{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:36:33Z","timestamp":1771612593919,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030880804","type":"print"},{"value":"9783030880811","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-88081-1_55","type":"book-chapter","created":{"date-parts":[[2021,9,29]],"date-time":"2021-09-29T11:07:08Z","timestamp":1632913628000},"page":"735-744","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Application of Traditional Machine Learning Models to Detect Abnormal Traffic in the Internet of Things Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9759-2249","authenticated-orcid":false,"given":"Evgeniya","family":"Istratova","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3016-3647","authenticated-orcid":false,"given":"Mikhail","family":"Grif","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6349-1466","authenticated-orcid":false,"given":"Dmitry","family":"Dostovalov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,30]]},"reference":[{"issue":"6","key":"55_CR1","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MWC.2010.5675773","volume":"17","author":"G Marrocco","year":"2010","unstructured":"Marrocco, G.: Pervasive electromagnetics: sensing paradigms by passive RFID technology. IEEE Wirel. Commun. 17(6), 10\u201317 (2010)","journal-title":"IEEE Wirel. Commun."},{"issue":"4","key":"55_CR2","first-page":"160","volume":"6","author":"BS Goldstein","year":"2013","unstructured":"Goldstein, B.S., Kucheryavy, A.E.: Post-NGN communication networks. Inf. Control Syst. 6(4), 160\u2013172 (2013)","journal-title":"Inf. Control Syst."},{"key":"55_CR3","unstructured":"Brutlag, J.D.: Aberrant behavior detection in time series for network monitoring. In: Proceeding of the 14th Systems Administration Conference, pp. 139\u2013146 (2000)"},{"issue":"51","key":"55_CR4","doi-asserted-by":"publisher","first-page":"2191","DOI":"10.1109\/TSP.2003.814797","volume":"8","author":"M Thottan","year":"2003","unstructured":"Thottan, M., Chuanyi, J.: Anomaly detection in IP networks. IEEE Trans. Sig. Proc. 8(51), 2191\u20132204 (2003)","journal-title":"IEEE Trans. Sig. Proc."},{"issue":"23","key":"55_CR5","first-page":"1530","volume":"6","author":"H Wang","year":"2002","unstructured":"Wang, H., Zhang, D., Shin, K.G.: Detecting SYN flooding attacks. Proc. IEEE INFOCOM. 6(23), 1530\u20131539 (2002)","journal-title":"Proc. IEEE INFOCOM."},{"key":"55_CR6","unstructured":"Staniford, S., Hoagland, J., MCalerney, J.M.: Practical automated detection of stealthy portscans. Proc. IDS Workshop 2(4), 197\u2013216 (2000)"},{"key":"55_CR7","first-page":"5","volume":"1","author":"SA Ageev","year":"2015","unstructured":"Ageev, S.A., Saenko, I.B.: Method of intellectual multi-agent information security risk management in protected multiservice special-purposed networks. T-Commun. 1, 5\u201310 (2015)","journal-title":"T-Commun."},{"issue":"18","key":"55_CR8","first-page":"191","volume":"4","author":"V Gorodetsky","year":"2003","unstructured":"Gorodetsky, V., Kotenko, I., Karsayev, O.: Multi-agent technologies for computer network security: attack simulation, intrusion detection and intrusion detection learning. Int. J. Comput. Syst. Sci. Eng. 4(18), 191\u2013200 (2003)","journal-title":"Int. J. Comput. Syst. Sci. Eng."},{"key":"55_CR9","first-page":"69","volume":"4","author":"AA Branitskiy","year":"2015","unstructured":"Branitskiy, A.A., Kotenko, I.V.: Network attack detection based on combination of neural, immune and neuro-fuzzy classifiers. Inf. Control Syst. 4, 69\u201377 (2015)","journal-title":"Inf. Control Syst."},{"issue":"22","key":"55_CR10","doi-asserted-by":"publisher","first-page":"1646","DOI":"10.1109\/COMST.2020.2988293","volume":"3","author":"MA Al-Garadi","year":"2020","unstructured":"Al-Garadi, M.A., Mohamed, A., Al-Ali, A., Du, X., Guizani, M.: A survey of machine and deep learning methods for Internet of Things (IoT) security. IEEE Commun. Surv. Tutorials 3(22), 1646\u20131685 (2020)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"19","key":"55_CR11","first-page":"1050","volume":"5","author":"D Levshun","year":"2020","unstructured":"Levshun, D., Gaifulina, D., Chechulin, A., Kotenko, I.: Problematic issues of information security of cyber-physical systems. Inf. Autom. 