{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T23:20:16Z","timestamp":1776381616284,"version":"3.51.2"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"26","license":[{"start":{"date-parts":[[2022,8,9]],"date-time":"2022-08-09T00:00:00Z","timestamp":1660003200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,8,9]],"date-time":"2022-08-09T00:00:00Z","timestamp":1660003200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1007\/s11042-022-13542-3","type":"journal-article","created":{"date-parts":[[2022,8,9]],"date-time":"2022-08-09T09:02:51Z","timestamp":1660035771000},"page":"37119-37135","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Comparative analysis of CN2 rule induction with other classification algorithms for network security"],"prefix":"10.1007","volume":"81","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8922-4059","authenticated-orcid":false,"given":"Neeraj","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Upendra","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,9]]},"reference":[{"key":"13542_CR1","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.eswa.2017.07.005","volume":"88","author":"IM Akashdeep","year":"2017","unstructured":"Akashdeep IM, Manzoor I, Kumar N (2017) A feature reduced intrusion detection system using ANN classifier. Expert Syst Appl 88:249\u2013257","journal-title":"Expert Syst Appl"},{"issue":"4","key":"13542_CR2","first-page":"20","volume":"88","author":"AM Almana","year":"2014","unstructured":"Almana AM, Aksoy M (2014) An overview of inductive learning algorithms. Int J Comput Appl 88(4):20\u201328","journal-title":"Int J Comput Appl"},{"key":"13542_CR3","doi-asserted-by":"crossref","unstructured":"Alqahtani H, Sarker IH, Kalim A, Hossain SMM, Ikhlaq S, Hossain S (2020) Cyber intrusion detection using machine learning classification techniques. In: International conference on computing science, communication and security. Springer, Singapore, pp 121\u2013131","DOI":"10.1007\/978-981-15-6648-6_10"},{"key":"13542_CR4","doi-asserted-by":"publisher","unstructured":"Alzahrani AO, Alenazi MJF (2021) Designing a network intrusion detection system based on machine learning for software-defined networks. Future Internet 13:111. https:\/\/doi.org\/10.3390\/fi13050111","DOI":"10.3390\/fi13050111"},{"key":"13542_CR5","doi-asserted-by":"publisher","first-page":"53346","DOI":"10.1109\/ACCESS.2020.2980937","volume":"8","author":"G Andresini","year":"2020","unstructured":"Andresini G, Appice A, Mauro ND, Loglisci C, Malerba D (2020) Multi-channel deep feature learning for intrusion detection. IEEE Access 8:53346\u201353359","journal-title":"IEEE Access"},{"key":"13542_CR6","doi-asserted-by":"crossref","unstructured":"Basori AH, Malebary SJ (2020) Deep reinforcement learning for adaptive cyber defense and attacker\u2019s pattern identification. In: Advances in cyber security analytics and decision systems. Springer, Cham, pp 15\u201325","DOI":"10.1007\/978-3-030-19353-9_2"},{"key":"13542_CR7","doi-asserted-by":"crossref","unstructured":"Clark P, Boswell R (1991) Rule induction with CN2: some recent improvements. In: European working session on learning. Springer, Berlin, pp 151\u2013163","DOI":"10.1007\/BFb0017011"},{"issue":"4","key":"13542_CR8","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/BF00116835","volume":"3","author":"P Clark","year":"1989","unstructured":"Clark P, Niblett T (1989) The CN2 induction algorithm. Mach Learn 3(4):261\u2013283","journal-title":"Mach Learn"},{"key":"13542_CR9","doi-asserted-by":"crossref","unstructured":"Ghanem WA, Jantan A (2019) A new approach for intrusion detection system based on training multilayer perceptron by using enhanced Bat algorithm. Neural Comput Appl:1\u201334","DOI":"10.1007\/s00521-019-04655-2"},{"key":"13542_CR10","doi-asserted-by":"crossref","unstructured":"Hakim L, Fatma R (2019) Influence analysis of feature selection to network intrusion detection system performance using NSL-KDD dataset. In:&nbsp;2019 International Conference on Computer Science, Information Technology, and Electrical Engineering (ICOMITEE). IEEE,&nbsp;pp 217\u2013220","DOI":"10.1109\/ICOMITEE.2019.8920961"},{"key":"13542_CR11","doi-asserted-by":"crossref","unstructured":"Hosseini S, Sardo SR (2020) Data mining tools-a case study for network intrusion detection. Multimed Tools Appl: 1\u201321","DOI":"10.1007\/s11042-020-09916-0"},{"issue":"1","key":"13542_CR12","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1049\/iet-ifs.2018.5258","volume":"13","author":"Y Jia","year":"2019","unstructured":"Jia Y, Wang M, Wang Y (2019) Network intrusion detection algorithm based on deep neural network. IET Information Security 13(1):48\u201353","journal-title":"IET Information Security"},{"issue":"10","key":"13542_CR13","doi-asserted-by":"publisher","first-page":"13593","DOI":"10.1007\/s11042-018-6913-5","volume":"78","author":"A Knutas","year":"2019","unstructured":"Knutas A, Van Roy R, Hynninen T, Granato M, Kasurinen J, Ikonen J (2019) A process for designing algorithm-based personalized gamification. Multimed Tools Appl 78(10):13593\u201313612","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"13542_CR14","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/s41066-018-0097-2","volume":"4","author":"H Liu","year":"2019","unstructured":"Liu H, Cocea M (2019) The granular computing-based approach of rule learning for binary classification. Granul Comput 4(2):275\u2013283","journal-title":"Granul Comput"},{"issue":"4","key":"13542_CR15","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/s41066-016-0021-6","volume":"1","author":"H