{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T02:17:34Z","timestamp":1768789054659,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T00:00:00Z","timestamp":1661212800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["101021981"],"award-info":[{"award-number":["101021981"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,23]]},"DOI":"10.1145\/3538969.3544486","type":"proceedings-article","created":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T23:41:40Z","timestamp":1660779700000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A novel, refined dataset for real-time Network Intrusion Detection"],"prefix":"10.1145","author":[{"given":"Miko\u0142aj","family":"Komisarek","sequence":"first","affiliation":[{"name":"ITTI Sp. z o.o., Poland and Bydgoszcz University of Science and Technology, Poland"}]},{"given":"Marek","family":"Pawlicki","sequence":"additional","affiliation":[{"name":"ITTI Sp. z o.o., Poland and Bydgoszcz University of Science and Technology, Poland"}]},{"given":"Maria-Elena","family":"Mihailescu","sequence":"additional","affiliation":[{"name":"University Politehnica of Bucharest, Romania"}]},{"given":"Darius","family":"Mihai","sequence":"additional","affiliation":[{"name":"University Politehnica of Bucharest, Romania"}]},{"given":"Mihai","family":"Carabas","sequence":"additional","affiliation":[{"name":"University Politehnica of Bucharest, Romania"}]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[{"name":"ITTI Sp. z o.o, Poland and Bydgoszcz University of Science and Technology, Poland"}]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[{"name":"FernUniversit\u00e4t in Hagen, Germany and Bydgoszcz University of Science and Technology, Poland"}]}],"member":"320","published-online":{"date-parts":[[2022,8,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10232919"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","unstructured":"G\u00e9rard Biau. 2010. Analysis of a Random Forests Model. https:\/\/doi.org\/10.48550\/ARXIV.1005.0208","DOI":"10.48550\/ARXIV.1005.0208"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"e_1_3_2_1_4_1","unstructured":"Dylan Chou and Meng Jiang. 2020. Data-Driven Network Intrusion Detection: A Taxonomy of Challenges and Methods. CoRR abs\/2009.07352(2020) \u2013. arXiv:2009.07352https:\/\/arxiv.org\/abs\/2009.07352"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9050800"},{"key":"e_1_3_2_1_6_1","volume-title":"TERENA Networking Conference. NET SpA","author":"Deri Luca","year":"2003","unstructured":"Luca Deri and NETikos SpA. 2003. nProbe: an open source netflow probe for gigabit networks. In TERENA Networking Conference. NET SpA, Pisa, Italy, 1\u20134."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","unstructured":"S. Garc\u00eda M. Grill J. Stiborek and A. Zunino. 2014. An Empirical Comparison of Botnet Detection Methods. Comput. Secur. 45 (Sept. 2014) 100\u2013123. https:\/\/doi.org\/10.1016\/j.cose.2014.05.011","DOI":"10.1016\/j.cose.2014.05.011"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599738"},{"key":"e_1_3_2_1_9_1","first-page":"3","article-title":"Machine Learning Based Approach to Anomaly and Cyberattack Detection in Streamed Network Traffic Data.J","volume":"12","author":"Komisarek Mikolaj","year":"2021","unstructured":"Mikolaj Komisarek, Marek Pawlicki, Rafal Kozik, and Michal Choras. 2021. Machine Learning Based Approach to Anomaly and Cyberattack Detection in Streamed Network Traffic Data.J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12, 1(2021), 3\u201319.","journal-title":"Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.3390\/e23111532"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-021-00980-2"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Rafa\u0142 Kozik Marek Pawlicki Micha\u0142 Chora\u015b and Witold Pedrycz. 2019. Practical employment of granular computing to complex application layer cyberattack detection. Complexity 2019(2019).","DOI":"10.1155\/2019\/5826737"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3129775"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1155\/2020"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21134319"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.20"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2020.3031848"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.06.002"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSIT48917.2020.9214160"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITSIM.2008.4632080"},{"key":"e_1_3_2_1_23_1","unstructured":"Emma Roth. 2022. Microsoft seized Russian domains targeting Ukrainian media organizations. https:\/\/www.theverge.com\/2022\/4\/9\/23018258\/microsoft-control-russian-domains-ukraine-war-cyberattack-fancy-bear-apt28-strontium"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2019.8888419"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795376"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49032.2021.9369654"},{"key":"e_1_3_2_1_27_1","unstructured":"welivesecurity. 2022. Industroyer2: Industroyer Reloaded. https:\/\/www.welivesecurity.com\/2022\/04\/12\/industroyer2-industroyer-reloaded\/"},{"key":"e_1_3_2_1_28_1","volume-title":"Multivariate Metrics of Normal and Anomalous Network Behaviors. In 2019 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM). IEEE","author":"Ye Nong","year":"2019","unstructured":"Nong Ye, Douglas Montgomery, Kevin Mills, and Mark Carson. 2019. Multivariate Metrics of Normal and Anomalous Network Behaviors. In 2019 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM). IEEE, Arlington, VA, USA, 55\u201358."},{"key":"e_1_3_2_1_29_1","unstructured":"Mahdi Zamani. 2013. Machine Learning Techniques for Intrusion Detection. CoRR abs\/1312.2177(2013). arXiv:1312.2177http:\/\/arxiv.org\/abs\/1312.2177"}],"event":{"name":"ARES 2022: The 17th International Conference on Availability, Reliability and Security","location":"Vienna Austria","acronym":"ARES 2022"},"container-title":["Proceedings of the 17th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3538969.3544486","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3538969.3544486","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:59:58Z","timestamp":1750186798000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3538969.3544486"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,23]]},"references-count":29,"alternative-id":["10.1145\/3538969.3544486","10.1145\/3538969"],"URL":"https:\/\/doi.org\/10.1145\/3538969.3544486","relation":{},"subject":[],"published":{"date-parts":[[2022,8,23]]},"assertion":[{"value":"2022-08-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}