{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:42:59Z","timestamp":1743032579885,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":36,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819744640"},{"type":"electronic","value":"9789819744657"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-4465-7_14","type":"book-chapter","created":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T17:01:46Z","timestamp":1720717306000},"page":"197-208","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Impact of\u00a0Data Scaling Approaches on\u00a0Deep Learning, Random Forest and\u00a0Nearest Neighbour-Based Network Intrusion Detection Systems for\u00a0DoS Detection in\u00a0IoT Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5881-6406","authenticated-orcid":false,"given":"Marek","family":"Pawlicki","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7122-3306","authenticated-orcid":false,"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1405-9911","authenticated-orcid":false,"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,12]]},"reference":[{"key":"14_CR1","unstructured":"Ddos attacks using iot bots have jumped five-fold in 12 months, says report. https:\/\/www.rcrwireless.com\/20230607\/internet-of-things-4\/ddos-attacks-using-iot-bots-have-jumped-five-fold-in-12-months-says-report. Accessed 09 Sept 2023"},{"key":"14_CR2","unstructured":"Famous ddos attacks | biggest ddos attacks | cloudflare. https:\/\/www.cloudflare.com\/learning\/ddos\/famous-ddos-attacks\/. Accessed 09 Sept 2023"},{"key":"14_CR3","unstructured":"Iot security: 5 cyber-attacks caused by iot security vulnerabilities. https:\/\/www.cm-alliance.com\/cybersecurity-blog\/iot-security-5-cyber-attacks-caused-by-iot-security-vulnerabilities. Accessed 09 Sept 2023"},{"key":"14_CR4","unstructured":"Agresti, A.: An introduction to categorical data analysis (1996)"},{"key":"14_CR5","doi-asserted-by":"publisher","unstructured":"Andrysiak, T., Saganowski, \u0141., Kiedrowski, P.: Predictive abuse detection for a PLC smart lighting network based on automatically created models of exponential smoothing. Secur. Commun. Netw. 2017, 1\u201319 (2017). https:\/\/doi.org\/10.1155\/2017\/7892182","DOI":"10.1155\/2017\/7892182"},{"key":"14_CR6","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45, 5\u201332 (2001)","journal-title":"Mach. Learn."},{"issue":"3","key":"14_CR7","doi-asserted-by":"publisher","first-page":"2671","DOI":"10.1109\/COMST.2019.2896380","volume":"21","author":"N Chaabouni","year":"2019","unstructured":"Chaabouni, N., Mosbah, M., Zemmari, A., Sauvignac, C., Faruki, P.: Network intrusion detection for IoT security based on learning techniques. IEEE Commun. Surv. Tutor. 21(3), 2671\u20132701 (2019)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"14_CR8","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: Smote: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321\u2013357 (2002)","journal-title":"J. Artif. Intell. Res."},{"issue":"11","key":"14_CR9","doi-asserted-by":"publisher","first-page":"1422","DOI":"10.3897\/jucs.2020.075","volume":"26","author":"V Dutta","year":"2020","unstructured":"Dutta, V., Choras, M., Pawlicki, M., Kozik, R.: Detection of cyberattacks traces in IoT data. J. Univers. Comput. Sci. 26(11), 1422\u20131434 (2020)","journal-title":"J. Univers. Comput. Sci."},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Edwards, A.W.: Ra fischer, statistical methods for research workers, (1925). In: Landmark Writings in Western Mathematics 1640\u20131940, pp. 856\u2013870. Elsevier (2005)","DOI":"10.1016\/B978-044450871-3\/50148-0"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Engelen, G., Rimmer, V., Joosen, W.: Troubleshooting an intrusion detection dataset: the cicids2017 case study. In: 2021 IEEE Security and Privacy Workshops (SPW), pp. 7\u201312. IEEE (2021)","DOI":"10.1109\/SPW53761.2021.00009"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Fix, E., Hodges, J.: USAF School of Aviation Medicine. Discriminatory Analysis, Nonparametric Discrimination: Consistency Properties. USAF School of Aviation Medicine, Randolph Field, Tex (1951)","DOI":"10.1037\/e471672008-001"},{"key":"14_CR13","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.comnet.2018.11.025","volume":"148","author":"WH Hassan","year":"2019","unstructured":"Hassan, W.H., et al.: Current research on internet of things (IoT) security: a survey. Comput. Netw. 148, 283\u2013294 (2019)","journal-title":"Comput. Netw."