{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T09:01:40Z","timestamp":1774602100866,"version":"3.50.1"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032037107","type":"print"},{"value":"9783032037114","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-03711-4_3","type":"book-chapter","created":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T06:57:30Z","timestamp":1761893850000},"page":"25-37","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Lightweight Anomaly Detection for\u00a0IoT: Evaluating Machine Learning and\u00a0Deep Learning Models on\u00a0CICIDS2017"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-1379-9106","authenticated-orcid":false,"given":"Emanuele","family":"Iacobelli","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2910-0273","authenticated-orcid":false,"given":"Valerio","family":"Ponzi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6307-7194","authenticated-orcid":false,"given":"Adriano","family":"Puglisi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2331-6326","authenticated-orcid":false,"given":"Oleksandr","family":"Kuznetsov","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9424-2646","authenticated-orcid":false,"given":"Katarzyna","family":"Nieszporek","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5300-3561","authenticated-orcid":false,"given":"Cristian","family":"Randieri","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3336-5853","authenticated-orcid":false,"given":"Christian","family":"Napoli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,1]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"D\u017eaferovi\u0107, E., Sokol, A., Abd\u00a0Almisreb, A., Norzeli, S.M.: Dos and ddos vulnerability of IoT: a review. Sustain. Eng. Innov.\u00a01(1), 43\u201348 (2019)","DOI":"10.37868\/sei.v1i1.36"},{"key":"3_CR2","unstructured":"Kleinbaum, D.G., Dietz, K., Gail, M., Klein, M.: Klein, M.: Logistic Regression. Springer, New York (2002)"},{"issue":"1","key":"3_CR3","doi-asserted-by":"publisher","first-page":"31","DOI":"10.17849\/insm-47-01-31-39.1","volume":"47","author":"SJ Rigatti","year":"2017","unstructured":"Rigatti, S.J.: Random forest. J. Insur. Med. 47(1), 31\u201339 (2017)","journal-title":"J. Insur. Med."},{"key":"3_CR4","unstructured":"Chen, T., et\u00a0al.: Xgboost: extreme gradient boosting. R Package Version 0.4-2, 1(4), 1\u20134 (2015)"},{"issue":"4","key":"3_CR5","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/5254.708428","volume":"13","author":"MA Hearst","year":"1998","unstructured":"Hearst, M.A., Dumais, S.T., Osuna, E., Platt, J., Scholkopf, B.: Support vector machines. IEEE Intell. Syst. Appl. 13(4), 18\u201328 (1998)","journal-title":"IEEE Intell. Syst. Appl."},{"issue":"2","key":"3_CR6","doi-asserted-by":"publisher","first-page":"1883","DOI":"10.4249\/scholarpedia.1883","volume":"4","author":"LE Peterson","year":"2009","unstructured":"Peterson, L.E.: K-nearest neighbor. Scholarpedia 4(2), 1883 (2009)","journal-title":"Scholarpedia"},{"key":"3_CR7","unstructured":"Ponzi, V., Russo, S., Wajda, A., Napoli, C.: A comparative study of machine learning approaches for autism detection in children from imaging data. IN: CEUR Workshop Proceedings, vol. 3398, pp. 9\u201315 (2022)"},{"issue":"7","key":"3_CR8","first-page":"579","volume":"8","author":"M-C Popescu","year":"2009","unstructured":"Popescu, M.-C., Balas, V.E., Perescu-Popescu, L., Mastorakis, N.: Multilayer perceptron and neural networks. WSEAS Trans. Circuits Syst. 8(7), 579\u2013588 (2009)","journal-title":"WSEAS Trans. Circuits Syst."},{"key":"3_CR9","unstructured":"Iacobelli, E., Russo, S., Napoli, C.: A machine learning based real-time application for engagement detection. In: CEUR Workshop Proceedings, vol. 3695, pp. 75\u201384 (2023)"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Aloysius, N., Geetha, M.: A review on deep convolutional neural networks. In: 2017 International Conference on Communication and Signal Processing (ICCSP), pp.\u00a00588\u20130592. IEEE (2017)","DOI":"10.1109\/ICCSP.2017.8286426"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Falciglia, S., Betello, F., Russo, S., Napoli, C.: Learning visual stimulus-evoked EEG manifold for neural image classification. Neurocomputing 588 (2024)","DOI":"10.1016\/j.neucom.2024.127654"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Koonce, B., Koonce, B.: Resnet 50. In: Convolutional Neural Networks with Swift for Tensorflow: Image Recognition and Dataset Categorization, pp.