{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:09:41Z","timestamp":1757617781932,"version":"3.44.0"},"publisher-location":"Cham","reference-count":50,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031823619"},{"type":"electronic","value":"9783031823626"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-82362-6_5","type":"book-chapter","created":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T09:58:25Z","timestamp":1743501505000},"page":"68-87","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Deep Learning for\u00a0Network Anomaly Detection Under Data Contamination: Evaluating Robustness and\u00a0Mitigating Performance Degradation"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5541-7837","authenticated-orcid":false,"given":"D\u2019Jeff K.","family":"Nkashama","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6165-8402","authenticated-orcid":false,"given":"Jordan F.","family":"Masakuna","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-6967-5730","authenticated-orcid":false,"given":"Arian","family":"Soltani","sequence":"additional","affiliation":[]},{"given":"Jean-Charles","family":"Verdier","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4402-2514","authenticated-orcid":false,"given":"Marc","family":"Frappier","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7413-6897","authenticated-orcid":false,"given":"Pierre-Martin","family":"Tardif","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6205-6447","authenticated-orcid":false,"given":"Froduald","family":"Kabanza","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,1]]},"reference":[{"key":"5_CR1","unstructured":"Alvarez, M., Verdier, J.C., Nkashama, D.K., Frappier, M., Tardif, P.M., Kabanza, F.: A revealing large-scale evaluation of unsupervised anomaly detection algorithms. arXiv preprint arXiv:2204.09825 (2022)"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Awan, S., Luo, B., Li, F.: Contra: defending against poisoning attacks in federated learning. In: Computer Security\u2013ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4\u20138, 2021, Proceedings, Part I 26, pp. 455\u2013475. Springer (2021)","DOI":"10.1007\/978-3-030-88418-5_22"},{"key":"5_CR3","unstructured":"Biggio, B., Nelson, B., Laskov, P.: Poisoning attacks against support vector machines. arXiv preprint arXiv:1206.6389 (2012)"},{"key":"5_CR4","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.patcog.2018.07.023","volume":"84","author":"B Biggio","year":"2018","unstructured":"Biggio, B., Roli, F.: Wild patterns: ten years after the rise of adversarial machine learning. Pattern Recogn. 84, 317\u2013331 (2018)","journal-title":"Pattern Recogn."},{"key":"5_CR5","first-page":"747","volume":"3","author":"X Bouthillier","year":"2021","unstructured":"Bouthillier, X., et al.: Accounting for variance in machine learning benchmarks. Proc. Mach. Learn. Syst. 3, 747\u2013769 (2021)","journal-title":"Proc. Mach. Learn. Syst."},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Bovenzi, G., Aceto, G., Ciuonzo, D., Montieri, A., Persico, V., Pescap\u00e9, A.: Network anomaly detection methods in IoT environments via deep learning: a fair comparison of performance and robustness. Comput. Secur. 128 (2023)","DOI":"10.1016\/j.cose.2023.103167"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Bovenzi, G., Foggia, A., Santella, S., Testa, A., Persico, V.: Data poisoning attacks against autoencoder-based anomaly detection models: a robustness analysis. In: IEEE International Conference on Communications, pp. 5427\u20135432 (2022)","DOI":"10.1109\/ICC45855.2022.9838942"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Breunig, M.M., Kriegel, H.P., Ng, R.T., Sander, J.: LOF: identifying density-based local outliers. