{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T10:44:07Z","timestamp":1776681847955,"version":"3.51.2"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T00:00:00Z","timestamp":1669075200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T00:00:00Z","timestamp":1669075200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,22]]},"DOI":"10.1109\/acit57182.2022.9994201","type":"proceedings-article","created":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T13:38:43Z","timestamp":1672839523000},"page":"1-7","source":"Crossref","is-referenced-by-count":9,"title":["Network-based Intrusion Detection Datasets: A Survey"],"prefix":"10.1109","author":[{"given":"Lubna Ali Hassan","family":"Ahmed","sequence":"first","affiliation":[{"name":"Sudan University of Science and Technology,Dept. of Electronics Engineering,Khartoum,Sudan"}]},{"given":"Yahia Abdalla Mohamed","family":"Hamad","sequence":"additional","affiliation":[{"name":"Sudan University of Science and Technology,Dept. of Computer Networks and Systems,Khartoum,Sudan"}]},{"given":"Ahmed Abdallah Mohamed Ali","family":"Abdalla","sequence":"additional","affiliation":[{"name":"Sudan University of Science and Technology,Dept. of Electronics Engineering,Khartoum,Sudan"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2011.5971980"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04968-2_4"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79232-1_8"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"},{"key":"ref36","author":"areas","year":"2012","journal-title":"The honeynet project T &#x201C;he Honeynet Project"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.5937\/vojtehg66-16670"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1117112.777341"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1978672.1978676"},{"key":"ref33","first-page":"9","article-title":"Toward instrumenting network warfare competitions to generate labeled datasets","author":"sangster","year":"2009","journal-title":"Proceedings of the 2nd Workshop on Cyber Security Experimentation and Test"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330110"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.5121\/ijcsit.2019.11306"},{"key":"ref2","article-title":"2021 Vulnerability Intelligence Report","author":"condon","year":"2021","journal-title":"Rapid7 Boston United States rep"},{"key":"ref1","article-title":"Top cybersecurity trends 2022","author":"canorea","year":"2022","journal-title":"Plain Concepts 22-"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.6633\/IJNS.20180720(4).06)"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-021-01843-0"},{"key":"ref16","article-title":"Network Intrusion Detection: Half a Kingdom for a Good Dataset","author":"malowidzki","year":"2015","journal-title":"NATO STO SAS-139 Workshop"},{"key":"ref38","first-page":"361","article-title":"Flow-based benchmark data sets for intrusion detection","author":"ring","year":"2017","journal-title":"Proceedings of the 16th European Conference on Cyber Warfare and Security"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.9734\/ajrcos\/2021\/v7i430185"},{"key":"ref18","first-page":"361","article-title":"Flow-based benchmark data sets for intrusion detection","author":"ring","year":"2017","journal-title":"Proceedings of the 16th European Conference on Cyber Warfare and Security"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.03.018"},{"key":"ref23","first-page":"3","article-title":"Salting public traces with attack traffic to test flow classifiers","volume":"2011","author":"celik","year":"0","journal-title":"Proceedings of the 4th Conference on Cyber Security Experimentation and Test"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/AHICI.2011.6113948"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2677046.2677050"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1080\/1206212X.2021.1885150"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-374494-4.00008-6"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2007.374825"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.05.011"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.11.004"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3009843"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.03.018"},{"key":"ref7","article-title":"Network Intrusion Detection: Half a Kingdom for a Good Dataset","author":"malowidzki","year":"0","journal-title":"NATO STO SAS-139 Workshop Portugal"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2000.821506"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781316271636"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref5","article-title":"KDD Cup 99","author":"stolfo","year":"0","journal-title":"KDD Cup 1999 data"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/NCCC49330.2021.9428827"}],"event":{"name":"2022 International Arab Conference on Information Technology (ACIT)","location":"Abu Dhabi, United Arab Emirates","start":{"date-parts":[[2022,11,22]]},"end":{"date-parts":[[2022,11,24]]}},"container-title":["2022 International Arab Conference on Information Technology (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9994070\/9994081\/09994201.pdf?arnumber=9994201","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T15:13:48Z","timestamp":1675091628000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9994201\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,22]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/acit57182.2022.9994201","relation":{},"subject":[],"published":{"date-parts":[[2022,11,22]]}}}