{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:45:53Z","timestamp":1772556353514,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:00:00Z","timestamp":1725494400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:00:00Z","timestamp":1725494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1007\/s10922-024-09842-8","type":"journal-article","created":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:02:12Z","timestamp":1725516132000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["XAITrafficIntell: Interpretable Cyber Threat Intelligence for Darknet Traffic Analysis"],"prefix":"10.1007","volume":"32","author":[{"given":"Dincy R.","family":"Arikkat","sequence":"first","affiliation":[]},{"given":"P.","family":"Vinod","sequence":"additional","affiliation":[]},{"given":"K. A.","family":"Rafidha Rehiman","sequence":"additional","affiliation":[]},{"given":"Rabeeba Abdul","family":"Rasheed","sequence":"additional","affiliation":[]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,5]]},"reference":[{"issue":"1","key":"9842_CR1","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/S0305-0483(98)00028-0","volume":"27","author":"TS Teo","year":"1999","unstructured":"Teo, T.S., Lim, V.K., Lai, R.Y.: Intrinsic and extrinsic motivation in internet usage. Omega 27(1), 25\u201337 (1999)","journal-title":"Omega"},{"issue":"3","key":"9842_CR2","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1016\/S0167-4048(03)00310-9","volume":"22","author":"S Kamara","year":"2003","unstructured":"Kamara, S., Fahmy, S., Schultz, E., Kerschbaum, F., Frantzen, M.: Analysis of vulnerabilities in internet firewalls. Comput. Secur. 22(3), 214\u2013232 (2003)","journal-title":"Comput. Secur."},{"issue":"1","key":"9842_CR3","doi-asserted-by":"crossref","first-page":"006","DOI":"10.1093\/cybsec\/tyy006","volume":"4","author":"I Agrafiotis","year":"2018","unstructured":"Agrafiotis, I., Nurse, J.R., Goldsmith, M., Creese, S., Upton, D.: A taxonomy of cyber-harms: defining the impacts of cyber-attacks and understanding how they propagate. J. Cybersecur. 4(1), 006 (2018)","journal-title":"J. Cybersecur."},{"key":"9842_CR4","doi-asserted-by":"crossref","unstructured":"Montieri, A., Ciuonzo, D., Aceto, G., Pescap\u00e9, A.: Anonymity services tor, i2p, jondonym: Classifying in the dark. In: 2017 29th International Teletraffic Congress (ITC 29), vol. 1, pp. 81\u201389 (2017). IEEE","DOI":"10.23919\/ITC.2017.8064342"},{"key":"9842_CR5","doi-asserted-by":"crossref","unstructured":"Mandal, S., Khan, D.A.: A study of security threats in cloud: Passive impact of covid-19 pandemic. In: 2020 International Conference on Smart Electronics and Communication (ICOSEC), pp. 837\u2013842 (2020). IEEE","DOI":"10.1109\/ICOSEC49089.2020.9215374"},{"key":"9842_CR6","doi-asserted-by":"crossref","unstructured":"Gurunarayanan, A., Agrawal, A., Bhatia, A., Vishwakarma, D.K.: Improving the performance of machine learning algorithms for tor detection. In: 2021 International Conference on Information Networking (ICOIN), pp. 439\u2013444 (2021). IEEE","DOI":"10.1109\/ICOIN50884.2021.9333989"},{"issue":"4","key":"9842_CR7","doi-asserted-by":"publisher","first-page":"556","DOI":"10.3390\/electronics11040556","volume":"11","author":"Q Abu Al-Haija","year":"2022","unstructured":"Abu Al-Haija, Q., Krichen, M., Abu Elhaija, W.: Machine-learning-based darknet traffic detection system for iot applications. Electronics 11(4), 556 (2022)","journal-title":"Electronics"},{"key":"9842_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/s10257-023-00626-2","author":"A Almomani","year":"2023","unstructured":"Almomani, A.: Darknet traffic analysis, and classification system based on modified stacking ensemble learning algorithms. Inform. Syst. e-Bus. Manag. (2023). https:\/\/doi.org\/10.1007\/s10257-023-00626-2","journal-title":"Inform. Syst. e-Bus. Manag."},{"key":"9842_CR9","volume":"18","author":"MC Marim","year":"2023","unstructured":"Marim, M.C., Ramos, P.V.B., Vieira, A.B., Galletta, A., Villari, M., Oliveira, R.M., Silva, E.F.: Darknet traffic detection and characterization with models based on decision trees and neural networks. Intell. Syst. Appl. 18, 200199 (2023)","journal-title":"Intell. Syst. Appl."