{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:08:58Z","timestamp":1750219738827,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T00:00:00Z","timestamp":1694736000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,9,15]]},"DOI":"10.1145\/3625343.3625346","type":"proceedings-article","created":{"date-parts":[[2023,11,11]],"date-time":"2023-11-11T11:09:02Z","timestamp":1699700942000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Efficient Scanning Activity Detection in IoT Networks Using Ensemble Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6255-236X","authenticated-orcid":false,"given":"Bashar","family":"Igried","sequence":"first","affiliation":[{"name":"Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology, The Hashemite University, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0319-1968","authenticated-orcid":false,"given":"Mohammad","family":"Alauthman","sequence":"additional","affiliation":[{"name":"Department of Information Security, University of Petra, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-7502-4668","authenticated-orcid":false,"given":"Mohammad","family":"AlKhaldy","sequence":"additional","affiliation":[{"name":"Department of Business Intelligence and Data Analytics, University of Petra, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9075-2828","authenticated-orcid":false,"given":"Ayoub","family":"Alsarhan","sequence":"additional","affiliation":[{"name":"Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology, The Hashemite University, Jordan"}]}],"member":"320","published-online":{"date-parts":[[2023,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"9","article-title":"Improved dropping attacks detecting system in 5g networks using machine learning and deep learning approaches","volume":"82","author":"Mughaid A.","year":"2023","unstructured":"Mughaid , A. , AlZu'bi , S. , Alnajjar , A. , AbuElsoud , E. , Salhi , S. E. , Igried , B. and Abualigah , L . Improved dropping attacks detecting system in 5g networks using machine learning and deep learning approaches . Multimedia Tools and Applications , 82 , 9 ( 2023 ), 13973-13995. Mughaid, A., AlZu'bi, S., Alnajjar, A., AbuElsoud, E., Salhi, S. E., Igried, B. and Abualigah, L. Improved dropping attacks detecting system in 5g networks using machine learning and deep learning approaches. Multimedia Tools and Applications, 82, 9 (2023), 13973-13995.","journal-title":"Multimedia Tools and Applications"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-52243-8_28"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi14080223"},{"key":"e_1_3_2_1_4_1","volume-title":"City","author":"Almseidin M.","year":"2019","unstructured":"Almseidin , M. , Al-Kasassbeh , M. and Kovacs , S . Detecting Slow Port Scan Using Fuzzy Rule Interpolation . City , 2019 . Almseidin, M., Al-Kasassbeh, M. and Kovacs, S. Detecting Slow Port Scan Using Fuzzy Rule Interpolation. City, 2019."},{"key":"e_1_3_2_1_5_1","first-page":"1","article-title":"-K. B. Risk and Vulnerability Analyses for the protection of Information for Future communication security Based Neural Networks","volume":"2","author":"Igried A.-K.","year":"2019","unstructured":"Igried , A.-K. , Takialddin , A.-S. and Igried , A . -K. B. Risk and Vulnerability Analyses for the protection of Information for Future communication security Based Neural Networks . Journal of Advanced Sciences and Engineering Technologies , 2 , 1 ( 2019 ), 31-39. Igried, A.-K., Takialddin, A.-S. and Igried, A.