<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>I. Horyn);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Comparison of feature extraction tools for network traffic data</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Borys Lypa</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ivan Horyn</string-name>
          <email>ivan.horyn.0@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Natalia Zagorodna</string-name>
          <email>Zagorodna.n@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dmytro Tymoshchuk</string-name>
          <email>dmytro.tymoshchuk@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Taras</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Lechachenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>ITTAP'2024: 4th International Workshop on Information Technologies: Theoretical and Applied Problems</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Ternopil Ivan Puluj National Technical University</institution>
          ,
          <addr-line>Ruska str., 56, Ternopil</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>1808</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>The comparison analysis of the most popular tools to extract features from network traffic is conducted in this paper. Feature extraction plays a crucial role in Intrusion Detection Systems (IDS) because it helps to transform huge raw network data into meaningful and manageable features for analysis and detection of malicious activities. The good choice of feature extraction tool is an essential step in construction of Artificial Intelligence-based Intrusion Detection Systems (AI-IDS), which can help to enhance the efficiency, accuracy, and scalability of such systems.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Cybersecurity</kwd>
        <kwd>Big Data</kwd>
        <kwd>Intrusion Detection System</kwd>
        <kwd>Network</kwd>
        <kwd>Traffic</kwd>
        <kwd>Feature Extraction</kwd>
        <kwd>Artificial Intelligence1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>problems.</p>
      <p>
        One of the most popular IDSs are signature-based IDS that can detect attack/intrusion based
on its “signature” by comparing data traffic against known attack signatures available in the
relevant database [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. These signatures are essentially patterns or characteristics associated
with known threats or attacks. When the IDS detects a match between the incoming data and
any signature in its database, it raises an alert or takes predefined actions to mitigate the threat.
[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] This approach can give accurate detection of known attacks [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        Nowadays the threat landscape is becoming more and more sophisticated and dynamic,
requiring constant vigilance and innovative security measures to stay ahead of cyber
adversaries. Signature-based network Intrusion Detection Systems are becoming less capable of
detecting new threats. That’s why cybersecurity companies all around the world invest huge
amounts of resources into developing a reliable approach for the detection of network threats
using AI algorithms. AI-based IDS show excellent results at anomaly detection, identification of
activities or behaviors that significantly deviate from normal patterns. The need for AI-based
systems is only increasing [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>AI-based IDS encompasses machine learning techniques. Data collection and feature space
construction is an essential and important step in development and analysis of Machine
Learning-Based IDS. Data quality is as important as the choice of algorithm for such systems.
Machine learning algorithms require input to be organized in a feature space which can be
considered as a dataset of objects with relevant feature values. Network traffic is presented in a
format of raw packet capture which could not be used for Machine Learning algorithms in its
original form. Feature extraction is a process of transforming raw network traffic data into a set
of features that represent characteristics of the traffic such as flow, packet, statistical,
timebased, and frequency-based features. Feature selection can contribute to dimensionality and
noise reduction, increasing efficiency and accuracy of IDS. But feature extraction is not a strictly
predefined process. Different sets of features can be generated from the same raw network
traffic data and they can contribute differently in final model efficiency.</p>
      <p>
        A lot of researchers [
        <xref ref-type="bibr" rid="ref5">5, 6, 7</xref>
        ] use open datasets with extracted in advance features in order to
construct and analyze their models. But such models cannot be easily embedded in IDS because
they cannot work with original raw network traffic data. Moreover, we cannot really prognose
the accuracy of such models based on real data.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Introduction to Network traffic data</title>
      <p>In previous years, network administrators typically monitored a limited number of devices,
usually operated with less than a thousand computers and network bandwidth often restricted
to 100 Mbps. Nowadays , administrators contend with high-speed wired networks exceeding 1
Gbps, along with a diverse variety of wireless networks. That’s why administrators have to rely
on advanced traffic analysis tools in order to effectively manage networks, promptly address
issues, prevent failures, and ensure security. Despite the fact that network traffic analysis
facilitates robust security management, several challenges have recently arisen. Analysis has to
be conducted across multiple levels, including packet, flow, and network levels. Researchers
employ various techniques within a generic framework for network traffic analysis, involving
preprocessing, subsequent analysis, and observation to discover patterns from network data.</p>
      <p>Analyzing network data can be considered as a big data problem due to several factors.
