{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:48:02Z","timestamp":1775746082257,"version":"3.50.1"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031083327","type":"print"},{"value":"9783031083334","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-08333-4_11","type":"book-chapter","created":{"date-parts":[[2022,6,16]],"date-time":"2022-06-16T15:52:13Z","timestamp":1655394733000},"page":"132-144","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":42,"title":["Random Forest Based on\u00a0Federated Learning for\u00a0Intrusion Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4920-2012","authenticated-orcid":false,"given":"Tijana","family":"Markovic","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3425-3837","authenticated-orcid":false,"given":"Miguel","family":"Leon","sequence":"additional","affiliation":[]},{"given":"David","family":"Buffoni","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5269-3900","authenticated-orcid":false,"given":"Sasikumar","family":"Punnekkat","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,10]]},"reference":[{"key":"11_CR1","unstructured":"NSL-KDD (2009). https:\/\/www.unb.ca\/cic\/datasets\/nsl.html"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Abedin, M., Siddiquee, K.N.E.A., Bhuyan, M., Karim, R., Hossain, M.S., Andersson, K., et al.: Performance analysis of anomaly based network intrusion detection systems. In: 43nd IEEE Conference on Local Computer Networks Workshops (LCN Workshops), Chicago, 1\u20134 October 2018, pp. 1\u20137. IEEE Computer Society (2018)","DOI":"10.1109\/LCNW.2018.8628599"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal, S., et al.: Federated learning for intrusion detection system: concepts, challenges and future directions. arXiv preprint arXiv:2106.09527 (2021)","DOI":"10.1016\/j.comcom.2022.09.012"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Ahmad, Z., Shahid Khan, A., Wai Shiang, C., Abdullah, J., Ahmad, F.: Network intrusion detection system: a systematic study of machine learning and deep learning approaches. Trans. Emerg. Telecommun. Technol. 32(1), e4150 (2021)","DOI":"10.1002\/ett.4150"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Bace, R., Mell, P.: Intrusion detection systems. National Institute of Standards and Technology (NIST), Technical Report 800-31 (2001)","DOI":"10.6028\/NIST.SP.800-31"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332, e4150 (2001)","DOI":"10.1023\/A:1010933404324"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153\u20131176 (2015)","DOI":"10.1109\/COMST.2015.2494502"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Campos, E.M., et al.: Evaluating federated learning for intrusion detection in internet of things: review and challenges. Comput. Netw. 203, 108661 (2022)","DOI":"10.1016\/j.comnet.2021.108661"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Farnaaz, N., Jabbar, M.: Random forest modeling for network intrusion detection system. Procedia Comput. Sci. 89, 213\u2013217 (2016)","DOI":"10.1016\/j.procs.2016.06.047"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Ghurab, M., Gaphari, G., Alshami, F., Alshamy, R., Othman, S.: A detailed analysis of benchmark datasets for network intrusion detection system. Asian J. Res. Comput. Sci. 7(4), 14\u201333 (2021)","DOI":"10.9734\/ajrcos\/2021\/v7i430185"},{"key":"11_CR11","unstructured":"Hautsalo, J.: Using supervised learning and data fusion to detect network attacks. [urn:nbn:se:mdh:diva-54957] (2021)"},{"key":"11_CR12","unstructured":"Hettich, S., Bay, S.D.: The UCI KDD archive. University of California, Department of Information and Computer Science, Irvine: (1999). http:\/\/kdd.ics.uci.edu"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Kairouz, P., McMahan, H.B., et al.: Advances and open problems in federated learning (2021)","DOI":"10.1561\/2200000083"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J.: Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2(1), 1\u201322 (2019)","DOI":"10.1186\/s42400-019-0038-7"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Larose, D.T., Larose, C.D.: Discovering Knowledge in Data: An Introduction to Data Mining, vol. 4. John Wiley & Sons, Hoboken (2014)","DOI":"10.1002\/9781118874059"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Li, Q., Wen, Z., He, B.: Practical federated gradient boosting decision trees. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34, pp. 4642\u20134649, April 2020","DOI":"10.1609\/aaai.v34i04.5895"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Li, Q., et al.: A survey on federated learning systems: vision, hype and reality for data privacy and protection. IEEE Trans. Knowl. Data Eng. (Early Access), 1\u20131 (2021)","DOI":"10.1109\/TKDE.2021.3124599"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Liao, H.J., Lin, C.H.R., Lin, Y.C., Tung, K.Y.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 16\u201324 (2013)","DOI":"10.1016\/j.jnca.2012.09.004"},{"key":"11_CR19","unstructured":"Liu, Y., Liu, Y., Liu, Z., Zhang, J., Meng, C., Zheng, Y.: Federated forest. CoRR abs\/1905.10053 (2019). http:\/\/arxiv.org\/abs\/1905.10053"},{"key":"11_CR20","doi-asserted-by":"publisher","unstructured":"Man, D., Zeng, F., Yang, W., Yu, M., Lv, J., Wang, Y.: Intelligent intrusion detection based on federated learning for edge-assisted internet of things. Secur. Commun. Netw. 2021, 108661 (2021). https:\/\/doi.org\/10.1155\/2021\/9361348","DOI":"10.1155\/2021\/9361348"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Resende, P.A.A., Drummond, A.C.: A survey of random forest based methods for intrusion detection systems. ACM Comput. Surv. 51(3), 1\u201336, 108661 (2018)","DOI":"10.1145\/3178582"},{"key":"11_CR23","unstructured":"Revathi, S., Malathi, A.: A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. Int. J. Eng. Res. Technol. 2(12), 1848\u20131853 (2013)"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1, 108\u2013116 (2018)","DOI":"10.5220\/0006639801080116"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"de Souza, L.A.C., Antonio F. Rebello, G., Camilo, G.F., Guimar\u00e3es, L.C.B., Duarte, O.C.M.B.: DFedForest: decentralized federated forest. In: 2020 IEEE International Conference on Blockchain (Blockchain), pp. 90\u201397 (2020)","DOI":"10.1109\/Blockchain50366.2020.00019"},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Ccomputational Intelligence for Security and Defense Applications, pp. 1\u20136. IEEE (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Yang, Q., Liu, Y., Cheng, Y., Kang, Y., Chen, T., Yu, H.: Federated learning. Synth. Lect. Artif. Intell. Mach. Learn. 13(3), 1\u2013207 (2019)","DOI":"10.2200\/S00960ED2V01Y201910AIM043"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Zambon, M., Lawrence, R., Bunn, A., Powell, S.: Effect of alternative splitting rules on image processing using classification tree analysis. Photogram. Eng. Remote Sens. 72(1), 25\u201330 (2006)","DOI":"10.14358\/PERS.72.1.25"}],"container-title":["IFIP Advances in Information and Communication Technology","Artificial Intelligence Applications and Innovations"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-08333-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T16:15:53Z","timestamp":1675872953000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-08333-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031083327","9783031083334"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-08333-4_11","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"10 June 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AIAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Artificial Intelligence Applications and Innovations","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hersonissos","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 June 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aiai2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ifipaiai.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}