{"id":"https://openalex.org/W2124268421","doi":"https://doi.org/10.1109/iceei.2011.6021705","title":"Network anomaly detection tools based on association rules","display_name":"Network anomaly detection tools based on association rules","publication_year":2011,"publication_date":"2011-07-01","ids":{"openalex":"https://openalex.org/W2124268421","doi":"https://doi.org/10.1109/iceei.2011.6021705","mag":"2124268421"},"language":"en","primary_location":{"id":"doi:10.1109/iceei.2011.6021705","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iceei.2011.6021705","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2011 International Conference on Electrical Engineering and Informatics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074274712","display_name":"Zulaiha Ali Othman","orcid":"https://orcid.org/0000-0002-4238-5266"},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Zulaiha Ali Othman","raw_affiliation_strings":["School of Computer Science, Universiti Kebangsaan Malaysia, Bangi, Selangor, Malaysia","School of Computer Science, Universiti Kebangsaan Malaysia, 43600 Bangi, Selangor Malaysia"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Universiti Kebangsaan Malaysia, Bangi, Selangor, Malaysia","institution_ids":["https://openalex.org/I885383172"]},{"raw_affiliation_string":"School of Computer Science, Universiti Kebangsaan Malaysia, 43600 Bangi, Selangor Malaysia","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012687797","display_name":"Entisar E. Eljadi","orcid":null},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Entisar E. Eljadi","raw_affiliation_strings":["School of Computer Science, Universiti Kebangsaan Malaysia, Bangi, Selangor, Malaysia","School of Computer Science, Universiti Kebangsaan Malaysia, 43600 Bangi, Selangor Malaysia"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Universiti Kebangsaan Malaysia, Bangi, Selangor, Malaysia","institution_ids":["https://openalex.org/I885383172"]},{"raw_affiliation_string":"School of Computer Science, Universiti Kebangsaan Malaysia, 43600 Bangi, Selangor Malaysia","institution_ids":["https://openalex.org/I885383172"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5074274712"],"corresponding_institution_ids":["https://openalex.org/I885383172"],"apc_list":null,"apc_paid":null,"fwci":1.0502,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.79284549,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"8","issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10538","display_name":"Data Mining Algorithms and Applications","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.8101445436477661},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7286685705184937},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7246198654174805},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6915858387947083},{"id":"https://openalex.org/keywords/association-rule-learning","display_name":"Association rule learning","score":0.6581909656524658},{"id":"https://openalex.org/keywords/anomaly-based-intrusion-detection-system","display_name":"Anomaly-based intrusion detection system","score":0.6141709685325623},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5305049419403076},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.4674704074859619},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4399024248123169},{"id":"https://openalex.org/keywords/data-set","display_name":"Data set","score":0.4319414794445038},{"id":"https://openalex.org/keywords/normalization","display_name":"Normalization (sociology)","score":0.4187890589237213},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.23471912741661072},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.1812753677368164},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.12954086065292358}],"concepts":[{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.8101445436477661},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7286685705184937},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7246198654174805},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6915858387947083},{"id":"https://openalex.org/C193524817","wikidata":"https://www.wikidata.org/wiki/Q386780","display_name":"Association rule learning","level":2,"score":0.6581909656524658},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.6141709685325623},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5305049419403076},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.4674704074859619},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4399024248123169},{"id":"https://openalex.org/C58489278","wikidata":"https://www.wikidata.org/wiki/Q1172284","display_name":"Data set","level":2,"score":0.4319414794445038},{"id":"https://openalex.org/C136886441","wikidata":"https://www.wikidata.org/wiki/Q926129","display_name":"Normalization (sociology)","level":2,"score":0.4187890589237213},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.23471912741661072},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.1812753677368164},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.12954086065292358},{"id":"https://openalex.org/C19165224","wikidata":"https://www.wikidata.org/wiki/Q23404","display_name":"Anthropology","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iceei.2011.6021705","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iceei.2011.6021705","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2011 International Conference on Electrical Engineering and Informatics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4099999964237213,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W26711432","https://openalex.org/W199536678","https://openalex.org/W259338706","https://openalex.org/W405461467","https://openalex.org/W1484413656","https://openalex.org/W1543152427","https://openalex.org/W2000473687","https://openalex.org/W2019486799","https://openalex.org/W2078533964","https://openalex.org/W2117625132","https://openalex.org/W2120549846","https://openalex.org/W2123619513","https://openalex.org/W2126561516","https://openalex.org/W2134517964","https://openalex.org/W2138672115","https://openalex.org/W2140190241","https://openalex.org/W2168931007","https://openalex.org/W2183056407","https://openalex.org/W2291193707","https://openalex.org/W2803279381","https://openalex.org/W3138598418","https://openalex.org/W3204616723","https://openalex.org/W4285719527","https://openalex.org/W6601051852","https://openalex.org/W6628750762","https://openalex.org/W6655095229","https://openalex.org/W6686160187"],"related_works":["https://openalex.org/W2337148208","https://openalex.org/W3004832009","https://openalex.org/W3036013726","https://openalex.org/W1971929717","https://openalex.org/W1724519426","https://openalex.org/W2061466315","https://openalex.org/W2355532322","https://openalex.org/W2368329025","https://openalex.org/W3157271777","https://openalex.org/W1485296229"],"abstract_inverted_index":{"With":[0],"the":[1,6,24,48,63,72,112,117,129,182,188,198,204,232,246,253,261],"growth":[2],"of":[3,8,26,47,111,116,134,222,226,255],"computer":[4],"networks,":[5],"number":[7],"attacks":[9],"posing":[10],"serious":[11],"security":[12],"risks":[13],"for":[14,249,284],"networks":[15],"has":[16,267],"grown":[17],"extensively.":[18],"Many":[19],"organizations":[20],"are":[21,185],"faced":[22],"with":[23,71,160],"problem":[25],"detecting":[27],"whether":[28],"or":[29],"not":[30],"they":[31],"have":[32,236],"an":[33],"anomaly":[34,85,102,153],"in":[35,66,252],"their":[36,239],"network":[37,62,84,120,163,207,227,286],"transactions.":[38],"The":[39,105,152,172,241,275],"Network":[40],"Intrusion":[41],"Detection":[42],"System":[43],"(NIDS)":[44],"is":[45,123,155,167,175,251],"one":[46],"popular":[49],"tools":[50,200,276],"used":[51,201,280],"to":[52,59,81,96,202,281],"secure":[53,60],"and":[54,99,127,139,145,150,191,230,238],"protect":[55],"networks.":[56],"In":[57],"order":[58],"a":[61,83,161,271],"signature":[64,74],"rules":[65],"NIDS":[67],"should":[68],"be":[69,278],"updated":[70],"latest":[73],"detection":[75,86,103,154],"rule.":[76],"Therefore,":[77],"this":[78],"research":[79],"aims":[80],"develop":[82],"tool":[87],"which":[88,166,220],"focuses":[89],"on":[90],"association":[91],"rule":[92],"data":[93,119,130,135,164,173,208,233],"mining":[94,146,273],"techniques":[95],"detect":[97,282],"anomalies":[98,237,283],"also":[100,196],"produce":[101],"rules.":[104,240],"tool,":[106],"named":[107],"as":[108,177,270],"NASSR,":[109],"consists":[110,221],"following":[113],"functions:":[114],"pre-processing":[115,250],"raw":[118],"transaction":[121],"that":[122,235,245],"captured":[124],"using":[125],"Wireshark":[126],"transforming":[128],"into":[131],"three":[132,223],"types":[133],"sets":[136,234],"(2,":[137],"5":[138],"10":[140],"seconds),":[141],"normalization":[142],"(min.,":[143],"max.)":[144],"(Appriori,":[147],"Fuzzy":[148,258],"Appriori,":[149],"FP-Growth).":[151],"calculated":[156],"by":[157,169],"comparing":[158],"it":[159],"normal":[162],"set,":[165],"validated":[168],"CACE":[170],"tools.":[171],"set":[174,209],"determined":[176],"having":[178],"no":[179],"intrusion,":[180],"if":[181],"similarity":[183],"results":[184],"higher":[186],"than":[187],"user":[189],"threshold,":[190],"vice":[192],"versa.":[193],"This":[194],"paper":[195],"presents":[197,231,260],"interface":[199],"analyse":[203],"7GB":[205],"real":[206],"obtained":[210],"from":[211],"Pusat":[212],"Teknologi":[213],"Maklumat":[214],"(PTM),":[215],"Universiti":[216],"Kebangsaan":[217],"Malaysia":[218],"(UKM),":[219],"days'":[224],"accumulation":[225],"traffic":[228],"data,":[229],"best":[242,247],"result":[243,264],"shows":[244],"technique":[248],"form":[254],"two":[256],"seconds.":[257],"Appriori":[259],"most":[262],"accurate":[263],"while":[265],"FP-growth":[266],"been":[268],"shown":[269],"faster":[272],"technique.":[274],"can":[277],"easily":[279],"any":[285],"traffic.":[287]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
