{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T09:23:58Z","timestamp":1762161838098,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T00:00:00Z","timestamp":1693267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100010662","name":"H2020 Security","doi-asserted-by":"publisher","award":["101021981"],"award-info":[{"award-number":["101021981"]}],"id":[{"id":"10.13039\/100010662","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,29]]},"DOI":"10.1145\/3600160.3605094","type":"proceedings-article","created":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T22:54:41Z","timestamp":1691621681000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Modern NetFlow network dataset with labeled attacks and detection methods"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1459-2695","authenticated-orcid":false,"given":"Miko\u0142aj","family":"Komisarek","sequence":"first","affiliation":[{"name":"ITTI Sp. z o.o., Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5881-6406","authenticated-orcid":false,"given":"Marek","family":"Pawlicki","sequence":"additional","affiliation":[{"name":"ITTI Sp. z o.o., Poland and Institute of Telecommunications, Bydgoszcz University of Science and Technology, Poland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-9903-8614","authenticated-orcid":false,"given":"Tomi","family":"Simic","sequence":"additional","affiliation":[{"name":"Telprom, informacijske tehnologije d.o.o., Slovenia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9620-2042","authenticated-orcid":false,"given":"David","family":"Kavcnik","sequence":"additional","affiliation":[{"name":"Telprom, informacijske tehnologije d.o.o., Slovenia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7122-3306","authenticated-orcid":false,"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[{"name":"Institute of Telecommunications, Bydgoszcz University of Science and Technology, Poland and ITTI Sp. z o.o., Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1405-9911","authenticated-orcid":false,"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[{"name":"Institute of Telecommunications, Bydgoszcz University of Science and Technology, Poland and ITTI Sp. z o.o., Poland"}]}],"member":"320","published-online":{"date-parts":[[2023,8,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Cyber attacks and terrorism: A twenty-first century conundrum. Science and engineering ethics 25","author":"Albahar Marwan","year":"2019","unstructured":"Marwan Albahar. 2019. Cyber attacks and terrorism: A twenty-first century conundrum. Science and engineering ethics 25 (2019), 993\u20131006."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.3390\/s22166164"},{"key":"e_1_3_2_1_3_1","unstructured":"CNN Business. 2022. Ransomware attacks increase in frequency and severity. https:\/\/www.cnn.com\/2022\/03\/15\/tech\/ransomware-attacks-increase\/index.html"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20247294"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3048319"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9050800"},{"key":"e_1_3_2_1_7_1","volume-title":"TERENA Networking Conference. NET SpA","author":"Deri Luca","year":"2003","unstructured":"Luca Deri and NETikos SpA. 2003. nProbe: an open source netflow probe for gigabit networks. In TERENA Networking Conference. NET SpA, Pisa, Italy, 1\u20134."},{"key":"e_1_3_2_1_8_1","volume-title":"An empirical comparison of botnet detection methods. computers & security 45","author":"Garcia Sebastian","year":"2014","unstructured":"Sebastian Garcia, Martin Grill, Jan Stiborek, and Alejandro Zunino. 2014. An empirical comparison of botnet detection methods. computers & security 45 (2014), 100\u2013123."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","unstructured":"Sebastian Garcia Agustin Parmisano and Maria\u00a0Jose Erquiaga. 2020. IoT-23: A labeled dataset with malicious and benign IoT network traffic. https:\/\/doi.org\/10.5281\/zenodo.4743746 More details here https:\/\/www.stratosphereips.org \/datasets-iot23.","DOI":"10.5281\/zenodo.4743746"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599738"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-019-04319-2"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-014-5473-9"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","unstructured":"Hyunjae Kang Dong\u00a0Hyun Ahn Gyung\u00a0Min Lee Jeong\u00a0Do Yoo Kyung\u00a0Ho Park and Huy\u00a0Kang Kim. 2019. IoT network intrusion dataset. https:\/\/doi.org\/10.21227\/q70p-q449","DOI":"10.21227\/q70p-q449"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3409189"},{"key":"e_1_3_2_1_15_1","first-page":"3","article-title":"Machine Learning Based Approach to Anomaly and Cyberattack Detection in Streamed Network Traffic Data.J","volume":"12","author":"Komisarek Mikolaj","year":"2021","unstructured":"Mikolaj Komisarek, Marek Pawlicki, Rafal Kozik, and Michal Choras. 