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, pp. 93\u2013104 (2000)","DOI":"10.1145\/342009.335388"},{"key":"5_CR9","unstructured":"Chalapathy, R., Chawla, S.: Deep learning for anomaly detection: a survey. arXiv preprint arXiv:1901.03407 (2019)"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Chen, Z., Yeo, C.K., Lee, B.S., Lau, C.T.: Autoencoder-based network anomaly detection. In: Wireless Telecommunications Symposium (WTS), pp.\u00a01\u20135 (2018)","DOI":"10.1109\/WTS.2018.8363930"},{"issue":"1","key":"5_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12864-019-6413-7","volume":"21","author":"D Chicco","year":"2020","unstructured":"Chicco, D., Jurman, G.: The advantages of the Matthews correlation coefficient (mcc) over f1 score and accuracy in binary classification evaluation. BMC Genomics 21(1), 1\u201313 (2020)","journal-title":"BMC Genomics"},{"issue":"1","key":"5_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-015-0029-9","volume":"2","author":"M Crawford","year":"2015","unstructured":"Crawford, M., Khoshgoftaar, T.M., Prusa, J.D., Richter, A.N., Al Najada, H.: Survey of review spam detection using machine learning techniques. J. Big Data 2(1), 1\u201324 (2015)","journal-title":"J. Big Data"},{"key":"5_CR13","first-page":"1","volume":"7","author":"J Dem\u0161ar","year":"2006","unstructured":"Dem\u0161ar, J.: Statistical comparisons of classifiers over multiple data sets. J. Mach. Learn. Res. 7, 1\u201330 (2006)","journal-title":"J. Mach. Learn. Res."},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Dua, S., Du, X.: Data Mining and Machine Learning in Cybersecurity. CRC press (2016)","DOI":"10.1201\/b10867"},{"key":"5_CR15","unstructured":"Fang, M., Cao, X., Jia, J., Gong, N.: Local model poisoning attacks to $$\\{$$Byzantine-Robust$$\\}$$ federated learning. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 1605\u20131622 (2020)"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Ferencz, K., Domokos, J., Kovacs, L.: Review of industry 4.0 security challenges. In: 2021 IEEE 15th International Symposium on Applied Computational Intelligence and Informatics (SACI), pp. 245\u2013248 (2021)","DOI":"10.1109\/SACI51354.2021.9465613"},{"issue":"3","key":"5_CR17","doi-asserted-by":"publisher","first-page":"279","DOI":"10.4300\/JGME-D-12-00156.1","volume":"4","author":"MS Gail","year":"2012","unstructured":"Gail, M.S., Richard, F.: Using effect size-or why the P value is not enough. J. Grad. Med. Educ. 4(3), 279\u2013282 (2012)","journal-title":"J. Grad. Med. Educ."},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Gong, D., et al.: Memorizing normality to detect anomaly: memory-augmented deep autoencoder for unsupervised anomaly detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 1705\u20131714 (2019)","DOI":"10.1109\/ICCV.2019.00179"},{"key":"5_CR19","unstructured":"Goodfellow, I., et al.: Generative adversarial nets. Adv. Neural Inf. Process. Syst. 27 (2014)"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Gupta, P., Tyagi, P., Singh, R.K.: Analysis of generative adversarial networks for data-driven inverse airfoil design. In: Proceedings of International Conference on Information Technology and Applications, pp. 251\u2013261. Springer (2022)","DOI":"10.1007\/978-981-16-7618-5_22"},{"key":"5_CR21","unstructured":"Hayase, J., Kong, W., Somani, R., Oh, S.: Spectre: Defending against backdoor attacks using robust statistics. arXiv preprint arXiv:2104.11315 (2021)"},{"key":"5_CR22","unstructured":"Ilyas, A., Santurkar, S., Tsipras, D., Engstrom, L., Tran, B., Madry, A.: Adversarial examples are not bugs, they are features. Adv. Neural Inf. Process. Syst. 32 (2019)"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Jagielski, M., Oprea, A., Biggio, B., Liu, C., Nita-Rotaru, C., Li, B.: Manipulating machine learning: poisoning attacks and countermeasures for regression learning. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 19\u201335 (2018)","DOI":"10.1109\/SP.2018.00057"},{"issue":"1","key":"5_CR24","doi-asserted-by":"publisher","first-page":"949","DOI":"10.1007\/s10586-017-1117-8","volume":"22","author":"D Kwon","year":"2019","unstructured":"Kwon, D., Kim, H., Kim, J., Suh, S.C., Kim, I., Kim, K.J.: A survey of deep learning-based network anomaly detection. Clust. Comput. 