{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:35:29Z","timestamp":1773513329499,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T00:00:00Z","timestamp":1734566400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T00:00:00Z","timestamp":1734566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s10207-024-00958-1","type":"journal-article","created":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T16:13:17Z","timestamp":1734624797000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Balancing the act? Resampling versus imbalanced data for Wi-Fi IDS"],"prefix":"10.1007","volume":"24","author":[{"given":"Konstantinos E.","family":"Kampourakis","sequence":"first","affiliation":[]},{"given":"Efstratios","family":"Chatzoglou","sequence":"additional","affiliation":[]},{"given":"Georgios","family":"Kambourakis","sequence":"additional","affiliation":[]},{"given":"Dimitrios","family":"Serpanos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,19]]},"reference":[{"key":"958_CR1","doi-asserted-by":"publisher","unstructured":"Kolias, C., Kambourakis, G., Stavrou, A., Gritzalis, S.: Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset. IEEE Commun. Surv. Tutor. 18(1), 184\u2013208 (2016). https:\/\/doi.org\/10.1109\/COMST.2015.2402161","DOI":"10.1109\/COMST.2015.2402161"},{"key":"958_CR2","doi-asserted-by":"publisher","unstructured":"Chatzoglou, E., Kambourakis, G., Kolias, C.: Empirical evaluation of attacks against ieee 802.11 enterprise networks: the awid3 dataset. IEEE Access 9, 34188\u201334205 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3061609","DOI":"10.1109\/ACCESS.2021.3061609"},{"key":"958_CR3","doi-asserted-by":"publisher","unstructured":"Chatzoglou, E., Kampourakis, V., Kambourakis, G.: Bl0ck: Paralyzing 802.11 connections through block ack frames. In: Meyer, N., Grocholewska-Czurylo, A. (eds.) ICT Systems Security and Privacy Protection - 38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 14-16, 2023, Revised Selected Papers. IFIP Advances in Information and Communication Technology, vol. 679, pp. 250\u2013264. Springer, (2023). https:\/\/doi.org\/10.1007\/978-3-031-56326-3_18","DOI":"10.1007\/978-3-031-56326-3_18"},{"key":"958_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/J.JISA.2021.103058","volume":"64","author":"E Chatzoglou","year":"2022","unstructured":"Chatzoglou, E., Kambourakis, G., Kolias, C.: How is your wi-fi connection today? Dos attacks on WPA3-SAE. J. Inf. Secur. Appl. 64, 103058 (2022). https:\/\/doi.org\/10.1016\/J.JISA.2021.103058","journal-title":"J. Inf. Secur. Appl."},{"key":"958_CR5","doi-asserted-by":"publisher","unstructured":"Schepers, D., Ranganathan, A., Vanhoef, M.: On the robustness of wi-fi deauthentication countermeasures. In: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks. WiSec \u201922, pp. 245\u2013256. Association for Computing Machinery, New York, NY, USA (2022). https:\/\/doi.org\/10.1145\/3507657.3528548","DOI":"10.1145\/3507657.3528548"},{"key":"958_CR6","unstructured":"Schepers, D., Ranganathan, A., Vanhoef, M.: Framing frames: Bypassing wi-fi encryption by manipulating transmit queues. In: Calandrino, J.A., Troncoso, C. (eds.) 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, pp. 53\u201368. USENIX Association, (2023). https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/schepers"},{"key":"958_CR7","doi-asserted-by":"publisher","unstructured":"Gollier, H., Vanhoef, M.: SSID confusion: Making wi-fi clients connect to the wrong network. In: Kim, Y., Kim, J., Koushanfar, F., Rasmussen, K. (eds.) Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2024, Seoul, Republic of Korea, May 27-29, 2024, pp. 156\u2013161. ACM, (2024). https:\/\/doi.org\/10.1145\/3643833.3656126","DOI":"10.1145\/3643833.3656126"},{"issue":"4","key":"958_CR8","doi-asserted-by":"publisher","first-page":"53","DOI":"10.3390\/CRYPTOGRAPHY6040053","volume":"6","author":"V Kampourakis","year":"2022","unstructured":"Kampourakis, V., Chatzoglou, E., Kambourakis, G., Dolmes, A., Zaroliagis, C.D.: Wpaxfuzz: Sniffing out vulnerabilities in wi-fi implementations. Cryptography 6(4), 53 (2022). https:\/\/doi.org\/10.3390\/CRYPTOGRAPHY6040053","journal-title":"Cryptography"},{"key":"958_CR9","doi-asserted-by":"publisher","unstructured":"Chatzoglou, E., Kambourakis, G., Kolias, C., Smiliotopoulos, C.: Pick quality over quantity: expert feature selection and data preprocessing for 802.11 intrusion detection systems. IEEE Access 10, 64761\u201364784 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3183597","DOI":"10.1109\/ACCESS.2022.3183597"},{"key":"958_CR10","doi-asserted-by":"publisher","unstructured":"Chatzoglou, E., Kambourakis, G., Smiliotopoulos, C., Kolias, C.: Best of both worlds: detecting application layer attacks through 802.11 and non-802.11 features. Sensors 22(15), 5633 (2022). https:\/\/doi.org\/10.3390\/S22155633","DOI":"10.3390\/S22155633"},{"key":"958_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103653","volume":"217","author":"A Belenguer","year":"2023","unstructured":"Belenguer, A., Pascual, J.A., Navaridas, J.: G\u00f6wfed: a novel federated network intrusion detection system. J. Netw. Comput. Appl. 217, 103653 (2023). https:\/\/doi.org\/10.1016\/j.jnca.2023.103653","journal-title":"J. Netw. Comput. Appl."},{"key":"958_CR12","unstructured":"Arp, D., Quiring, E., Pendlebury, F., Warnecke, A., Pierazzi, F., Wressnegger, C., Cavallaro, L., Rieck, K.: Dos and don\u2019ts of machine learning in computer security. In: Butler, K.R.B., Thomas, K. (eds.) 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022, pp. 3971\u20133988. USENIX Association, (2022)"},{"key":"958_CR13","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/JAIR.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321\u2013357 (2002). https:\/\/doi.org\/10.1613\/JAIR.953","journal-title":"J. Artif. Intell. Res."},{"key":"958_CR14","unstructured":"Batista, G.E.A.P.A., Bazzan, A.L.C., Monard, M.C.: Balancing training data for automated annotation of keywords: a case study. In: Lifschitz, S., Jr., N.F.A., Jr., G.J.P., Linden, R. (eds.) II Brazilian Workshop on Bioinformatics, December 3-5, 2003, Maca\u00e9, RJ, Brazil, pp. 10\u201318 (2003)"},{"key":"958_CR15","doi-asserted-by":"publisher","unstructured":"Batista, G.E.A.P.A., Prati, R.C., Monard, M.C.: A study of the behavior of several methods for balancing machine learning training data. SIGKDD Explor. 6(1), 20\u201329 (2004). https:\/\/doi.org\/10.1145\/1007730.1007735","DOI":"10.1145\/1007730.1007735"},{"issue":"3","key":"958_CR16","doi-asserted-by":"publisher","first-page":"0118432","DOI":"10.1371\/journal.pone.0118432","volume":"10","author":"T Saito","year":"2015","unstructured":"Saito, T., Rehmsmeier, M.: The precision-recall plot is more informative than the roc plot when evaluating binary classifiers on imbalanced datasets. PloS One 10(3), 0118432 (2015)","journal-title":"PloS One"},{"key":"958_CR17","unstructured":"Boyd, K., Costa, V.S., Davis, J., Page, C.D.: Unachievable region in precision-recall space and its effect on empirical evaluation. In: Proceedings of the International Conference on Machine Learning. International Conference on Machine Learning, vol. 2012, p. 349 (2012). NIH Public Access"},{"key":"958_CR18","doi-asserted-by":"publisher","unstructured":"Pozzolo, A.D., Caelen, O., Waterschoot, S., Bontempi, G.: Racing for unbalanced methods selection. In: Yin, H., Tang, K., Gao, Y., Klawonn, F., Lee, M., Weise, T., Li, B., Yao, X. (eds.) Intelligent Data Engineering and Automated Learning - IDEAL 2013 - 14th International Conference, IDEAL 2013, Hefei, China, October 20-23, 2013. Proceedings. Lecture Notes in Computer Science, vol. 8206, pp. 24\u201331. Springer, (2013). https:\/\/doi.org\/10.1007\/978-3-642-41278-3_4","DOI":"10.1007\/978-3-642-41278-3_4"},{"key":"958_CR19","doi-asserted-by":"publisher","unstructured":"Pozzolo, A.D., Caelen, O., Bontempi, G.: When is undersampling effective in unbalanced classification tasks? In: Appice, A., Rodrigues, P.P., Costa, V.S., Soares, C., Gama, J., Jorge, A. (eds.) Machine Learning and Knowledge Discovery in Databases - European Conference, ECML PKDD 2015, Porto, Portugal, September 7-11, 2015, Proceedings, Part I. Lecture Notes in Computer Science, vol. 9284, pp. 200\u2013215. Springer, (2015).https:\/\/doi.org\/10.1007\/978-3-319-23528-8_13","DOI":"10.1007\/978-3-319-23528-8_13"},{"issue":"9","key":"958_CR20","doi-asserted-by":"publisher","first-page":"1322","DOI":"10.3390\/electronics11091322","volume":"11","author":"Q Li","year":"2022","unstructured":"Li, Q., Zhao, C., He, X., Chen, K., Wang, R.: The impact of partial balance of imbalanced dataset on classification performance. Electronics 11(9), 1322 (2022)","journal-title":"Electronics"},{"key":"958_CR21","unstructured":"kuan: Moore Dataset. https:\/\/figshare.com\/articles\/dataset\/Moore_dataset\/18467507. last visited 10\/08\/2023 (2022)"},{"key":"958_CR22","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Habibi\u00a0Lashkari, A., Ghorbani, A.A.: A detailed analysis of the cicids2017 data set. In: Information Systems Security and Privacy: 4th International Conference, ICISSP 2018, Funchal-Madeira, Portugal, January 22-24, 2018, Revised Selected Papers 4, pp. 172\u2013188 (2019). Springer","DOI":"10.1007\/978-3-030-25109-3_9"},{"key":"958_CR23","doi-asserted-by":"crossref","unstructured":"Wang, T., Zhao, J., Yatskar, M., Chang, K.-W., Ordonez, V.: Balanced datasets are not enough: estimating and mitigating gender bias in deep image representations. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV) (2019)","DOI":"10.1109\/ICCV.2019.00541"},{"key":"958_CR24","doi-asserted-by":"publisher","unstructured":"Pawlicki, M., Choras, M., Kozik, R., Holubowicz, W.: On the impact of network data balancing in cybersecurity applications. In: Krzhizhanovskaya, V.V., Z\u00e1vodszky, G., Lees, M.H., Dongarra, J.J., Sloot, P.M.A., Brissos, S., Teixeira, J. (eds.) Computational Science - ICCS 2020 - 20th International Conference, Amsterdam, The Netherlands, June 3-5, 2020, Proceedings, Part IV. Lecture Notes in Computer Science, vol. 12140, pp. 196\u2013210. Springer, (2020).https:\/\/doi.org\/10.1007\/978-3-030-50423-6_15","DOI":"10.1007\/978-3-030-50423-6_15"},{"key":"958_CR25","unstructured":"Pokhrel, S., Abbas, R., Aryal, B.: Iot security: Botnet detection in iot using machine learning. CoRR abs\/2104.02231 (2021) https:\/\/arxiv.org\/abs\/2104.02231"},{"key":"958_CR26","doi-asserted-by":"publisher","first-page":"83965","DOI":"10.1109\/ACCESS.2020.2992249","volume":"8","author":"A Al-Abassi","year":"2020","unstructured":"Al-Abassi, A., Karimipour, H., Dehghantanha, A., Parizi, R.M.: An ensemble deep learning-based cyber-attack detection in industrial control system. IEEE Access 8, 83965\u201383973 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2992249","journal-title":"IEEE Access"},{"key":"958_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/J.JISA.2022.103405","volume":"72","author":"MA Talukder","year":"2023","unstructured":"Talukder, M.A., Hasan, K.F., Islam, M.M., Uddin, A., Akhter, A., Yousuf, M.A., Alharbi, F., Moni, M.A.: A dependable hybrid machine learning model for network intrusion detection. J. Inf. Secur. Appl. 72, 103405 (2023). https:\/\/doi.org\/10.1016\/J.JISA.2022.103405","journal-title":"J. Inf. Secur. Appl."},{"key":"958_CR28","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-981-16-7018-3_15","volume-title":"Mobile Radio Communications and 5G Networks","author":"M Rani","year":"2022","unstructured":"Rani, M.: Gagandeep: An efficient network intrusion detection system based on feature selection using evolutionary algorithm over balanced dataset. In: Marriwala, N., Tripathi, C.C., Jain, S., Kumar, D. (eds.) Mobile Radio Communications and 5G Networks, pp. 179\u2013193. Springer, Singapore (2022)"},{"key":"958_CR29","doi-asserted-by":"publisher","first-page":"2339","DOI":"10.1109\/TIFS.2022.3183390","volume":"17","author":"T Zebin","year":"2022","unstructured":"Zebin, T., Rezvy, S., Luo, Y.: An explainable AI-based intrusion detection system for dns over https (doh) attacks. IEEE Trans. Inf. Forensics Secur. 