2021. Machine Learning Based Approach to Anomaly and Cyberattack Detection in Streamed Network Traffic Data.J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12, 1 (2021), 3\u201319.","journal-title":"Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl."},{"key":"e_1_3_2_1_16_1","volume-title":"How to Effectively Collect and Process Network Data for Intrusion Detection?Entropy 23, 11","author":"Komisarek Miko\u0142aj","year":"2021","unstructured":"Miko\u0142aj Komisarek, Marek Pawlicki, Rafa\u0142 Kozik, Witold Ho\u0142ubowicz, and Micha\u0142 Chora\u015b. 2021. How to Effectively Collect and Process Network Data for Intrusion Detection?Entropy 23, 11 (2021), 1532."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.11.004"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367731"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21134319"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21134319"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2871719"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.20"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.3390\/info12100405"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.06.002"},{"key":"e_1_3_2_1_25_1","unstructured":"Reuters. 2021. Cyberattacks targeting healthcare organizations on the rise. https:\/\/www.reuters.com\/technology\/cyberattacks-targeting-healthcare-organizations-rise-2021-09-22\/"},{"key":"e_1_3_2_1_26_1","unstructured":"Hannah Ritchie Edouard Mathieu Max Roser and Esteban Ortiz-Ospina. 2023. Our World in Data: Internet. https:\/\/ourworldindata.org\/internet."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITSIM.2008.4632080"},{"key":"e_1_3_2_1_28_1","volume-title":"Big Data Technologies and Applications: 10th EAI International Conference, BDTA","author":"Sarhan Mohanad","year":"2020","unstructured":"Mohanad Sarhan, Siamak Layeghy, Nour Moustafa, and Marius Portmann. 2021. Netflow datasets for machine learning-based network intrusion detection systems. In Big Data Technologies and Applications: 10th EAI International Conference, BDTA 2020, and 13th EAI International Conference on Wireless Internet, WiCON 2020, Virtual Event, December 11, 2020, Proceedings 10. Springer, ., 117\u2013135."},{"key":"e_1_3_2_1_29_1","volume-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization.ICISSp 1","author":"Sharafaldin Iman","year":"2018","unstructured":"Iman Sharafaldin, Arash\u00a0Habibi Lashkari, and Ali\u00a0A Ghorbani. 2018. Toward generating a new intrusion detection dataset and intrusion traffic characterization.ICISSp 1 (2018), 108\u2013116."},{"key":"e_1_3_2_1_30_1","volume-title":"Toward developing a systematic approach to generate benchmark datasets for intrusion detection. computers & security 31, 3","author":"Shiravi Ali","year":"2012","unstructured":"Ali Shiravi, Hadi Shiravi, Mahbod Tavallaee, and Ali\u00a0A Ghorbani. 2012. Toward developing a systematic approach to generate benchmark datasets for intrusion detection. computers & security 31, 3 (2012), 357\u2013374."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795376"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3528580.3532843"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"e_1_3_2_1_34_1","unstructured":"TechTarget. 2021. Advanced persistent threats: A growing concern for businesses. https:\/\/searchsecurity.techtarget.com\/feature\/Advanced-persistent-threats-A-growing-concern-for-businesses"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.3390\/app13074482"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1956"},{"key":"e_1_3_2_1_37_1","unstructured":"ZDNet. 2020. Hackers use social engineering to gain access to corporate networks. https:\/\/www.zdnet.com\/article\/hackers-use-social-engineering-to-gain-access-to-corporate-networks\/"}],"event":{"name":"ARES 2023: The 18th International Conference on Availability, Reliability and Security","acronym":"ARES 2023","location":"Benevento Italy"},"container-title":["Proceedings of the 18th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600160.3605094","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3600160.3605094","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:17Z","timestamp":1750182557000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600160.3605094"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,29]]},"references-count":37,"alternative-id":["10.1145\/3600160.3605094","10.1145\/3600160"],"URL":"https:\/\/doi.org\/10.1145\/3600160.3605094","relation":{},"subject":[],"published":{"date-parts":[[2023,8,29]]},"assertion":[{"value":"2023-08-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}