{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:41:14Z","timestamp":1773247274638,"version":"3.50.1"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,6,24]],"date-time":"2014-06-24T00:00:00Z","timestamp":1403568000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s13198-014-0277-7","type":"journal-article","created":{"date-parts":[[2014,6,23]],"date-time":"2014-06-23T09:59:57Z","timestamp":1403517597000},"page":"567-576","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":101,"title":["HIDS: A host based intrusion detection system for cloud computing environment"],"prefix":"10.1007","volume":"9","author":[{"given":"Prachi","family":"Deshpande","sequence":"first","affiliation":[]},{"given":"S. C.","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"S. K.","family":"Peddoju","sequence":"additional","affiliation":[]},{"given":"S.","family":"Junaid","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,6,24]]},"reference":[{"issue":"3","key":"277_CR1","first-page":"328","volume":"4","author":"A Abraham","year":"2007","unstructured":"Abraham A, Grosan C, Martin-Vide C (2007) Evolutionary design of intrusion detection programs. Int J Netw Secur 4(3):328\u2013339","journal-title":"Int J Netw Secur"},{"key":"277_CR2","doi-asserted-by":"crossref","unstructured":"Aggarwal C, Zhai C (2012) A survey of text classification algorithms. In: Mining Text Data. New york, Springer 163\u2013222","DOI":"10.1007\/978-1-4614-3223-4_6"},{"key":"277_CR3","volume-title":"Computer security threat monitoring and surveillance, Technical report","author":"J Anderson","year":"1980","unstructured":"Anderson J (1980) Computer security threat monitoring and surveillance, Technical report. James P. Anderson Co., Fort Washington"},{"issue":"3","key":"277_CR4","first-page":"163","volume":"3","author":"F Barbhuiya","year":"2011","unstructured":"Barbhuiya F et al (2011) An active host-based intrusion detection system for ARP-related attacks and its verification. Int J Net Sec App 3(3):163\u2013180","journal-title":"Int J Net Sec App"},{"issue":"10","key":"277_CR5","doi-asserted-by":"crossref","first-page":"778","DOI":"10.1631\/jzus.C0910625","volume":"11","author":"L Cai","year":"2010","unstructured":"Cai L, Chen J, Ke Y, Chen T, Li Z (2010) A new data normalization method for unsupervised anomaly intrusion detection. J Zhejiang Uni-SCI C 11(10):778\u2013784","journal-title":"J Zhejiang Uni-SCI C"},{"issue":"2","key":"277_CR6","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"13","author":"D Denning","year":"1987","unstructured":"Denning D (1987) An intrusion detection model. IEEE Trans Soft Eng 13(2):222\u2013232","journal-title":"IEEE Trans Soft Eng"},{"issue":"2","key":"277_CR7","first-page":"635","volume":"259","author":"P Deshpande","year":"2013","unstructured":"Deshpande P, Sharma S, Kumar S (2013) Implementation of a private cloud: a case study. Adv Int Sys Comp 259(2):635\u2013648","journal-title":"Adv Int Sys Comp"},{"key":"277_CR8","doi-asserted-by":"publisher","unstructured":"Doelitzscher F et al (2012) An agent based business aware incident detection system for cloud environments. J Cloud Comp Adv Sys App 1\u20139. doi: 10.1186\/2192-113X-1-9","DOI":"10.1186\/2192-113X-1-9"},{"key":"277_CR9","doi-asserted-by":"crossref","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","volume":"27","author":"T Fawcett","year":"2006","unstructured":"Fawcett T (2006) An introduction to ROC analysis. Patt Recog Lett 27:861\u2013874","journal-title":"Patt Recog Lett"},{"key":"277_CR10","first-page":"120","volume-title":"A sense of self for Unix processes","author":"S Forrest","year":"1996","unstructured":"Forrest S, Hofmeyr A, Somayaji A, Longsta T (1996) A sense of self for Unix processes. IEEE Symp Security and Privacy, Oakland, pp 120\u2013128"},{"key":"277_CR11","unstructured":"Ghosh A, Schwartzbard A, Shatz A (1999) Learning program behavior profiles for intrusion detection. In:\u00a0Proceedings of the Ist USENIX workshop on intrusion detection and network monitoring, Santa Clara, California, USA, pp 51\u201362"},{"issue":"5","key":"277_CR12","first-page":"1850","volume":"2","author":"P