{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T23:59:06Z","timestamp":1772582346247,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T00:00:00Z","timestamp":1697414400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["101021911"],"award-info":[{"award-number":["101021911"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Department of Education, Universities and Research of the Basque Government","award":["IT1676-22"],"award-info":[{"award-number":["IT1676-22"]}]},{"name":"Department of Economic Development, Sustainability and Environment of the Basque Government","award":["KK-2023\/00085"],"award-info":[{"award-number":["KK-2023\/00085"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,16]]},"DOI":"10.1145\/3607199.3607234","type":"proceedings-article","created":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T22:30:51Z","timestamp":1696372251000},"page":"346-365","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Federated Explainability for Network Anomaly Characterization"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0277-4432","authenticated-orcid":false,"given":"Xabier","family":"S\u00e1ez-de-C\u00e1mara","sequence":"first","affiliation":[{"name":"Ikerlan Technology Research Centre, Basque Research and Technology Alliance (BRTA), Spain and Mondragon Unibertsitatea, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5555-9712","authenticated-orcid":false,"given":"Jose Luis","family":"Flores","sequence":"additional","affiliation":[{"name":"Ikerlan Technology Research Centre, Basque Research and Technology Alliance (BRTA), Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7878-3306","authenticated-orcid":false,"given":"Crist\u00f3bal","family":"Arellano","sequence":"additional","affiliation":[{"name":"Ikerlan Technology Research Centre, Basque Research and Technology Alliance (BRTA), Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5836-4198","authenticated-orcid":false,"given":"Aitor","family":"Urbieta","sequence":"additional","affiliation":[{"name":"Ikerlan Technology Research Centre, Basque Research and Technology Alliance (BRTA), Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3720-6048","authenticated-orcid":false,"given":"Urko","family":"Zurutuza","sequence":"additional","affiliation":[{"name":"Mondragon Unibertsitatea, Spain"}]}],"member":"320","published-online":{"date-parts":[[2023,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533168"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474369.3486864"},{"key":"e_1_3_2_1_3_1","volume-title":"Understanding the Mirai Botnet. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Antonakakis Manos","year":"2017","unstructured":"Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J.\u00a0Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, and Yi Zhou. 2017. Understanding the Mirai Botnet. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC, 1093\u20131110."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115736"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3203249"},{"key":"e_1_3_2_1_6_1","volume-title":"Dos and Don\u2019ts of Machine Learning in Computer Security. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Arp Daniel","year":"2022","unstructured":"Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, and Konrad Rieck. 2022. Dos and Don\u2019ts of Machine Learning in Computer Security. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 3971\u20133988."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the Twenty Third International Conference on Artificial Intelligence and Statistics(Proceedings of Machine Learning Research, Vol.\u00a0108)","author":"Bagdasaryan Eugene","year":"2020","unstructured":"Eugene Bagdasaryan, Andreas Veit, Yiqing Hua, Deborah Estrin, and Vitaly Shmatikov. 2020. How To Backdoor Federated Learning. In Proceedings of the Twenty Third International Conference on Artificial Intelligence and Statistics(Proceedings of Machine Learning Research, Vol.\u00a0108), Silvia Chiappa and Roberto Calandra (Eds.). PMLR, Online, 2938\u20132948. https:\/\/proceedings.mlr.press\/v108\/bagdasaryan20a.html"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2022.3186589"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.3390\/info10040122"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 38th International Conference on Machine Learning(Proceedings of Machine Learning Research, Vol.\u00a0139)","author":"Dennis Don\u00a0Kurian","year":"2021","unstructured":"Don\u00a0Kurian Dennis, Tian Li, and Virginia Smith. 2021. Heterogeneity for the Win: One-Shot Federated Clustering. In Proceedings of the 38th International Conference on Machine Learning(Proceedings of Machine Learning Research, Vol.\u00a0139), Marina Meila and Tong Zhang (Eds.). PMLR, Online, 2611\u20132620. https:\/\/proceedings.mlr.press\/v139\/dennis21a.html"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00009"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","unstructured":"Benjamin Feinstein David Curry and Herve Debar. 2007. The Intrusion Detection Message Exchange Format (IDMEF). RFC 4765. https:\/\/doi.org\/10.17487\/RFC4765","DOI":"10.17487\/RFC4765"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102419"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243792"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-022-03435-1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3173288"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Peter Kairouz H.