{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T20:01:14Z","timestamp":1743019274323,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030150310"},{"type":"electronic","value":"9783030150327"}],"license":[{"start":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T00:00:00Z","timestamp":1552608000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-15032-7_39","type":"book-chapter","created":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T08:30:46Z","timestamp":1552552246000},"page":"458-469","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation"],"prefix":"10.1007","author":[{"given":"Yan Naung","family":"Soe","sequence":"first","affiliation":[]},{"given":"Yaokai","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Paulus Insap","family":"Santosa","sequence":"additional","affiliation":[]},{"given":"Rudy","family":"Hartanto","sequence":"additional","affiliation":[]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,15]]},"reference":[{"unstructured":"Andra, U.: Network Security in the Age of Hyperconnectivity_ Pervasive, Proactive, and Persistent Protection is Essential to Thwart Cyberattacks. \n https:\/\/blogs.cisco.com\/sp\/network-security-in-the-age-of-hyperconnectivity-pervasive-proactive-and-persistent-protection-is-essential-to-thwart-cyberattacks","key":"39_CR1"},{"key":"39_CR2","first-page":"33","volume":"4","author":"A Ashari","year":"2013","unstructured":"Ashari, A., Paryudi, I., Min, A.: Performance comparison between Na\u00efve Bayes, decision tree and k-nearest neighbor in searching alternative design in an energy simulation tool. Int. J. Adv. Comput. Sci. Appl. 4, 33\u201339 (2013)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"doi-asserted-by":"crossref","unstructured":"Cervantes, C., Poplade, D., Nogueira, M., Santos, A.: Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for internet of things. In: Proceedings of the 2015 IFIP\/IEEE International Symposium on Integrated Network Management, IM 2015, pp. 606\u2013611 (2015)","key":"39_CR3","DOI":"10.1109\/INM.2015.7140344"},{"key":"39_CR4","first-page":"446","volume":"4","author":"L Dhanabal","year":"2015","unstructured":"Dhanabal, L., Shantharajah, S.P.: A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. Int. J. Adv. Res. Comput. Commun. Eng. 4, 446\u2013452 (2015)","journal-title":"Int. J. Adv. Res. Comput. Commun. Eng."},{"doi-asserted-by":"crossref","unstructured":"Feng, Y., Akiyama, H., Lu, L., Sakurai, K.: Feature selection for machine learning-based early detection of distributed cyber attacks. In: The IEEE Cyber Science and Technology Congress (CyberSciTech), CyberSciTech 2018, pp. 173\u2013180 (2018)","key":"39_CR5","DOI":"10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00040"},{"issue":"3","key":"39_CR6","first-page":"527","volume":"21","author":"Y Feng","year":"2013","unstructured":"Feng, Y., Hori, Y., Sakurai, K., Takeuchi, J.: A behavior-based method for detecting distributed scan attacks in darknets. J. Inf. Process. (JIP) 21(3), 527\u2013538 (2013)","journal-title":"J. Inf. Process. (JIP)"},{"key":"39_CR7","first-page":"6","volume":"2017","author":"Y Fu","year":"2017","unstructured":"Fu, Y., Yan, Z., Cao, J., Kon\u00e9, O., Cao, X.: An automata based intrusion detection method for internet of things. Mob. Inf. Syst. 2017, 6\u201310 (2017)","journal-title":"Mob. Inf. Syst."},{"doi-asserted-by":"crossref","unstructured":"Guo, Z., Harris, I.G., Jiang, Y., Tsaur, L.F.: An efficient approach to prevent battery exhaustion attack on BLE-based mesh networks. In: 2017 International Conference on Computing, Networking and Communications, ICNC 2017, pp. 1\u20135 (2017)","key":"39_CR8","DOI":"10.1109\/ICCNC.2017.7876092"},{"unstructured":"Hall, M.A.: Correlation-Based Feature Selection for Machine Learning. Department of Computer Science, The University of Waikato (1999)","key":"39_CR9"},{"unstructured":"Kaspersky Lab: Amount of Malware Targeting Smart Devices more than Doubled in 2017 (2017). \n https:\/\/www.kaspersky.com\/about\/press-releases\/2017_amount-of-malware","key":"39_CR10"},{"issue":"1\u20132","key":"39_CR11","first-page":"273","volume":"97","author":"R Kohavi","year":"1996","unstructured":"Kohavi, R., John, G.: Wrappers for feature subset selection. Artif. Intell. Spec. Issue Relevance 97(1\u20132), 273\u2013324 (1996)","journal-title":"Artif. Intell. Spec. Issue Relevance"},{"unstructured":"Kohavi, R., Sommerfield, D.: Feature subset selection using the wrapper method: overfitting and dynamic search space topology. In: The First International Conference on Knowledge Discovery