{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T14:50:23Z","timestamp":1777128623515,"version":"3.51.4"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,12,28]],"date-time":"2023-12-28T00:00:00Z","timestamp":1703721600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,28]],"date-time":"2023-12-28T00:00:00Z","timestamp":1703721600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-023-00509-7","type":"journal-article","created":{"date-parts":[[2023,12,28]],"date-time":"2023-12-28T19:02:21Z","timestamp":1703790141000},"page":"203-211","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Faulty use of the CIC-IDS 2017 dataset in information security research"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1622-9099","authenticated-orcid":false,"given":"Rohit","family":"Dube","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,28]]},"reference":[{"key":"509_CR1","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: 4th International Conference on Information Systems Security and Privacy (2018). https:\/\/www.scitepress.org\/Papers\/2018\/66398\/66398.pdf","DOI":"10.5220\/0006639801080116"},{"key":"509_CR2","unstructured":"https:\/\/scholar.google.com\/. Citation counts retrieved on October 21, (2023)"},{"key":"509_CR3","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1192\/1\/012018","author":"A Yulianto","year":"2019","unstructured":"Yulianto, A., Sukarno, P., Suwastika, N.A.: Improving adaboost-based intrusion detection system (IDS) performance on CIC IDS 2017 dataset. J. Phys. (2019). https:\/\/doi.org\/10.1088\/1742-6596\/1192\/1\/012018","journal-title":"J. Phys."},{"key":"509_CR4","doi-asserted-by":"crossref","unstructured":"Vinayakumar, R., et\u00a0al.: Deep learning approach for intelligent intrusion detection system. IEEE Access (2019). https:\/\/ieeexplore.ieee.org\/abstract\/document\/8681044\/","DOI":"10.1109\/ACCESS.2019.2895334"},{"key":"509_CR5","unstructured":"Global correlation on CISCO IPS sensors (2012). https:\/\/blogs.cisco.com\/cin\/ips-in-the-data-center-workshop"},{"key":"509_CR6","unstructured":"Performance of cisco ips 4500 and 4300 series sensors (2012). https:\/\/blogs.cisco.com\/cin\/ips-in-the-data-center-workshop"},{"key":"509_CR7","unstructured":"Distributed intrusion detection\/prevention system: Solution overview (2023). https:\/\/www.vmware.com\/content\/dam\/digitalmarketing\/vmware\/en\/pdf\/docs\/vmware-nsx-distributed-ids-ips-solution-overview.pdf"},{"key":"509_CR8","unstructured":"https:\/\/www.snort.org\/. Retrieved on October 21 (2023)"},{"key":"509_CR9","unstructured":"https:\/\/suricata.io\/. Retrieved on October 21 (2023)"},{"key":"509_CR10","unstructured":"Panigrahi, R., Borah, S.: A detailed analysis of cicids2017 dataset for designing intrusion detection systems. Int. J. Eng. Technol. (2018). https:\/\/www.researchgate.net\/publication\/329045441_A_detailed_analysis_of_CICIDS2017_dataset_for_designing_Intrusion_Detection_Systems"},{"key":"509_CR11","doi-asserted-by":"crossref","unstructured":"Engelen, G., Rimmer, V., Joosen, W.: Troubleshooting an intrusion detection dataset: the cicids2017 case study. IEEE Security and Privacy Workshops (2021)","DOI":"10.1109\/SPW53761.2021.00009"},{"key":"509_CR12","doi-asserted-by":"crossref","unstructured":"Liu, L., Engelen, G., Lynar, T., Essam, D., Joosen, W.: Error prevalence in nids datasets: A case study on cic-ids-2017 and cse-cic-ids-2018. IEEE Conference on Communications and Network Security (2022)","DOI":"10.1109\/CNS56114.2022.9947235"},{"key":"509_CR13","doi-asserted-by":"crossref","unstructured":"Rosayand, A., Cheval, E., Carlier, F., Leroux, P.: Network intrusion detection: A comprehensive analysis of cic-ids2017. In: 8th International Conference on Information Systems Security and Privacy (2022)","DOI":"10.5220\/0010774000003120"},{"key":"509_CR14","doi-asserted-by":"crossref","unstructured":"Lee, W., Stolfo, S., Mok, K.: Mining in a data-flow environment: Experience in network intrusion detection. In: Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (1999). https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/312129.312212","DOI":"10.1145\/312129.312212"},{"key":"509_CR15","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.: A detailed analysis of the kdd cup 99 data set. In: IEEE Symposium on Computational Intelligence in Security and Defense Applications (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"509_CR16","unstructured":"ESG. Network traffic analysis (nta): A cybersecurity quick win (2020). https:\/\/www.cisco.com\/c\/dam\/en\/us\/products\/collateral\/security\/stealthwatch\/stealthwatch-esg-wp.pdf"},{"key":"509_CR17","unstructured":"Network traffic analysis: Solution overview (2023). https:\/\/www.vmware.com\/content\/dam\/digitalmarketing\/vmware\/en\/pdf\/docs\/vmware-nsx-network-traffic-analysis.pdf"},{"key":"509_CR18","unstructured":"Firepower 9300 series data sheet. (2021). https:\/\/www.cisco.com\/c\/en\/us\/products\/collateral\/security\/firepower-9000-series\/datasheet-c78-742471.html"},{"key":"509_CR19","doi-asserted-by":"crossref","unstructured":"Noormohammadpour, M., Raghavendra, C.: Datacenter traffic control: Understanding techniques and trade-offs. In: IEEE Communications Surveys and Tutorials (2018). https:\/\/www.researchgate.net\/publication\/321744877_Datacenter_Traffic_Control_Understanding_Techniques_and_Trade-offs","DOI":"10.31219\/osf.io\/6qzxc"},{"key":"509_CR20","doi-asserted-by":"publisher","unstructured":"Dube, R.: (mis)use of the cicids 2017 dataset in information security research (2022). https:\/\/doi.org\/10.13140\/RG.2.2.25435.64809","DOI":"10.13140\/RG.2.2.25435.64809"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00509-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-023-00509-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00509-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,23]],"date-time":"2024-02-23T11:25:23Z","timestamp":1708687523000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-023-00509-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,28]]},"references-count":20,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,3]]}},"alternative-id":["509"],"URL":"https:\/\/doi.org\/10.1007\/s11416-023-00509-7","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,28]]},"assertion":[{"value":"11 November 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 October 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 December 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}