},{"key":"14_CR14","doi-asserted-by":"publisher","unstructured":"Hastie, T., Tibshirani, R., Friedman, J.H., Friedman, J.H.: The Elements of Statistical Learning: Data Mining, Inference, and Prediction, vol.\u00a02. Springer, New York (2009). https:\/\/doi.org\/10.1007\/978-0-387-21606-5","DOI":"10.1007\/978-0-387-21606-5"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Ho, T.K.: Random decision forests. In: Proceedings of 3rd International Conference on Document Analysis and Recognition, vol.\u00a01, pp. 278\u2013282. IEEE (1995)","DOI":"10.1109\/ICDAR.1995.598994"},{"key":"14_CR16","unstructured":"Kohavi, R., et\u00a0al.: A study of cross-validation and bootstrap for accuracy estimation and model selection. In: IJCAI, Montreal, vol.\u00a014, pp. 1137\u20131145 (1995)"},{"issue":"7","key":"14_CR17","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDOS in the IoT: MIRAI and other botnets. Computer 50(7), 80\u201384 (2017)","journal-title":"Computer"},{"key":"14_CR18","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. Adv. Neural Inf. Process. Syst. 25 (2012)"},{"key":"14_CR19","doi-asserted-by":"publisher","unstructured":"Lokman, S.-F., Othman, A.T., Bakar, M.H.A., Musa, S.: The impact of different feature scaling methods on intrusion detection for in-vehicle controller area network (CAN). In: Anbar, M., Abdullah, N., Manickam, S. (eds.) ACeS 2019. CCIS, vol. 1132, pp. 195\u2013205. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-2693-0_14","DOI":"10.1007\/978-981-15-2693-0_14"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Mihailescu, M.E., et al.: The proposition and evaluation of the roedunet-simargl2021 network intrusion detection dataset. Sensors 21(13), 4319 (2021)","DOI":"10.3390\/s21134319"},{"key":"14_CR21","unstructured":"Montgomery, D.C.: Design and Analysis of Experiments. Wiley (2017)"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Ozsahin, D.U., Mustapha, M.T., Mubarak, A.S., Ameen, Z.S., Uzun, B.: Impact of feature scaling on machine learning models for the diagnosis of diabetes. In: 2022 International Conference on Artificial Intelligence in Everything (AIE), pp. 87\u201394. IEEE (2022)","DOI":"10.1109\/AIE57029.2022.00024"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Pawlicka, A., Chora\u015b, M., Pawlicki, M.: Cyberspace threats: not only hackers and criminals. raising the awareness of selected unusual cyberspace actors-cybersecurity researchers\u2019 perspective. In: Proceedings of the 15th International Conference on Availability, Reliability and Security, pp. 1\u201311 (2020)","DOI":"10.1145\/3407023.3409181"},{"issue":"5","key":"14_CR24","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1007\/s00779-021-01568-7","volume":"25","author":"A Pawlicka","year":"2021","unstructured":"Pawlicka, A., Chora\u015b, M., Pawlicki, M.: The stray sheep of cyberspace aka the actors who claim they break the law for the greater good. Pers. Ubiquit. Comput. 25(5), 843\u2013852 (2021)","journal-title":"Pers. Ubiquit. Comput."},{"key":"14_CR25","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1016\/j.neucom.2022.06.002","volume":"500","author":"M Pawlicki","year":"2022","unstructured":"Pawlicki, M., Kozik, R., Chora\u015b, M.: A survey on neural networks for (cyber-) security and (cyber-) security of neural networks. Neurocomputing 500, 1075\u20131087 (2022)","journal-title":"Neurocomputing"},{"key":"14_CR26","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)"},{"issue":"6088","key":"14_CR27","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1038\/323533a0","volume":"323","author":"DE Rumelhart","year":"1986","unstructured":"Rumelhart, D.E., Hinton, G.E., Williams, R.J.: Learning representations by back-propagating errors. Nature 323(6088), 533\u2013536 (1986)","journal-title":"Nature"},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Sahu, A., Mao, Z., Davis, K., Goulart, A.E.: Data processing and model selection for machine learning-based network intrusion detection. In: 2020 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR), pp.