{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:31:37Z","timestamp":1743129097685,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031702587"},{"type":"electronic","value":"9783031702594"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-70259-4_4","type":"book-chapter","created":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T09:02:15Z","timestamp":1725786135000},"page":"43-53","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Analysis of\u00a0Network Intrusion Detection and\u00a0Potential Botnets Identification Using Selected Machine Learning Techniques"],"prefix":"10.1007","author":[{"given":"Patryk","family":"Zabawa","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7764-1303","authenticated-orcid":false,"given":"Michal","family":"Kedziora","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,9]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Ahmetoglu, H., Das, R.: A comprehensive review on detection of cyber-attacks: data sets, methods, challenges, and future research directions. Internet Things 20, 100615 (2022)","DOI":"10.1016\/j.iot.2022.100615"},{"issue":"7","key":"4_CR2","doi-asserted-by":"publisher","first-page":"243","DOI":"10.3390\/fi15070243","volume":"15","author":"M Al Lail","year":"2023","unstructured":"Al Lail, M., Garcia, A., Olivo, S.: Machine learning for network intrusion detection-a comparative study. Future Internet 15(7), 243 (2023)","journal-title":"Future Internet"},{"issue":"21","key":"4_CR3","doi-asserted-by":"publisher","first-page":"7070","DOI":"10.3390\/s21217070","volume":"21","author":"M Aljabri","year":"2021","unstructured":"Aljabri, M., et al.: Intelligent techniques for detecting network attacks: review and research directions. Sensors 21(21), 7070 (2021)","journal-title":"Sensors"},{"key":"4_CR4","unstructured":"Bond, M., Human, K., Kwon, N.: Analysis and implications for equifax data breach (2022)"},{"key":"4_CR5","unstructured":"Delplace, A., Hermoso, S., Anandita, K.: Cyber attack detection thanks to machine learning algorithms. arXiv preprint arXiv:2001.06309 (2020)"},{"key":"4_CR6","unstructured":"Erickson, S.L., Stone, M., Serdar, G., Pfeffer, B.: When crisis victims are not customers: SCCT and the equifax data breach. J. Manag. Issues 35(2) (2023)"},{"key":"4_CR7","unstructured":"Garcia, S., Uhlir, V.: The CTU-13 dataset. a labeled dataset with botnet, normal and background traffic. S. Lab, Ed., ed (2014)"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Kedziora, M., Gawin, P., Szczepanik, M., Jozwiak, I.: Malware detection using machine learning algorithms and reverse engineering of android java code. Int. J. Netw. Secur. Its Appl. (IJNSA) 11 (2019)","DOI":"10.2139\/ssrn.3328497"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Kedziora, M., Gawin, P., Szczepanik, M., Jozwiak, I., et al.: Android malware detection using machine learning and reverse engineering. Comput. Sci. Inf. Technol. (CS &IT) 95\u2013107 (2018)","DOI":"10.5121\/csit.2018.81709"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Krolik, L., Kedziora, M., Mizera-Pietraszko, J., Jozwiak, I.: Detecting attacks on computer networks using artificial intelligence algorithms. In: Proceedings of the 14th International Conference on Management of Digital EcoSystems, pp. 110\u2013114 (2022)","DOI":"10.1145\/3508397.3564830"},{"key":"4_CR11","unstructured":"Luu, Q.: Detect botnet traffic (2023). https:\/\/ github.com\/lmquan1609\/ detectbotnettraffic"},{"issue":"5","key":"4_CR12","first-page":"478","volume":"8","author":"S Meftah","year":"2019","unstructured":"Meftah, S., Rachidi, T., Assem, N.: Network based intrusion detection using the UNSW-NB15 dataset. Int. J. Comput. Digital Syst. 8(5), 478\u2013487 (2019)","journal-title":"Int. J. Comput. Digital Syst."},{"key":"4_CR13","doi-asserted-by":"publisher","unstructured":"Sarhan, M., Layeghy, S., Moustafa, N., Portmann, M.: NetFlow datasets for machine learning-based network intrusion detection systems. In: Big Data Technologies and Applications: 10th EAI International Conference, BDTA 2020, and 13th EAI International Conference on Wireless Internet, WiCON 2020, Virtual Event, December 11, 2020, Proceedings 10, pp. 117\u2013135. Springer (2021). https:\/\/doi.org\/10.1007\/978-3-030-72802-1_9","DOI":"10.1007\/978-3-030-72802-1_9"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Sarhan, M., Layeghy, S., Portmann, M.: Towards a standard feature set for network intrusion detection system datasets. Mobile Netw. Appl. 1\u201314 (2022)","DOI":"10.1007\/s11036-021-01843-0"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Shareena, J., Ramdas, A., AP, H., et al.: Intrusion detection system for IOT botnet attacks using deep learning. SN Comput. Sci. 2(3), 1\u20138 (2021)","DOI":"10.1007\/s42979-021-00516-9"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Yavanoglu, O., Aydos, M.: A review on cyber security datasets for machine learning algorithms. In: 2017 IEEE International Conference on Big Data (Big Data), pp. 2186\u20132193. IEEE (2017)","DOI":"10.1109\/BigData.2017.8258167"}],"container-title":["Communications in Computer and Information Science","Advances in Computational Collective Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-70259-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T09:15:41Z","timestamp":1725786941000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-70259-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031702587","9783031702594"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-70259-4_4","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"9 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCCI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Collective Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Leipzig","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccci2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccci.pwr.edu.pl\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}