{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T19:08:21Z","timestamp":1776884901869,"version":"3.51.2"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031575365","type":"print"},{"value":"9783031575372","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-57537-2_1","type":"book-chapter","created":{"date-parts":[[2024,4,24]],"date-time":"2024-04-24T19:02:38Z","timestamp":1713985358000},"page":"3-17","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4968-3653","authenticated-orcid":false,"given":"Jo\u00e3o","family":"Vitorino","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6630-9939","authenticated-orcid":false,"given":"Miguel","family":"Silva","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8075-531X","authenticated-orcid":false,"given":"Eva","family":"Maia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2519-9859","authenticated-orcid":false,"given":"Isabel","family":"Pra\u00e7a","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,25]]},"reference":[{"key":"1_CR1","doi-asserted-by":"publisher","unstructured":"European Union Agency for Cybersecurity, Christoforatos, N., Lella, I., Rekleitis, E., Van Heurck, C., Zacharis, A.: Cyber Europe 2022: After Action Report (2022). https:\/\/doi.org\/10.2824\/397622","DOI":"10.2824\/397622"},{"key":"1_CR2","doi-asserted-by":"publisher","unstructured":"European Union Agency for Cybersecurity, et al.: ENISA Threat Landscape 2022 (2022). https:\/\/doi.org\/10.2824\/764318","DOI":"10.2824\/764318"},{"issue":"20","key":"1_CR3","doi-asserted-by":"publisher","first-page":"4396","DOI":"10.3390\/app9204396","volume":"9","author":"H Liu","year":"2019","unstructured":"Liu, H., Lang, Bo.: Machine learning and deep learning methods for intrusion detection systems: a survey. Appl. Sci. 9(20), 4396 (2019). https:\/\/doi.org\/10.3390\/app9204396","journal-title":"Appl. Sci."},{"key":"1_CR4","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-031-08147-7_13","volume-title":"Foundations and Practice of Security: 14th International Symposium, FPS 2021, Paris, France, December 7\u201310, 2021, Revised Selected Papers","author":"J Vitorino","year":"2022","unstructured":"Vitorino, J., Andrade, R., Pra\u00e7a, I., Sousa, O., Maia, E.: A comparative analysis of machine learning techniques for IoT intrusion detection. In: A\u00efmeur, E., Laurent, M., Yaich, R., Dupont, B., Garcia-Alfaro, J. (eds.) Foundations and Practice of Security: 14th International Symposium, FPS 2021, Paris, France, December 7\u201310, 2021, Revised Selected Papers, pp. 191\u2013207. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-08147-7_13"},{"issue":"2","key":"1_CR5","doi-asserted-by":"publisher","first-page":"62","DOI":"10.3390\/fi15020062","volume":"15","author":"A Alotaibi","year":"2023","unstructured":"Alotaibi, A., Rassam, M.A.: Adversarial machine learning attacks against intrusion detection systems: a survey on strategies and defense. Fut. Internet 15(2), 62 (2023). https:\/\/doi.org\/10.3390\/fi15020062","journal-title":"Fut. Internet"},{"issue":"5","key":"1_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3453158","volume":"54","author":"I Rosenberg","year":"2021","unstructured":"Rosenberg, I., Shabtai, A., Elovici, Y., Rokach, L.: Adversarial machine learning attacks and defense methods in the cyber security domain. ACM Comput. Surv. 54(5), 1\u201336 (2021). https:\/\/doi.org\/10.1145\/3453158","journal-title":"ACM Comput. Surv."