{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T20:06:24Z","timestamp":1743019584948,"version":"3.40.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030966263"},{"type":"electronic","value":"9783030966270"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-96627-0_8","type":"book-chapter","created":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T12:22:32Z","timestamp":1651839752000},"page":"79-88","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A WNN-Based Approach for\u00a0Network Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Mario","family":"Di Mauro","sequence":"first","affiliation":[]},{"given":"Giovanni","family":"Galatro","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Liotta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,7]]},"reference":[{"key":"8_CR1","first-page":"85","volume":"38","author":"M Di Mauro","year":"2018","unstructured":"Di Mauro, M., Di Sarno, C.: Improving SIEM capabilities through an enhanced probe for encrypted Skype traffic detection. J. Inf. Secur. Appl. 38, 85\u201395 (2018)","journal-title":"J. Inf. Secur. Appl."},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Di Mauro, M., Di Sarno, C.: A framework for internet data real-time processing: a machine-learning approach. In: 2014 International Carnahan Conference on Security Technology (ICCST), pp. 1\u20136 (2014)","DOI":"10.1109\/CCST.2014.6987044"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Di Mauro, M., Longo, M.: Revealing encrypted WebRTC traffic via machine learning tools. In: 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE), vol.\u00a004, pp. 259\u2013266 (2015)","DOI":"10.5220\/0005542202590266"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Di Mauro, M., Longo, M.: Skype traffic detection: a decision theory based tool. In: 2014 International Carnahan Conference on Security Technology (ICCST), pp. 1\u20136 (2014)","DOI":"10.1109\/CCST.2014.6986975"},{"key":"8_CR5","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1109\/TIFS.2019.2922398","volume":"15","author":"P Addesso","year":"2020","unstructured":"Addesso, P., Cirillo, M., Di Mauro, M., Matta, V.: ADVoIP: adversarial detection of encrypted and concealed VoIP. IEEE Trans. Inf. Forensics Secur. 15, 943\u2013958 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"12","key":"8_CR6","doi-asserted-by":"publisher","first-page":"3137","DOI":"10.1109\/TIFS.2018.2838084","volume":"13","author":"V Matta","year":"2018","unstructured":"Matta, V., Di Mauro, M., Longo, M., Farina, A.: Cyber-threat mitigation exploiting the birth\u00e2\u0102\u015edeath\u00e2\u0102\u015eimmigration model. IEEE Trans. Inf. Forensics Secur. 13(12), 3137\u20133152 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"3604","DOI":"10.1109\/TIFS.2021.3082327","volume":"16","author":"P Addesso","year":"2021","unstructured":"Addesso, P., Barni, M., Di Mauro, M., Matta, V.: Adversarial kendall\u00e2\u0102\u0179s model towards containment of distributed cyber-threats. IEEE Trans. Inf. Forensics Secur. 16, 3604\u20133619 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR8","volume-title":"Introduction to Neural Computing","author":"I Aleksander","year":"1990","unstructured":"Aleksander, I., Morton, H.: Introduction to Neural Computing. Chapman and Hall, London (1990)"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Cauteruccio, F., Fortino, G., Guerrieri, A., Liotta, A., Mocanu, D.C., Perra, C., Terracina, G., Vega, M.T.: Short-long term anomaly detection in wireless sensor networks based on machine learning and multi-parameterized edit distance. Inf. Fusion 52, 13\u201330 (2019)","DOI":"10.1016\/j.inffus.2018.11.010"},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.inffus.2020.10.001","volume":"67","author":"L Erhan","year":"2021","unstructured":"Erhan, L., Ndubuaku, M., Di Mauro, M., Song, W., Chen, M., Fortino, G., Bagdasar, O., Liotta, A.: Smart anomaly detection in sensor systems: a multi-perspective review. Inf. Fusion 67, 64\u201379 (2021)","journal-title":"Inf. Fusion"},{"key":"8_CR11","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1016\/j.future.2020.08.010","volume":"114","author":"F Cauteruccio","year":"2021","unstructured":"Cauteruccio, F., Cinelli, L., Corradini, E., Terracina, G., Ursino, D., Virgili, L., Savaglio, C., Liotta, A., Fortino, G.: A framework for anomaly detection and classification in multiple IoT scenarios. Futur. Gener. Comput. Syst. 114, 322\u2013335 (2021)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"8_CR12","doi-asserted-by":"publisher","first-page":"21954","DOI":"10.1109\/ACCESS.2017.2762418","volume":"5","author":"C Yin","year":"2017","unstructured":"Yin, C., Zhu, Y., Fei, J., He, X.