{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T04:11:48Z","timestamp":1751602308242,"version":"3.41.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031877711"},{"type":"electronic","value":"9783031877728"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87772-8_34","type":"book-chapter","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T07:36:25Z","timestamp":1745307385000},"page":"406-417","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy Benchmarking of\u00a0Intrusion Detection Sytems"],"prefix":"10.1007","author":[{"given":"Solayman","family":"Ayoubi","sequence":"first","affiliation":[]},{"given":"Gregory","family":"Blanc","sequence":"additional","affiliation":[]},{"given":"Houda","family":"Jmila","sequence":"additional","affiliation":[]},{"given":"S\u00e9bastien","family":"Tixeuil","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,23]]},"reference":[{"key":"34_CR1","unstructured":"Cisco Annual Internet Report (2018-2023). Tech. rep., Cisco (2020)"},{"key":"34_CR2","unstructured":"Arshad, J., Azad, M.A., Salah, K., Jie, W., Iqbal, R., Alazab, M.: A review of performance, energy and privacy of intrusion detection systems for IoT. ArXiv abs\/1812.09160 (2018)"},{"key":"34_CR3","doi-asserted-by":"publisher","unstructured":"Ayoubi, S., Blanc, G., Jmila, H., Silverston, T., Tixeuil, S.: Data-driven evaluation of intrusion detectors: A methodological framework. In: Foundations and Practice of Security, pp. 142\u2013157. Springer Nature Switzerland (2022). https:\/\/doi.org\/10.1007\/978-3-031-30122-3_9","DOI":"10.1007\/978-3-031-30122-3_9"},{"key":"34_CR4","doi-asserted-by":"publisher","unstructured":"Ayoubi, S., Tixeuil, S., Blanc, G., Jmila, H.: Demo: Towards reproducible evaluations of ml-based ids using data-driven approaches. In: Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security (CCS 2024), p.\u00a03. ACM, Salt Lake City, UT, USA (2024). https:\/\/doi.org\/10.1145\/3658644.3691368","DOI":"10.1145\/3658644.3691368"},{"key":"34_CR5","doi-asserted-by":"crossref","unstructured":"Ayoubi, S., Tixeuil, S., Jmila, H., Blanc, G.: Freida: A concrete tool for reproducible evaluation of ids using a data-driven approach. In: International Conference on Risks and Security of Internet and Systems. Springer (2024)","DOI":"10.1007\/978-3-031-89350-6_3"},{"key":"34_CR6","doi-asserted-by":"crossref","unstructured":"Bukhari, S.M.S., et al.: Secure and privacy-preserving intrusion detection in wireless sensor networks: Federated learning with SCNN-Bi-LSTM for enhanced reliability. Ad Hoc Netw. 155, 103407 (2024)","DOI":"10.1016\/j.adhoc.2024.103407"},{"issue":"12","key":"34_CR7","doi-asserted-by":"publisher","first-page":"12195","DOI":"10.1109\/TMC.2024.3407709","volume":"23","author":"J Cui","year":"2024","unstructured":"Cui, J., et al.: LH-IDS: lightweight hybrid intrusion detection system based on differential privacy in VANETs. IEEE Trans. Mob. Comput. 23(12), 12195\u201312210 (2024)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"3","key":"34_CR8","doi-asserted-by":"publisher","first-page":"2450048","DOI":"10.1142\/S0218126624500488","volume":"33","author":"J Du","year":"2024","unstructured":"Du, J., Yang, K.: NIDS-FLGDP: network intrusion detection algorithm based on gaussian differential privacy federated learning. J. Circuits Syst. Comput. 33(3), 2450048 (2024)","journal-title":"J. Circuits Syst. Comput."},{"key":"34_CR9","doi-asserted-by":"crossref","unstructured":"Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends\u00ae Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014)","DOI":"10.1561\/0400000042"},{"issue":"15","key":"34_CR10","doi-asserted-by":"publisher","first-page":"44685","DOI":"10.1007\/s11042-023-17401-7","volume":"83","author":"R Gupta","year":"2024","unstructured":"Gupta, R., Alam, T.: An efficient federated learning based intrusion detection system using ls$$ ^{\\text{2 }}$$dnn with PBKA based lightweight privacy preservation in cloud server. Multim. Tools Appl. 83(15), 44685\u201344697 (2024)","journal-title":"Multim. Tools Appl."