<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Real-Time Intrusion Detection via Machine Learning Approaches</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Erik</forename><surname>Murtaj</surname></persName>
							<email>erik.murtaj@studenti.unicam.it</email>
							<affiliation key="aff0">
								<orgName type="department">School of Science and Technology</orgName>
								<orgName type="institution">University of Camerino</orgName>
								<address>
									<addrLine>Via Madonna delle Carceri, 9</addrLine>
									<postCode>62032</postCode>
									<settlement>Camerino</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Fausto</forename><surname>Marcantoni</surname></persName>
							<email>fausto.marcantoni@unicam.it</email>
							<affiliation key="aff0">
								<orgName type="department">School of Science and Technology</orgName>
								<orgName type="institution">University of Camerino</orgName>
								<address>
									<addrLine>Via Madonna delle Carceri, 9</addrLine>
									<postCode>62032</postCode>
									<settlement>Camerino</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Michele</forename><surname>Loreti</surname></persName>
							<email>michele.loreti@unicam.it</email>
							<affiliation key="aff0">
								<orgName type="department">School of Science and Technology</orgName>
								<orgName type="institution">University of Camerino</orgName>
								<address>
									<addrLine>Via Madonna delle Carceri, 9</addrLine>
									<postCode>62032</postCode>
									<settlement>Camerino</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Michela</forename><surname>Quadrini</surname></persName>
							<email>michela.quadrini@unicam.it</email>
							<affiliation key="aff0">
								<orgName type="department">School of Science and Technology</orgName>
								<orgName type="institution">University of Camerino</orgName>
								<address>
									<addrLine>Via Madonna delle Carceri, 9</addrLine>
									<postCode>62032</postCode>
									<settlement>Camerino</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Hans-Friedrich</forename><surname>Witschel</surname></persName>
							<email>hansfriedrich.witschel@fhnw.ch</email>
							<affiliation key="aff1">
								<orgName type="institution" key="instit1">FHNW University of Applied Sciences</orgName>
								<orgName type="institution" key="instit2">Arts Northwestern Switzerland</orgName>
								<address>
									<addrLine>Riggenbachstrasse 16</addrLine>
									<postCode>CH-4600</postCode>
									<settlement>Olten</settlement>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Real-Time Intrusion Detection via Machine Learning Approaches</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">E200A8834C28D7DABEE237E32A2D2FAC</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T16:55+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Random Forest, Feature Selection, analysis of Real-Time network traffic, Intrusion Detection Systems (H. Witschel) 0000-0002-7779-203X (F. Marcantoni)</term>
					<term>0000-0003-3061-863X (M. Loreti)</term>
					<term>0000-0003-0539-0290 (M. Quadrini)</term>
					<term>0000-0002-8608-9039 (H. Witschel)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In many cybersecurity contexts, the real-time detections of hostile actions play a fundamental role in protecting network infrastructures. In this scenario, Intrusion Detection Systems (IDS), based on signature-based or anomaly detection, are widely used to analyze network traffic. The signature-based detection relies on databases of known attack signatures, and anomaly detection is mainly based on Artificial Intelligence (AI) techniques. The latter is promising to detect new kinds of cyberattacks in real time.</p><p>In this work, we propose ReTiNA-IDS, a framework that integrates the CICFlowmeter tool with Machine Learning techniques to analyze Real-Time network traffic patterns and detect abnormalities that may suggest a possible intrusion. The considered machine learning techniques, random forest and multi-layer network, are based on selected features to enhance efficiency and scalability. To select the features and train the models, we use a version of the public dataset, CSECICI-IDS2018. The framework's effectiveness has been tested in real-case scenarios by identifying different forms of intrusion. Analyzing the results, we conclude that the proposed solution shows valuable features.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Intrusion Detection Systems (IDS) are relevant tools employed in cybersecurity to protect networks from possible cyber attacks.</p><p>In recent years, the world of cyber security has become more turbulent, with a rise in the number of cyber-attacks that target businesses worldwide. For this reason, always new methodologies are needed to shield vital assets from hostile actors in reaction to this expanding danger.</p><p>Recently, an increasing focus on the use of Artificial Intelligence (AI) in cyber security. As a subset of artificial intelligence, machine learning algorithms can improve danger detection and automate procedures. Organizations may examine massive volumes of data in real-time, spot patterns suggestive of malicious behaviour, and take preemptive measures to reduce risks by utilizing machine learning algorithms.