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954\u201321961 (2017)","journal-title":"IEEE Access"},{"key":"8_CR13","first-page":"01","volume":"10","author":"R Ravipati","year":"2019","unstructured":"Ravipati, R., Munther, A.: A survey on different machine learning algorithms and weak classifiers based on KDD and NSL-KDD datasets. Int. J. Artif. Intell. Appl. 10, 01\u201311 (2019)","journal-title":"Int. J. Artif. Intell. Appl."},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Azwar, H., Murtaz, M., Siddique, M., Rehman, S.: Intrusion detection in secure network for cybersecurity systems using machine learning and data mining. In: 2018 IEEE 5th International Conference on Engineering Technologies and Applied Sciences (ICETAS), pp. 1\u20139 (2018)","DOI":"10.1109\/ICETAS.2018.8629197"},{"key":"8_CR15","unstructured":"Kdd cup 1999 data.: http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html. Last accessed: 10 Sept 2021"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1\u20136 (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Khan, R.U., Zhang, X., Alazab, M., Kumar, R.: An improved convolutional neural network model for intrusion detection in networks. In: 2019 Cybersecurity and Cyberforensics Conference, pp. 74\u201377 (2019)","DOI":"10.1109\/CCC.2019.000-6"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"S.\u00a0T.\u00a0F. Al-Janabi and H.\u00a0A. Saeed. A neural network based anomaly intrusion detection system. In Developments in E-systems Engineering, pages 221\u2013226, 2011","DOI":"10.1109\/DeSE.2011.19"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Taher, K.A., Jisan, B.M.Y., Rahman, M.M.: Network intrusion detection using supervised machine learning technique with feature selection. In: 2019 International Conference on Robotics,Electrical and Signal Processing Techniques (ICREST), pp. 643\u2013646 (2019)","DOI":"10.1109\/ICREST.2019.8644161"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Papamartzivanos, D., Marmol, F.G., Kambourakis, G.: Introducing deep learning self-adaptive misuse network intrusion detection systems. IEEE Access 7, 13546\u201313560 (2019)","DOI":"10.1109\/ACCESS.2019.2893871"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Fernando, Z.T., Thaseen, I.S., Kumar, C.A.: Network attacks identification using consistency based feature selection and self organizing maps. In: First International Conference on Networks Soft Computing, pp. 162\u2013166 (2014)","DOI":"10.1109\/CNSC.2014.6906666"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"McElwee, S., Cannady, J.: Improving the performance of self-organizing maps for intrusion detection. In: SoutheastCon 2016, pp. 1\u20136 (2016)","DOI":"10.1109\/SECON.2016.7506766"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Li-ying, C., Xiao-xian, Z., He, L., Gui-fen, C.: A network intrusion detection method based on combined model. In: International Conference on Mechatronic Science, Electric Engineering and Computer, pp. 254\u2013257 (2011)","DOI":"10.1109\/MEC.2011.6025449"},{"key":"8_CR24","unstructured":"Al-Sultani, Z.N., Naoum, R.S.: Learning vector quantization (LVQ) and k-nearest neighbor for intrusion classification. World Comput. Sci. Inf. Technol. J. 2(3), 105\u2013109 (2012)"},{"key":"8_CR25","unstructured":"The CSE-CIC-IDS2018 Dataset.: http:\/\/netflowmeter.cal. Last accessed: 10 Sept 2021"},{"issue":"4","key":"8_CR26","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/SURV.2008.080406","volume":"10","author":"TTT Nguyen","year":"2008","unstructured":"Nguyen, T.T.T., Armitage, G.: A survey of techniques for internet traffic classification using machine learning. IEEE Commun. Surv. Tutor. 10(4), 56\u201376 (2008)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"8_CR27","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1186\/s13174-018-0087-2","volume":"9","author":"R Boutaba","year":"2018","unstructured":"Boutaba, R., Salahuddin, M.A., Limam, N., Ayoubi, S., Shahriar, N., Estrada-Solano, F., Caicedo, O.M.: A comprehensive survey on machine learning for networking: evolution, applications and research opportunities. J. Internet Serv. Appl. 9(1), 16 (2018)","journal-title":"J. Internet Serv. Appl."