and Data Mining (1995)","key":"39_CR12"},{"doi-asserted-by":"crossref","unstructured":"Kuhn, M., Johnson, K.: An introduction to feature selection. In: Applied Predictive Modeling, pp. 487\u2013519 (2013)","key":"39_CR13","DOI":"10.1007\/978-1-4614-6849-3_19"},{"doi-asserted-by":"crossref","unstructured":"Kumar, R., Sharma, D.: HyINT: signature-anomaly intrusion detection system. In: 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1\u20137 (2018)","key":"39_CR14","DOI":"10.1109\/ICCCNT.2018.8494088"},{"doi-asserted-by":"crossref","unstructured":"Kyaw, A.K., Chen, Y., Joseph, J.: Pi-IDS: evaluation of open-source intrusion detection systems on Raspberry Pi 2. In: 2015 2nd International Conference on Information Security and Cyber Forensics, InfoSec 2015, pp. 165\u2013170 (2016)","key":"39_CR15","DOI":"10.1109\/InfoSec.2015.7435523"},{"unstructured":"Witten, I.H., Frank, E.: Data mining: practical machine learning tools and techniques. In: Library of Congress Cataloging-in-Publication Data (2005)","key":"39_CR16"},{"doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: The significant features of the UNSW-NB15 and the KDD99 data sets for network intrusion detection systems. In: Proceedings - 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS 2015, pp. 25\u201331 (2017)","key":"39_CR17","DOI":"10.1109\/BADGERS.2015.014"},{"doi-asserted-by":"crossref","unstructured":"Moustafa, M., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: Proceedings of 2015 Military Communications and Information Systems Conference, MilCIS 2015 (2015)","key":"39_CR18","DOI":"10.1109\/MilCIS.2015.7348942"},{"doi-asserted-by":"crossref","unstructured":"Pacheco, J., Zhu, X., Badr, Y., Hariri, S.: Enabling risk management for smart infrastructures with an anomaly behavior analysis intrusion detection system. In: Proceedings - 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems, FAS*W 2017, pp. 324\u2013328 (2017)","key":"39_CR19","DOI":"10.1109\/FAS-W.2017.167"},{"doi-asserted-by":"crossref","unstructured":"Sforzin, A., Marmol, A.G., Conti, M., Bohli, J.M.: RPiDS: Raspberry Pi IDS - a fruitful intrusion detection system for IoT. In: 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress, pp. 440\u2013448 (2016)","key":"39_CR20","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0080"},{"unstructured":"Cardoso, D.S., Lopes, R.F., Teles, A.S., Magalhaes, F.B.V.: Real-time DDoS detection based on complex event processing for IoT. In: Proceedings - ACM\/IEEE International Conference on Internet of Things Design and Implementation, IoTDI 2018, pp. 273\u2013274 (2018)","key":"39_CR21"},{"key":"39_CR22","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1145\/380995.381030","volume":"2","author":"SD Bay","year":"2000","unstructured":"Bay, S.D., Kibler, D., Pazzani, M.J., Smyth, P.: The UCI KDD archive of large data sets for data mining research and experimentation. SIGKDD Explor. 2, 81 (2000)","journal-title":"SIGKDD Explor."},{"unstructured":"Sperling, T.L., Caldas Filho, F.L., Sousa, R.T., Martins, L.M., Rocha, R.L.: Tracking intruders in IoT networks by means of DNS traffic analysis. In: 2017 Workshop on Communication Networks and Power Systems (WCNPS), pp. 1\u20134 (2017)","key":"39_CR23"},{"unstructured":"Zena, M.H., Gillies, D.F.: A review of feature selection and feature extraction methods applied on microarray data. Adv. Bioinform. 2015, 198363, 1\u201313 (2015)","key":"39_CR24"},{"doi-asserted-by":"crossref","unstructured":"Zitta, T., Neruda, M., Vojtech, L.: The security of RFID readers with IDS\/IPS solution using Raspberry Pi\u2019. In: 2017 18th International Carpathian Control Conference, ICCC 2017, pp. 316\u2013320 (2017)","key":"39_CR25","DOI":"10.1109\/CarpathianCC.2017.7970418"}],"container-title":["Advances in Intelligent Systems and Computing","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-15032-7_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T02:33:42Z","timestamp":1558146822000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-15032-7_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,15]]},"ISBN":["9783030150310","9783030150327"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-15032-7_39","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,3,15]]},"assertion":[{"value":"15 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Matsue","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 March 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 March 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"33","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}