},{"key":"1_CR7","doi-asserted-by":"publisher","first-page":"35403","DOI":"10.1109\/ACCESS.2020.2974752","volume":"8","author":"N Martins","year":"2020","unstructured":"Martins, N., Cruz, J.M., Cruz, T., Abreu, P.H.: Adversarial machine learning applied to intrusion and malware scenarios: a systematic review. IEEE Access 8, 35403\u201335419 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2974752","journal-title":"IEEE Access"},{"key":"1_CR8","doi-asserted-by":"publisher","unstructured":"Vitorino, J., Dias, T., Fonseca, T., Maia, E., Pra\u00e7a, I.: Constrained adversarial learning and its applicability to automated software testing: a systematic review. arXiv (2023). https:\/\/doi.org\/10.48550\/arXiv.2303.07546","DOI":"10.48550\/arXiv.2303.07546"},{"issue":"3","key":"1_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3469659","volume":"3","author":"G Apruzzese","year":"2022","unstructured":"Apruzzese, G., Andreolini, M., Ferretti, L., Marchetti, M., Colajanni, M.: Modeling realistic adversarial attacks against network intrusion detection systems. Digit. Threats Res. Pract. 3(3), 1\u201319 (2022). https:\/\/doi.org\/10.1145\/3469659","journal-title":"Digit. Threats Res. Pract."},{"key":"1_CR10","doi-asserted-by":"publisher","first-page":"103433","DOI":"10.1016\/j.cose.2023.103433","volume":"134","author":"J Vitorino","year":"2023","unstructured":"Vitorino, J., Pra\u00e7a, I., Maia, E.: SoK: realistic adversarial attacks and defenses for intelligent network intrusion detection. Comput. Secur. 134, 103433 (2023). https:\/\/doi.org\/10.1016\/j.cose.2023.103433","journal-title":"Comput. Secur."},{"key":"1_CR11","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/OJCS.2021.3050917","volume":"2","author":"S Ho","year":"2021","unstructured":"Ho, S., Jufout, S.A., Dajani, K., Mozumdar, M.: A novel intrusion detection model for detecting known and innovative cyberattacks using convolutional neural network. IEEE Open J. Comput. Soc. 2, 14\u201325 (2021). https:\/\/doi.org\/10.1109\/OJCS.2021.3050917","journal-title":"IEEE Open J. Comput. Soc."},{"issue":"23","key":"1_CR12","doi-asserted-by":"publisher","first-page":"9326","DOI":"10.3390\/s22239326","volume":"22","author":"M Rodr\u00edguez","year":"2022","unstructured":"Rodr\u00edguez, M., Alesanco, \u00c1., Mehavilla, L., Garc\u00eda, J.: Evaluation of machine learning techniques for traffic flow-based intrusion detection. Sensors 22(23), 9326 (2022). https:\/\/doi.org\/10.3390\/s22239326","journal-title":"Sensors"},{"issue":"3","key":"1_CR13","doi-asserted-by":"publisher","first-page":"322","DOI":"10.3390\/electronics8030322","volume":"8","author":"R Abdulhammed","year":"2019","unstructured":"Abdulhammed, R., Musafer, H., Alessa, A., Faezipour, M., Abuzneid, A.: Features dimensionality reduction approaches for machine learning based network intrusion detection. Electronics 8(3), 322 (2019). https:\/\/doi.org\/10.3390\/electronics8030322","journal-title":"Electronics"},{"key":"1_CR14","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-031-31108-6_2","volume-title":"Risks and Security of Internet and Systems: 17th International Conference, CRiSIS 2022, Sousse, Tunisia, December 7\u20139, 2022, Revised Selected Papers","author":"M Lanvin","year":"2023","unstructured":"Lanvin, M., Gimenez, P.-F., Han, Y., Majorczyk, F., M\u00e9, L., Totel, \u00c9.: Errors in\u00a0the\u00a0CICIDS2017 dataset and\u00a0the\u00a0significant differences in\u00a0detection performances it makes. In: Kallel, S., Jmaiel, M., Zulkernine, M., Kacem, A.H., Cuppens, F., Cuppens, N. (eds.) Risks and Security of Internet and Systems: 17th International Conference, CRiSIS 2022, Sousse, Tunisia, December 7\u20139, 2022, Revised Selected Papers, pp. 18\u201333. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-31108-6_2"},{"key":"1_CR15","doi-asserted-by":"publisher","unstructured":"Liu, L., Engelen, G., Lynar, T., Essam, D., Joosen, W.: Error prevalence in NIDS datasets: a case study on CIC-IDS-2017 and CSE-CIC-IDS-2018. In: 2022 IEEE Conference on Communications and Network Security (CNS), IEEE, October 2022, pp. 254\u2013262 (2022). https:\/\/doi.org\/10.1109\/CNS56114.2022.9947235","DOI":"10.1109\/CNS56114.2022.9947235"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Catillo, M., Del Vecchio, A., Pecchia, A., Villano, U.: A case study with CICIDS2017 on the robustness of machine learning against adversarial attacks in intrusion detection. In: Proceedings of the 18th International Conference on Availability, Reliability and Security, pp. 1\u20138 (2023)","DOI":"10.1145\/3600160.3605031"},{"issue":"1","key":"1_CR17","doi-asserted-by":"publisher","first-page":"154","DOI":"10.3390\/jcp2010010","volume":"2","author":"A McCarthy","year":"2022","unstructured":"McCarthy, A., Ghadafi, E., Andriotis, P., Legg, P.: Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: a survey. J. Cybersecur. Priv. 2(1), 154\u2013190 (2022). https:\/\/doi.org\/10.3390\/jcp2010010","journal-title":"J. Cybersecur. Priv."},{"key":"1_CR18","doi-asserted-by":"publisher","unstructured":"Fernandes, R., Lopes, N.: Network intrusion detection packet classification with the HIKARI-2021 dataset: a study on ML algorithms. In: 10th International Symposium on Digital Forensics and Security, ISDFS 2022, Institute of Electrical and Electronics Engineers Inc. (2022). https:\/\/doi.org\/10.1109\/ISDFS55398.2022.9800807","DOI":"10.1109\/ISDFS55398.2022.9800807"},{"key":"1_CR19","doi-asserted-by":"publisher","first-page":"119030","DOI":"10.1016\/j.eswa.2022.119030","volume":"213","author":"MHL Louk","year":"2023","unstructured":"Louk, M.H.L., Tama, B.A.: Dual-IDS: A bagging-based gradient boosting decision tree model for network anomaly intrusion detection system. Exp. Syst. Appl. 213, 119030 (2023). https:\/\/doi.org\/10.1016\/j.eswa.2022.119030","journal-title":"Exp. Syst. Appl."},{"issue":"12","key":"1_CR20","doi-asserted-by":"publisher","first-page":"2483","DOI":"10.3390\/sym14122483","volume":"14","author":"AHH Kabla","year":"2022","unstructured":"Kabla, A.H.H., Thamrin, A.H., Anbar, M., Manickam, S., Karuppayah, S.: PeerAmbush: multi-layer perceptron to detect peer-to-peer botnet. Symmetry 14(12), 2483 (2022). https:\/\/doi.org\/10.3390\/sym14122483","journal-title":"Symmetry"},{"key":"1_CR21","doi-asserted-by":"publisher","unstructured":"Wang, L., Cheng, Z., Lv, Q., Wang, Y., Zhang, S., Huang, W.: ACG: attack classification on encrypted network traffic using graph convolution attention networks. Institute of Electrical and Electronics Engineers (IEEE), June 2023, pp. 47\u201352 (2023). https:\/\/doi.org\/10.1109\/cscwd57460.2023.10152599","DOI":"10.1109\/cscwd57460.2023.10152599"},{"key":"1_CR22","doi-asserted-by":"publisher","unstructured":"Kwon, D., Neagu, R.M., Rasakonda, P., Ryu, J.T., Kim, J.: Evaluating unbalanced network data for attack detection. In: Proceedings of the 2023 on Systems and Network Telemetry and Analytics, SNTA 2023, July 2023, pp. 23\u201326. Association for Computing Machinery, Inc. (2023). https:\/\/doi.org\/10.1145\/3589012.3594898","DOI":"10.1145\/3589012.3594898"},{"key":"1_CR23","doi-asserted-by":"publisher","unstructured":"Koda, S., Morikawa, I.: OOD-robust boosting tree for intrusion detection systems. In: Proceedings of the International Joint Conference on Neural Networks. Institute of Electrical and Electronics Engineers Inc. (2023). https:\/\/doi.org\/10.1109\/IJCNN54540.2023.10191603","DOI":"10.1109\/IJCNN54540.2023.10191603"},{"key":"1_CR24","doi-asserted-by":"publisher","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy, SciTePress, 2018, pp. 108\u2013116 (2018). https:\/\/doi.org\/10.5220\/0006639801080116","DOI":"10.5220\/0006639801080116"},{"key":"1_CR25","unstructured":"CICFlowMeter Canadian Institute for Cybersecurity. https:\/\/www.unb.ca\/cic\/research\/applications.html#CICFlowMeter. Accessed 09 Dec 2022"},{"issue":"17","key":"1_CR26","doi-asserted-by":"publisher","first-page":"7868","DOI":"10.3390\/app11177868","volume":"11","author":"A Ferriyan","year":"2021","unstructured":"Ferriyan, A., Thamrin, A.H., Takeda, K., Murai, J.: Generating network intrusion detection dataset based on real and encrypted synthetic attack traffic. Appl. Sci. 11(17), 7868 (2021). https:\/\/doi.org\/10.3390\/app11177868","journal-title":"Appl. Sci."