},{"issue":"14","key":"9842_CR10","doi-asserted-by":"publisher","first-page":"40337","DOI":"10.1007\/s11042-023-17338-x","volume":"83","author":"M Sharma","year":"2024","unstructured":"Sharma, M., Kumar, N., Singh, V.P., Madan, C., Sarowa, S.: Hybrid intelligent feature selector framework for darknet traffic classification. Multimed. Tools Appl. 83(14), 40337\u201340360 (2024)","journal-title":"Multimed. Tools Appl."},{"key":"9842_CR11","doi-asserted-by":"publisher","first-page":"113705","DOI":"10.1109\/ACCESS.2021.3105000","volume":"9","author":"MB Sarwar","year":"2021","unstructured":"Sarwar, M.B., Hanif, M.K., Talib, R., Younas, M., Sarwar, M.U.: Darkdetect: darknet traffic detection and categorization using modified convolution-long short-term memory. IEEE Access 9, 113705\u2013113713 (2021)","journal-title":"IEEE Access"},{"key":"9842_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102663","volume":"116","author":"J Lan","year":"2022","unstructured":"Lan, J., Liu, X., Li, B., Li, Y., Geng, T.: Darknetsec: a novel self-attentive deep learning method for darknet traffic classification and application identification. Comput. Secur. 116, 102663 (2022)","journal-title":"Comput. Secur."},{"issue":"4","key":"9842_CR13","doi-asserted-by":"publisher","first-page":"4225","DOI":"10.1109\/TNSM.2021.3098157","volume":"18","author":"A Nascita","year":"2021","unstructured":"Nascita, A., Montieri, A., Aceto, G., Ciuonzo, D., Persico, V., Pescap\u00e9, A.: Xai meets mobile traffic classification: understanding and improving multimodal deep learning architectures. IEEE Trans. Netw. Serv. Manag. 18(4), 4225\u20134246 (2021)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"15","key":"9842_CR14","doi-asserted-by":"publisher","first-page":"11459","DOI":"10.1007\/s00521-023-08319-0","volume":"35","author":"S Sivamohan","year":"2023","unstructured":"Sivamohan, S., Sridhar, S.: An optimized model for network intrusion detection systems in industry 4.0 using xai based bi-lstm framework. Neural Comput. Appl. 35(15), 11459\u201311475 (2023)","journal-title":"Neural Comput. Appl."},{"key":"9842_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/6634811","volume":"2021","author":"B Mahbooba","year":"2021","unstructured":"Mahbooba, B., Timilsina, M., Sahal, R., Serrano, M.: Explainable artificial intelligence (xai) to enhance trust management in intrusion detection systems using decision tree model. Complexity 2021, 1\u201311 (2021)","journal-title":"Complexity"},{"key":"9842_CR16","doi-asserted-by":"publisher","first-page":"2339","DOI":"10.1109\/TIFS.2022.3183390","volume":"17","author":"T Zebin","year":"2022","unstructured":"Zebin, T., Rezvy, S., Luo, Y.: An explainable ai-based intrusion detection system for dns over https (doh) attacks. IEEE Trans. Inform. Forensics Secur. 17, 2339\u20132349 (2022)","journal-title":"IEEE Trans. Inform. Forensics Secur."},{"issue":"3","key":"9842_CR17","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.3390\/s22031154","volume":"22","author":"T-T-H Le","year":"2022","unstructured":"Le, T.-T.-H., Kim, H., Kang, H., Kim, H.: Classification and explanation for intrusion detection system based on ensemble trees and shap method. Sensors 22(3), 1154 (2022)","journal-title":"Sensors"},{"issue":"4","key":"9842_CR18","doi-asserted-by":"publisher","first-page":"126","DOI":"10.3390\/bdcc6040126","volume":"6","author":"R Younisse","year":"2022","unstructured":"Younisse, R., Ahmad, A., Abu Al-Haija, Q.: Explaining intrusion detection-based convolutional neural networks using shapley additive explanations (shap). Big Data Cognitive Comput. 6(4), 126 (2022)","journal-title":"Big Data Cognitive Comput."},{"key":"9842_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108732","volume":"108","author":"MM Alani","year":"2023","unstructured":"Alani, M.M.: An explainable efficient flow-based industrial iot intrusion detection system. Comput. Electrical Eng. 108, 108732 (2023)","journal-title":"Comput. Electrical Eng."},{"key":"9842_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119000","volume":"639","author":"M Keshk","year":"2023","unstructured":"Keshk, M., Koroniotis, N., Pham, N., Moustafa, N., Turnbull, B., Zomaya, A.Y.: An explainable deep learning-enabled intrusion detection framework in iot networks. Inform. Sci. 639, 119000 (2023)","journal-title":"Inform. Sci."