{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T14:47:24Z","timestamp":1725806844334},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319116976"},{"type":"electronic","value":"9783319116983"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11698-3_44","type":"book-chapter","created":{"date-parts":[[2014,10,9]],"date-time":"2014-10-09T01:18:13Z","timestamp":1412817493000},"page":"542-549","source":"Crossref","is-referenced-by-count":38,"title":["Evaluating Host-Based Anomaly Detection Systems: Application of the Frequency-Based Algorithms to ADFA-LD"],"prefix":"10.1007","author":[{"given":"Miao","family":"Xie","sequence":"first","affiliation":[]},{"given":"Jiankun","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Xinghuo","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Elizabeth","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"44_CR1","doi-asserted-by":"crossref","unstructured":"Stavroulakis, P., Stamp, M.: Handbook of information and communication security. Springer (2010)","DOI":"10.1007\/978-3-642-04117-4"},{"key":"44_CR2","unstructured":"http:\/\/www.cs.unm.edu\/~immsec\/systemcalls.htm"},{"key":"44_CR3","unstructured":"http:\/\/www.ll.mit.edu\/mission\/communications\/cyber\/CSTcorpora\/ideval\/data\/"},{"key":"44_CR4","unstructured":"Forrest, S., Hofmeyr, S., Somayaji, A., Longstaff, T.A.: A sense of self for Unix processes. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 120\u2013128 (1996)"},{"key":"44_CR5","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/52.605929","volume":"14","author":"A.P. Kosoresow","year":"1997","unstructured":"Kosoresow, A.P., Hofmeyer, S.A.: Intrusion detection via system call traces. IEEE Software\u00a014, 35\u201342 (1997)","journal-title":"IEEE Software"},{"key":"44_CR6","doi-asserted-by":"crossref","unstructured":"Forrest, S., Hofmeyr, S., Somayaji, A.: The Evolution of System-Call Monitoring. In: Annual Computer Security Applications Conference, ACSAC 2008, pp. 418\u2013430 (2008)","DOI":"10.1109\/ACSAC.2008.54"},{"key":"44_CR7","unstructured":"Eskin, E., Wenke, L., Stolfo, S.J.: Modeling system calls for intrusion detection with dynamic window sizes. In: Proceedings of the DARPA Information Survivability Conference Exposition II, DISCEX 2001, pp. 165\u2013175 (2001)"},{"key":"44_CR8","unstructured":"Hoang, X.D., Hu, J.: An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system calls. In: Proceedings of the 12th IEEE International Conference on Networks (ICON 2004), pp. 470\u2013474 (2004)"},{"key":"44_CR9","doi-asserted-by":"publisher","first-page":"1219","DOI":"10.1016\/j.jnca.2009.05.004","volume":"32","author":"X.D. Hoang","year":"2009","unstructured":"Hoang, X.D., Hu, J., Bertok, P.: A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference. Journal of Network and Computer Applications\u00a032, 1219\u20131228 (2009)","journal-title":"Journal of Network and Computer Applications"},{"key":"44_CR10","doi-asserted-by":"crossref","unstructured":"Creech, G., Hu, J.: Generation of a new IDS test dataset: Time to retire the KDD collection. In: 2013 IEEE Wireless Communications and Networking Conference (WCNC), pp. 4487\u20134492 (2013)","DOI":"10.1109\/WCNC.2013.6555301"},{"key":"44_CR11","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1109\/TC.2013.13","volume":"63","author":"G. Creech","year":"2014","unstructured":"Creech, G., Hu, J.: A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguous and Discontiguous System Call Patterns. IEEE Transactions on Computers\u00a063, 807\u2013819 (2014)","journal-title":"IEEE Transactions on Computers"},{"key":"44_CR12","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1016\/S0167-4048(02)00514-X","volume":"21","author":"Y. Liao","year":"2002","unstructured":"Liao, Y., Vemuri, V.R.: Use of K-nearest neighbor classifier for intrusion detection. Computers & Security\u00a021, 439\u2013448 (2002)","journal-title":"Computers & Security"},{"key":"44_CR13","doi-asserted-by":"publisher","first-page":"2617","DOI":"10.1016\/j.cor.2004.03.019","volume":"32","author":"W.-H. Chen","year":"2005","unstructured":"Chen, W.-H., Hsu, S.-H., Shen, H.