{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T22:10:10Z","timestamp":1748729410837,"version":"3.41.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319264486"},{"type":"electronic","value":"9783319264509"}],"license":[{"start":{"date-parts":[[2015,12,20]],"date-time":"2015-12-20T00:00:00Z","timestamp":1450569600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-26450-9_10","type":"book-chapter","created":{"date-parts":[[2015,12,19]],"date-time":"2015-12-19T00:51:32Z","timestamp":1450486292000},"page":"249-273","source":"Crossref","is-referenced-by-count":0,"title":["A Benchmarking Study on Stream Network Traffic Analysis Using Active Learning"],"prefix":"10.1007","author":[{"given":"Jillian","family":"Morgan","sequence":"first","affiliation":[]},{"given":"A. Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]},{"given":"John T.","family":"Jacobs","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,20]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Wang, R., Kwong, S., Chen, D., He, Q.: Fuzzy rough sets based uncertainty measuring for stream based active learning. In: 2012 International Conference on Machine Learning and Cybernetics (ICMLC), vol. 1, pp. 282\u2013288 (2012)","DOI":"10.1109\/ICMLC.2012.6358926"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Vahdat, A., Atwater, A., McIntyre, A., Heywood, M.: On the application of GP to streaming data classification tasks with label budgets. In: Proceedings in the 2014 Conference Companion on Genetic ad Evolutionary Computation Companion, GECCO Comp\u201914, pp. 1287\u20131294 (2014)","DOI":"10.1145\/2598394.2611385"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Saad, S., Traore, I., Ghorbani, A., Sayed, B., Zhao, D., Lu, W., Felix, J., Hakimian, P.: Detecting P2P botnets through network behavior analysis and machine learning. In: Proceedings of 9th Annual Conference on Privacy, Security and Trust (PST2011) (2011)","DOI":"10.1109\/PST.2011.5971980"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Stevanovic, M., Pedersen, J.M.: An efficient flow-based botnet detection using supervised machine learning. In: 2014 International Conference on Computing, Networking and Communications (ICNC), pp. 797\u2013801 (2014)","DOI":"10.1109\/ICCNC.2014.6785439"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Nogueira, A., Salvador, P., Blessa, F.: A botnet detection system based on neural networks. In: 2010 Fifth International Conference on Digital Telecommunications, pp. 57\u201362","DOI":"10.1109\/ICDT.2010.19"},{"issue":"1","key":"10_CR6","doi-asserted-by":"publisher","first-page":"2754","DOI":"10.1109\/TNNLS.2012.2236570","volume":"25","author":"I Zliobaite","year":"2014","unstructured":"Zliobaite, I., Bifet, A., Pfahringer, B., Holmes, G.: Active learning with drifting streaming data. IEEE Trans. Neural Netw. Learn. Syst. 25(1), 2754 (2014)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"6","key":"10_CR7","doi-asserted-by":"publisher","first-page":"1607","DOI":"10.1109\/TSMCB.2010.2042445","volume":"40","author":"X Zhu","year":"2010","unstructured":"Zhu, X., Zhang, P., Shi, Y.: Active learning from stream data using optimal weight classifier ensemble. IEEE Trans. Syst. Man Cybern. Part B Cybern. 40(6), 1607\u20131621 (2010)","journal-title":"IEEE Trans. Syst. Man Cybern. Part B Cybern."},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Hsiao, H., Chen, D., Ju Wu, T.: Detecting hiding malicious website network traffic mining approach. In: 2010 2nd International Conference on Education Technology Computer (ICETC), vol. 5, pp. 276\u2013280 (2010)","DOI":"10.1109\/ICETC.2010.5530064"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Dalal, A., Musicant, D., Olson, J., McMenamy, B., Benzaid, S., Kazez, B., Bolan, E.: Predicting user-perceived quality ratings from streaming media data. In: 2007 IEEE International Conference on Communications, pp. 65\u201372 (2007)","DOI":"10.1109\/ICC.2007.20"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Dalal, A., Bouchard, A., Cantor, S., Guo, Y., Johnson, A.: Assessing QoE of on-demand TCP video streams in real time, In: 2012 IEEE International Conference on Communications (ICC), pp. 1165\u20131170 (2012)","DOI":"10.1109\/ICC.2012.6364073"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Cunha, C., Silva, L.: Separating performance anomalies from workload-explained failures in streaming servers. In: Cloud and Grid Computing (CCGrid), 2012 12th IEEE\/ACM International Symposium on Cluster, pp. 292\u2013299 (2012)","DOI":"10.1109\/CCGrid.2012.58"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Haddadi, F., Morgan, J., Filho, E.G., Zincir-Heywood, A.N.: Botnet behaviour analysis using IP flows: with HTTP filters using classifiers. In: 2014 28th International Conference on Advanced Information Networking and Applications Workshops, pp. 7\u201312 (2014)","DOI":"10.1109\/WAINA.2014.19"},{"key":"10_CR13","unstructured":"Kdd Cup 1999 Data: http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"},{"key":"10_CR14","unstructured":"NIMS1 Dataset: https:\/\/projects.cs.dal.ca\/projectx\/Download.html"},{"key":"10_CR15","unstructured":"ISOT Botnet Data: http:\/\/www.uvic.ca\/engineering\/ece\/isot\/datasets\/"},{"key":"10_CR16","unstructured":"Alexa: http:\/\/alexa.com\/topsites"},{"key":"10_CR17","unstructured":"Abuse: Zeus Tracker. https:\/\/zeustracker.abuse.ch\/"},{"key":"10_CR18","unstructured":"DNS-BH-Malware Domain Blocklist: http:\/\/www.malwaredomains.com"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Claise, B.: Specification of the IP flow information export (IPFIX) protocol for the exchange of IP traffic flow information. In: RFC 5101. http:\/\/www.rfc-editor.org\/info\/rfc5101 (2008)","DOI":"10.17487\/rfc5101"},{"key":"10_CR20","unstructured":"MOA (Massive Online Analysis): http:\/\/moa.cms.waikato.ac.nz\/"},{"key":"10_CR21","first-page":"1205","volume":"7","author":"N Cesa-Bianchi","year":"2006","unstructured":"Cesa-Bianchi, N., Gentile, C., Zaniboni, L.: Worst-case analysis of selective sampling for linear classification. J. Mach. Learn. Res. 7, 1205\u20131230 (2006)","journal-title":"J. Mach. Learn. Res."},{"key":"10_CR22","volume-title":"Introduction to Machine Learning","author":"A Smola","year":"2008","unstructured":"Smola, A., Vishwanathan, S.V.N.: Introduction to Machine Learning. Cambridge University Press, Cambridge (2008)"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Hoelinger, S., Pears, R.: Use of hoeffding trees in concept based data stream mining. In: Third International Conference on Information and Automation for Sustainability, ICIAFS 2007, pp. 57\u201362 (2007)","DOI":"10.1109\/ICIAFS.2007.4544780"},{"issue":"3","key":"10_CR24","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/s10710-014-9236-y","volume":"16","author":"Malcolm I. Heywood","year":"2014","unstructured":"Heywood, M.I., Evolutionary model building under streaming data for classification tasks: opportunities and challenges. Genetic Programming and Evolvable Machines. 16(3), 283\u2013326. Springer (2015). doi: 10.1007\/s10710-014-9236-y","journal-title":"Genetic Programming and Evolvable Machines"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Kayacik, G.H., Zincir-Heywood, A.N., Heywood, M.I.: On the capability of an SOM based intrusion detection sytem. In: IEEE International Joint Conference on Neural Networks, pp. 1808\u20131813 (2003)","DOI":"10.1109\/IJCNN.2003.1223682"}],"container-title":["Studies in Computational Intelligence","Recent Advances in Computational Intelligence in Defense and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26450-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T21:33:12Z","timestamp":1748727192000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26450-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,20]]},"ISBN":["9783319264486","9783319264509"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26450-9_10","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2015,12,20]]}}}