (2000) R language definition. R foundation for statistical computing, Vienna"},{"issue":"3","key":"9916_CR34","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1023\/A:1007626913721","volume":"38","author":"DR Wilson","year":"2000","unstructured":"Wilson DR, Martinez TR (2000) Reduction techniques for instance-based learning algorithms. Mach Learn 38(3):257\u2013286","journal-title":"Mach Learn"},{"issue":"2","key":"9916_CR35","doi-asserted-by":"publisher","first-page":"1107","DOI":"10.1007\/s11071-019-05252-7","volume":"98","author":"Z Zhang","year":"2019","unstructured":"Zhang Z, Hong W-C (2019) Electric load forecasting by complete ensemble empirical mode decomposition adaptive noise and support vector regression with quantum-based dragonfly algorithm. Nonlinear Dynamics 98(2):1107\u20131136","journal-title":"Nonlinear Dynamics"},{"key":"9916_CR36","doi-asserted-by":"publisher","first-page":"14642","DOI":"10.1109\/ACCESS.2020.2966712","volume":"8","author":"Z Zhang","year":"2020","unstructured":"Zhang Z, Hong W-C, Li J (2020) Electric load forecasting by hybrid self-recurrent support vector regression model with variational mode decomposition and improved cuckoo search algorithm. IEEE Access 8:14642\u201314658","journal-title":"IEEE Access"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09916-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09916-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09916-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,2]],"date-time":"2021-10-02T01:11:13Z","timestamp":1633137073000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09916-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,2]]},"references-count":36,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["9916"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09916-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,2]]},"assertion":[{"value":"7 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 September 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 October 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}