-P.: Application of SVM and ANN for intrusion detection. Computers & Operations Research\u00a032, 2617\u20132634 (2005)","journal-title":"Computers & Operations Research"},{"key":"44_CR14","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1016\/j.cose.2007.10.003","volume":"26","author":"A. Sharma","year":"2007","unstructured":"Sharma, A., Pujari, A.K., Paliwal, K.K.: Intrusion detection using text processing techniques with a kernel based similarity measure. Computers & Security\u00a026, 488\u2013495 (2007)","journal-title":"Computers & Security"},{"key":"44_CR15","doi-asserted-by":"crossref","unstructured":"Xie, M., Hu, J.: Evaluating host-based anomaly detection systems: A preliminary analysis of ADFA-LD. In: 2013 6th International Congress on Image and Signal Processing (CISP), pp. 1711\u20131716 (2013)","DOI":"10.1109\/CISP.2013.6743952"},{"key":"44_CR16","unstructured":"http:\/\/osinside.net\/syscall\/system_call_table.htm"},{"key":"44_CR17","doi-asserted-by":"crossref","unstructured":"Jolliffe, I.: Principal component analysis. Wiley Online Library (2005)","DOI":"10.1002\/0470013192.bsa501"},{"key":"44_CR18","doi-asserted-by":"crossref","unstructured":"Xie, M., Han, S., Tian, B.: Highly Efficient Distance-Based Anomaly Detection through Univariate with PCA in Wireless Sensor Networks. In: 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 564\u2013571 (2011)","DOI":"10.1109\/TrustCom.2011.73"},{"key":"44_CR19","doi-asserted-by":"crossref","unstructured":"Xie, M., Hu, J., Tian, B.: Histogram-Based Online Anomaly Detection in Hierarchical Wireless Sensor Networks. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 751\u2013759 (2012)","DOI":"10.1109\/TrustCom.2012.173"},{"key":"44_CR20","doi-asserted-by":"publisher","first-page":"1661","DOI":"10.1109\/TPDS.2012.261","volume":"24","author":"M. Xie","year":"2013","unstructured":"Xie, M., Hu, J., Han, S., Chen, H.-H.: Scalable Hypergrid k-NN-Based Online Anomaly Detection in Wireless Sensor Networks. IEEE Transactions on Parallel and Distributed Systems\u00a024, 1661\u20131670 (2013)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"44_CR21","doi-asserted-by":"crossref","unstructured":"Hu, J., Gingrich, D., Sentosa, A.: A k-Nearest Neighbor Approach for User Authentication through Biometric Keystroke Dynamics. In: IEEE International Conference on Communications, ICC 2008, pp. 1556\u20131560 (2008)","DOI":"10.1109\/ICC.2008.301"},{"key":"44_CR22","doi-asserted-by":"crossref","unstructured":"Hartigan, J.A., Wong, M.A.: Algorithm AS 136: A k-means clustering algorithm. Applied Statistics, 100\u2013108 (1979)","DOI":"10.2307\/2346830"},{"key":"44_CR23","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1016\/j.jnca.2010.01.003","volume":"33","author":"A.N. Mahmood","year":"2010","unstructured":"Mahmood, A.N., Hu, J., Tari, Z., Leckie, C.: Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic. Journal of Network and Computer Applications\u00a033, 491\u2013502 (2010)","journal-title":"Journal of Network and Computer Applications"},{"key":"44_CR24","doi-asserted-by":"publisher","first-page":"1632","DOI":"10.1093\/comjnl\/bxr064","volume":"54","author":"K. Xi","year":"2011","unstructured":"Xi, K., Tang, Y., Hu, J.: Correlation keystroke verification scheme for user access control in cloud computing environment. The Computer Journal\u00a054, 1632\u20131644 (2011)","journal-title":"The Computer Journal"},{"key":"44_CR25","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1109\/TIT.1982.1056489","volume":"28","author":"S. Lloyd","year":"1982","unstructured":"Lloyd, S.: Least squares quantization in PCM. IEEE Transactions on Information Theory\u00a028, 129\u2013137 (1982)","journal-title":"IEEE Transactions on Information Theory"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11698-3_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T23:21:27Z","timestamp":1558999287000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11698-3_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319116976","9783319116983"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11698-3_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}