-K. B. Risk and Vulnerability Analyses for the protection of Information for Future communication security Based Neural Networks. Journal of Advanced Sciences and Engineering Technologies, 2, 1 (2019), 31-39.","journal-title":"Journal of Advanced Sciences and Engineering Technologies"},{"key":"e_1_3_2_1_6_1","first-page":"15","volume":"22","author":"Qabalin M. K.","year":"2022","unstructured":"Qabalin , M. K. , Naser , M. and Alkasassbeh , M. J . S. Android Spyware Detection Using Machine Learning: A Novel Dataset , 22 , 15 ( 2022 ), 5765. Qabalin, M. K., Naser, M. and Alkasassbeh, M. J. S. Android Spyware Detection Using Machine Learning: A Novel Dataset, 22, 15 (2022), 5765.","journal-title":"Android Spyware Detection Using Machine Learning: A Novel Dataset"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-020-00835-4"},{"key":"e_1_3_2_1_8_1","volume-title":"Implementing Cisco IOS Network Security (IINS 640-554) Foundation Learning Guide: Imp Cisco IOS Netw Sec F _c2","author":"Paquet C.","year":"2012","unstructured":"Paquet , C. Implementing Cisco IOS Network Security (IINS 640-554) Foundation Learning Guide: Imp Cisco IOS Netw Sec F _c2 . Cisco Press , 2012 . Paquet, C. Implementing Cisco IOS Network Security (IINS 640-554) Foundation Learning Guide: Imp Cisco IOS Netw Sec F _c2. Cisco Press, 2012."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11172741"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.3390\/app11125713"},{"key":"e_1_3_2_1_11_1","volume-title":"H. Semantics-aware detection of targeted attacks: a survey, 13, 1","author":"Luh R.","year":"2017","unstructured":"Luh , R. , Marschalek , S. , Kaiser , M. , Janicke , H. , Schrittwieser , S. J. J. o. C. V. and Techniques , H. Semantics-aware detection of targeted attacks: a survey, 13, 1 ( 2017 ), 47-85. Luh, R., Marschalek, S., Kaiser, M., Janicke, H., Schrittwieser, S. J. J. o. C. V. and Techniques, H. Semantics-aware detection of targeted attacks: a survey, 13, 1 (2017), 47-85."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi15010001"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi15010001"},{"key":"e_1_3_2_1_14_1","volume-title":"U. Botnet detection used fast-flux technique, based on adaptive dynamic evolving spiking neural network algorithm, 36, 1","author":"Almomani A.","year":"2021","unstructured":"Almomani , A. , Al-Nawasrah , A. , Alauthman , M. , Al-Betar , M. A. , Meziane , F. J. I. J. o. A. H. and Computing , U. Botnet detection used fast-flux technique, based on adaptive dynamic evolving spiking neural network algorithm, 36, 1 ( 2021 ), 50-65. Almomani, A., Al-Nawasrah, A., Alauthman, M., Al-Betar, M. A., Meziane, F. J. I. J. o. A. H. and Computing, U. Botnet detection used fast-flux technique, based on adaptive dynamic evolving spiking neural network algorithm, 36, 1 (2021), 50-65."},{"key":"e_1_3_2_1_15_1","volume-title":"991-1004","author":"Alauthaman M.","year":"2018","unstructured":"Alauthaman , M. , Aslam , N. , Zhang , L. , Alasem , R. , Hossain , M. A. J. N. C. and Applications A P2 P Botnet detection scheme based on decision tree and adaptive multilayer neural networks, 29, 11 ( 2018 ), 991-1004 . Alauthaman, M., Aslam, N., Zhang, L., Alasem, R., Hossain, M. A. J. N. C. and Applications A P2P Botnet detection scheme based on decision tree and adaptive multilayer neural networks, 29, 11 (2018), 991-1004."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2014.6779162"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"e_1_3_2_1_18_1","volume-title":"Towards deep-learning-driven intrusion detection for the internet of things, 19, 9","author":"Thamilarasu G.","year":"2019","unstructured":"Thamilarasu , G. and Chawla , S. J. S . Towards deep-learning-driven intrusion detection for the internet of things, 19, 9 ( 2019 ), 1977. Thamilarasu, G. and Chawla, S. J. S. Towards deep-learning-driven intrusion detection for the internet of things, 19, 9 (2019), 1977."},{"key":"e_1_3_2_1_19_1","volume-title":"o. H. S. N. An efficient approach to detect IoT botnet attacks using machine learning, 26, 3","author":"Alothman Z.","year":"2020","unstructured":"Alothman , Z. , Alkasassbeh , M. and Al-Haj Baddar , S. J. J. o. H. S. N. An efficient approach to detect IoT botnet attacks using machine learning, 26, 3 ( 2020 ), 241-254. Alothman, Z., Alkasassbeh, M. and Al-Haj Baddar, S. J. J. o. H. S. N. An efficient approach to detect IoT botnet attacks using machine learning, 26, 3 (2020), 241-254."