},{"issue":"1","key":"9842_CR21","doi-asserted-by":"publisher","first-page":"1000","DOI":"10.1109\/TITS.2022.3188671","volume":"24","author":"A Oseni","year":"2022","unstructured":"Oseni, A., Moustafa, N., Creech, G., Sohrabi, N., Strelzoff, A., Tari, Z., Linkov, I.: An explainable deep learning framework for resilient intrusion detection in iot-enabled transportation networks. IEEE Trans. Intell. Trans. Syst. 24(1), 1000\u20131014 (2022)","journal-title":"IEEE Trans. Intell. Trans. Syst."},{"key":"9842_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121751","volume":"238","author":"B Sharma","year":"2024","unstructured":"Sharma, B., Sharma, L., Lal, C., Roy, S.: Explainable artificial intelligence for intrusion detection in iot networks: a deep learning based approach. Exp. Syst. Appl. 238, 121751 (2024)","journal-title":"Exp. Syst. Appl."},{"key":"9842_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117144","volume":"201","author":"G Andresini","year":"2022","unstructured":"Andresini, G., Appice, A., Caforio, F.P., Malerba, D., Vessio, G.: Roulette: a neural attention multi-output model for explainable network intrusion detection. Exp. Syst. Appl. 201, 117144 (2022)","journal-title":"Exp. Syst. Appl."},{"key":"9842_CR24","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.comcom.2022.06.039","volume":"193","author":"MM Alani","year":"2022","unstructured":"Alani, M.M.: Botstop: packet-based efficient and explainable iot botnet detection using machine learning. Comput. Commun. 193, 53\u201362 (2022)","journal-title":"Comput. Commun."},{"key":"9842_CR25","doi-asserted-by":"publisher","unstructured":"Kang, H., Ahn, D.H., Lee, G.M., Yoo, J.D., Park, K.H., Kim, H.K.: IoT Network Intrusion Dataset. https:\/\/doi.org\/10.21227\/q70p-q449","DOI":"10.21227\/q70p-q449"},{"key":"9842_CR26","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3183361","author":"PP Kundu","year":"2022","unstructured":"Kundu, P.P., Truong-Huu, T., Chen, L., Zhou, L., Teo, S.G.: Detection and classification of botnet traffic using deep learning with model explanation. IEEE Trans. Dep. Secur. Comput. (2022). https:\/\/doi.org\/10.1109\/TDSC.2022.3183361","journal-title":"IEEE Trans. Dep. Secur. Comput."},{"key":"9842_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100747","volume":"22","author":"WW Lo","year":"2023","unstructured":"Lo, W.W., Kulatilleke, G., Sarhan, M., Layeghy, S., Portmann, M.: Xg-bot: an explainable deep graph neural network for botnet detection and forensics. Internet Things 22, 100747 (2023)","journal-title":"Internet Things"},{"key":"9842_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2023.103329","volume":"153","author":"M Al-Hawawreh","year":"2024","unstructured":"Al-Hawawreh, M., Moustafa, N.: Explainable deep learning for attack intelligence and combating cyber-physical attacks. Ad Hoc Networks 153, 103329 (2024)","journal-title":"Ad Hoc Networks"},{"key":"9842_CR29","unstructured":"Morris, T.H., Thornton, Z., Turnipseed, I.: Industrial control system simulation and data logging for intrusion detection system research. In: 7th Annual Southeastern Cyber Security Summit, 3\u20134 (2015)"},{"issue":"1","key":"9842_CR30","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s10922-022-09691-3","volume":"31","author":"M Sarhan","year":"2023","unstructured":"Sarhan, M., Layeghy, S., Moustafa, N., Portmann, M.: Cyber threat intelligence sharing scheme based on federated learning for network intrusion detection. J. Network Syst. Manag. 31(1), 3 (2023)","journal-title":"J. Network Syst. Manag."},{"issue":"4","key":"9842_CR31","doi-asserted-by":"publisher","first-page":"2968","DOI":"10.1109\/TNSE.2020.3032415","volume":"8","author":"M Al-Hawawreh","year":"2020","unstructured":"Al-Hawawreh, M., Moustafa, N., Garg, S., Hossain, M.S.: Deep learning-enabled threat intelligence scheme in the internet of things networks. IEEE Trans. Network Sci. Eng. 8(4), 2968\u20132981 (2020)","journal-title":"IEEE Trans. Network Sci. Eng."