22(1), 949\u2013961 (2019)","journal-title":"Clust. Comput."},{"key":"5_CR25","doi-asserted-by":"publisher","first-page":"1908","DOI":"10.1109\/LSP.2022.3203296","volume":"29","author":"H Kye","year":"2022","unstructured":"Kye, H., Kim, M., Kwon, M.: Hierarchical detection of network anomalies\u202f: a self-supervised learning approach. IEEE Signal Process. Lett. 29, 1908\u20131912 (2022). https:\/\/doi.org\/10.1109\/LSP.2022.3203296","journal-title":"IEEE Signal Process. Lett."},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Li, T., Wang, Z., Liu, S., Lin, W.Y.: Deep unsupervised anomaly detection. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pp. 3636\u20133645 (2021)","DOI":"10.1109\/WACV48630.2021.00368"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.H.: Isolation forest. In: 2008 eighth IEEE International Conference on Data Mining, pp. 413\u2013422. IEEE (2008)","DOI":"10.1109\/ICDM.2008.17"},{"key":"5_CR28","doi-asserted-by":"crossref","unstructured":"Liu, L., Engelen, G., Lynar, T., Essam, D., Joosen, W.: Error prevalence in NIDS datasets: A case study on CIC-IDS-2017 and CSE-CIC-IDS-2018. In: 2022 IEEE Conference on Communications and Network Security (CNS), pp. 254\u2013262 (2022)","DOI":"10.1109\/CNS56114.2022.9947235"},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"Liu, Z., Thapa, N., Shaver, A., Roy, K., Yuan, X., Khorsandroo, S.: Anomaly detection on iot network intrusion using machine learning. In: 2020 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD), pp.\u00a01\u20135. IEEE (2020)","DOI":"10.1109\/icABCD49160.2020.9183842"},{"key":"5_CR30","unstructured":"Van\u00a0der Maaten, L., Hinton, G.: Visualizing data using t-SNE. J. Mach. Learn. Res. 9(11) (2008)"},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Madani, P., Vlajic, N.: Robustness of deep autoencoder in intrusion detection under adversarial contamination. In: Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security. HoTSoS \u201918, Association for Computing Machinery, New York, NY, USA (2018)","DOI":"10.1145\/3190619.3190637"},{"key":"5_CR32","doi-asserted-by":"crossref","unstructured":"Mu\u00f1oz-Gonz\u00e1lez, L., Biggio, B., Demontis, A., Paudice, A., Wongrassamee, V., Lupu, E.C., Roli, F.: Towards poisoning of deep learning algorithms with back-gradient optimization. In: Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, pp. 27\u201338 (2017)","DOI":"10.1145\/3128572.3140451"},{"issue":"1","key":"5_CR33","first-page":"9","volume":"8","author":"B Nelson","year":"2008","unstructured":"Nelson, B., et al.: Exploiting machine learning to subvert your spam filter. LEET 8(1), 9 (2008)","journal-title":"LEET"},{"key":"5_CR34","doi-asserted-by":"crossref","unstructured":"Neto, E.C.P., Dadkhah, S., Ferreira, R., Zohourian, A., Lu, R., Ghorbani, A.A.: CICIoT2023: a real-time dataset and benchmark for large-scale attacks in IoT environment. Sensors 23(13) (2023)","DOI":"10.3390\/s23135941"},{"key":"5_CR35","unstructured":"Nkashama, D., Soltani, A., Verdier, J.C., Frappier, M., Tardif, P.M., Kabanza, F.: Robustness evaluation of deep unsupervised learning algorithms for intrusion detection systems. In: ICML workshop on Machine Learning for Cybersecurity (ICML-ML4Cyber) (2022)"},{"key":"5_CR36","unstructured":"Qiu, C., Pfrommer, T., Kloft, M., Mandt, S., Rudolph, M.: Neural transformation learning for deep anomaly detection beyond images. In: International Conference on Machine Learning, pp. 8703\u20138714. PMLR (2021)"},{"key":"5_CR37","doi-asserted-by":"crossref","unstructured":"Rubinstein, B.I., et al.: Antidote: understanding and defending against poisoning of anomaly detectors. In: Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement, pp. 1\u201314 (2009)","DOI":"10.1145\/1644893.1644895"},{"key":"5_CR38","doi-asserted-by":"crossref","unstructured":"Ruff, L., et al.: A