Htun","year":"2013","unstructured":"Htun P, Khaing K (2013) Important roles of data mining techniques for anomaly intrusion detection system. Int J Adv Res Comp Eng Tech 2(5):1850\u20131854","journal-title":"Int J Adv Res Comp Eng Tech"},{"key":"277_CR13","unstructured":"KDD\u201999 datasets, The UCI KDD Archive Irvine, CA, USA, 1999 [online] http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"},{"key":"277_CR14","unstructured":"Lee W, Stolfo S,and Chan P (1997) Learning patterns from UNIX process execution traces for intrusion detection. In: Proceedings of the AAAI Workshop on AI Models in Fraud and Risk Management, Stanford, pp 50\u201356"},{"key":"277_CR15","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.jnca.2012.05.003","volume":"36","author":"C Modi","year":"2013","unstructured":"Modi C et al (2013) A survey of intrusion detection techniques in cloud. J Netw Comp App 36:42\u201357","journal-title":"J Netw Comp App"},{"key":"277_CR16","unstructured":"Mukkamala S, Sung A, Abraham A (2004) Designing intrusion detection systems: architectures and perspectives. Annual review of communications, The Int Eng Consortium (IEC), Chicago, 57:1229\u20131241"},{"issue":"2","key":"277_CR17","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1109\/69.591456","volume":"9","author":"T Payne","year":"1997","unstructured":"Payne T et al (1997) Experience with rule induction and k-nearest neighbor methods for interface agents that learn. IEEE Trans Knowl Data Eng 9(2):329\u2013335","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"277_CR18","first-page":"43","volume":"1","author":"S Rawat","year":"2006","unstructured":"Rawat S et al (2006) Intrusion detection using text processing techniques with a binary-weighted cosine metric. J Info Assur Security 1:43\u201350","journal-title":"J Info Assur Security"},{"key":"277_CR19","unstructured":"Tandon G and Chan P (2005) Learning useful system call attributes for anomaly detection. In: Proceedings of the 18th International Artificial Intelligence Research Society Conference, Florida, pp 405\u2013410"},{"key":"277_CR20","doi-asserted-by":"crossref","unstructured":"Vokorokos L. and Balaz A (2010) Host-based intrusion detection system. In: 14th International Conference on Intelligent Engineering System, Spain, pp 43\u201347","DOI":"10.1109\/INES.2010.5483815"},{"key":"277_CR21","first-page":"133","volume-title":"Detecting intrusions using system calls: alternative data models","author":"C Warrender","year":"1999","unstructured":"Warrender C, Forrest S, Pearlmutter B (1999) Detecting intrusions using system calls: alternative data models. IEEE Symposium on Security and Privacy, Oakland, pp 133\u2013145"},{"key":"277_CR22","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1007\/3-540-39945-3_8","volume":"1907","author":"A Wespi","year":"2000","unstructured":"Wespi A, Dacier M, Debar H (2000) Intrusion detection using variable length audit trail patterns. Recent Adv Intru Det 1907:110\u2013129","journal-title":"Recent Adv Intru Det"},{"key":"277_CR23","unstructured":"Ying L, Yan Z, Jia O (2010) The design and implementation of host-based intrusion detection system. In: Third International Symposium on Intelligent Information Technology and Security Information, Jinggangshan, pp 595\u2013598"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-014-0277-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13198-014-0277-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-014-0277-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-014-0277-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,11]],"date-time":"2019-08-11T20:34:05Z","timestamp":1565555645000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13198-014-0277-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,24]]},"references-count":23,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["277"],"URL":"https:\/\/doi.org\/10.1007\/s13198-014-0277-7","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"value":"0975-6809","type":"print"},{"value":"0976-4348","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,6,24]]}}}