\u00a01\u20136. IEEE (2020)","DOI":"10.1109\/CQR47547.2020.9101394"},{"key":"14_CR29","doi-asserted-by":"crossref","unstructured":"Sarhan, M., Layeghy, S., Moustafa, N., Portmann, M.: Netflow datasets for machine learning-based network intrusion detection systems. In: Big Data Technologies and Applications: 10th EAI International Conference, BDTA 2020, and 13th EAI International Conference on Wireless Internet, WiCON 2020, Virtual Event, 11 December 2020, Proceedings 10, pp. 117\u2013135. Springer (2021)","DOI":"10.1007\/978-3-030-72802-1_9"},{"issue":"3","key":"14_CR30","doi-asserted-by":"publisher","first-page":"1070","DOI":"10.3390\/s22031070","volume":"22","author":"A Singh","year":"2022","unstructured":"Singh, A., Amutha, J., Nagar, J., Sharma, S., Lee, C.C.: Lt-fs-id: log-transformed feature learning and feature-scaling-based machine learning algorithms to predict the k-barriers for intrusion detection using wireless sensor network. Sensors 22(3), 1070 (2022)","journal-title":"Sensors"},{"key":"14_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105524","volume":"97","author":"D Singh","year":"2020","unstructured":"Singh, D., Singh, B.: Investigating the impact of data normalization on classification performance. Appl. Soft Comput. 97, 105524 (2020)","journal-title":"Appl. Soft Comput."},{"issue":"2","key":"14_CR32","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1111\/j.2517-6161.1974.tb00994.x","volume":"36","author":"M Stone","year":"1974","unstructured":"Stone, M.: Cross-validatory choice and assessment of statistical predictions. J. Roy. Stat. Soc.: Ser. B (Methodol.) 36(2), 111\u2013133 (1974)","journal-title":"J. Roy. Stat. Soc.: Ser. B (Methodol.)"},{"key":"14_CR33","doi-asserted-by":"publisher","unstructured":"Vervier, P.-A., Shen, Y.: Before toasters rise up: a view into the emerging IoT threat landscape. In: Bailey, M., Holz, T., Stamatogiannakis, M., Ioannidis, S. (eds.) RAID 2018. LNCS, vol. 11050, pp. 556\u2013576. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00470-5_26","DOI":"10.1007\/978-3-030-00470-5_26"},{"key":"14_CR34","doi-asserted-by":"crossref","unstructured":"Wan, X.: Influence of feature scaling on convergence of gradient iterative algorithm. J. Phys.: Conf. Ser. 1213, 032021 (2019). IOP Publishing","DOI":"10.1088\/1742-6596\/1213\/3\/032021"},{"key":"14_CR35","doi-asserted-by":"crossref","unstructured":"Waqas, M., et al.: Botnet attack detection in internet of things devices over cloud environment via machine learning. Concurr. Comput.: Pract. Exp. 34(4), e6662 (2022)","DOI":"10.1002\/cpe.6662"},{"key":"14_CR36","doi-asserted-by":"publisher","unstructured":"Wilcoxon, F.: Individual comparisons by ranking methods. In: Kotz, S., Johnson, N.L. (eds.) Breakthroughs in Statistics, pp. 196\u2013202. Springer, New York (1992). https:\/\/doi.org\/10.1007\/978-1-4612-4380-9_16","DOI":"10.1007\/978-1-4612-4380-9_16"}],"container-title":["Communications in Computer and Information Science","Mobile Internet Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-4465-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,23]],"date-time":"2024-11-23T23:15:36Z","timestamp":1732403736000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-4465-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819744640","9789819744657"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-4465-7_14","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"12 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MobiSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mobile Internet Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Okinawa","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mobisec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isyou.biz\/conf\/mobisec23\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}