\u00a0Brendan McMahan Brendan Avent Aur\u00e9lien Bellet Mehdi Bennis Arjun\u00a0Nitin Bhagoji Keith Bonawitz Zachary Charles Graham Cormode Rachel Cummings Rafael G.\u00a0L. D\u2019Oliveira Salim\u00a0El Rouayheb David Evans Josh Gardner Zachary Garrett Adri\u00e0 Gasc\u00f3n Badih Ghazi Phillip\u00a0B. Gibbons Marco Gruteser Za\u00efd Harchaoui Chaoyang He Lie He Zhouyuan Huo Ben Hutchinson Justin Hsu Martin Jaggi Tara Javidi Gauri Joshi Mikhail Khodak Jakub Kone\u010dn\u00fd Aleksandra Korolova Farinaz Koushanfar Sanmi Koyejo Tancr\u00e8de Lepoint Yang Liu Prateek Mittal Mehryar Mohri Richard Nock Ayfer \u00d6zg\u00fcr Rasmus Pagh Mariana Raykova Hang Qi Daniel Ramage Ramesh Raskar Dawn Song Weikang Song Sebastian\u00a0U. Stich Ziteng Sun Ananda\u00a0Theertha Suresh Florian Tram\u00e8r Praneeth Vepakomma Jianyu Wang Li Xiong Zheng Xu Qiang Yang Felix\u00a0X. Yu Han Yu and Sen Zhao. 2021. Advances and Open Problems in Federated Learning. arxiv:1912.04977\u00a0[cs.LG]","DOI":"10.1561\/9781680837896"},{"key":"e_1_3_2_1_19_1","volume-title":"Federated Learning: Strategies for Improving Communication Efficiency. arxiv:1610.05492\u00a0[cs.LG]","author":"Kone\u010dn\u00fd Jakub","year":"2017","unstructured":"Jakub Kone\u010dn\u00fd, H.\u00a0Brendan McMahan, Felix\u00a0X. Yu, Peter Richt\u00e1rik, Ananda\u00a0Theertha Suresh, and Dave Bacon. 2017. Federated Learning: Strategies for Improving Communication Efficiency. arxiv:1610.05492\u00a0[cs.LG]"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-021-09606-8"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPCCC55026.2022.9894328"},{"key":"e_1_3_2_1_22_1","unstructured":"Scott\u00a0M Lundberg 2017. SHAP. A game theoretic approach to explain the output of any machine learning model.https:\/\/github.com\/slundberg\/shap Accessed 2023\/02\/14."},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems","author":"M.","unstructured":"Scott\u00a0M. Lundberg and Su-In Lee. 2017. A Unified Approach to Interpreting Model Predictions. In Proceedings of the 31st International Conference on Neural Information Processing Systems (Long Beach, California, USA) (NIPS\u201917). Curran Associates Inc., Red Hook, NY, USA, 4768\u20134777."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3216981"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367731"},{"key":"e_1_3_2_1_26_1","volume-title":"Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. In 25th Annual Network and Distributed System Security Symposium, NDSS","author":"Mirsky Yisroel","year":"2018","unstructured":"Yisroel Mirsky, Tomer Doitshman, Yuval Elovici, and Asaf Shabtai. 2018. Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018. The Internet Society, Reston, VA, USA, 15\u00a0pages."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Azqa Nadeem Dani\u00ebl Vos Clinton Cao Luca Pajola Simon Dieck Robert Baumgartner and Sicco Verwer. 2023. SoK: Explainable Machine Learning for Computer Security Applications. arxiv:2208.10605\u00a0[cs.CR]","DOI":"10.1109\/EuroSP57164.2023.00022"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2910750"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3216617"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2019.8802833"},{"key":"e_1_3_2_1_31_1","unstructured":"Phenomite. 2019. AMP-Research. Research on exotic UDP\/TCP amplification vectors payloads and mitigations. https:\/\/github.com\/Phenomite\/AMP-Research"},{"key":"e_1_3_2_1_32_1","unstructured":"Dattaraj Rao and Shraddha Mane. 2021. Zero-shot learning approach to adaptive Cybersecurity using Explainable AI. arxiv:2106.14647\u00a0[cs.CR]"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2021.3133764"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3055937"},{"key":"e_1_3_2_1_36_1","unstructured":"Xabier S\u00e1ez-de-C\u00e1mara. 2023. Source code repository for: Federated Explainability for Network Anomaly Characterization. https:\/\/github.com\/xsaga\/federated-xai-anomalies Accessed 2023\/06\/27."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103299"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3247166"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3160699"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2988359"},{"key":"e_1_3_2_1_41_1","unstructured":"Han Yuan Mingxuan Liu Lican Kang Chenkui Miao and Ying Wu. 2023. An empirical study of the effect of background data size on the stability of SHapley Additive exPlanations (SHAP) for deep learning models. arxiv:2204.11351\u00a0[cs.LG]"}],"event":{"name":"RAID 2023: The 26th International Symposium on Research in Attacks, Intrusions and Defenses","location":"Hong Kong China","acronym":"RAID 2023"},"container-title":["Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607199.3607234","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607199.3607234","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:35Z","timestamp":1750178255000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607199.3607234"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":41,"alternative-id":["10.1145\/3607199.3607234","10.1145\/3607199"],"URL":"https:\/\/doi.org\/10.1145\/3607199.3607234","relation":{},"subject":[],"published":{"date-parts":[[2023,10,16]]},"assertion":[{"value":"2023-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}