</p><p>In this work, we propose ReTiNA-IDS, a framework that integrates the CICFlowmeter tool with Machine Learning techniques to analyze real-time network traffic patterns and detect abnormalities that may suggest a possible intrusion. The integrated methodology, which is based on random forest and multi-layer networks, is based on selected features to enhance efficiency and scalability. To select the features and train the models, the public dataset CSECICI-IDS2018 has been used. The framework's effectiveness has been tested in real-case scenarios by identifying different forms of intrusion. Analyzing the results, we conclude that the proposed solution shows valuable features. The paper is structured as follows. In Section 2 related works are discussed while in Section 3 some basic background is introduced. In Section 4 the tool ReTiNa-IDS is presented, while in Section 5 some evaluation experiments are proposed. Section 6 concludes the paper.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related Works</head><p>The use of machine learning approaches in intrusion detection systems to obtain real-time analysis has been exploited by many researchers. Many of them take advantage of Deep Learning (DL) approaches. ARCADE is an unsupervised DL-based approach for early anomaly detection using 1D Convolutional Neural Networks (CNNs) proposed by Lunardi et al. <ref type="bibr" target="#b0">[1]</ref>. The approach builds a profile of normal traffic based on raw packet bytes. Kathareios et al. designed and tested a real-time net-work AD system, able to operate on encrypted and nonencrypted network packets, based on two learning stages: an autoencoder for adaptive unsupervised AD and a custom nearest-neighbour classifier to filter false positives <ref type="bibr" target="#b1">[2]</ref>. Shuai proposed a prototype that combines big data processing frameworks like Apache Hadoop, Apache Kafka, and Apache Storm, along with ML techniques, i.e., Naïve Bayesian (NB), Support Vector Machine (SVM), and Decision Tree (DT). The proposed approach considers six features related to the IP addresses of the sender, receiver, and correspondent port without taking into account flow measurements. Ho et al. suggested an Intrusion Detection System (IDS) based on CNN that classifies all packet traffic as benign or malicious, detecting network intrusions <ref type="bibr" target="#b2">[3]</ref>. Atefnia and Ahmadi proposed a modular deep neural network model that consists of four complete architectures that are combined with an aggregator module, each generating distinct outputs <ref type="bibr" target="#b3">[4]</ref>. The four architectures are a Deep Feed-Forward Module (DFFM), a Stacked Restricted Boltzmann Machine Module (SRBMM), and two recurrent modules, one utilizing gated recurrent units (GRUM) and the other utilizing long short-term memory (LSTMM). Catillo et al. <ref type="bibr" target="#b4">[5]</ref> proposed an approach based on Deep Autoencoder, and Fitni and Ramli <ref type="bibr" target="#b5">[6]</ref> proposed a model based on decision trees that takes into account 23 features selected by Spearman's rank correlation coefficient <ref type="bibr" target="#b6">[7]</ref>. Gamage and Samarabandu considered four DL architectures, i.e., feed-forward neural network, autoencoder, deep belief network, and LSTM <ref type="bibr" target="#b7">[8]</ref>. Karatas et al. in <ref type="bibr" target="#b8">[9]</ref> reviewed the implementation of a Synthetic Minority Oversampling Technique (SMOTE) <ref type="bibr" target="#b9">[10]</ref> to balance the data by exploiting six models. Kanimozhi and Jacob presented a two-layer MLP to detect only botnet attacks that exploit a grid search for hyper-parameter optimization and a 10-fold cross-validation for mitigating the overfitting problems <ref type="bibr" target="#b10">[11]</ref>. Huancayo Ramos et al. extended this approach by considering botnet data and Random Forests. Kim et al. also designed a model that exploits CNN for training on a single type of attack, specifically Denial of Service (DoS) attacks <ref type="bibr" target="#b11">[12]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Background</head><p>In this section, we present the CICFlowMeter, an Ethernet traffic Bi-flow generator and analyzer for anomaly detection, and the Random Forest, a machine learning method used for classifying flow data and evaluating the importance of features. This classifier will then be integrated into CICFlowMeter for classifying network flows.