<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="static/style.xsl"?><OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd"><responseDate>2026-04-18T13:05:05Z</responseDate><request verb="GetRecord" identifier="oai:riubu.ubu.es:10259/7266" metadataPrefix="mods">https://riubu.ubu.es/oai/request</request><GetRecord><record><header><identifier>oai:riubu.ubu.es:10259/7266</identifier><datestamp>2023-01-19T01:05:23Z</datestamp><setSpec>com_10259_3847</setSpec><setSpec>com_10259_5086</setSpec><setSpec>com_10259_2604</setSpec><setSpec>col_10259_3848</setSpec></header><metadata><mods:mods xmlns:mods="http://www.loc.gov/mods/v3" xmlns:doc="http://www.lyncode.com/xoai" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-1.xsd">
<mods:name>
<mods:namePart>Sánchez, Raúl</mods:namePart>
</mods:name>
<mods:name>
<mods:namePart>Herrero Cosío, Álvaro</mods:namePart>
</mods:name>
<mods:name>
<mods:namePart>Corchado, Emilio</mods:namePart>
</mods:name>
<mods:extension>
<mods:dateAvailable encoding="iso8601">2023-01-18T12:03:50Z</mods:dateAvailable>
</mods:extension>
<mods:extension>
<mods:dateAccessioned encoding="iso8601">2023-01-18T12:03:50Z</mods:dateAccessioned>
</mods:extension>
<mods:originInfo>
<mods:dateIssued encoding="iso8601">2017-02</mods:dateIssued>
</mods:originInfo>
<mods:identifier type="issn">1367-0751</mods:identifier>
<mods:identifier type="uri">http://hdl.handle.net/10259/7266</mods:identifier>
<mods:identifier type="doi">10.1093/jigpal/jzw047</mods:identifier>
<mods:identifier type="essn">1368-9894</mods:identifier>
<mods:abstract>Much effort has been devoted to research on intrusion detection (ID) in recent years because intrusion strategies and technologies are constantly and quickly evolving. As an innovative solution based on visualization, MObile VIsualisation Connectionist Agent-Based IDS was previously proposed, conceived as a hybrid-intelligent ID System. It was designed to analyse&#xd;
continuous network data at a packet level and is extended in present paper for the analysis of flow-based traffic data. By&#xd;
incorporating clustering techniques to the original proposal, network flows are investigated trying to identify different types&#xd;
of attacks. The analysed real-life data (the well-known dataset from the University of Twente) come from a honeypot directly&#xd;
connected to the Internet (thus ensuring attack-exposure) and is analysed by means of clustering and neural techniques, individually and in conjunction. Promising results are obtained, proving the validity of the proposed extension for the analysis&#xd;
of network flow data</mods:abstract>
<mods:language>
<mods:languageTerm>eng</mods:languageTerm>
</mods:language>
<mods:accessCondition type="useAndReproduction">info:eu-repo/semantics/openAccess</mods:accessCondition>
<mods:subject>
<mods:topic>Network intrusion detection</mods:topic>
</mods:subject>
<mods:subject>
<mods:topic>Network flow</mods:topic>
</mods:subject>
<mods:subject>
<mods:topic>Neural projection</mods:topic>
</mods:subject>
<mods:subject>
<mods:topic>Clustering</mods:topic>
</mods:subject>
<mods:subject>
<mods:topic>MOVICAB-IDS</mods:topic>
</mods:subject>
<mods:titleInfo>
<mods:title>Clustering extension of MOVICAB-IDS to distinguish intrusions in flow-based data</mods:title>
</mods:titleInfo>
<mods:genre>info:eu-repo/semantics/article</mods:genre>
</mods:mods></metadata></record></GetRecord></OAI-PMH>