{"id":"https://openalex.org/W2033917624","doi":"https://doi.org/10.1109/isbast.2014.7013127","title":"Signature-Based Anomaly intrusion detection using Integrated data mining classifiers","display_name":"Signature-Based Anomaly intrusion detection using Integrated data mining classifiers","publication_year":2014,"publication_date":"2014-08-01","ids":{"openalex":"https://openalex.org/W2033917624","doi":"https://doi.org/10.1109/isbast.2014.7013127","mag":"2033917624"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/isbast.2014.7013127","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://psasir.upm.edu.my/id/eprint/47759/1/Signature-based%20anomaly%20intrusion%20detection%20using%20integrated%20data%20mining%20classifiers.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048149984","display_name":"Warusia Yassin","orcid":"https://orcid.org/0000-0001-9601-2572"},"institutions":[{"id":"https://openalex.org/I130343225","display_name":"Universiti Putra Malaysia","ror":"https://ror.org/02e91jd64","country_code":"MY","type":"education","lineage":["https://openalex.org/I130343225"]},{"id":"https://openalex.org/I32589535","display_name":"Technical University of Malaysia Malacca","ror":"https://ror.org/01xb6rs26","country_code":"MY","type":"education","lineage":["https://openalex.org/I32589535"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Warusia Yassin","raw_affiliation_strings":["Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Selangor, Malaysia","Faculty of Information and Communication Technology, Universiti Teknikal Malaysia Melaka, Malaysia"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Selangor, Malaysia","institution_ids":["https://openalex.org/I130343225"]},{"raw_affiliation_string":"Faculty of Information and Communication Technology, Universiti Teknikal Malaysia Melaka, Malaysia","institution_ids":["https://openalex.org/I32589535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035208215","display_name":"Nur Izura Udzir","orcid":"https://orcid.org/0000-0002-0543-3329"},"institutions":[{"id":"https://openalex.org/I130343225","display_name":"Universiti Putra Malaysia","ror":"https://ror.org/02e91jd64","country_code":"MY","type":"education","lineage":["https://openalex.org/I130343225"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Nur Izura Udzir","raw_affiliation_strings":["Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Selangor, Malaysia"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Selangor, Malaysia","institution_ids":["https://openalex.org/I130343225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029122226","display_name":"Azizol Abdullah","orcid":"https://orcid.org/0000-0001-8321-9259"},"institutions":[{"id":"https://openalex.org/I130343225","display_name":"Universiti Putra Malaysia","ror":"https://ror.org/02e91jd64","country_code":"MY","type":"education","lineage":["https://openalex.org/I130343225"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Azizol Abdullah","raw_affiliation_strings":["Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Selangor, Malaysia"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Selangor, Malaysia","institution_ids":["https://openalex.org/I130343225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101759908","display_name":"Mohd Taufik Abdullah","orcid":"https://orcid.org/0000-0001-8342-5618"},"institutions":[{"id":"https://openalex.org/I130343225","display_name":"Universiti Putra Malaysia","ror":"https://ror.org/02e91jd64","country_code":"MY","type":"education","lineage":["https://openalex.org/I130343225"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Mohd Taufik Abdullah","raw_affiliation_strings":["Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Selangor, Malaysia"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Selangor, Malaysia","institution_ids":["https://openalex.org/I130343225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005739786","display_name":"Hazura Zulzalil","orcid":"https://orcid.org/0000-0002-1596-4828"},"institutions":[{"id":"https://openalex.org/I130343225","display_name":"Universiti Putra Malaysia","ror":"https://ror.org/02e91jd64","country_code":"MY","type":"education","lineage":["https://openalex.org/I130343225"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Hazura Zulzalil","raw_affiliation_strings":["Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Selangor, Malaysia"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Selangor, Malaysia","institution_ids":["https://openalex.org/I130343225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111417252","display_name":"Zaiton Muda","orcid":null},"institutions":[{"id":"https://openalex.org/I130343225","display_name":"Universiti Putra Malaysia","ror":"https://ror.org/02e91jd64","country_code":"MY","type":"education","lineage":["https://openalex.org/I130343225"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Zaiton Muda","raw_affiliation_strings":["Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Selangor, Malaysia"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Selangor, Malaysia","institution_ids":["https://openalex.org/I130343225"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.399,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":19,"citation_normalized_percentile":{"value":0.840158,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":91},"biblio":{"volume":"3077","issue":null,"first_page":"232","last_page":"237"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9987,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.5794418},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.51581424},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.41638988}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.79627144},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7773626},