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">CICFlowMeter</head><p>CICFlowmeter is a network traffic flow generator and analyser <ref type="bibr" target="#b12">[13,</ref><ref type="bibr" target="#b13">14]</ref>. It generates bidirectional flows, where the first packet determines the forward (source to destination) and backward (destination to source) directions. The tool enables the extraction of more than 80 statistical network traffic features such as Duration, Number of packets, Number of bytes, Length of packets, etc. Such features can be calculated independently for both directions. The tool is developed in JAVA and provides a useful Graphical User Interface, shown in Figure <ref type="figure">1</ref> to monitor network flows in real-time. TCP flows are usually terminated upon connection teardown (by FINpacket), while a flow timeout terminates UDP flows <ref type="bibr" target="#b14">[15]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 1: Example of the CICFlowmeter's GUI</head><p>The tool is developed in JAVA and provides a useful GUI (Graphical User Interface) to monitor network flows in real time.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Machine Learning Approaches and Feature Selection</head><p>The Random Forest is an ML ensemble model used for both classification and regression tasks. During training, the model creates numerous decision trees and determines the output class by either the mode (for classification) or the mean/average prediction (for regression) of the classes predicted by individual trees. Introduced by Breiman in <ref type="bibr" target="#b15">[16]</ref>, this approach combines the bagging technique with the random selection of features. Such a random selection ensures that the decision trees within the forest are uncorrelated. In the bagging phase, decision trees are constructed from bootstrap samples of the training dataset, where each sample is drawn with replacement, allowing for the possibility of repeated samples. These replicated datasets are then used to train decision trees, ensuring that each tree only sees different portions of the original dataset during training. This bagging approach is coupled with random feature selection, which involves using distinct random subsets of the entire feature space to train each tree in the random forest. Usually, around √ 𝑛 features are employed in each split for a classification task that considers ′ 𝑛 ′ features.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.">Dataset: CSE-CIC-IDS2018</head><p>The data used in this study is the CSE-CIC-IDS2018, a benchmark dataset for the evaluation of IDSs. Such data was collected by the Communications Security Establishment (CSE) and the Canadian Institute for Cybersecurity (CIC). The recorded data consists of ten days of traffic and includes seven types of attacks. Liu et al. identified some issues in such dataset related to the creation lifecycle, including attack orchestration, feature generation, documentation, and labelling and provided to reconstruct the datasets by deleting artefacts and corrected labelling logic, including corrected implementations of existing features and new features that capture valuable flow state information <ref type="bibr" target="#b16">[17]</ref>. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4.">Metrics</head><p>We evaluate the performance and effectiveness of the approaches by using Precision (𝑃 ), Recall (𝑅) and , defined as follows</p><formula xml:id="formula_0">𝑃 = 𝑇 𝑃 𝑇 𝑃 + 𝐹 𝑃 𝑅 = 𝑇 𝑃 𝑇 𝑃 + 𝐹 𝑁 𝐹1 = 2 𝑃 • 𝑄 𝑃 + 𝑄</formula><p>where 𝑇 𝑃 represents the number of true positive, 𝐹 𝑁 denotes the number of false negative, 𝐹 𝑃 represents the number of false positive, 𝑇 𝑁 denotes the number of true negative.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 2</head><p>The first 13 attributes ordered by importance </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">ReTiNA-IDS Approach</head><p>ReTiNA-IDS, Real-Time anomaly Detection IDS Approach, integrates a ML model mainly based on Random Forest in the CICFlowMeter tool to detect Real-Time cyber-attacks and act as a simple IDS. The Random Forest classifier considers only 13 of the 80 features calculated by the CICFlowMeter tool. The list of features with the relative description, selected by another Random Forest model, is in Table <ref type="table">2</ref>. After being trained, the model has been exported in a pmml format with the use of the "sklearn-pmml-model" library from Sklearn <ref type="bibr" target="#b17">[18]</ref>. The exported model is then imported into CICFlowMeter, which is developed in Java.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">ML Pipeline</head><p>The proposed approach is based on Random Forest, described in Section 3.2, and its scheme is shown in Figure <ref type="figure" target="#fig_0">2</ref>. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.1.">Data Preprocessing</head><p>In this study, the used dataset is a revised version of CSE-CIC-IDS2018, as introduced in Section 3.3. The dataset consists of the network traffic captured on ten days, stored in 10 distinct files according to the day of data capture, as shown in Table <ref type="table" target="#tab_2">3</ref>. The first step of the preprocessing consists of data cleaning, i.e., removing missing values, such as incomplete rows, and containing invalid (or infinite) numerical values. Moreover, many non-relevant features for spotting cyber-attacks have been eliminated, such as the IP address of the sender and receiver, the connection timestamp, the protocol type, and the destination/sender port. Furthermore, the traffic data related to Web Attacks is deleted since its volume is insufficient.