},{"key":"9842_CR32","unstructured":"Lashkari, A.H., Gil, G.D., Mamun, M.S.I., Ghorbani, A.A.: Characterization of tor traffic using time based features. In: International Conference on Information Systems Security and Privacy, vol. 2, pp. 253\u2013262 (2017). SciTePress"},{"key":"9842_CR33","doi-asserted-by":"crossref","unstructured":"Habibi\u00a0Lashkari, A., Kaur, G., Rahali, A.: Didarknet: A contemporary approach to detect and characterize the darknet traffic using deep image learning. In: 2020 the 10th International Conference on Communication and Network Security, pp. 1\u201313 (2020)","DOI":"10.1145\/3442520.3442521"},{"issue":"6","key":"9842_CR34","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1002\/cem.873","volume":"18","author":"AJ Myles","year":"2004","unstructured":"Myles, A.J., Feudale, R.N., Liu, Y., Woody, N.A., Brown, S.D.: An introduction to decision tree modeling. J. Chemom.: A J. Chemom. Soc. 18(6), 275\u2013285 (2004)","journal-title":"J. Chemom.: A J. Chemom. Soc."},{"key":"9842_CR35","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45, 5\u201332 (2001)","journal-title":"Mach. Learn."},{"key":"9842_CR36","doi-asserted-by":"crossref","unstructured":"Chen, T., Guestrin, C.: Xgboost: A scalable tree boosting system. In: Proceedings of the 22nd Acm Sigkdd International Conference on Knowledge Discovery and Data Mining, pp. 785\u2013794 (2016)","DOI":"10.1145\/2939672.2939785"},{"key":"9842_CR37","first-page":"4","volume":"30","author":"G Ke","year":"2017","unstructured":"Ke, G., Meng, Q., Finley, T., Wang, T., Chen, W., Ma, W., Ye, Q., Liu, T.-Y.: Lightgbm: a highly efficient gradient boosting decision tree. Adva. Neural Inform. Proc. Syst. 30, 4\u20139 (2017)","journal-title":"Adva. Neural Inform. Proc. Syst."},{"issue":"4","key":"9842_CR38","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/5254.708428","volume":"13","author":"MA Hearst","year":"1998","unstructured":"Hearst, M.A., Dumais, S.T., Osuna, E., Platt, J., Scholkopf, B.: Support vector machines. IEEE Intell. Syst. Appl. 13(4), 18\u201328 (1998)","journal-title":"IEEE Intell. Syst. Appl."},{"issue":"7","key":"9842_CR39","first-page":"579","volume":"8","author":"MC Popescu","year":"2009","unstructured":"Popescu, M.C., Balas, V.E., Perescu-Popescu, L., Mastorakis, N.: Multilayer perceptron and neural networks. WSEAS Trans. Circ. Syst. 8(7), 579\u2013588 (2009)","journal-title":"WSEAS Trans. Circ. Syst."},{"key":"9842_CR40","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1705.07874","author":"SM Lundberg","year":"2017","unstructured":"Lundberg, S.M., Lee, S.I.: A unified approach to interpreting model predictions. Adv. Neural Inform. Proc. Syst. (2017). https:\/\/doi.org\/10.48550\/arXiv.1705.07874","journal-title":"Adv. Neural Inform. Proc. Syst."},{"key":"9842_CR41","doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Singh, S., Guestrin, C.: \u201cwhy should i trust you?\" explaining the predictions of any classifier. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1135\u20131144 (2016)","DOI":"10.1145\/2939672.2939778"},{"key":"9842_CR42","doi-asserted-by":"crossref","unstructured":"Mothilal, R.K., Sharma, A., Tan, C.: Explaining machine learning classifiers through diverse counterfactual explanations. In: Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency, pp. 607\u2013617 (2020)","DOI":"10.1145\/3351095.3372850"},{"key":"9842_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101948","volume":"97","author":"M Mansoori","year":"2020","unstructured":"Mansoori, M., Welch, I.: How do they find us? A study of geolocation tracking techniques of malicious web sites. Comput. Secur. 97, 101948 (2020)","journal-title":"Comput. Secur."}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-024-09842-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10922-024-09842-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-024-09842-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:17:27Z","timestamp":1730301447000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10922-024-09842-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,5]]},"references-count":43,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["9842"],"URL":"https:\/\/doi.org\/10.1007\/s10922-024-09842-8","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,5]]},"assertion":[{"value":"9 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 July 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 July 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 September 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval and Consent to Participate"}},{"value":"Consent for publication was obtained from all the authors.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}}],"article-number":"88"}}