unifying review of deep and shallow anomaly detection. Proceedings of the IEEE (2021)","DOI":"10.1109\/JPROC.2021.3052449"},{"key":"5_CR39","unstructured":"Ruff, L., et al.: Deep one-class classification. In: International Conference on Machine Learning, pp. 4393\u20134402. PMLR (2018)"},{"issue":"3","key":"5_CR40","doi-asserted-by":"publisher","first-page":"e0118432","DOI":"10.1371\/journal.pone.0118432","volume":"10","author":"T Saito","year":"2015","unstructured":"Saito, T., Rehmsmeier, M.: The precision-recall plot is more informative than the roc plot when evaluating binary classifiers on imbalanced datasets. PLoS ONE 10(3), e0118432 (2015)","journal-title":"PLoS ONE"},{"issue":"1","key":"5_CR41","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/s11036-022-01937-3","volume":"28","author":"IH Sarker","year":"2023","unstructured":"Sarker, I.H., Khan, A.I., Abushark, Y.B., Alsolami, F.: Internet of things (IoT) security intelligence: a comprehensive overview, machine learning solutions and research directions. Mob. Netw. Appl. 28(1), 296\u2013312 (2023)","journal-title":"Mob. Netw. Appl."},{"key":"5_CR42","unstructured":"Sch\u00f6lkopf, B., Williamson, R.C., Smola, A., Shawe-Taylor, J., Platt, J.: Support vector method for novelty detection. Adv. Neural Inf. Process. Syst. 12 (1999)"},{"key":"5_CR43","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization (2018)","DOI":"10.5220\/0006639801080116"},{"issue":"4","key":"5_CR44","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1109\/TDSC.2011.14","volume":"8","author":"F Simmross-Wattenberg","year":"2011","unstructured":"Simmross-Wattenberg, F., Asensio-Perez, J.I., Casaseca-De-La-Higuera, P., Martin-Fernandez, M., Dimitriadis, I.A., Alberola-Lopez, C.: Anomaly detection in network traffic based on statistical inference and$$\\backslash $$alpha-stable modeling. IEEE Trans. Dependable Secure Comput. 8(4), 494\u2013509 (2011)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"5_CR45","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp.\u00a01\u20136. IEEE (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"5_CR46","unstructured":"Wang, B., Cao, X., Gong, N.Z., et\u00a0al.: On certifying robustness against backdoor attacks via randomized smoothing. arXiv preprint arXiv:2002.11750 (2020)"},{"key":"5_CR47","unstructured":"Xiao, H., Biggio, B., Brown, G., Fumera, G., Eckert, C., Roli, F.: Is feature selection secure against training data poisoning? In: International Conference on Machine Learning, pp. 1689\u20131698. PMLR (2015)"},{"key":"5_CR48","doi-asserted-by":"crossref","unstructured":"Zenati, H., Romain, M., Foo, C.S., Lecouat, B., Chandrasekhar, V.: Adversarially learned anomaly detection. In: 2018 IEEE International conference on data mining (ICDM), pp. 727\u2013736. IEEE (2018)","DOI":"10.1109\/ICDM.2018.00088"},{"key":"5_CR49","unstructured":"Zhai, S., Cheng, Y., Lu, W., Zhang, Z.: Deep structured energy based models for anomaly detection. In: International Conference on Machine Learning, pp. 1100\u20131109. PMLR (2016)"},{"key":"5_CR50","unstructured":"Zong, B., Song, Q., Min, M.R., Cheng, W., Lumezanu, C., Cho, D., Chen, H.: Deep autoencoding gaussian mixture model for unsupervised anomaly detection. In: International Conference on Learning Representations (2018)"}],"container-title":["Lecture Notes in Computer Science","Computer Security. ESORICS 2024 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-82362-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T08:31:13Z","timestamp":1757147473000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-82362-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031823619","9783031823626"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-82362-6_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"1 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bydgoszcz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2024.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}