\u00a063\u201372 (2021)","DOI":"10.1007\/978-1-4842-6168-2_6"},{"key":"3_CR13","unstructured":"Iandola, F., Moskewicz, M., Karayev, S., Girshick, R., Darrell, T., Keutzer, K.: Densenet: implementing efficient convnet descriptor pyramids. arXiv preprint arXiv:1404.1869 (2014)"},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science (Including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-031-23480-4_1","volume-title":"Artificial Intelligence and Soft Computing - ICAISC 2022","author":"N Brandizzi","year":"2023","unstructured":"Brandizzi, N., et al.: Unsupervised pose estimation by means of an innovative vision transformer. In: Rutkowski, L., Scherer, R., Korytkowski, M., Pedrycz, W., Tadeusiewicz, R., Zurada, J.M. (eds.) ICAISC 2022. LNCS (LNAI and LNB), vol. 13589, pp. 3\u201320. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-23480-4_1"},{"issue":"7","key":"3_CR15","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/S1353-4858(08)70086-2","volume":"2008","author":"J Nazario","year":"2008","unstructured":"Nazario, J.: Ddos attack evolution. Netw. Secur. 2008(7), 7\u201310 (2008)","journal-title":"Netw. Secur."},{"key":"3_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2021.103545","volume":"78","author":"AA Afuwape","year":"2021","unstructured":"Afuwape, A.A., Xu, Y., Anajemba, J.H., Srivastava, G.: Performance evaluation of secured network traffic classification using a machine learning approach. Comput. Stand. Interfaces 78, 103545 (2021)","journal-title":"Comput. Stand. Interfaces"},{"issue":"9","key":"3_CR17","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1109\/MCOM.2018.1701270","volume":"56","author":"A Diro","year":"2018","unstructured":"Diro, A., Chilamkurti, N.: Leveraging LSTM networks for attack detection in fog-to-things communications. IEEE Commun. Mag. 56(9), 124\u2013130 (2018)","journal-title":"IEEE Commun. Mag."},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Elsayed, M.S., Le-Khac, N.-A., Dev, S., Jurcut, A.D.: Ddosnet: a deep-learning model for detecting network attacks. In: 2020 IEEE 21st International Symposium on \u201cA World of Wireless, Mobile and Multimedia Networks\u201d (WoWMoM), pp.\u00a0391\u2013396. IEEE (2020)","DOI":"10.1109\/WoWMoM49955.2020.00072"},{"key":"3_CR19","unstructured":"Tymoshchuk, D., Yasniy, O., Mytnyk, M., Zagorodna, N., Tymoshchuk, V.: Detection and classification of ddos flooding attacks by machine learning method. arXiv preprint arXiv:2412.18990 (2024)"},{"key":"3_CR20","unstructured":"Alfatemi, A., Rahouti, M., Amin, R., ALJamal, S., Xiong, K., Xin, Y.: Advancing ddos attack detection: a synergistic approach using deep residual neural networks and synthetic oversampling. arXiv preprint arXiv:2401.03116 (2024)"},{"issue":"4","key":"3_CR21","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1145\/3543146.3543171","volume":"49","author":"D Pujol-Perich","year":"2022","unstructured":"Pujol-Perich, D., Su\u00e1rez-Varela, J., Cabellos-Aparicio, A., Barlet-Ros, P.: Unveiling the potential of graph neural networks for robust intrusion detection. ACM SIGMETRICS Perform. Eval. Rev. 49(4), 111\u2013117 (2022)","journal-title":"ACM SIGMETRICS Perform. Eval. Rev."},{"key":"3_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/978-3-031-17551-0_25","volume-title":"Science of Cyber Security - SciSec 2022","author":"O Belarbi","year":"2022","unstructured":"Belarbi, O., Khan, A., Carnelli, P., Spyridopoulos, T.: An intrusion detection system based on deep belief networks. In: Su, C., Sakurai, K., Liu, F. (eds.) SciSec 2022. LNCS, vol. 13580, pp. 377\u2013392. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-17551-0_25"},{"key":"3_CR23","doi-asserted-by":"publisher","first-page":"132911","DOI":"10.1109\/ACCESS.2020.3009843","volume":"8","author":"D Stiawan","year":"2020","unstructured":"Stiawan, D., Idris, M.Y.B., Bamhdi, A.M., Budiarto, R., et al.: Cicids-2017 dataset feature analysis with information gain for anomaly detection. IEEE Access 8, 132911\u2013132921 (2020)","journal-title":"IEEE Access"},{"key":"3_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2024.100450","volume":"25","author":"SK Dash","year":"2024","unstructured":"Dash, S.K., et al.: Enhancing ddos attack detection in IoT using PCA. Egypt. Inform. J. 25, 100450 (2024)","journal-title":"Egypt. Inform. J."},{"key":"3_CR25","unstructured":"Panigrahi, R., Borah, S.: A detailed analysis of cicids2017 dataset for designing intrusion detection systems. Int. J. Eng. Technol. 7(3.24), 479\u2013482 (2018)"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-03711-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T08:15:09Z","timestamp":1774599309000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-03711-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,1]]},"ISBN":["9783032037107","9783032037114"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-03711-4_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,1]]},"assertion":[{"value":"1 November 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Soft Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zakopane","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icaisc2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icaisc.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}