{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:41:49Z","timestamp":1743032509707,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030708658"},{"type":"electronic","value":"9783030708665"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-70866-5_1","type":"book-chapter","created":{"date-parts":[[2021,3,2]],"date-time":"2021-03-02T16:03:57Z","timestamp":1614701037000},"page":"1-18","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Better Anomaly Detection for Access Attacks Using Deep Bidirectional LSTMs"],"prefix":"10.1007","author":[{"given":"Henry","family":"Clausen","sequence":"first","affiliation":[]},{"given":"Gudmund","family":"Grov","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Sabate","sequence":"additional","affiliation":[]},{"given":"David","family":"Aspinall","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,3]]},"reference":[{"key":"1_CR1","unstructured":"M-trends 2015: a view from the front lines. Technical report (2015). https:\/\/www2.fireeye.com\/rs\/fireye\/images\/rpt-m-trends-2015.pdf"},{"key":"1_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-319-48057-2_9","volume-title":"Future Data and Security Engineering","author":"L Bontemps","year":"2016","unstructured":"Bontemps, L., Cao, V.L., McDermott, J., Le-Khac, N.-A.: Collective anomaly detection based on long short-term memory recurrent neural networks. In: Dang, T.K., Wagner, R., K\u00fcng, J., Thoai, N., Takizawa, M., Neuhold, E. (eds.) FDSE 2016. LNCS, vol. 10018, pp. 141\u2013152. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-48057-2_9"},{"issue":"7","key":"1_CR3","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1016\/j.comcom.2012.01.016","volume":"35","author":"P Casas","year":"2012","unstructured":"Casas, P., Mazel, J., Owezarski, P.: Unsupervised network intrusion detection systems: Detecting the unknown without knowledge. Comput. Commun. 35(7), 772\u2013783 (2012)","journal-title":"Comput. Commun."},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Chen, W., Grangier, D., Auli, M.: Strategies for training large vocabulary neural language models. arXiv preprint arXiv:1512.04906 (2015)","DOI":"10.18653\/v1\/P16-1186"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Du, M., Li, F., Zheng, G., Srikumar, V.: DeepLog: anomaly detection and diagnosis from system logs through deep learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1285\u20131298. ACM (2017)","DOI":"10.1145\/3133956.3134015"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Javaid, A., Niyaz, Q., Sun, W., Alam, M.: A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), pp. 21\u201326. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering) (2016)","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Kim, J., Kim, J., Thu, H.L.T., Kim, H.: Long short term memory recurrent neural network classifier for intrusion detection. In: 2016 International Conference on Platform Technology and Service (PlatCon), pp. 1\u20135. IEEE (2016)","DOI":"10.1109\/PlatCon.2016.7456805"},{"key":"1_CR8","unstructured":"Koutrouki, E.: Mitigating concept drift in data mining applications for intrusion detection systems. arXiv preprint arXiv:1010.4784 (2018)"},{"key":"1_CR9","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1016\/j.cose.2017.11.004","volume":"73","author":"G Maci\u00e1-Fern\u00e1ndez","year":"2018","unstructured":"Maci\u00e1-Fern\u00e1ndez, G., Camacho, J., Mag\u00e1n-Carri\u00f3n, R., Garc\u00eda-Teodoro, P., Ther\u00f3n, R.: UGR \u201916: a new dataset for the evaluation of cyclostationarity-based network IDSs. Comput. Secur. 73, 411\u2013424 (2018)","journal-title":"Comput. Secur."},{"issue":"4","key":"1_CR10","doi-asserted-by":"publisher","first-page":"3369","DOI":"10.1109\/COMST.2018.2854724","volume":"20","author":"A Nisioti","year":"2018","unstructured":"Nisioti, A., Mylonas, A., Yoo, P.D., Katos, V.: From intrusion detection to attacker attribution: a comprehensive survey of unsupervised methods. IEEE Commun. Surve. Tutorials 20(4), 3369\u20133388 (2018)","journal-title":"IEEE Commun. Surve. Tutorials"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"\u00d6zg\u00fcr, A., Erdem, H.: A review of KDD99 dataset usage in intrusion detection and machine learning between 2010 and 2015. PeerJ Preprints 4, e1954v1 (2016)","DOI":"10.7287\/peerj.preprints.1954"},{"key":"1_CR12","unstructured":"Radford, B.J., Apolonio, L.M., Trias, A.J., Simpson, J.A.: Network traffic anomaly detection using recurrent neural networks. arXiv preprint arXiv:1803.10769 (2018)"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Rubin-Delanchy, P., Lawson, D.J., Turcotte, M.J., Heard, N., Adams, N.M.: Three statistical approaches to sessionizing network flow data. In: 2014 IEEE Joint Intelligence and Security Informatics Conference, pp. 244\u2013247. IEEE (2014)","DOI":"10.1109\/JISIC.2014.46"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSP, pp. 108\u2013116 (2018)","DOI":"10.5220\/0006639801080116"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Shen, Y., Mariconti, E., Vervier, P.A., Stringhini, G.: Tiresias: predicting security events through deep learning. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 592\u2013605. ACM (2018)","DOI":"10.1145\/3243734.3243811"},{"key":"1_CR16","unstructured":"Song, Y., Keromytis, A.D., Swtolfo, S.: Spectrogram: a mixture-of-Markov-chains model for anomaly detection in web traffic (2009)"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1\u20136. IEEE (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"1_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/978-3-030-45778-5_13","volume-title":"Machine Learning for Networking","author":"T Wakui","year":"2020","unstructured":"Wakui, T., Kondo, T., Teraoka, F.: GAMPAL: anomaly detection for internet backbone traffic by flow prediction with LSTM-RNN. In: Boumerdassi, S., Renault, \u00c9., M\u00fchlethaler, P. (eds.) MLN 2019. LNCS, vol. 12081, pp. 196\u2013211. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-45778-5_13"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Yu, Y., Liu, G., Yan, H., Li, H., Guan, H.: Attention-based Bi-LSTM model for anomalous HTTP traffic detection. In: 2018 15th International Conference on Service Systems and Service Management (ICSSSM), pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/ICSSSM.2018.8465034"}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-70866-5_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,2]],"date-time":"2021-03-02T16:07:36Z","timestamp":1614701256000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-70866-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030708658","9783030708665"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-70866-5_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"3 March 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MLN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Networking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mln2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.adda-association.org\/mln-2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the Corona pandemic this event was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}