{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T07:48:07Z","timestamp":1773820087705,"version":"3.50.1"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030308582","type":"print"},{"value":"9783030308599","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-30859-9_36","type":"book-chapter","created":{"date-parts":[[2019,9,11]],"date-time":"2019-09-11T12:03:26Z","timestamp":1568203406000},"page":"424-433","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Network Anomaly Detection Based on WaveNet"],"prefix":"10.1007","author":[{"given":"Tero","family":"Kokkonen","sequence":"first","affiliation":[]},{"given":"Samir","family":"Puuska","sequence":"additional","affiliation":[]},{"given":"Janne","family":"Alatalo","sequence":"additional","affiliation":[]},{"given":"Eppu","family":"Heilimo","sequence":"additional","affiliation":[]},{"given":"Antti","family":"M\u00e4kel\u00e4","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,12]]},"reference":[{"key":"36_CR1","doi-asserted-by":"publisher","unstructured":"Bitton, R., Shabtai, A.: A machine learning-based intrusion detection system for securing remote desktop connections to electronic flight bag servers. IEEE Trans. Dependable Secure Comput. 1 (2019). \n                      https:\/\/doi.org\/10.1109\/TDSC.2019.2914035","DOI":"10.1109\/TDSC.2019.2914035"},{"key":"36_CR2","doi-asserted-by":"publisher","unstructured":"Chen, Z., Yeo, C.K., Lee, B.S., Lau, C.T.: Autoencoder-based network anomaly detection. In: 2018 Wireless Telecommunications Symposium (WTS), pp. 1\u20135, April 2018. \n                      https:\/\/doi.org\/10.1109\/WTS.2018.8363930","DOI":"10.1109\/WTS.2018.8363930"},{"key":"36_CR3","doi-asserted-by":"publisher","unstructured":"Chiba, Z., Abghour, N., Moussaid, K., Omri, A.E., Rida, M.: A clever approach to develop an efficient deep neural network based IDS for cloud environments using a self-adaptive genetic algorithm. In: 2019 International Conference on Advanced Communication Technologies and Networking (CommNet), pp. 1\u20139, April 2019. \n                      https:\/\/doi.org\/10.1109\/COMMNET.2019.8742390","DOI":"10.1109\/COMMNET.2019.8742390"},{"key":"36_CR4","doi-asserted-by":"publisher","unstructured":"Creech, G., Hu, J.: Generation of a new IDS test dataset: time to retire the KDD collection. In: IEEE Wireless Communications and Networking Conference, WCNC, pp. 4487\u20134492. IEEE, April 2013. \n                      https:\/\/doi.org\/10.1109\/WCNC.2013.6555301","DOI":"10.1109\/WCNC.2013.6555301"},{"key":"36_CR5","unstructured":"JAMK University of Applied Sciences, Institute of Information Technology, JYVSECTEC: Rgce cyber range. \n                      http:\/\/www.jyvsectec.fi\/en\/rgce\/\n                      \n                    . Accessed 26 Apr 2019"},{"key":"36_CR6","doi-asserted-by":"publisher","unstructured":"Li, Z., Rios, A.L.G., Xu, G., Trajkovi\u0107, L.: Machine learning techniques for classifying network anomalies and intrusions. In: 2019 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1\u20135, May 2019. \n                      https:\/\/doi.org\/10.1109\/ISCAS.2019.8702583","DOI":"10.1109\/ISCAS.2019.8702583"},{"key":"36_CR7","unstructured":"Lincoln Laboratory, Massachusetts Institute of Technology: 1998 DARPA Intrusion Detection Evaluation Dataset. \n                      https:\/\/www.ll.mit.edu\/r-d\/datasets\/1998-darpa-intrusion-detection-evaluation-dataset\n                      \n                    . Accessed 29 Apr 2019"},{"key":"36_CR8","unstructured":"Lincoln Laboratory, Massachusetts Institute of Technology: 1999 DARPA Intrusion Detection Evaluation Dataset. \n                      https:\/\/www.ll.mit.edu\/r-d\/datasets\/1999-darpa-intrusion-detection-evaluation-dataset\n                      \n                    . Accessed 29 Apr 2019"},{"key":"36_CR9","unstructured":"Lincoln Laboratory, Massachusetts Institute of Technology: 2000 DARPA Intrusion Detection Scenario Specific Datasets. \n                      https:\/\/www.ll.mit.edu\/r-d\/datasets\/2000-darpa-intrusion-detection-scenario-specific-datasets\n                      \n                    . Accessed 29 Apr 2019"},{"key":"36_CR10","unstructured":"Makhzani, A., Shlens, J., Jaitly, N., Goodfellow, I.: Adversarial autoencoders. In: International Conference on Learning Representations (2016). \n                      http:\/\/arxiv.org\/abs\/1511.05644"},{"issue":"4","key":"36_CR11","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1145\/382912.382923","volume":"3","author":"J McHugh","year":"2000","unstructured":"McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory. ACM Trans. Inf. Syst. Secur. 