{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T14:38:05Z","timestamp":1742999885948,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031764585"},{"type":"electronic","value":"9783031764592"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-76459-2_1","type":"book-chapter","created":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T16:34:43Z","timestamp":1741624483000},"page":"3-13","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Efficient Network Traffic Feature Sets for IoT Intrusion Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-6630-9939","authenticated-orcid":false,"given":"Miguel","family":"Silva","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4968-3653","authenticated-orcid":false,"given":"Jo\u00e3o","family":"Vitorino","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8075-531X","authenticated-orcid":false,"given":"Eva","family":"Maia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2519-9859","authenticated-orcid":false,"given":"Isabel","family":"Pra\u00e7a","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,11]]},"reference":[{"key":"1_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.025","author":"M Noor","year":"2019","unstructured":"Noor, M., Hassan, W.: Current research on internet of things (IoT) security: a survey. Comput. Netw. (2019). https:\/\/doi.org\/10.1016\/j.comnet.2018.11.025","journal-title":"Comput. Netw."},{"key":"1_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-08147-7_13","author":"J Vitorino","year":"2022","unstructured":"Vitorino, J., Andrade, R., Pra\u00e7a, I., Sousa, O., Maia, E.: A comparative analysis of machine learning techniques for IoT intrusion detection. Found. Pract. Secur. (2022). https:\/\/doi.org\/10.1007\/978-3-031-08147-7_13","journal-title":"Found. Pract. Secur."},{"doi-asserted-by":"publisher","unstructured":"Ahmad, Z., et al.: Network intrusion detection system: a systematic study of machine learning and deep learning approaches. Trans. Emerg. Telecommun. Technol. 32(1) (2021). https:\/\/doi.org\/10.1002\/ett.4150","key":"1_CR3","DOI":"10.1002\/ett.4150"},{"key":"1_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.03.330","author":"A Thakkar","year":"2020","unstructured":"Thakkar, A., Lohiya, R.: A Review of the advancement in intrusion detection datasets. Procedia Comput. Sci. (2020). https:\/\/doi.org\/10.1016\/j.procs.2020.03.330","journal-title":"Procedia Comput. Sci."},{"doi-asserted-by":"publisher","unstructured":"Vitorino, J., Silva, M., Maia, E., Pra\u00e7a, I.: An adversarial robustness benchmark for enterprise network intrusion detection. arXiv (2024). https:\/\/doi.org\/10.48550\/arXiv.2402.16912","key":"1_CR5","DOI":"10.48550\/arXiv.2402.16912"},{"key":"1_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-021-10037-9","author":"A Thakkar","year":"2022","unstructured":"Thakkar, A., Lohiya, R.: A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions. Artif. Intell. Rev. (2022). https:\/\/doi.org\/10.1007\/s10462-021-10037-9","journal-title":"Artif. Intell. Rev."},{"doi-asserted-by":"publisher","unstructured":"Vitorino, J., Silva, M., Maia, E., Pra\u00e7a, I.: Reliable feature selection for adversarially robust cyber-attack detection. ArXiv (2024). https:\/\/doi.org\/10.48550\/arXiv.2404.04188","key":"1_CR7","DOI":"10.48550\/arXiv.2404.04188"},{"key":"1_CR8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3007291","author":"Q Al-Tashi","year":"2020","unstructured":"Al-Tashi, Q., et al.: Approaches to multi-objective feature selection: a systematic literature review. IEEE Access (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3007291","journal-title":"IEEE Access"},{"key":"1_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101863","author":"M Shafiq","year":"2020","unstructured":"Shafiq, M., et al.: IoT malicious traffic identification using wrapper-based feature selection mechanisms. Comput. Secur. (2020). https:\/\/doi.org\/10.1016\/j.cose.2020.101863","journal-title":"Comput. Secur."},{"key":"1_CR10","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.eswa.2019.05.028","volume":"134","author":"J Speiser","year":"2019","unstructured":"Speiser, J., et al.: A comparison of random forest variable selection methods for classification prediction modeling. Expert Syst. Appl. 134, 93\u2013101 (2019). https:\/\/doi.org\/10.1016\/j.eswa.2019.05.028","journal-title":"Expert Syst. Appl."},{"key":"1_CR11","doi-asserted-by":"publisher","first-page":"103433","DOI":"10.1016\/j.cose.2023.103433","volume":"134","author":"J Vitorino","year":"2023","unstructured":"Vitorino, J., Pra\u00e7a, I., Maia, E.: SoK: realistic adversarial attacks and defenses for intelligent network intrusion detection. Comput. Secur. 134, 103433 (2023). https:\/\/doi.org\/10.1016\/j.cose.2023.103433","journal-title":"Comput. Secur."},{"issue":"1","key":"1_CR12","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1186\/s40537-020-00379-6","volume":"7","author":"S Kasongo","year":"2020","unstructured":"Kasongo, S., Sun, Y.: Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset. J Big Data 7(1), 105 (2020). https:\/\/doi.org\/10.1186\/s40537-020-00379-6","journal-title":"J Big Data"},{"key":"1_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-020-03222-y","author":"S Krishnaveni","year":"2021","unstructured":"Krishnaveni, S., et al.: Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing. Cluster Comput (2021). https:\/\/doi.org\/10.1007\/s10586-020-03222-y","journal-title":"Cluster Comput"},{"doi-asserted-by":"publisher","unstructured":"Li, L.