{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T01:40:09Z","timestamp":1743385209986,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":32,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819628636","type":"print"},{"value":"9789819628643","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-2864-3_33","type":"book-chapter","created":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T01:18:03Z","timestamp":1743383883000},"page":"417-429","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["EAMTI: A Novel Method Toward Early and Accurate Malicious Traffic Identification"],"prefix":"10.1007","author":[{"given":"Yuyang","family":"Shen","sequence":"first","affiliation":[]},{"given":"Jun","family":"Tao","sequence":"additional","affiliation":[]},{"given":"Linxiao","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Yuantu","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,29]]},"reference":[{"key":"33_CR1","doi-asserted-by":"crossref","first-page":"102542","DOI":"10.1016\/j.cose.2021.102542","volume":"113","author":"Z Wang","year":"2022","unstructured":"Wang, Z., Fok, K.W., Thing, V.L.: Machine learning for encrypted malicious traffic detection: approaches, datasets and comparative study. Comput. Secur. 113, 102542 (2022)","journal-title":"Comput. Secur."},{"issue":"1","key":"33_CR2","doi-asserted-by":"crossref","first-page":"1249","DOI":"10.1007\/s12652-020-02167-9","volume":"12","author":"A Thakkar","year":"2021","unstructured":"Thakkar, A., Lohiya, R.: Attack classification using feature selection techniques: a comparative study. J. Ambient. Intell. Humaniz. Comput. 12(1), 1249\u20131266 (2021)","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"33_CR3","doi-asserted-by":"crossref","first-page":"102767","DOI":"10.1016\/j.jnca.2020.102767","volume":"169","author":"G Sunanda","year":"2020","unstructured":"Sunanda, G., Jagath, S.: Deep learning methods in network intrusion detection: a survey and an objective comparison. J. Netw. Comput. Appl. 169, 102767 (2020)","journal-title":"J. Netw. Comput. Appl."},{"key":"33_CR4","first-page":"102419","volume":"50","author":"MA Ferrag","year":"2020","unstructured":"Ferrag, M.A., Maglaras, L., Moschoyiannis, S., Janicke, H.: Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J. Inf. Secur. Appl. 50, 102419 (2020)","journal-title":"J. Inf. Secur. Appl."},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"Nascita, A., Cerasuolo, F., Di Monda, D., Garcia, J.T.A., Montieri, A., Pescape, A.: Machine and deep learning approaches for IoT attack classification. In: IEEE INFOCOM 2022-IEEE Conference on Computer Communications Workshops, pp. 1\u20136 (2022)","DOI":"10.1109\/INFOCOMWKSHPS54753.2022.9797971"},{"key":"33_CR6","first-page":"108","volume":"1","author":"I Sharafaldin","year":"2018","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1, 108\u2013116 (2018)","journal-title":"ICISSp"},{"key":"33_CR7","doi-asserted-by":"crossref","unstructured":"Subba, B., Biswas, S., Karmakar, S.: Enhancing performance of anomaly based intrusion detection systems through dimensionality reduction using principal component analysis. In: IEEE International Conference on Advanced Networks and Telecommunications Systems, pp. 1\u20136. IEEE, Piscataway (2016)","DOI":"10.1109\/ANTS.2016.7947776"},{"issue":"2","key":"33_CR8","doi-asserted-by":"crossref","first-page":"133","DOI":"10.20532\/cit.2016.1002701","volume":"24","author":"ST Ikram","year":"2016","unstructured":"Ikram, S.T., Cherukuri, A.K.: Improving accuracy of intrusion detection model using PCA and optimized SVM. J. Comput. Inf. Technol. 24(2), 133\u2013148 (2016)","journal-title":"J. Comput. Inf. Technol."},{"key":"33_CR9","doi-asserted-by":"crossref","unstructured":"Lee, K., Park, H.:Malicious adware detection on android platform using dynamic random forest. In: Barolli, L., Xhafa, F. (eds.) Proceedings of the 13th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 609\u2013617. Springer, Cham (2019)","DOI":"10.1007\/978-3-030-22263-5_57"},{"key":"33_CR10","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.jocs.2017.03.006","volume":"25","author":"S Aljawarneh","year":"2018","unstructured":"Aljawarneh, S., Aldwairi, M., Yassein, M.B.: Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J. Comput. Sci. 25, 152\u2013160 (2018)","journal-title":"J. Comput. Sci."