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.2.">Data Balancing and Data Augmentation</head><p>The collected data related to network traffic is substantially unbalanced: benign traffic is more prevalent than malicious traffic. To balance the data, we have used the one step of the bootstrapping procedure, implemented in the resample function of Sklearn. Due to the corrupted data on the original dataset, it does not contain data related to FTP Brute Force attacks. Therefore, we have added this kind of data by collecting such data during a simulation of brute force attacks via FTP (File Transfer Protocol). The simulation involved the use of a Windows host (victim machine) and a Kali-Linux host (attacker machine), both in the same local area network (connected to the same router). The victim machine runs a FileZilla server, an open-source software utility that facilitates the transmission of files using the File FTP. It enables users to establish their own FTP servers or connect to existing FTP servers to exchange data, and the victim machine accepts connections on port 21, used to attack. When the FileZilla server on the victim machine is running, the Kali Linux host performs a brute-force attack using Patator, a multi-purpose brute-forcer tool <ref type="bibr" target="#b18">[19]</ref>. Table <ref type="table" target="#tab_3">4</ref> shows the amount of data and the relative kind of attack, after the cleaning and balancing phases.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.3.">Feature Selection and Classifier</head><p>To select the features, a Random Forest has been considered and implemented by setting up the depth of each decision tree and number of estimators to 16 and 20,  respectively. To avoid eventually issue related to overfitting, we consider the cross-validation with 5-fold. Figure <ref type="figure" target="#fig_1">3</ref> shows the obtained confusion matrix. The performance of the model, evaluated in terms of Precision, Recall and 𝐹1-score, is shown in the Table <ref type="table" target="#tab_4">5</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Experimental Setup</head><p>The ML models have been implemented in a Google Colab document with Python 3. The default CPU in the environment is an Intel Xeon CPU equipped with 2 virtual CPUs (vCPUs) and 13GB of RAM <ref type="bibr" target="#b19">[20]</ref>. For this study, the configuration involved the utilization of extra RAM, resulting in a total memory capacity of 50GB (included with Google Colab Pro <ref type="bibr" target="#b19">[20]</ref>).</p><p>For data handling, preprocessing, analysis, training, and evaluation metrics, the recommended model was built and evaluated using Numpy <ref type="bibr" target="#b20">[21]</ref>, Pandas <ref type="bibr" target="#b21">[22]</ref>, and Scikit Learn <ref type="bibr" target="#b22">[23]</ref>. Matplotlib <ref type="bibr" target="#b23">[24]</ref> were used to visualize the data. The testing phase for this study used a Windows operating system for the with the following specifications: an Intel Core i5-4670 CPU at 3.40GHz, 16 GB of DDR4 memory and a Nvidia GTX 1050 Ti GPU.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1.">Testing</head><p>Retina-IDS, a tool that integrates an ML model into CI-CFlowMeter, analyzes data patterns and distinguishes benign traffic from malicious traffic. The testing phase of ReTiNA-IDS intends to assess the efficiency and efficacy of the machine learning model in real-world network situations. We take advantage of the Graphical Network Simulator-3 (GNS3) software, an open-source network simulation tool used for creating, modelling, and testing virtual and real networks <ref type="bibr" target="#b24">[25]</ref>, to perform the simulations. To reach the aim, we create a simple network composed of a Cisco router <ref type="bibr" target="#b25">[26]</ref> and two generic switches, outlining two different areas of a hypothetical Local Area Network (LAN), a Windows machine and a Kali Linux machine. Figure <ref type="figure" target="#fig_2">4shows</ref> the network infrastructure. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusion and Future Work</head><p>In this work, we have presented ReTiNA-IDS, a tool that integrates an ML model into CICFlowMeter, which analyzes data patterns and distinguishes benign traffic from malicious traffic in real-time. The ML model is based on a Random Forest, used to select features and to classify the data. The testing phase, performed by running the tool in a normal traffic situation (without performing any cyberattack) in a local network and the University of Camerino's network, shows that the tool does not identify false positives.