{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T18:23:46Z","timestamp":1771957426640,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T00:00:00Z","timestamp":1629158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["833042"],"award-info":[{"award-number":["833042"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,17]]},"DOI":"10.1145\/3465481.3470091","type":"proceedings-article","created":{"date-parts":[[2021,8,16]],"date-time":"2021-08-16T17:57:21Z","timestamp":1629136641000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Network Intrusion Detection in the Wild - the Orange use case in the SIMARGL project"],"prefix":"10.1145","author":[{"given":"Miko\u0142aj","family":"Komisarek","sequence":"first","affiliation":[{"name":"ITTI Sp. z o.o., Poland, and UTP University of Science and Technology, Poland"}]},{"given":"Marek","family":"Pawlicki","sequence":"additional","affiliation":[{"name":"ITTI Sp. z o.o., Poland, and UTP University of Science and Technology, Poland"}]},{"given":"Miko\u0142aj","family":"Kowalski","sequence":"additional","affiliation":[{"name":"Orange Polska, Poland"}]},{"given":"Adrian","family":"Marzecki","sequence":"additional","affiliation":[{"name":"Orange Polska, Poland"}]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[{"name":"ITTI Sp. z o.o., Poland, and UTP University of Science and Technology, Poland"}]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[{"name":"FernUniversitat Hagen, Germany and UTP University of Science and Technology, Poland"}]}],"member":"320","published-online":{"date-parts":[[2021,8,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. Chinese start-up leaked 400GB of scraped data exposing 200+ million Facebook Instagram and LinkedIn users. https:\/\/www.safetydetectives.com\/blog\/socialarks-leak-report\/. (Accessed on 05\/23\/2021)."},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. COMB: over 3.2 Billion Email\/Password Combinations Leaked | CyberNews. https:\/\/cybernews.com\/news\/largest-compilation-of-emails-and-passwords-leaked-free\/. (Accessed on 05\/23\/2021)."},{"key":"e_1_3_2_1_3_1","unstructured":"[n.d.]. Coronavirus: impact on online usage in the U.S. - Statistics & Facts | Statista. https:\/\/www.statista.com\/topics\/6241\/coronavirus-impact-on-online-usage-in-the-us\/dossierSummary. (Accessed on 05\/22\/2021)."},{"key":"e_1_3_2_1_4_1","unstructured":"[n.d.]. ENISA Threat Landscape 2020 - List of top 15 threats \u2014 ENISA. https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2020-list-of-top-15-threats. (Accessed on 05\/23\/2021)."},{"key":"e_1_3_2_1_5_1","unstructured":"[n.d.]. How LinkedIn customizes Apache Kafka for 7 trillion messages per day. https:\/\/engineering.linkedin.com\/blog\/2019\/apache-kafka-trillion-messages"},{"key":"e_1_3_2_1_6_1","unstructured":"[n.d.]. USCellular hit by a data breach after hackers access CRM software. https:\/\/www.bleepingcomputer.com\/news\/security\/uscellular-hit-by-a-data-breach-after-hackers-access-crm-software\/. (Accessed on 05\/23\/2021)."},{"key":"e_1_3_2_1_7_1","volume-title":"\u2022 Total data","year":"2021","unstructured":"[n.d.]. \u2022 Total data volume worldwide 2010-2024 | Statista. https:\/\/www.statista.com\/statistics\/871513\/worldwide-data-created\/. (Accessed on 05\/22\/2021)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/DATABIA50434.2020.9190436"},{"key":"e_1_3_2_1_9_1","volume-title":"Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection","author":"Caviglione Luca","year":"2020","unstructured":"Luca Caviglione, Micha\u0142 Chora\u015b, Igino Corona, Artur Janicki, Wojciech Mazurczyk, Marek Pawlicki, and Katarzyna Wasielewska. 2020. Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection. IEEE Access (2020)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/2048558.2048569"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622407.1622416"},{"key":"e_1_3_2_1_12_1","volume-title":"Intrusion detection approach based on optimised artificial neural network. Neurocomputing","author":"Chora\u015b Micha\u0142","year":"2021","unstructured":"Micha\u0142 Chora\u015b and Marek Pawlicki. 2021. Intrusion detection approach based on optimised artificial neural network. Neurocomputing (2021)."},{"key":"e_1_3_2_1_13_1","unstructured":"Dylan Chou and Meng Jiang. 2020. Data-Driven Network Intrusion Detection: A Taxonomy of Challenges and Methods. arXiv preprint arXiv:2009.07352(2020)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSESS47205.2019.9040718"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20164583"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Blossom Fernandes Urmi\u00a0Nanda Biswas Roseann\u00a0Tan Mansukhani Alma\u00a0Vallejo Casar\u00edn and Cecilia\u00a0A Essau. 2020. The impact of COVID-19 lockdown on internet use and escapism in adolescents. Revista de Psicolog\u00eda Cl\u00ednica con Ni\u00f1os y Adolescentes 7 3(2020) 59\u201365.","DOI":"10.21134\/rpcna.2020.mon.2056"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS50601.2020.9342751"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2992966"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","unstructured":"Bhole Hiraman Chapte M and C Abhijeet. 2018. A Study of Apache Kafka in Big Data Stream Processing. 1\u20133. https:\/\/doi.org\/10.1109\/ICICET.2018.8533771","DOI":"10.1109\/ICICET.2018.8533771"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.18535\/ijecs"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Rafa\u0142 Kozik Marek Pawlicki and Micha\u0142 Chora\u015b. 2021. A new method of hybrid time window embedding with transformer-based traffic data classification in IoT-networked environment. Pattern Analysis and Applications(2021) 1\u20139.","DOI":"10.1007\/s10044-021-00980-2"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 25th International Conference on Neural Information Processing Systems -","volume":"1","author":"Krizhevsky Alex","year":"2012","unstructured":"Alex Krizhevsky, Ilya Sutskever, and Geoffrey\u00a0E. Hinton. 2012. ImageNet Classification with Deep Convolutional Neural Networks. In Proceedings of the 25th International Conference on Neural Information Processing Systems - Volume 1 (Lake Tahoe, Nevada) (NIPS\u201912). Curran Associates Inc., Red Hook, NY, USA, 1097\u20131105."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOEI48184.2020.9142954"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1155\/2020"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1155\/2020"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/0005-2795(75)90109-9"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/NAECON.2012.6531064"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-009-9138-0"},{"key":"e_1_3_2_1_31_1","volume-title":"Our World in Data","author":"Roser Max","year":"2013","unstructured":"Max Roser and Hannah Ritchie. 2013. Technological Progress. Our World in Data (2013). https:\/\/ourworldindata.org\/technological-progress."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41060-016-0027-9"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-018-01896-2"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","unstructured":"Han Wu Shang Zhihao and Katinka Wolter. 2019. Performance Prediction for the Apache Kafka Messaging System. 154\u2013161. https:\/\/doi.org\/10.1109\/HPCC\/SmartCity\/DSS.2019.00036","DOI":"10.1109\/HPCC"}],"event":{"name":"ARES 2021: The 16th International Conference on Availability, Reliability and Security","location":"Vienna Austria","acronym":"ARES 2021"},"container-title":["Proceedings of the 16th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465481.3470091","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3465481.3470091","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:24Z","timestamp":1750191444000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465481.3470091"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,17]]},"references-count":34,"alternative-id":["10.1145\/3465481.3470091","10.1145\/3465481"],"URL":"https:\/\/doi.org\/10.1145\/3465481.3470091","relation":{},"subject":[],"published":{"date-parts":[[2021,8,17]]},"assertion":[{"value":"2021-08-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}