},{"key":"8_CR28","unstructured":"Hindy, H., Brosset, D., Bayne, E., Seeam, A., Tachtatzis, C., Atkinson, R., Bellekens, X.: A taxonomy and survey of intrusion detection system design techniques, network threats and datasets. CoRR (2018). arXiv:abs\/1806.03517"},{"issue":"1","key":"8_CR29","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1186\/s42400-019-0038-7","volume":"2","author":"A Khraisat","year":"2019","unstructured":"Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J.: Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2(1), 20 (2019)","journal-title":"Cybersecurity"},{"key":"8_CR30","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.knosys.2019.105124","volume":"189","author":"A Aldweesh","year":"2020","unstructured":"Aldweesh, A., Derhab, A., Emam, A.: Deep learning approaches for anomaly-based intrusion detection systems: a survey, taxonomy, and open issues. Knowl.-Based Syst. 189, 105\u2013124 (2020)","journal-title":"Knowl.-Based Syst."},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"Bowden, P., Alexander, I., Thomas, W.: Learning deep architectures for AI. Sens. Rev. 4(3), 120\u2013124 (1984)","DOI":"10.1108\/eb007637"},{"key":"8_CR32","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/j.asoc.2018.07.052","volume":"72","author":"M De Gregorio","year":"2018","unstructured":"De Gregorio, M., Giordano, M.: An experimental evaluation of weightless neural networks for multi-class classification. Appl. Soft Comput. 72, 338\u2013354 (2018)","journal-title":"Appl. Soft Comput."},{"key":"8_CR33","doi-asserted-by":"crossref","unstructured":"Di Mauro, M., Galatro, G., Fortino, G., Liotta, A.: Supervised feature selection techniques in network intrusion detection: a critical review. Eng. Appl. Artif. Intell. 101 (2021)","DOI":"10.1016\/j.engappai.2021.104216"},{"key":"8_CR34","doi-asserted-by":"crossref","unstructured":"Matta, V., Di Mauro, M., Longo, M.: Botnet identification in randomized DDoS attacks. In: Proceedings of the 24th European Signal Processing Conference, pp. 2260\u20132264 (2016)","DOI":"10.1109\/EUSIPCO.2016.7760651"},{"key":"8_CR35","doi-asserted-by":"crossref","unstructured":"Cirillo, M., Di Mauro, M., Matta, V., Tambasco, M.: Botnet identification in DDoS attacks with multiple emulation dictionaries. IEEE Trans. Inf. Forensics Secur. 16, 3554\u20133569 (2021)","DOI":"10.1109\/TIFS.2021.3082290"},{"key":"8_CR36","doi-asserted-by":"crossref","unstructured":"Cirillo, M., Di Mauro, M., Matta, V., Tambasco, M.: Application-layer DDoS attacks with multiple emulation dictionaries. In: IEEE ICASSP, pp. 2610\u20132614 (2021)","DOI":"10.1109\/ICASSP39728.2021.9413570"},{"issue":"4","key":"8_CR37","doi-asserted-by":"publisher","first-page":"2480","DOI":"10.1109\/TNSM.2020.3024225","volume":"17","author":"M Di Mauro","year":"2020","unstructured":"Di Mauro, M., Galatro, G., Liotta, A.: Experimental review of neural-based approaches for network intrusion management. IEEE Trans. Netw. Serv. Manage. 17(4), 2480\u20132495 (2020)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"8_CR38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-56927-2","volume-title":"Self-Organizing Maps","author":"T Kohonen","year":"2001","unstructured":"Kohonen, T.: Self-Organizing Maps, 3rd edn. Springer, Berlin, Heidelberg (2001)","edition":"3"}],"container-title":["Studies in Computational Intelligence","Intelligent Distributed Computing XIV"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-96627-0_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T12:23:36Z","timestamp":1651839816000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-96627-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030966263","9783030966270"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-96627-0_8","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"7 May 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IDC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Intelligent and Distributed Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"idc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/idc2021.unirc.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}