17, 2339\u20132349 (2022). https:\/\/doi.org\/10.1109\/TIFS.2022.3183390","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"958_CR30","doi-asserted-by":"crossref","unstructured":"MontazeriShatoori, M., Davidson, L., Kaur, G., Lashkari, A.H.: Detection of doh tunnels using time-series classification of encrypted traffic. In: 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech), 63\u201370 (2020)","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00026"},{"key":"958_CR31","doi-asserted-by":"publisher","first-page":"96731","DOI":"10.1109\/ACCESS.2022.3205337","volume":"10","author":"AS Dina","year":"2022","unstructured":"Dina, A.S., Siddique, A.B., Manivannan, D.: Effect of balancing data using synthetic data on the performance of machine learning classifiers for intrusion detection in computer networks. IEEE Access 10, 96731\u201396747 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3205337","journal-title":"IEEE Access"},{"key":"958_CR32","doi-asserted-by":"publisher","unstructured":"Sinha, J., Manollas, M.: Efficient deep cnn-bilstm model for network intrusion detection. In: AIPR 2020: 3rd International Conference on Artificial Intelligence and Pattern Recognition, Xiamen, China, June 26-28, 2020, pp. 223\u2013231. ACM, (2020). https:\/\/doi.org\/10.1145\/3430199.3430224","DOI":"10.1145\/3430199.3430224"},{"key":"958_CR33","doi-asserted-by":"publisher","first-page":"2269","DOI":"10.1109\/ACCESS.2021.3137201","volume":"10","author":"M Zeeshan","year":"2022","unstructured":"Zeeshan, M., Riaz, Q., Bilal, M.A., Shahzad, M.K., Jabeen, H., Haider, S.A., Rahim, A.: Protocol-based deep intrusion detection for dos and ddos attacks using UNSW-NB15 and bot-iot data-sets. IEEE Access 10, 2269\u20132283 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2021.3137201","journal-title":"IEEE Access"},{"key":"958_CR34","doi-asserted-by":"crossref","unstructured":"Tyagi, S., Mittal, S.: Sampling approaches for imbalanced data classification problem in machine learning. In: Singh, P.K., Kar, A.K., Singh, Y., Kolekar, M.H., Tanwar, S. (eds.) Proceedings of ICRIC 2019, pp. 209\u2013221. Springer, Cham (2020)","DOI":"10.1007\/978-3-030-29407-6_17"},{"key":"958_CR35","doi-asserted-by":"publisher","unstructured":"He, H., Bai, Y., Garcia, E.A., Li, S.: ADASYN: adaptive synthetic sampling approach for imbalanced learning. In: Proceedings of the International Joint Conference on Neural Networks, IJCNN 2008, Part of the IEEE World Congress on Computational Intelligence, WCCI 2008, Hong Kong, China, June 1-6, 2008, pp. 1322\u20131328. IEEE, (2008). https:\/\/doi.org\/10.1109\/IJCNN.2008.4633969","DOI":"10.1109\/IJCNN.2008.4633969"},{"key":"958_CR36","unstructured":"Zhang, J., Mani, I.: KNN Approach to Unbalanced Data Distributions: A Case Study Involving Information Extraction. In: Proceedings of the ICML\u20192003 Workshop on Learning from Imbalanced Datasets (2003)"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00958-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00958-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00958-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T05:19:48Z","timestamp":1739337588000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00958-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,19]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["958"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00958-1","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,19]]},"assertion":[{"value":"19 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"47"}}