Liu","year":"2016","unstructured":"Liu H, Gegov A, Cocea M (2016) Rule-based systems: a granular computing perspective. Granul Comput 1(4):259\u2013274","journal-title":"Granul Comput"},{"key":"13542_CR16","doi-asserted-by":"crossref","unstructured":"Martinez MAQ, Rugel DTL, Alcivar CJE, Vazquez MYL (2020) A framework for selecting classification models in the intruder detection system using TOPSIS. In: International conference on human interaction and emerging technologies. Springer, Cham,&nbsp;pp 173\u2013179","DOI":"10.1007\/978-3-030-55307-4_27"},{"key":"13542_CR17","doi-asserted-by":"crossref","unstructured":"Meerja AJ, Ashu A, Kanth AR (2019) Gaussian na\u00efve bayes based intrusion detection system. In: International conference on soft computing and pattern recognition. Springer, Cham, pp 150\u2013156","DOI":"10.1007\/978-3-030-49345-5_16"},{"key":"13542_CR18","unstructured":"Meira J et al (2019) Performance evaluation of unsupervised techniques in cyber-attack anomaly detection. J Ambient Intell Humaniz Comput:1\u201313"},{"key":"13542_CR19","doi-asserted-by":"crossref","unstructured":"Nanda NB, Parikh A (2019) A hybrid approach for network intrusion detection system using random forest classifier and rough set theory for rules generation. In: International conference on advanced informatics for computing research. Springer, Singapore, pp 274\u2013287","DOI":"10.1007\/978-981-15-0111-1_25"},{"issue":"1","key":"13542_CR20","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/BF00116251","volume":"1","author":"JR Quinlan","year":"1986","unstructured":"Quinlan JR (1986) Induction of decision trees. Mach Learn 1(1):81\u2013106","journal-title":"Mach Learn"},{"key":"13542_CR21","unstructured":"Radha Krishnan S et al (2020) Forest data visualization and land mapping using support vector machines and decision trees. Earth Sci Inform:1\u201319"},{"key":"13542_CR22","doi-asserted-by":"publisher","unstructured":"Sangeetha S, Haripriya S, Mohana Priya SG, Vaidehi V, Srinivasan N (2010) Fuzzy rule-base based intrusion detection system on application layer. In: Meghanathan N, Boumerdassi S, Chaki N, Nagamalai D (eds) Recent trends in network security and applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/978-3-642-14478-3_3","DOI":"10.1007\/978-3-642-14478-3_3"},{"key":"13542_CR23","doi-asserted-by":"crossref","unstructured":"Sikora M, Wr\u00f3bel \u0141ukasz, Gudy\u015b A (2019) GuideR: a guided separate-and-conquer rule learning in classification, regression, and survival settings. Knowl Based Syst 173:1\u201314","DOI":"10.1016\/j.knosys.2019.02.019"},{"key":"13542_CR24","doi-asserted-by":"crossref","unstructured":"Sun C, Lv K, Hu CZ et al (2018) A double-layer detection and classification approach for network attacks. In: Proceedings of the 27th International Conference on Computer Communication and Networks (ICCCN), pp 1\u20138, Hangzhou, China","DOI":"10.1109\/ICCCN.2018.8487460"},{"key":"13542_CR25","doi-asserted-by":"crossref","unstructured":"Taher KA, Mohammed Yasin B, Jisan, Rahman MM (2019) Network Intrusion detection using supervised machine learning technique with feature selection,&nbsp;2019 International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), pp 643\u2013646","DOI":"10.1109\/ICREST.2019.8644161"},{"key":"13542_CR26","doi-asserted-by":"crossref","unstructured":"Thakkar A, Lohiya R (2020) Attack classification using feature selection techniques: a comparative study. J Ambient Intell Humaniz Comput:1\u201318","DOI":"10.1007\/s12652-020-02167-9"},{"key":"13542_CR27","doi-asserted-by":"publisher","unstructured":"Teli M, Singh R, Kyada M, Mangrulkar R (2020) Network intrusion detection system using machine learning approach. In: Vasudevan H, Michalas A, Shekokar N, Narvekar M (eds) Advanced computing technologies and applicationlogies and Applications. Algorithms for intelligent systems. Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-15-3242-9_25","DOI":"10.1007\/978-981-15-3242-9_25"},{"key":"13542_CR28","doi-asserted-by":"publisher","unstructured":"Waskita AA, Suhartanto H, Persadha PD, Handoko LT (2013) A simple statistical analysis approach for intrusion detection system.&nbsp;IEEE Conference on Systems, Process & Control (ICSPC), 2013, pp 193\u2013197. https:\/\/doi.org\/10.1109\/SPC.2013.6735130","DOI":"10.1109\/SPC.2013.6735130"},{"key":"13542_CR29","doi-asserted-by":"crossref","unstructured":"Wazirali R (2020) An improved intrusion detection system based on KNN hyperparameter tuning and cross-validation. Arab J Sci Eng:1\u201315","DOI":"10.1007\/s13369-020-04907-7"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13542-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-13542-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13542-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,29]],"date-time":"2022-09-29T09:51:43Z","timestamp":1664445103000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-13542-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,9]]},"references-count":29,"journal-issue":{"issue":"26","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["13542"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-13542-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,9]]},"assertion":[{"value":"29 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 August 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 May 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 August 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}