3(4), 262\u2013294 (2000). \n                      https:\/\/doi.org\/10.1145\/382912.382923","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"36_CR12","unstructured":"Ministry of Defence Finland: The national cyber security exercises is organised in Jyv\u00e4skyl\u00e4 - Kansallinen kyberturvallisuusharjoitus kyha18 j\u00e4rjestet\u00e4\u00e4n Jyv\u00e4skyl\u00e4ss\u00e4, official bulletin 11th of May 2018, May 2018. \n                      https:\/\/valtioneuvosto.fi\/artikkeli\/-\/asset_publisher\/kansallinen-kyberturvallisuusharjoitus-kyha18-jarjestetaan-jyvaskylassa\n                      \n                    . Accessed 26 Apr 2019"},{"key":"36_CR13","doi-asserted-by":"publisher","unstructured":"Narsingyani, D., Kale, O.: Optimizing false positive in anomaly based intrusion detection using genetic algorithm. In: 2015 IEEE 3rd International Conference on MOOCs, Innovation and Technology in Education (MITE), pp. 72\u201377, October 2015. \n                      https:\/\/doi.org\/10.1109\/MITE.2015.7375291","DOI":"10.1109\/MITE.2015.7375291"},{"key":"36_CR14","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1007\/978-3-030-16184-2_51","volume-title":"New Knowledge in Information Systems and Technologies","author":"P Nevavuori","year":"2019","unstructured":"Nevavuori, P., Kokkonen, T.: Requirements for training and evaluation dataset of network and host intrusion detection system. In: Rocha, \u00c1., Adeli, H., Reis, L.P., Costanzo, S. (eds.) WorldCIST\u201919 2019. AISC, vol. 931, pp. 534\u2013546. Springer, Cham (2019). \n                      https:\/\/doi.org\/10.1007\/978-3-030-16184-2_51"},{"key":"36_CR15","unstructured":"van den Oord, A., et al.: WaveNet: a generative model for raw audio (2016). \n                      https:\/\/arxiv.org\/pdf\/1609.03499.pdf"},{"key":"36_CR16","unstructured":"van den Oord, A., Kalchbrenner, N., Kavukcuoglu, K.: Pixel recurrent neural networks. In: Balcan, M.F., Weinberger, K.Q. (eds.) Proceedings of the 33rd International Conference on Machine Learning. Proceedings of Machine Learning Research, vol. 48, pp. 1747\u20131756. PMLR, New York, 20\u201322 June 2016. \n                      http:\/\/proceedings.mlr.press\/v48\/oord16.html"},{"key":"36_CR17","unstructured":"van den Oord, A., et al.: Parallel WaveNet: fast high-fidelity speech synthesis. CoRR abs\/1711.10433 (2017). \n                      http:\/\/arxiv.org\/abs\/1711.10433"},{"key":"36_CR18","unstructured":"Open Information Security Foundation (OISF): Suricata Open Source IDS\/IPS\/NSM engine. \n                      https:\/\/suricata-ids.org\/\n                      \n                    . Accessed 7 May 2019"},{"key":"36_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-030-12942-2_18","volume-title":"Innovative Security Solutions for Information Technology and Communications","author":"S Puuska","year":"2019","unstructured":"Puuska, S., Kokkonen, T., Alatalo, J., Heilimo, E.: Anomaly-based network intrusion detection using wavelets and adversarial autoencoders. In: Lanet, J.-L., Toma, C. (eds.) SECITC 2018. LNCS, vol. 11359, pp. 234\u2013246. Springer, Cham (2019). \n                      https:\/\/doi.org\/10.1007\/978-3-030-12942-2_18"},{"key":"36_CR20","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.cose.2019.06.005","volume":"86","author":"M Ring","year":"2019","unstructured":"Ring, M., Wunderlich, S., Scheuring, D., Landes, D., Hotho, A.: A survey of network-based intrusion detection data sets. Comput. Secur. 86, 147\u2013167 (2019). \n                      https:\/\/doi.org\/10.1016\/j.cose.2019.06.005","journal-title":"Comput. Secur."