{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T16:18:27Z","timestamp":1776183507083,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,14]],"date-time":"2021-12-14T00:00:00Z","timestamp":1639440000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,14]]},"DOI":"10.1145\/3486622.3493973","type":"proceedings-article","created":{"date-parts":[[2022,4,14]],"date-time":"2022-04-14T01:18:53Z","timestamp":1649899133000},"page":"570-575","source":"Crossref","is-referenced-by-count":19,"title":["From CIC-IDS2017 to LYCOS-IDS2017: A corrected dataset for better performance"],"prefix":"10.1145","author":[{"given":"Arnaud","family":"ROSAY","sequence":"first","affiliation":[{"name":"STMicroelectronics, France"}]},{"given":"Florent","family":"CARLIER","sequence":"additional","affiliation":[{"name":"CREN, Le Mans University, France"}]},{"given":"Elo\u00efse","family":"CHEVAL","sequence":"additional","affiliation":[{"name":"Polytech Nantes, Nantes University, France"}]},{"given":"Pascal","family":"LEROUX","sequence":"additional","affiliation":[{"name":"Le Mans University, France"}]}],"member":"320","published-online":{"date-parts":[[2022,4,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"A Network Traffic Biflow Generator and Analyzer (Formerly ISCXFlowMeter). https:\/\/www.unb.ca\/cic\/research\/applications.html(Accessed","year":"2021","unstructured":"[n.d.]. CicFlowMeter , A Network Traffic Biflow Generator and Analyzer (Formerly ISCXFlowMeter). https:\/\/www.unb.ca\/cic\/research\/applications.html(Accessed Oct 29, 2021 ). [n.d.]. CicFlowMeter, A Network Traffic Biflow Generator and Analyzer (Formerly ISCXFlowMeter). https:\/\/www.unb.ca\/cic\/research\/applications.html(Accessed Oct 29, 2021)."},{"key":"e_1_3_2_1_2_1","volume-title":"Intrusion Detection Evaluation Dataset (CICIDS2017). https:\/\/www.unb.ca\/cic\/datasets\/ids-2017.html (Accessed","year":"2021","unstructured":"[n.d.]. Intrusion Detection Evaluation Dataset (CICIDS2017). https:\/\/www.unb.ca\/cic\/datasets\/ids-2017.html (Accessed Oct 29, 2021 ). [n.d.]. Intrusion Detection Evaluation Dataset (CICIDS2017). https:\/\/www.unb.ca\/cic\/datasets\/ids-2017.html (Accessed Oct 29, 2021)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102767"},{"key":"e_1_3_2_1_4_1","volume-title":"An Evaluation Framework for Intrusion Detection Dataset. In International Conference on Information Science and Security (ICISS). 1\u20136. https:\/\/doi.org\/10","author":"Gharib A.","year":"2016","unstructured":"A. Gharib , I. Sharafaldin , A.\u00a0 H. Lashkari , and A.\u00a0 A. Ghorbani . 2016 . An Evaluation Framework for Intrusion Detection Dataset. In International Conference on Information Science and Security (ICISS). 1\u20136. https:\/\/doi.org\/10 .1109\/ICISSEC.2016.7885840 A. Gharib, I. Sharafaldin, A.\u00a0H. Lashkari, and A.\u00a0A. Ghorbani. 2016. An Evaluation Framework for Intrusion Detection Dataset. In International Conference on Information Science and Security (ICISS). 1\u20136. https:\/\/doi.org\/10.1109\/ICISSEC.2016.7885840"},{"key":"e_1_3_2_1_5_1","volume-title":"Android Malware Detection and Classification Based on Network Traffic Using Deep Learning. In 2021 7th International Conference on Web Research (ICWR). 71\u201377","author":"Gohari Mahshid","year":"2021","unstructured":"Mahshid Gohari , Sattar Hashemi , and Lida Abdi . 2021 . Android Malware Detection and Classification Based on Network Traffic Using Deep Learning. In 2021 7th International Conference on Web Research (ICWR). 71\u201377 . https:\/\/doi.org\/10.1109\/ICWR51868.2021.9443025 Mahshid Gohari, Sattar Hashemi, and Lida Abdi. 2021. Android Malware Detection and Classification Based on Network Traffic Using Deep Learning. In 2021 7th International Conference on Web Research (ICWR). 