},{"key":"34_CR11","doi-asserted-by":"publisher","unstructured":"Lee, T., Edwards, B., Molloy, I., Su, D.: Defending against neural network model stealing attacks using deceptive perturbations. In: 2019 IEEE Security and Privacy Workshops (SPW), pp. 43\u201349 (2019). https:\/\/doi.org\/10.1109\/SPW.2019.00020","DOI":"10.1109\/SPW.2019.00020"},{"key":"34_CR12","doi-asserted-by":"publisher","unstructured":"Li, S., Han, M.: PRIV-IDS: a privacy protection and intrusion detection framework for in-vehicle network. In: Machine Learning for Cyber Security - 4th International Conference, ML4CS 2022, Guangzhou, China, 2-4 December 2022, Proceedings, Part II, LNCS, vol. 13656, pp. 165\u2013179. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-031-20099-1_14","DOI":"10.1007\/978-3-031-20099-1_14"},{"key":"34_CR13","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., y\u00a0Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data. In: A.\u00a0Singh, X.J. Zhu (eds.) Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, AISTATS 2017, 20-22 April 2017, Fort Lauderdale, FL, USA, Proceedings of Machine Learning Research, vol.\u00a054, pp. 1273\u20131282. PMLR (2017)"},{"key":"34_CR14","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1\u20136 (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"34_CR15","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.cosrev.2017.07.001","volume":"25","author":"S Niksefat","year":"2017","unstructured":"Niksefat, S., Kaghazgaran, P., Sadeghiyan, B.: Privacy issues in intrusion detection systems: a taxonomy, survey and future directions. Comput. Sci. Rev. 25, 69\u201378 (2017)","journal-title":"Comput. Sci. Rev."},{"key":"34_CR16","doi-asserted-by":"crossref","unstructured":"Orekondy, T., Schiele, B., Fritz, M.: Knockoff nets: stealing functionality of black-box models. In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2018)","DOI":"10.1109\/CVPR.2019.00509"},{"key":"34_CR17","doi-asserted-by":"publisher","first-page":"69551","DOI":"10.1109\/ACCESS.2024.3395997","volume":"12","author":"M Raza","year":"2024","unstructured":"Raza, M., Saeed, M.J., Riaz, M.B., Sattar, M.A.: Federated learning for privacy-preserving intrusion detection in software-defined networks. IEEE Access 12, 69551\u201369567 (2024)","journal-title":"IEEE Access"},{"key":"34_CR18","doi-asserted-by":"crossref","unstructured":"Rigaki, M., Garcia, S.: A survey of privacy attacks in machine learning. ACM Comput. Surv. 56, 1\u201334 (2023)","DOI":"10.1145\/3624010"},{"key":"34_CR19","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: International Conference on Information Systems Security and Privacy (2018)","DOI":"10.5220\/0006639801080116"},{"key":"34_CR20","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 3\u201318 (2016)","DOI":"10.1109\/SP.2017.41"},{"key":"34_CR21","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/j.comcom.2022.06.015","volume":"192","author":"A Tabassum","year":"2022","unstructured":"Tabassum, A., Erbad, A., Lebda, W., Mohamed, A., Guizani, M.: FEDGAN-IDS: privacy-preserving IDS using GAN and federated learning. Comput. Commun. 192, 299\u2013310 (2022)","journal-title":"Comput. Commun."},{"key":"34_CR22","doi-asserted-by":"publisher","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD cup 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1\u20136 (2009). https:\/\/doi.org\/10.1109\/CISDA.2009.5356528","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"34_CR23","unstructured":"Tram\u00e8r, F., Zhang, F., Juels, A., Reiter, M.K., Ristenpart, T.: Stealing machine learning models via prediction APIs. In: USENIX Security Symposium (2016)"},{"key":"34_CR24","doi-asserted-by":"crossref","unstructured":"Vyas, A., Lin, P., Hwang, R., Tripathi, M.: Privacy-preserving federated learning for intrusion detection in IoT environments: a survey. IEEE Access 12, 127,018\u2013127,050 (2024)","DOI":"10.1109\/ACCESS.2024.3454211"},{"key":"34_CR25","unstructured":"Yeom, S., Fredrikson, M., Jha, S.: The unintended consequences of overfitting: Training data inference attacks. ArXiv abs\/1709.01604 (2017)"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87772-8_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T18:37:48Z","timestamp":1751567868000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87772-8_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031877711","9783031877728"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87772-8_34","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"23 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"39","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}