{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:14:14Z","timestamp":1766067254633,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030675493"},{"type":"electronic","value":"9783030675509"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-67550-9_6","type":"book-chapter","created":{"date-parts":[[2021,1,19]],"date-time":"2021-01-19T12:02:51Z","timestamp":1611057771000},"page":"72-88","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Efficient and Secure Statistical Port Scan Detection Scheme"],"prefix":"10.1007","author":[{"given":"Hussein","family":"Majed","sequence":"first","affiliation":[]},{"given":"Hassan N.","family":"Noura","sequence":"additional","affiliation":[]},{"given":"Ola","family":"Salman","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Chehab","sequence":"additional","affiliation":[]},{"given":"Rapha\u00ebl","family":"Couturier","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,20]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Sivanathan, A., Gharakheili, H.H., Sivaraman, V.: Can we classify an IoT device using TCP port scan? In: 2018 IEEE International Conference on Information and Automation for Sustainability (ICIAfS), pp. 1\u20134. IEEE (2018)","key":"6_CR1","DOI":"10.1109\/ICIAFS.2018.8913346"},{"key":"6_CR2","first-page":"1","volume":"6335","author":"M Cotton","year":"2011","unstructured":"Cotton, M., Eggert, L., Touch, J., Westerlund, M., Cheshire, S.: Internet assigned numbers authority (IANA) procedures for the management of the service name and transport protocol port number registry. RFC 6335, 1\u201333 (2011)","journal-title":"RFC"},{"doi-asserted-by":"crossref","unstructured":"Christopher, R.: Port scanning techniques and the defense against them. SANS Institute (2001)","key":"6_CR3","DOI":"10.1016\/S1353-4858(01)00103-9"},{"unstructured":"Lyon, G.F.: Nmap network scanning: the official Nmap project guide to network discovery and security scanning. Insecure (2009)","key":"6_CR4"},{"doi-asserted-by":"crossref","unstructured":"Ananin, E.V., Nikishova, A.V., Kozhevnikova, I.S.: Port scanning detection based on anomalies. In: 2017 Dynamics of Systems, Mechanisms and Machines (Dynamics), pp. 1\u20135 (2017)","key":"6_CR5","DOI":"10.1109\/Dynamics.2017.8239427"},{"doi-asserted-by":"crossref","unstructured":"Balram, S., Wiscy, M.: Detection of TCP SYN scanning using packet counts and neural network. In: 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems, pp. 646\u2013649 (2008)","key":"6_CR6","DOI":"10.1109\/SITIS.2008.33"},{"doi-asserted-by":"crossref","unstructured":"Baig, H.U., Kamran, F., Sheikh, M.A.: An adaptive fuzzy based scan detection technique using time independent feature set. In: 2009 IEEE International Conference on Intelligent Computing and Intelligent Systems, vol. 3, pp. 123\u2013127 (2009)","key":"6_CR7","DOI":"10.1109\/ICICISYS.2009.5358213"},{"doi-asserted-by":"crossref","unstructured":"El-Hajj, W., Aloul, F., Trabelsi, Z., Zaki, N.: On detecting port scanning using fuzzy based intrusion detection system. In: 2008 International Wireless Communications and Mobile Computing Conference, pp. 105\u2013110. IEEE (2008)","key":"6_CR8","DOI":"10.1109\/IWCMC.2008.19"},{"doi-asserted-by":"crossref","unstructured":"Almseidin, M., Al-Kasassbeh, M., Kovacs, S.: Detecting slow port scan using fuzzy rule interpolation. In: 2019 2nd International Conference on new Trends in Computing Sciences (ICTCS), pp. 1\u20136. IEEE (2019)","key":"6_CR9","DOI":"10.1109\/ICTCS.2019.8923028"},{"doi-asserted-by":"crossref","unstructured":"Zhang, Y., Fang, B.: A novel approach to scan detection on the backbone. In: 2009 Sixth International Conference on Information Technology: New Generations, pp. 16\u201321 (2009)","key":"6_CR10","DOI":"10.1109\/ITNG.2009.16"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/978-3-319-67074-4_39","volume-title":"Computational Collective Intelligence","author":"K Hajd\u00fa-Sz\u00fccs","year":"2017","unstructured":"Hajd\u00fa-Sz\u00fccs, K., Laki, S., Kiss, A.: A profile-based fast port scan detection method. In: Nguyen, N.T., Papadopoulos, G.A., J\u0119drzejowicz, P., Trawi\u0144ski, B., Vossen, G. (eds.) ICCCI 2017. LNCS (LNAI), vol. 10448, pp. 401\u2013410. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-67074-4_39"},{"doi-asserted-by":"crossref","unstructured":"Aksu, D., Ali Aydin, M.: Detecting port scan attempts with comparative analysis of deep learning and support vector machine algorithms. In: 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), pp. 77\u201380 (2018)","key":"6_CR12","DOI":"10.1109\/IBIGDELFT.2018.8625370"},{"doi-asserted-by":"crossref","unstructured":"Hartpence, B., Kwasinski, A.: Combating TCP port scan attacks using sequential neural networks. In: 2020 International Conference on Computing, Networking and Communications (ICNC), pp. 256\u2013260. IEEE (2020)","key":"6_CR13","DOI":"10.1109\/ICNC47757.2020.9049730"},{"key":"6_CR14","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1007\/978-981-13-2826-8_32","volume-title":"Bio-inspired Computing: Theories and Applications","author":"Y Wang","year":"2018","unstructured":"Wang, Y., Zhang, J.: DeepPort: detect low speed port scan using convolutional neural network. In: Qiao, J., et al. (eds.) BIC-TA 2018. CCIS, vol. 951, pp. 368\u2013379. Springer, Singapore (2018). https:\/\/doi.org\/10.1007\/978-981-13-2826-8_32"},{"unstructured":"Soman, K.P., Alazab, M., et al.: A comprehensive tutorial and survey of applications of deep learning for cyber security (2020)","key":"6_CR15"},{"doi-asserted-by":"crossref","unstructured":"Viet, H.N., Van, Q.N., Trang, L.L.T., Nathan, S.: Using deep learning model for network scanning detection. In: Proceedings of the 4th International Conference on Frontiers of Educational Technologies, pp. 117\u2013121 (2018)","key":"6_CR16","DOI":"10.1145\/3233347.3233379"},{"doi-asserted-by":"crossref","unstructured":"Chockwanich, N., Visoottiviseth, V.: Intrusion detection by deep learning with tensorflow. In: 2019 21st International Conference on Advanced Communication Technology (ICACT), pp. 654\u2013659. IEEE (2019)","key":"6_CR17","DOI":"10.23919\/ICACT.2019.8701969"},{"issue":"1","key":"6_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/LSENS.2018.2879990","volume":"3","author":"R Abdulhammed","year":"2018","unstructured":"Abdulhammed, R., Faezipour, M., Abuzneid, A., AbuMallouh, A.: Deep and machine learning approaches for anomaly-based intrusion detection of imbalanced network traffic. IEEE Sens. Lett. 3(1), 1\u20134 (2018)","journal-title":"IEEE Sens. Lett."},{"doi-asserted-by":"crossref","unstructured":"Fern\u00e1ndez, G.C., Xu, S.: A case study on using deep learning for network intrusion detection. In: MILCOM 2019-2019 IEEE Military Communications Conference (MILCOM), pp. 1\u20136. IEEE (2019)","key":"6_CR19","DOI":"10.1109\/MILCOM47813.2019.9020824"}],"container-title":["Lecture Notes in Computer Science","Mobile, Secure, and Programmable Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-67550-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,19]],"date-time":"2021-01-19T12:13:52Z","timestamp":1611058432000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-67550-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030675493","9783030675509"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-67550-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"20 January 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MSPN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mobile, Secure, and Programmable Networking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mspn2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/mspn2020.roc.cnam.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}