5(19), 1050\u20131088 (2020)","journal-title":"Inf. Autom."},{"key":"55_CR12","doi-asserted-by":"crossref","unstructured":"Roopak, M., Tian, G.Y., Chambers, J.: Deep learning models for cyber security in IoT networks. In: IEEE Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, USA, pp. 0452\u20130457 (2019)","DOI":"10.1109\/CCWC.2019.8666588"},{"issue":"1","key":"55_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s43926-020-00001-4","volume":"1","author":"M Kuzlu","year":"2021","unstructured":"Kuzlu, M., Fair, C., Guler, O.: Role of artificial intelligence in the Internet of Things (IoT) cybersecurity. Discov. Internet Things 1(1), 1\u201314 (2021). https:\/\/doi.org\/10.1007\/s43926-020-00001-4","journal-title":"Discov. Internet Things"},{"issue":"1","key":"55_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-018-0123-6","volume":"7","author":"MF Elrawy","year":"2018","unstructured":"Elrawy, M.F., Awad, A.I., Hamed, H.F.A.: Intrusion detection systems for IoT-based smart environments: a survey. J. Cloud Comput. 7(1), 1\u201320 (2018). https:\/\/doi.org\/10.1186\/s13677-018-0123-6","journal-title":"J. Cloud Comput."},{"issue":"1","key":"55_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-021-01893-8","volume":"2021","author":"M Ahmad","year":"2021","unstructured":"Ahmad, M., Riaz, Q., Zeeshan, M., Tahir, H., Haider, S.A., Khan, M.S.: Intrusion detection in internet of things using supervised machine learning based on application and transport layer features using UNSW-NB15 data-set. J. Wirel. Commun. Netw. 2021(1), 1\u201323 (2021). https:\/\/doi.org\/10.1186\/s13638-021-01893-8","journal-title":"J. Wirel. Commun. Netw."},{"key":"55_CR16","doi-asserted-by":"crossref","unstructured":"Maim\u00f3, L.F., et al.: On the performance of a deep learning-based anomaly detection system for 5G networks. In: IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, pp. 1\u20138 (2017)","DOI":"10.1109\/UIC-ATC.2017.8397440"},{"key":"55_CR17","unstructured":"UNSW-NB15 Dataset (2021). https:\/\/www.unsw.adfa.edu.au\/unsw-canberra-cyber\/cybersecurity\/ADFA-NB15-Datasets\/. Accessed 06 Mar 2021"},{"key":"55_CR18","doi-asserted-by":"publisher","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: Military Communications and Information Systems Conference (MilCIS), Canberra, ACT, pp. 1\u20136 (2015). https:\/\/doi.org\/10.1109\/MilCIS.2015.7348942","DOI":"10.1109\/MilCIS.2015.7348942"},{"issue":"6","key":"55_CR19","doi-asserted-by":"publisher","first-page":"4815","DOI":"10.1109\/JIOT.2018.2871719","volume":"3","author":"N Moustafa","year":"2019","unstructured":"Moustafa, N., Turnbull, B., Choo, K.R.: An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things. IEEE Internet Things J. 3(6), 4815\u20134830 (2019). https:\/\/doi.org\/10.1109\/JIOT.2018.2871719","journal-title":"IEEE Internet Things J."},{"key":"55_CR20","unstructured":"Deshevih, E.A., Ushakov, I.A., Kotenko, I.V.: Overview of big data tools and platforms for information security monitoring. In: Information Security of Russian Regions (IBRR-2015), pp. 67\u201387 (2019)"}],"container-title":["Lecture Notes in Computer Science","Computational Collective Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-88081-1_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,29]],"date-time":"2021-09-29T11:31:36Z","timestamp":1632915096000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-88081-1_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030880804","9783030880811"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-88081-1_55","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"30 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCCI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Collective Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rhodos","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccci2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccci.pwr.edu.pl\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"231","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"58","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}