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2011.5971980"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/UKIWCWS.2009.5749427"},{"key":"e_1_3_2_1_23_1","volume-title":"N-baiot\u2014network-based detection of iot botnet attacks using deep autoencoders, 17, 3","author":"Meidan Y.","year":"2018","unstructured":"Meidan , Y. , Bohadana , M. , Mathov , Y. , Mirsky , Y. , Shabtai , A. , Breitenbacher , D. and Elovici , Y. J. I. P. C. N-baiot\u2014network-based detection of iot botnet attacks using deep autoencoders, 17, 3 ( 2018 ), 12-22. Meidan, Y., Bohadana, M., Mathov, Y., Mirsky, Y., Shabtai, A., Breitenbacher, D. and Elovici, Y. J. I. P. C. N-baiot\u2014network-based detection of iot botnet attacks using deep autoencoders, 17, 3 (2018), 12-22."},{"key":"e_1_3_2_1_24_1","volume-title":"Using data mining algorithms for developing a model for intrusion detection system (IDS), 61","author":"Duque S.","year":"2015","unstructured":"Duque , S. and bin Omar , M. N. J. P. C. S. Using data mining algorithms for developing a model for intrusion detection system (IDS), 61 ( 2015 ), 46-51. Duque, S. and bin Omar, M. N. J. P. C. S. Using data mining algorithms for developing a model for intrusion detection system (IDS), 61 (2015), 46-51."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.30534\/ijeter\/2020\/83852020"},{"key":"e_1_3_2_1_26_1","volume-title":"Classification of Virtual Private networks encrypted traffic using ensemble learning algorithms. Egyptian Informatics Journal (2022\/07\/25\/","author":"Almomani A.","year":"2022","unstructured":"Almomani , A. Classification of Virtual Private networks encrypted traffic using ensemble learning algorithms. Egyptian Informatics Journal (2022\/07\/25\/ 2022 ). Almomani, A. Classification of Virtual Private networks encrypted traffic using ensemble learning algorithms. Egyptian Informatics Journal (2022\/07\/25\/ 2022)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJAIP.2020.104108"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10247-4"},{"key":"e_1_3_2_1_29_1","volume-title":"o. A. i. S. Data quality considerations for big data and machine learning: Going beyond data cleaning and transformations, 10, 1","author":"Gudivada V.","year":"2017","unstructured":"Gudivada , V. , Apon , A. and Ding , J. J. I. J. o. A. i. S. Data quality considerations for big data and machine learning: Going beyond data cleaning and transformations, 10, 1 ( 2017 ), 1-20. Gudivada, V., Apon, A. and Ding, J. J. I. J. o. A. i. S. Data quality considerations for big data and machine learning: Going beyond data cleaning and transformations, 10, 1 (2017), 1-20."},{"key":"e_1_3_2_1_30_1","volume-title":"City","author":"Ullah I.","year":"2020","unstructured":"Ullah , I. and Mahmoud , Q. H . A Technique for Generating a Botnet Dataset for Anomalous Activity Detection in IoT Networks . City , 2020 . Ullah, I. and Mahmoud, Q. H. A Technique for Generating a Botnet Dataset for Anomalous Activity Detection in IoT Networks. City, 2020."}],"event":{"name":"AIMLR 2023: 2023 Asia Conference on Artificial Intelligence, Machine Learning and Robotics","acronym":"AIMLR 2023","location":"Bangkok Thailand"},"container-title":["Proceedings of the 2023 Asia Conference on Artificial Intelligence, Machine Learning and Robotics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3625343.3625346","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3625343.3625346","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:33Z","timestamp":1750178193000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3625343.3625346"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,15]]},"references-count":30,"alternative-id":["10.1145\/3625343.3625346","10.1145\/3625343"],"URL":"https:\/\/doi.org\/10.1145\/3625343.3625346","relation":{},"subject":[],"published":{"date-parts":[[2023,9,15]]},"assertion":[{"value":"2023-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}