},{"issue":"4","key":"33_CR11","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1016\/j.jksuci.2015.12.004","volume":"29","author":"IS Thaseen","year":"2017","unstructured":"Thaseen, I.S., Kumar, C.A.: Intrusion detection model using fusion of chi-square feature selection and multi class SVM. J. King Saud Univ.-Comput. Inf. Sci. 29(4), 462\u2013472 (2017)","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"33_CR12","doi-asserted-by":"crossref","first-page":"102718","DOI":"10.1016\/j.cose.2022.102718","volume":"117","author":"MM Alani","year":"2022","unstructured":"Alani, M.M., Awad, A.I.: AdStop: efficient flow-based mobile adware detection using machine learning. Comput. Secur. 117, 102718 (2022)","journal-title":"Comput. Secur."},{"issue":"5","key":"33_CR13","first-page":"365","volume":"79","author":"C Ambikavathi","year":"2020","unstructured":"Ambikavathi, C., Srivatsa, S.K.: Predictor selection and attack classification using random forest for intrusion detection. J. Sci. Ind. Res. 79(5), 365\u2013368 (2020)","journal-title":"J. Sci. Ind. Res."},{"issue":"5","key":"33_CR14","first-page":"478","volume":"8","author":"S Meftah","year":"2019","unstructured":"Meftah, S., Rachidi, T., Assem, N.: Network based intrusion detection using the UNSW-NB15 dataset. Int. J. Comput. Digit. Syst. 8(5), 478\u2013487 (2019)","journal-title":"Int. J. Comput. Digit. Syst."},{"key":"33_CR15","doi-asserted-by":"crossref","first-page":"107247","DOI":"10.1016\/j.comnet.2020.107247","volume":"174","author":"Y Zhou","year":"2020","unstructured":"Zhou, Y., Cheng, G., Jiang, S., Dai, M.: Building an efficient intrusion detection system based on feature selection and ensemble classifier. Comput. Netw. 174, 107247 (2020)","journal-title":"Comput. Netw."},{"key":"33_CR16","doi-asserted-by":"crossref","first-page":"103143","DOI":"10.1016\/j.cose.2023.103143","volume":"128","author":"Z Wang","year":"2023","unstructured":"Wang, Z., Thing, V.L.: Feature mining for encrypted malicious traffic detection with deep learning and other machine learning algorithms. Comput. Secur. 128, 103143 (2023)","journal-title":"Comput. Secur."},{"key":"33_CR17","doi-asserted-by":"crossref","first-page":"107840","DOI":"10.1016\/j.comnet.2021.107840","volume":"188","author":"IF Kilincer","year":"2021","unstructured":"Kilincer, I.F., Ertam, F., Sengur, A.: Machine learning methods for cyber security intrusion detection: datasets and comparative study. Comput. Netw. 188, 107840 (2021)","journal-title":"Comput. Netw."},{"key":"33_CR18","doi-asserted-by":"crossref","unstructured":"Lima Filho, F.S.D., Silveira, F.A., de Medeiros Brito Junior, A., Vargas-Solar, G., Silveira, L.F.: Smart detection: an online approach for DoS\/DDoS attack detection using machine learning. Secur. Commun. Netw. 2019(1), 1574749 (2019)","DOI":"10.1155\/2019\/1574749"},{"key":"33_CR19","doi-asserted-by":"crossref","unstructured":"Bansal, A., Kaur, S.: Extreme gradient boosting based tuning for classification in intrusion detection system. In: Advances in Computing and Data Sciences: Second International Conference, pp. 372\u2013380. Springer, Singapore (2018)","DOI":"10.1007\/978-981-13-1810-8_37"},{"key":"33_CR20","doi-asserted-by":"crossref","first-page":"949","DOI":"10.1007\/s10586-017-1117-8","volume":"22","author":"D Kwon","year":"2019","unstructured":"Kwon, D., Kim, H., Kim, J., Suh, S.C., Kim, I., Kim, K.J.: A survey of deep learning-based network anomaly detection. Clust. Comput. 22, 949\u2013961 (2019)","journal-title":"Clust. Comput."