},{"key":"1_CR27","doi-asserted-by":"publisher","unstructured":"Fernandes, R., Silva, J., Ribeiro, O., Portela, I., Lopes, N.: The impact of identifiable features in ML classification algorithms with the HIKARI-2021 dataset. In: 11th International Symposium on Digital Forensics and Security, ISDFS 2023. Institute of Electrical and Electronics Engineers Inc. (2023). https:\/\/doi.org\/10.1109\/ISDFS58141.2023.10131864","DOI":"10.1109\/ISDFS58141.2023.10131864"},{"issue":"7\u20138","key":"1_CR28","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/s12243-023-00953-y","volume":"78","author":"J Vitorino","year":"2023","unstructured":"Vitorino, J., Pra\u00e7a, I., Maia, E.: Towards adversarial realism and robust learning for IoT intrusion detection and classification. Ann. Telecommun. 78(7\u20138), 401\u2013412 (2023). https:\/\/doi.org\/10.1007\/s12243-023-00953-y","journal-title":"Ann. Telecommun."},{"issue":"4","key":"1_CR29","doi-asserted-by":"publisher","first-page":"108","DOI":"10.3390\/fi14040108","volume":"14","author":"J Vitorino","year":"2022","unstructured":"Vitorino, J., Oliveira, N., Pra\u00e7a, I.: Adaptative perturbation patterns: realistic adversarial learning for robust intrusion detection. Fut. Internet 14(4), 108 (2022). https:\/\/doi.org\/10.3390\/fi14040108","journal-title":"Fut. Internet"},{"issue":"1","key":"1_CR30","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001). https:\/\/doi.org\/10.1023\/A:1010933404324","journal-title":"Mach. Learn."},{"key":"1_CR31","doi-asserted-by":"publisher","unstructured":"Chen, T., Guestrin, C.: XGBoost: a scalable tree boosting system. In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 13\u201317 August, pp. 785\u2013794 (2016). https:\/\/doi.org\/10.1145\/2939672.2939785","DOI":"10.1145\/2939672.2939785"},{"key":"1_CR32","unstructured":"Ke, G., et al.: LightGBM: a highly efficient gradient boosting decision tree. In: Advances in Neural Information Processing Systems (NIPS), 2017 December, pp. 3147\u20133155 (2017)"},{"key":"1_CR33","doi-asserted-by":"publisher","unstructured":"Lou, Y., Caruana, R., Gehrke, J.: Intelligible models for classification and regression. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2012, pp. 150\u2013158. Association for Computing Machinery, New York (2012). https:\/\/doi.org\/10.1145\/2339530.2339556","DOI":"10.1145\/2339530.2339556"},{"key":"1_CR34","unstructured":"Nori, H., Jenkins, S., Koch, P., Caruana, R.: InterpretML: a unified framework for machine learning interpretability (2019)"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-57537-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,24]],"date-time":"2024-04-24T19:02:50Z","timestamp":1713985370000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-57537-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031575365","9783031575372"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-57537-2_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"25 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FPS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Foundations and Practice of Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bordeaux","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fps2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.fps-2023.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"80","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}