},{"key":"36_CR21","unstructured":"Salimans, T., Karpathy, A., Chen, X., Kingma, D.P.: PixelCNN++: improving the PixelCNN with discretized logistic mixture likelihood and other modifications. In: 5th International Conference on Learning Representations, ICLR 2017, 24\u201326 April 2017, Toulon, France (2017). \n                      https:\/\/openreview.net\/references\/pdf?id=rJuJ1cP_l"},{"issue":"3","key":"36_CR22","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.cose.2011.12.012","volume":"31","author":"A Shiravi","year":"2012","unstructured":"Shiravi, A., Shiravi, H., Tavallaee, M., Ghorbani, A.A.: Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 31(3), 357\u2013374 (2012). \n                      https:\/\/doi.org\/10.1016\/j.cose.2011.12.012","journal-title":"Comput. Secur."},{"key":"36_CR23","doi-asserted-by":"publisher","unstructured":"Siddiqui, M.A., et al.: Detecting cyber attacks using anomaly detection with explanations and expert feedback. In: ICASSP 2019\u20132019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2872\u20132876, May 2019. \n                      https:\/\/doi.org\/10.1109\/ICASSP.2019.8683212","DOI":"10.1109\/ICASSP.2019.8683212"},{"key":"36_CR24","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: Proceedings of the Second IEEE International Conference on Computational Intelligence for Security and Defense Applications, CISDA 2009, pp. 53\u201358. IEEE Press, Piscataway (2009). \n                      http:\/\/dl.acm.org\/citation.cfm?id=1736481.1736489"},{"key":"36_CR25","unstructured":"The University of California Irvine (UCI): KDD Cup 1999 Data. \n                      http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html\n                      \n                    . Accessed 29 Apr 2019"},{"key":"36_CR26","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.cose.2017.05.009","volume":"70","author":"MF Umer","year":"2017","unstructured":"Umer, M.F., Sher, M., Bi, Y.: Flow-based intrusion detection: techniques and challenges. Comput. Secur. 70, 238\u2013254 (2017). \n                      https:\/\/doi.org\/10.1016\/j.cose.2017.05.009","journal-title":"Comput. Secur."},{"key":"36_CR27","unstructured":"University of New Brunswick, Canadian Institute for Cybersecurity: Intrusion Detection Evaluation Dataset (CICIDS 2017). \n                      https:\/\/www.unb.ca\/cic\/datasets\/ids-2017.html\n                      \n                    . Accessed 30 Apr 2019"},{"key":"36_CR28","doi-asserted-by":"publisher","unstructured":"Wiewel, F., Yang, B.: Continual learning for anomaly detection with variational autoencoder. In: 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), ICASSP 2019, pp. 3837\u20133841, May 2019. \n                      https:\/\/doi.org\/10.1109\/ICASSP.2019.8682702","DOI":"10.1109\/ICASSP.2019.8682702"},{"key":"36_CR29","unstructured":"Yu, F., Koltun, V.: Multi-scale context aggregation by dilated convolutions. CoRR abs\/1511.07122 (2016). \n                      https:\/\/arxiv.org\/pdf\/1511.07122.pdf"},{"key":"36_CR30","doi-asserted-by":"publisher","unstructured":"Zagoruyko, S., Komodakis, N.: Wide residual networks. In: Richard C. Wilson, E.R.H., Smith, W.A.P. (eds.) Proceedings of the British Machine Vision Conference (BMVC), pp. 87.1\u201387.12. BMVA Press, September 2016. \n                      https:\/\/doi.org\/10.5244\/C.30.87","DOI":"10.5244\/C.30.87"}],"container-title":["Lecture Notes in Computer Science","Internet of Things, Smart Spaces, and Next Generation Networks and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-30859-9_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,11]],"date-time":"2019-09-11T12:08:41Z","timestamp":1568203721000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-30859-9_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030308582","9783030308599"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-30859-9_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"12 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NEW2AN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Next Generation Wired\/Wireless Networking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"St. Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"new2an2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/rusmart.e-werest.org\/2019.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EDAS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"144","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}