},{"key":"33_CR21","doi-asserted-by":"crossref","first-page":"41525","DOI":"10.1109\/ACCESS.2019.2895334","volume":"7","author":"R Vinayakumar","year":"2019","unstructured":"Vinayakumar, R., Alazab, M., Soman, K.P., Poornachandran, P., Al-Nemrat, A., Venkatraman, S.: Deep learning approach for intelligent intrusion detection system. IEEE Access 7, 41525\u201341550 (2019)","journal-title":"IEEE Access"},{"key":"33_CR22","doi-asserted-by":"crossref","unstructured":"Chen, X., Cao, C., Mai, J.: Network anomaly detection based on deep support vector data description. In: IEEE International Conference on Big Data Analytics, pp. 251\u2013255. IEEE, Piscataway (2020)","DOI":"10.1109\/ICBDA49040.2020.9101325"},{"key":"33_CR23","doi-asserted-by":"crossref","unstructured":"Wang, W., Zhu, M.: Malware traffic classification using convolutional neural network for representation learning. In: International conference on information networking, pp. 712\u2013717. IEEE (2017)","DOI":"10.1109\/ICOIN.2017.7899588"},{"issue":"1","key":"33_CR24","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1109\/TBDATA.2019.2940675","volume":"8","author":"H Yao","year":"2019","unstructured":"Yao, H., Liu, C., Zhang, P., Wu, S., Jiang, C., Yu, S.: Identification of encrypted traffic through attention mechanism based long short term memory. IEEE Trans. Big Data 8(1), 241\u2013252 (2019)","journal-title":"IEEE Trans. Big Data"},{"key":"33_CR25","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1016\/j.ins.2019.10.069","volume":"513","author":"MM Hassan","year":"2020","unstructured":"Hassan, M.M., Gumaei, A., Alsanad, A., Alrubaian, M., Fortino, G.: A hybrid deep learning model for efficient intrusion detection in big data environment. Inf. Sci. 513, 386\u2013396 (2020)","journal-title":"Inf. Sci."},{"key":"33_CR26","doi-asserted-by":"crossref","first-page":"106798","DOI":"10.1016\/j.knosys.2021.106798","volume":"216","author":"G Andresini","year":"2021","unstructured":"Andresini, G., Appice, A., Malerba, D.: Nearest cluster-based intrusion detection through convolutional neural networks. Knowl.-Based Syst. 216, 106798 (2021)","journal-title":"Knowl.-Based Syst."},{"key":"33_CR27","doi-asserted-by":"crossref","unstructured":"Lo, W.W., Layeghy, S., Sarhan, M., Gallagher, M., Portmann, M.: E-graphsage: a graph neural network based intrusion detection system for IoT. In: IEEE\/IFIP Network Operations and Management Symposium, pp. 1\u20139. IEEE (2022)","DOI":"10.1109\/NOMS54207.2022.9789878"},{"key":"33_CR28","doi-asserted-by":"crossref","unstructured":"Guarino, I.,Bovenzi, G., Monda, D., Aceto, G., Ciuonzo, D., Pescap\u00e9, A.: On the use of machine learning approaches for the early classification in network intrusion detection. In: IEEE International Symposium on Measurements & Networking, pp. 1\u20136. IEEE, Piscataway (2022)","DOI":"10.1109\/MN55117.2022.9887775"},{"key":"33_CR29","doi-asserted-by":"crossref","first-page":"103628","DOI":"10.1016\/j.cose.2023.103628","volume":"137","author":"B Pi","year":"2024","unstructured":"Pi, B., Guo, C., Cui, Y., Shen, G., Yang, J., Ping, Y.: Remote access trojan traffic early detection method based on Markov matrices and deep learning. Comput. Secur. 137, 103628 (2024)","journal-title":"Comput. Secur."},{"key":"33_CR30","doi-asserted-by":"crossref","first-page":"5817","DOI":"10.1109\/TIFS.2023.3318960","volume":"18","author":"X Hu","year":"2023","unstructured":"Hu, X., Gao, W., Cheng, G., Li, R., Zhou, Y., Wu, H.: Toward early and accurate network intrusion detection using graph embedding. IEEE Trans. Inf. Forensics Secur. 18, 5817\u20135831 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"33_CR31","unstructured":"Scapy. https:\/\/scapy.readthedocs.io\/en\/latest\/"},{"key":"33_CR32","unstructured":"CICFlowMeter. https:\/\/github.com\/ahlashkari\/CICFlowMeter"}],"container-title":["Lecture Notes in Computer Science","Network and Parallel Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-2864-3_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T01:19:17Z","timestamp":1743383957000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-2864-3_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819628636","9789819628643"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-2864-3_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"29 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"NPC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Network and Parallel Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"npc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}