71\u201377. https:\/\/doi.org\/10.1109\/ICWR51868.2021.9443025"},{"key":"e_1_3_2_1_6_1","volume-title":"Correlation and variable importance in random forests. Statistics and Computing 27, 3 (01","author":"Gregorutti Baptiste","year":"2017","unstructured":"Baptiste Gregorutti , Bertrand Michel , and Philippe Saint-Pierre . 2017. Correlation and variable importance in random forests. Statistics and Computing 27, 3 (01 May 2017 ), 659\u2013678. https:\/\/doi.org\/10.1007\/s11222-016-9646-1 Baptiste Gregorutti, Bertrand Michel, and Philippe Saint-Pierre. 2017. Correlation and variable importance in random forests. Statistics and Computing 27, 3 (01 May 2017), 659\u2013678. https:\/\/doi.org\/10.1007\/s11222-016-9646-1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2021.3050917"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2018.8585560"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3056614"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"},{"key":"e_1_3_2_1_11_1","volume-title":"Military Communications and Information Systems Conference (MilCIS). 1\u20136. https:\/\/doi.org\/10","author":"Moustafa N.","year":"2015","unstructured":"N. Moustafa and J. Slay . 2015. UNSW-NB15: A Comprehensive Data Set for Network Intrusion Detection Systems (UNSW-NB15 Network Data Set) . In Military Communications and Information Systems Conference (MilCIS). 1\u20136. https:\/\/doi.org\/10 .1109\/MilCIS. 2015 .7348942 N. Moustafa and J. Slay. 2015. UNSW-NB15: A Comprehensive Data Set for Network Intrusion Detection Systems (UNSW-NB15 Network Data Set). In Military Communications and Information Systems Conference (MilCIS). 1\u20136. https:\/\/doi.org\/10.1109\/MilCIS.2015.7348942"},{"key":"e_1_3_2_1_12_1","first-page":"3","article-title":"A detailed analysis of CICIDS2017 dataset for designing Intrusion Detection Systems","volume":"7","author":"Panigrahi Ranjit","year":"2018","unstructured":"Ranjit Panigrahi and Samarjeet Borah . 2018 . A detailed analysis of CICIDS2017 dataset for designing Intrusion Detection Systems . International Journal of Engineering & Technology 7 , 3 .24(2018), 479\u2013482. https:\/\/doi.org\/10.14419\/ijet.v7i3.24.22797 Ranjit Panigrahi and Samarjeet Borah. 2018. A detailed analysis of CICIDS2017 dataset for designing Intrusion Detection Systems. International Journal of Engineering & Technology 7, 3.24(2018), 479\u2013482. https:\/\/doi.org\/10.14419\/ijet.v7i3.24.22797","journal-title":"International Journal of Engineering & Technology"},{"key":"e_1_3_2_1_13_1","volume-title":"Machine Learning for Networking, Selma Boumerdassi, \u00c9ric Renault, and Paul M\u00fchlethaler (Eds.)","author":"Rosay Arnaud","unstructured":"Arnaud Rosay , Florent Carlier , and Pascal Leroux . 2020. MLP4NIDS: An Efficient MLP-Based Network Intrusion Detection for CICIDS2017 Dataset . In Machine Learning for Networking, Selma Boumerdassi, \u00c9ric Renault, and Paul M\u00fchlethaler (Eds.) . Springer International Publishing , 240\u2013254. https:\/\/doi.org\/10.1007\/978-3-030-45778-5_16 Arnaud Rosay, Florent Carlier, and Pascal Leroux. 2020. MLP4NIDS: An Efficient MLP-Based Network Intrusion Detection for CICIDS2017 Dataset. In Machine Learning for Networking, Selma Boumerdassi, \u00c9ric Renault, and Paul M\u00fchlethaler (Eds.). Springer International Publishing, 240\u2013254. https:\/\/doi.org\/10.1007\/978-3-030-45778-5_16"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-021-00852-0"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"e_1_3_2_1_16_1","volume-title":"Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy. In International Carnahan Conference on Security Technology (ICCST). 1\u20138. https:\/\/doi.org\/10","author":"Sharafaldin I.","year":"2019","unstructured":"I. Sharafaldin , A.