</p><p>In the near future, we intend to test the approach in botnet traffic to investigate the performance of the ReTiNA-IDS. To reach this aim, we intend to create a central server to control potentially infected hosts. Moreover, we have planned to consider other machine learning models, both supervised and unsupervised. Moreover, motivated by the results obtained for modelling and verifying properties of Collective Adaptive Systems <ref type="bibr" target="#b26">[27,</ref><ref type="bibr" target="#b27">28,</ref><ref type="bibr" target="#b28">29]</ref>, we intend to define formal approaches to specify and verify properties of the data traffic to monitor the traffic and identify anomalous pattern in the traffic.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Pipeline of our Approach</figDesc><graphic coords="3,304.30,474.85,200.01,77.69" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Confusion Matrix of the Random Forest Classifier</figDesc><graphic coords="4,320.96,304.01,166.68,119.18" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Network structure in GNS3 for testing simulations</figDesc><graphic coords="5,89.29,264.43,208.34,120.83" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 Corruption</head><label>1</label><figDesc>Table 1 reports the corrupt amount of data.</figDesc><table><row><cell>Attack Type</cell><cell>Corruption Rate (%)</cell></row><row><cell>Bot</cell><cell>50.06</cell></row><row><cell>Web -Brute Force</cell><cell>53.85</cell></row><row><cell>Web Attack -XSS</cell><cell>50.43</cell></row><row><cell>DoS Attacks</cell><cell>&gt;50</cell></row><row><cell>DDoS Attacks</cell><cell>&gt;50</cell></row><row><cell>FTP-Patator</cell><cell>100.00</cell></row><row><cell>Infiltration</cell><cell>76.84</cell></row><row><cell>SQL Injection</cell><cell>54.02</cell></row><row><cell>SSH-Patator</cell><cell>49.97</cell></row></table><note>Rate of Different Attacks on the CSE-CIC-IDS 2018 dataset<ref type="bibr" target="#b16">[17]</ref> </note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 3</head><label>3</label><figDesc>CSE-CIC-IDS2018 files</figDesc><table><row><cell cols="2">Id File Name</cell><cell>Size</cell></row><row><cell>1</cell><cell cols="2">Wednesday-14-02-2018 3.03 GB</cell></row><row><cell>2</cell><cell>Thursday-15-02-2018</cell><cell>2.18 GB</cell></row><row><cell>3</cell><cell>Friday-16-02-2018</cell><cell>3.92 GB</cell></row><row><cell>4</cell><cell>Tuesday-20-02-2018</cell><cell>3.19 GB</cell></row><row><cell>5</cell><cell cols="2">Wednesday-21-02-2018 3.68 GB</cell></row><row><cell>6</cell><cell>Thursday-22-02-2018</cell><cell>3.23 GB</cell></row><row><cell>7</cell><cell>Friday-23-02-2018</cell><cell>3.17 GB</cell></row><row><cell>8</cell><cell cols="2">Wednesday-28-02-2018 3.54 GB</cell></row><row><cell>9</cell><cell>Thursday-01-03-2018</cell><cell>3.54 GB</cell></row><row><cell cols="2">10 Friday-02-03-2018</cell><cell>3.43 GB</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head>Table 4</head><label>4</label><figDesc>Amount data per network traffic class</figDesc><table><row><cell>Class</cell><cell>Count</cell></row><row><cell>BENIGN</cell><cell>145904</cell></row><row><cell>DoS Attack</cell><cell>145904</cell></row><row><cell cols="2">BruteForce Attack 99147</cell></row><row><cell>PortScan Attack</cell><cell>49740</cell></row><row><cell>BotNet Attack</cell><cell>142921</cell></row><row><cell>Total</cell><cell>583.616</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_4"><head>Table 5</head><label>5</label><figDesc>Classification Performance Metrics Random Forest</figDesc><table><row><cell>Class</cell><cell cols="3">Precision Recall F1-score</cell></row><row><cell>BENIGN</cell><cell>1.00</cell><cell>1.00</cell><cell>1.00</cell></row><row><cell>Botnet Ares</cell><cell>1.00</cell><cell>1.00</cell><cell>1.00</cell></row><row><cell>BruteForce Attack</cell><cell>1.00</cell><cell>1.00</cell><cell>1.00</cell></row><row><cell>DoS Attack</cell><cell>1.00</cell><cell>1.00</cell><cell>1.00</cell></row><row><cell>Infiltration -NMAP Portscan</cell><cell>0.99</cell><cell>1.00</cell><cell>1.00</cell></row><row><cell>Accuracy</cell><cell></cell><cell>1.00</cell><cell></cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Acknowledgements. This work has been funded by the European Union -NextGenerationEU under the Italian Ministry of University and Research (MUR) National Innovation Ecosystem grant ECS00000041 -VITALITY -CUP J13C22000430001</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Arcade: Adversarially regularized convolutional autoencoder for network anomaly detection</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">T</forename><surname>Lunardi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Lopez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J.-P</forename><surname>Giacalone</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Network and Service Management</title>
		<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Catch it if you can: Real-time network anomaly detection with low false alarm rates</title>
		<author>
			<persName><forename type="first">G</forename><surname>Kathareios</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Anghel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Mate</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Clauberg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Gusat</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">16th IEEE International Conference on Machine Learning and Applications (ICMLA)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2017">2017. 2017</date>