-H., et al.: A feature selection based DNN for intrusion detection system. In: 15th International Conference on Ubiquitous Information Management and Communication (2021). https:\/\/doi.org\/10.1109\/imcom51814.2021.9377405","key":"1_CR14","DOI":"10.1109\/imcom51814.2021.9377405"},{"key":"1_CR15","doi-asserted-by":"publisher","first-page":"107247","DOI":"10.1016\/j.comnet.2020.107247","volume":"174","author":"Y Zhou","year":"2020","unstructured":"Zhou, Y., et al.: Building an efficient intrusion detection system based on feature selection and ensemble classifier. Comput. Netw. 174, 107247 (2020). https:\/\/doi.org\/10.1016\/j.comnet.2020.107247","journal-title":"Comput. Netw."},{"key":"1_CR16","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.4743746","author":"S Garcia","year":"2020","unstructured":"Garcia, S., Parmisano, A., Erquiaga, M.J.: IoT-23: a labeled dataset with malicious and benign IoT network traffic. Zenodo (2020). https:\/\/doi.org\/10.5281\/zenodo.4743746","journal-title":"Zenodo"},{"key":"1_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.041","author":"N Koroniotis","year":"2019","unstructured":"Koroniotis, N., et al.: Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset. Futur. Gener. Comput. Syst. (2019). https:\/\/doi.org\/10.1016\/j.future.2019.05.041","journal-title":"Futur. Gener. Comput. Syst."},{"doi-asserted-by":"publisher","unstructured":"Moustafa, N.: A new distributed architecture for evaluating AI-based security systems at the edge: network TON_IoT datasets. Sustain. Cities Soc. 72 (2021). https:\/\/doi.org\/10.1016\/j.scs.2021.102994","key":"1_CR18","DOI":"10.1016\/j.scs.2021.102994"},{"doi-asserted-by":"publisher","unstructured":"Vitorino, J., Dias, T., Fonseca, T., Maia, E., Pra\u00e7a, I.: Constrained adversarial learning and its applicability to automated software testing: a systematic review. ArXiv, (2023). https:\/\/doi.org\/10.48550\/arXiv.2303.07546","key":"1_CR19","DOI":"10.48550\/arXiv.2303.07546"},{"key":"1_CR20","doi-asserted-by":"publisher","first-page":"114765","DOI":"10.1016\/j.eswa.2021.114765","volume":"174","author":"E Omuya","year":"2021","unstructured":"Omuya, E., et al.: Feature selection for classification using principal component analysis and information gain. Expert Syst. Appl. 174, 114765 (2021). https:\/\/doi.org\/10.1016\/j.eswa.2021.114765","journal-title":"Expert Syst. Appl."},{"unstructured":"Yang, Y., Pedersen, J.O.: A comparative study on feature selection in text categorization. In: 14th International Conference on Machine Learning (1997)","key":"1_CR21"},{"key":"1_CR22","doi-asserted-by":"publisher","DOI":"10.1023\/A:1012487302797","author":"I Guyon","year":"2002","unstructured":"Guyon, I., et al.: Gene selection for cancer classification using support vector machines. Mach. Learn. (2002). https:\/\/doi.org\/10.1023\/A:1012487302797","journal-title":"Mach. Learn."},{"key":"1_CR23","doi-asserted-by":"publisher","DOI":"10.12785\/ijbsa\/020201","author":"K Elsayed","year":"2015","unstructured":"Elsayed, K.: \u201cMean absolute deviation: analysis and applications. Int. J. Bus. Stat. Analysis (2015). https:\/\/doi.org\/10.12785\/ijbsa\/020201","journal-title":"Int. J. Bus. Stat. Analysis"},{"key":"1_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.eswa.2018.08.039","volume":"116","author":"S Roy","year":"2019","unstructured":"Roy, S., et al.: Dispersion ratio based decision tree model for classification. Expert Syst. Appl. 116, 1\u20139 (2019). https:\/\/doi.org\/10.1016\/j.eswa.2018.08.039","journal-title":"Expert Syst. Appl."},{"issue":"7\u20138","key":"1_CR25","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/s12243-023-00953-y","volume":"78","author":"J Vitorino","year":"2023","unstructured":"Vitorino, J., Pra\u00e7a, I., Maia, E.: Towards adversarial realism and robust learning for IoT intrusion detection and classification. Ann. Telecommun. 78(7\u20138), 401\u2013412 (2023). https:\/\/doi.org\/10.1007\/s12243-023-00953-y","journal-title":"Ann. Telecommun."},{"issue":"4","key":"1_CR26","doi-asserted-by":"publisher","first-page":"108","DOI":"10.3390\/fi14040108","volume":"14","author":"J Vitorino","year":"2022","unstructured":"Vitorino, J., Oliveira, N., Pra\u00e7a, I.: Adaptative perturbation patterns: realistic adversarial learning for robust intrusion detection. Future Internet 14(4), 108 (2022). https:\/\/doi.org\/10.3390\/fi14040108","journal-title":"Future Internet"},{"issue":"1","key":"1_CR27","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random Forests. Mach. Learn. 45(1), 5\u201332 (2001). https:\/\/doi.org\/10.1023\/A:1010933404324","journal-title":"Mach. Learn."},{"doi-asserted-by":"publisher","unstructured":"Chen, T., Guestrin, C.: XGBoost: a scalable tree boosting system. In: 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785\u2013794 (2016). https:\/\/doi.org\/10.1145\/2939672.2939785","key":"1_CR28","DOI":"10.1145\/2939672.2939785"},{"unstructured":"Ke, G., et al.: Lightgbm: a highly efficient gradient boosting decision tree. In: Advances in Neural Information Processing Systems, vol. 30 (2017)","key":"1_CR29"}],"container-title":["Lecture Notes in Networks and Systems","Distributed Computing and Artificial Intelligence, Special Sessions I, 21st International Conference"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-76459-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T16:34:47Z","timestamp":1741624487000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-76459-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031764585","9783031764592"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-76459-2_1","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"11 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DCAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Distributed Computing and Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Salamanca","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dcai2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.dcai-conference.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}