\u00a0 H. Lashkari , S. Hakak , and A.\u00a0 A. Ghorbani . 2019 . Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy. In International Carnahan Conference on Security Technology (ICCST). 1\u20138. https:\/\/doi.org\/10 .1109\/CCST.2019.8888419 I. Sharafaldin, A.\u00a0H. Lashkari, S. Hakak, and A.\u00a0A. Ghorbani. 2019. Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy. In International Carnahan Conference on Security Technology (ICCST). 1\u20138. https:\/\/doi.org\/10.1109\/CCST.2019.8888419"},{"key":"e_1_3_2_1_17_1","volume-title":"IP Operations and Management","author":"Sperotto Anna","unstructured":"Anna Sperotto , Ramin Sadre , Frank van Vliet , and Aiko Pras . 2009. A Labeled Data Set for Flow-Based Intrusion Detection . In IP Operations and Management , Giorgio Nunzi, Caterina Scoglio, and Xing Li (Eds.). Springer Berlin Heidelberg, Berlin , Heidelberg , 39\u201350. https:\/\/doi.org\/10.1007\/978-3-642-04968-2_4 Anna Sperotto, Ramin Sadre, Frank van Vliet, and Aiko Pras. 2009. A Labeled Data Set for Flow-Based Intrusion Detection. In IP Operations and Management, Giorgio Nunzi, Caterina Scoglio, and Xing Li (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 39\u201350. https:\/\/doi.org\/10.1007\/978-3-642-04968-2_4"},{"key":"e_1_3_2_1_18_1","volume-title":"Extensible Android Malware Detection and Family Classification Using Network-Flows and API-Calls. In International Carnahan Conference on Security Technology (ICCST). 1\u20138. https:\/\/doi.org\/10","author":"Taheri L.","year":"2019","unstructured":"L. Taheri , A.\u00a0F.\u00a0 A. Kadir , and A.\u00a0 H. Lashkari . 2019 . Extensible Android Malware Detection and Family Classification Using Network-Flows and API-Calls. In International Carnahan Conference on Security Technology (ICCST). 1\u20138. https:\/\/doi.org\/10 .1109\/CCST.2019.8888430 L. Taheri, A.\u00a0F.\u00a0A. Kadir, and A.\u00a0H. Lashkari. 2019. Extensible Android Malware Detection and Family Classification Using Network-Flows and API-Calls. In International Carnahan Conference on Security Technology (ICCST). 1\u20138. https:\/\/doi.org\/10.1109\/CCST.2019.8888430"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"e_1_3_2_1_20_1","volume-title":"Advances in Artificial Intelligence","author":"Ullah Imtiaz","unstructured":"Imtiaz Ullah and Qusay\u00a0 H. Mahmoud . 2020. A Scheme for Generating a Dataset for Anomalous Activity Detection in IoT Networks . In Advances in Artificial Intelligence , Cyril Goutteand Xiaodan Zhu (Eds.). Springer International Publishing , Cham , 508\u2013520. Imtiaz Ullah and Qusay\u00a0H. Mahmoud. 2020. A Scheme for Generating a Dataset for Anomalous Activity Detection in IoT Networks. In Advances in Artificial Intelligence, Cyril Goutteand Xiaodan Zhu (Eds.). Springer International Publishing, Cham, 508\u2013520."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1962.10490022"}],"event":{"name":"WI-IAT '21: IEEE\/WIC\/ACM International Conference on Web Intelligence","location":"ESSENDON VIC Australia","acronym":"WI-IAT '21","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence"]},"container-title":["IEEE\/WIC\/ACM International Conference on Web Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3486622.3493973","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3486622.3493973","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:05Z","timestamp":1750191125000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3486622.3493973"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,14]]},"references-count":21,"alternative-id":["10.1145\/3486622.3493973","10.1145\/3486622"],"URL":"https:\/\/doi.org\/10.1145\/3486622.3493973","relation":{},"subject":[],"published":{"date-parts":[[2021,12,14]]}}}