			<biblScope unit="page" from="924" to="929" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">A novel intrusion detection model for detecting known and innovative cyberattacks using convolutional neural network</title>
		<author>
			<persName><forename type="first">S</forename><surname>Ho</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">Al</forename><surname>Jufout</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Dajani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Mozumdar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Open Journal of the Computer Society</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="14" to="25" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Network intrusion detection using multi-architectural modular deep neural network</title>
		<author>
			<persName><forename type="first">R</forename><surname>Atefinia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ahmadi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The Journal of Supercomputing</title>
		<imprint>
			<biblScope unit="page" from="3571" to="3593" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">2l-zed-ids: A twolevel anomaly detector for multiple attack classes</title>
		<author>
			<persName><forename type="first">M</forename><surname>Catillo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Rak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Villano</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Web, Artificial Intelligence and Network Applications: Proceedings of the Workshops of the 34th International Conference on Advanced Information Networking and Applications (WAINA-2020)</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="687" to="696" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Implementation of ensemble learning and feature selection for performance improvements in anomaly-based intrusion detection systems</title>
		<author>
			<persName><forename type="first">Q</forename><forename type="middle">R S</forename><surname>Fitni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Ramli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2020">2020. 2020</date>
			<biblScope unit="page" from="118" to="124" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">W</forename><surname>Daniel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The spearman rank correlation coefficient</title>
				<imprint>
			<date type="published" when="1987">1987</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Deep learning methods in network intrusion detection: A survey and an objective comparison</title>
		<author>
			<persName><forename type="first">S</forename><surname>Gamage</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Samarabandu</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.jnca.2020.102767</idno>
	</analytic>
	<monogr>
		<title level="j">Journal of Network and Computer Applications</title>
		<imprint>
			<biblScope unit="volume">169</biblScope>
			<biblScope unit="page">102767</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Increasing the performance of machine learningbased idss on an imbalanced and up-to-date dataset</title>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">Karatas</forename><surname>Baydogmus</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Demir</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Sahingoz</surname></persName>
		</author>
		<idno type="DOI">10.1109/ACCESS.2020.2973219</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Access PP</title>
		<imprint>
			<biblScope unit="page" from="1" to="1" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<title level="m" type="main">Smote for imbalanced classification with python</title>
		<author>
			<persName><forename type="first">B</forename><surname>Jason</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">optimization tuning on the realistic cyber dataset cse-cic-ids2018 using cloud computing</title>
		<author>
			<persName><forename type="first">V</forename><surname>Kanimozhi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">P</forename><surname>Jacob</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2019 international conference on communication and signal processing (ICCSP), IEEE</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="33" to="0036" />
		</imprint>
	</monogr>
	<note>Artificial intelligence based network intrusion detection with hyperparameter</note>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Cnnbased network intrusion detection against denialof-service attacks</title>
		<author>