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.7200162},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.71057105},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.6678969},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6420174},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.5794418},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5247728},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.51581424},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.43570408},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.42826235},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.41638988},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.41541082},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.39765492},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.32831132},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.24017909},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.13288641},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/isbast.2014.7013127","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"http://psasir.upm.edu.my/id/eprint/47759/1/Signature-based%20anomaly%20intrusion%20detection%20using%20integrated%20data%20mining%20classifiers.pdf","pdf_url":"http://psasir.upm.edu.my/id/eprint/47759/1/Signature-based%20anomaly%20intrusion%20detection%20using%20integrated%20data%20mining%20classifiers.pdf","source":{"id":"https://openalex.org/S4377196260","display_name":"Universiti Putra Malaysia Institutional Repository (Universiti Putra Malaysia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I130343225","host_organization_name":"Universiti Putra Malaysia","host_organization_lineage":["https://openalex.org/I130343225"],"host_organization_lineage_names":["Universiti Putra Malaysia"],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"http://psasir.upm.edu.my/id/eprint/47759/1/Signature-based%20anomaly%20intrusion%20detection%20using%20integrated%20data%20mining%20classifiers.pdf","pdf_url":"http://psasir.upm.edu.my/id/eprint/47759/1/Signature-based%20anomaly%20intrusion%20detection%20using%20integrated%20data%20mining%20classifiers.pdf","source":{"id":"https://openalex.org/S4377196260","display_name":"Universiti Putra Malaysia Institutional Repository (Universiti Putra Malaysia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I130343225","host_organization_name":"Universiti Putra Malaysia","host_organization_lineage":["https://openalex.org/I130343225"],"host_organization_lineage_names":["Universiti Putra Malaysia"],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":16,"referenced_works":["https://openalex.org/W1966676530","https://openalex.org/W1980529734","https://openalex.org/W1999427165","https://openalex.org/W2017663154","https://openalex.org/W2026491557","https://openalex.org/W2031163547","https://openalex.org/W2032477387","https://openalex.org/W2089364185","https://openalex.org/W2133725384","https://openalex.org/W2164732286","https://openalex.org/W2281706614","https://openalex.org/W2589679544","https://openalex.org/W2911964244","https://openalex.org/W2912934387","https://openalex.org/W4212883601","https://openalex.org/W4299587006"],"related_works":["https://openalex.org/W2988433590","https://openalex.org/W2564228587","https://openalex.org/W2240467741","https://openalex.org/W2141254179","https://openalex.org/W2125148286","https://openalex.org/W2078868204","https://openalex.org/W1606225312","https://openalex.org/W1521770704","https://openalex.org/W1516902003","https://openalex.org/W122617795"],"abstract_inverted_index":{"As":[0],"the":[1,15,57],"influence":[2],"of":[3,74,138],"Internet":[4],"and":[5,12,99,110,130,143],"networking":[6],"technologies":[7],"as":[8,32,46,48,107,119,121,160],"communication":[9],"medium":[10],"advance":[11],"expand":[13],"across":[14],"globe,":[16],"cyber":[17],"attacks":[18],"also":[19],"grow":[20],"accordingly.":[21],"Anomaly":[22,83],"detection":[23,75,126,154,165],"systems":[24],"(ADSs)":[25],"are":[26],"employed":[27],"to":[28,41,61,68,91,115,162],"scrutinize":[29,92],"information":[30],"such":[31,106],"packet":[33,93],"behaviours":[34],"coming":[35],"from":[36,135],"various":[37],"locations":[38],"on":[39,125],"network":[40],"find":[42],"those":[43],"intrusive":[44],"activities":[45],"fast":[47],"possible":[49],"with":[50,156],"precision.":[51],"Unfortunately,":[52],"besides":[53],"minimizing":[54],"false":[55,117],"alarms;":[56],"performance":[58],"issues":[59],"related":[60],"heavy":[62],"computational":[63],"process":[64],"has":[65],"become":[66],"drawbacks":[67],"be":[69,89],"resolved":[70],"in":[71],"this":[72,78],"kind":[73],"systems.":[76],"In":[77],"work,":[79],"a":[80,136],"novel":[81],"Signature-Based":[82],"Detection":[84],"Scheme":[85],"(SADS)":[86],"which":[87],"could":[88],"applied":[90],"headers'":[94],"behaviour":[95],"patterns":[96],"more":[97],"precisely":[98],"promptly":[100],"is":[101],"proposed.":[102],"Integratingdata":[103],"mining":[104],"classifiers":[105],"Naive":[108],"Bayes":[109],"Random":[111],"Forest":[112],"can":[113],"beutilized":[114],"decrease":[116],"alarms":[118],"well":[120],"generate":[122],"signatures":[123],"based":[124],"resultsfor":[127],"future":[128],"prediction":[129],"reducing":[131],"processing":[132,158],"time.":[133],"Results":[134],"number":[137],"experiments":[139],"using":[140],"DARPA":[141],"1999":[142],"ISCX":[144],"2012":[145],"benchmark":[146],"dataset":[147],"have":[148],"validated":[149],"that":[150],"SADS":[151],"own":[152],"better":[153],"capabilities":[155],"lower":[157],"duration":[159],"contrast":[161],"conventional":[163],"anomaly-based":[164],"method.":[166]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2033917624","counts_by_year":[{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":3}],"updated_date":"2024-12-14T01:32:01.150862","created_date":"2016-06-24"}