{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:28:46Z","timestamp":1740101326399,"version":"3.37.3"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,30]],"date-time":"2022-10-30T00:00:00Z","timestamp":1667088000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,30]],"date-time":"2022-10-30T00:00:00Z","timestamp":1667088000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100014239","name":"CENTRAL","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100014239","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,30]]},"DOI":"10.1109\/wpmc55625.2022.10014923","type":"proceedings-article","created":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T19:12:29Z","timestamp":1674241949000},"page":"110-115","source":"Crossref","is-referenced-by-count":0,"title":["Development and Validation of Dataset for Intrusion Detection System over Real Traffic"],"prefix":"10.1109","author":[{"given":"Shafqat Ali","family":"Siyyal","sequence":"first","affiliation":[{"name":"Mehran Univ. of Eng. &#x0026; Technology,Dept. of Telecommunication Eng.,Jamshoro,Pakistan"}]},{"given":"Faheem Yar","family":"Khuhawar","sequence":"additional","affiliation":[{"name":"Mehran Univ. of Eng. &#x0026; Technology,Dept. of Telecommunication Eng.,Jamshoro,Pakistan"}]},{"given":"Muhammad Raza","family":"Shaikh","sequence":"additional","affiliation":[{"name":"Mehran Univ. of Eng. &#x0026; Technology,Dept. of Telecommunication Eng.,Jamshoro,Pakistan"}]},{"given":"Aftab A.","family":"Memon","sequence":"additional","affiliation":[{"name":"Mehran Univ. of Eng. &#x0026; Technology,Dept. of Telecommunication Eng.,Jamshoro,Pakistan"}]},{"given":"Bhawani S.","family":"Chowdhry","sequence":"additional","affiliation":[{"name":"Mehran Univ. of Eng. &#x0026; Technology,Dept. of Electronic Eng.,Jamshoro,Pakistan"}]},{"given":"M. Zakir","family":"Shaikh","sequence":"additional","affiliation":[{"name":"Mehran Univ. of Eng. &#x0026; Technology,Dept. of Electronic Eng.,Jamshoro,Pakistan"}]},{"given":"Ambuj","family":"Kumar","sequence":"additional","affiliation":[{"name":"CGC, Aarhus University,Dept. of Business Development and Technology,Herning,Denmark"}]},{"given":"Muhammad Aslam","family":"Uqaili","sequence":"additional","affiliation":[{"name":"Mehran Univ. of Eng. &#x0026; Technology,Dept. of Electronic Eng.,Jamshoro,Pakistan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.005"},{"issue":"3","key":"ref2","first-page":"621","article-title":"Analyzing ml-based ids over real-traffic","volume-title":"International Journal of Innovations in Science &amp; Technology","volume":"4","author":"Siyyal","year":"2022"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2000.821506"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WiCOM.2012.6478433"},{"volume-title":"Zeek","year":"1990","author":"Paxson","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.30534\/ijatcse\/2020\/15942020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.03.330"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3056614"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3000179"},{"volume-title":"Hulk","author":"Shteiman","key":"ref14"},{"volume-title":"Golden Eye","author":"Campbell","key":"ref15"},{"key":"ref16","article-title":"Slowloris","volume-title":"github.com","author":"Yaltirakli","year":"2015"},{"volume-title":"SlowHttpTest DoS attack","key":"ref17"},{"volume-title":"inviteFlood DoS Attack","key":"ref18"},{"volume-title":"iaxFlood DoS","key":"ref19"},{"volume-title":"THC-SSL-DoS","key":"ref20"},{"volume-title":"Synflood","key":"ref21"},{"volume-title":"Loic","key":"ref22"},{"volume-title":"High orbit ion canon (HOIC)","key":"ref23"},{"volume-title":"PyLoris Http DDoS tool","key":"ref24"},{"volume-title":"Tors Hammer DDoS","key":"ref25"},{"volume-title":"DDoS D AVOSET","key":"ref26"},{"article-title":"Artificial Intelligence-Based Password Brute Force Attacks","volume-title":"MWAIS 2018 Proceedings","author":"Trieu","key":"ref27"},{"volume-title":"HYDRA","key":"ref28"},{"volume-title":"Medusa","key":"ref29"},{"volume-title":"Patator","key":"ref30"},{"volume-title":"Ncract password cracker","year":"2000","author":"Muffett","key":"ref31"},{"volume-title":"Nmap","author":"Lyon","key":"ref32"},{"volume-title":"Burpe suite","year":"2012","key":"ref33"},{"volume-title":"CIC Flow meter","year":"2017","key":"ref34"},{"volume-title":"An intrusion detection system using machine learning algorithm","year":"2019","author":"Ugochukwu","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1117\/12.2305256"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102158"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICOSEC49089.2020.9215333"},{"journal-title":"Evaluation: from precision, recall and f-measure to roc, informedness, markedness and correlation","year":"2020","author":"Powers","key":"ref39"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CCCS.2018.8586840"},{"volume-title":"IDS Dataset based on Real Traffic","year":"2022","author":"Ali","key":"ref41"}],"event":{"name":"2022 25th International Symposium on Wireless Personal Multimedia Communications (WPMC)","start":{"date-parts":[[2022,10,30]]},"location":"Herning, Denmark","end":{"date-parts":[[2022,11,2]]}},"container-title":["2022 25th International Symposium on Wireless Personal Multimedia Communications (WPMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10014682\/10014702\/10014923.pdf?arnumber=10014923","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T06:55:44Z","timestamp":1707807344000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10014923\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,30]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/wpmc55625.2022.10014923","relation":{},"subject":[],"published":{"date-parts":[[2022,10,30]]}}}