			<persName><forename type="first">J</forename><surname>Kim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Kim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Shim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Choi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Electronics</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page">916</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Characterization of tor traffic using time based features</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">H</forename><surname>Lashkari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">D</forename><surname>Gil</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">S I</forename><surname>Mamun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Ghorbani</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Information Systems Security and Privacy</title>
				<imprint>
			<publisher>SciTePress</publisher>
			<date type="published" when="2017">2017</date>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="253" to="262" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Characterization of encrypted and vpn traffic using time-related</title>
		<author>
			<persName><forename type="first">G</forename><surname>Draper-Gil</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">H</forename><surname>Lashkari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">S I</forename><surname>Mamun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Ghorbani</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2nd international conference on information systems security and privacy (ICISSP)</title>
				<meeting>the 2nd international conference on information systems security and privacy (ICISSP)</meeting>
		<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="407" to="414" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<ptr target="https://www.unb.ca/cic/research/applications.html" />
		<title level="m">Applications | research</title>
				<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
		<respStmt>
			<orgName>U. of New Brunswick | UNB ; canadian institute for cybersecurity</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Random forests</title>
		<author>
			<persName><forename type="first">L</forename><surname>Breiman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Machine learning</title>
		<imprint>
			<biblScope unit="volume">45</biblScope>
			<biblScope unit="page" from="5" to="32" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<author>
			<persName><forename type="first">L</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Engelen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Lynar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Essam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Joosen</surname></persName>
		</author>
		<title level="m">Error prevalence in nids datasets: A case study on cic-ids-2017 and cse-cic-ids-2018</title>
				<imprint>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="254" to="262" />
		</imprint>
	</monogr>
	<note>2022 IEEE Conference on Communications and Network Security (CNS), IEEE</note>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<ptr target="https://scikit-learn.org/stable/index.html" />
		<title level="m">scikit-learn: machine learning in python -scikitlearn 1</title>
				<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
	<note>4.1 documentation</note>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<ptr target="https://www.kali.org/tools/patator/" />
		<title level="m">Kali linux tools</title>
				<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
	<note>patator</note>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<title level="m" type="main">Google colab</title>
		<author>
			<persName><surname>Google</surname></persName>
		</author>
		<ptr target="https://research.google.com/colaboratory/faq.html" />
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Array programming with NumPy</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">R</forename><surname>Harris</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">J</forename><surname>Millman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">J</forename><surname>Van Der Walt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Gommers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Virtanen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Cournapeau</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Wieser</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Taylor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Berg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">J</forename><surname>Smith</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Kern</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Picus</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Hoyer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">H</forename><surname>Van Kerkwijk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Brett</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Haldane</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">F</forename><surname>Del Río</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Wiebe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Peterson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Gérard-Marchant</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Sheppard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Reddy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Weckesser</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Abbasi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Gohlke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">E</forename><surname>Oliphant</surname></persName>
		</author>
		<idno type="DOI">10.1038/s41586-020-2649-2</idno>
		<ptr target="https://doi.org/10.1038/s41586-020-2649-2.doi:10.1038/s41586-020-2649-2" />
	</analytic>
	<monogr>
		<title level="j">Nature</title>
		<imprint>
			<biblScope unit="volume">585</biblScope>
			<biblScope unit="page" from="357" to="362" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<author>
			<persName><forename type="first">T</forename></persName>
		</author>
		<idno type="DOI">10.5281/zenodo.3509134</idno>
		<idno>pandas-dev/pandas</idno>
		<ptr target="https://doi.org/10.5281/zenodo.3509134.doi:10.5281/zenodo.3509134" />
		<title level="m">pandas development team</title>
				<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
		<respStmt>
			<orgName>Pandas</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Scikit-learn: Machine learning in Python</title>
		<author>
			<persName><forename type="first">F</forename><surname>Pedregosa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Varoquaux</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gramfort</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Michel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Thirion</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Grisel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Blondel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Prettenhofer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Weiss</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Dubourg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Vanderplas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Passos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Cournapeau</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Brucher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Perrot</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Duchesnay</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Machine Learning Research</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="page" from="2825" to="2830" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Matplotlib: A 2d graphics environment</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">D</forename><surname>Hunter</surname></persName>
		</author>
		<idno type="DOI">10.1109/MCSE.2007.55</idno>
	</analytic>
	<monogr>
		<title level="j">Computing in Science &amp; Engineering</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page" from="90" to="95" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<monogr>
		<author>
			<persName><forename type="first">S</forename><surname>Worldwide</surname></persName>
		</author>
		<ptr target="https://docs.gns3.com/docs/" />
		<title level="m">Gns3 documentation</title>
				<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<monogr>
		<ptr target="https://www.cisco.com/c/en/us/td/docs/ios/12_2/12_2x/12_2xa/release/notes/rn3600xa.html" />
		<title level="m">Cisco 3600 series -cisco</title>
				<imprint>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">A spatial logic for simplicial models</title>
		<author>
			<persName><forename type="first">M</forename><surname>Loreti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Quadrini</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Log. Methods Comput. Sci</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Sibilla: A tool for reasoning about collective systems</title>
		<author>
			<persName><forename type="first">N</forename><surname>Del Giudice</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Matteucci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Quadrini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rehman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Loreti</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Science of Computer Programming</title>
		<imprint>
			<biblScope unit="page">103095</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Sibilla: A tool for reasoning about collective systems</title>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">D</forename><surname>Giudice</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Matteucci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Quadrini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rehman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Loreti</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-031-08143-9_6</idno>
	</analytic>
	<monogr>
		<title level="m">Coordination Models and Languages -24th IFIP WG 6.1 International Conference, COORDINATION 2022, Held as Part of the 17th International Federated Conference on Distributed Computing Techniques, DisCoTec 2022</title>
				<meeting><address><addrLine>Lucca, Italy</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2022">June 13-17, 2022. 2022</date>
			<biblScope unit="page" from="92" to="98" />
		</imprint>
	</monogr>
	<note>Proceedings</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