Firstly, the total volume of data generated by network devices, such as routers, switches, and
servers, is immense. These devices continuously produce logs, packets, and other forms of data
that need to be processed and analyzed. With the proliferation of internet-connected devices
and the growth of digital communication, this volume is only increasing. It is estimated that the
average person produces 1.7 MB per second or 6,120 MB per hour. The average number of
members globally is 3.45 on a household scale, meaning a family can create about 506,736 MB
daily. [8]</p>
      <p>Secondly, network data is often generated at high velocity. Data packets are transmitted
rapidly across networks, and real-time analysis is often necessary to detect and respond to
security threats, performance issues, or anomalies.</p>
      <p>Thirdly, network data encompasses various types of data, including packet headers, payload
content, session logs, flow records, and more. Analyzing this diverse range of data sources
requires flexible and scalable processing techniques.</p>
      <p>Overall, the combination of volume, velocity and variety makes network data a prime
candidate for big data analytics. It requires scalable infrastructure, sophisticated algorithms, and
efficient processing mechanisms to derive actionable insights from the huge amount of data
generated by modern networks.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Feature extraction for network traffic data</title>
      <p>Various techniques can be employed to derive characteristics from a network connection. The
most commonly used methods encompass:
 Packet capture and analysis: it involves capturing packets of network traffic and
analyzing them to extract features such as packet size, protocol, source and destination
IP addresses, port numbers, and flags.
 Flow analysis: it involves grouping packets into flows, which are sequences of packets
of the same communication session. Flow size, duration, and protocol are flow features
that can be extracted from network traffic flow .
 Application layer monitoring: it involves monitoring network traffic at the application
layer to extract features such as the type of application traffic, the URLs accessed, and
the amount of data transferred.</p>
      <p>Features are often extracted from Packet captures or PCAP. It's a file format used to store
network traffic captured by packet sniffers or network monitoring tools. These tools capture
data packets as they traverse a network, including such information as source and destination IP
addresses, ports, protocols, and the contents of the packets themselves. PCAP are commonly
used files for network analysis, troubleshooting, and security purposes, which allow
cybersecurity researchers to inspect network traffic for anomalies, malicious activity, or
performance issues.</p>
      <p>The specific features that are extracted will depend on the specific application and will affect
algorithm efficiency. For example, an application, used to detect malicious traffic, may extract
different features compared to an application, used to monitor network performance.</p>
      <sec id="sec-3-1">
        <title>Packet level features</title>
        <p>Packet-based Intrusion Detection Systems (IDS) are highly regarded for their flexibility in
intrusion detection patterns due to the comprehensive volume of data they capture, including all
headers up to the application layer (OSI layer 7) and the complete payload. This enables precise
rule definition on any part of the traffic, resulting in less number of false positives and higher
alert confidence. Implementing simple packet-based IDS is comparatively straightforward, as
there's no need to decode protocols beforehand. In some scenarios, when complete data is
available in real-time, packet-based IDSs do an excellent job with maximum time resolution.
However, encrypted payloads pose a challenge for such systems as signature matching becomes
impractical and decreases detection performance.</p>
        <p>Packet-based IDSs process all traffic forwarded to them, which lead to higher resource usage.
Filtering, aggregation, and state handling are managed entirely on the IDS machine: either
through libraries like PCAP or within the IDS itself. Packet-based IDS, particularly without
hardware pre-filters, can have a significant processing load, which can lead to system overload.
Additionally, packet-based IDSs receive the full payload data of every packet, raising issues
about the exposure of confidential information. [9]</p>
        <p>Packet-level features include, but not limited to packet size, protocol, source, destination, IP
addresses, port numbers, flags.
3.2.</p>
      </sec>
      <sec id="sec-3-2">
        <title>Flow level features</title>
        <p>Cisco NetFlow is a proprietary but openly documented format for transmitting aggregated
network data, widely recognized as a standard for flow records. Although it is primarily used for
network monitoring rather than intrusion detection, its widespread implementation allows it to
be further exploited for intrusion detection without additional computational expenses. Despite
its original purpose was not intrusion detection, research demonstrates its effectiveness in
detecting certain attacks.</p>
        <p>Flow-based feature extraction often relies on the NetFlow protocol. NetFlow records
typically contain aggregated data up to the network layer (OSI layer 3), and, depending on probe
configuration, may include specific transport (OSI layer 4) information such as TCP flags. Due to
the restricted data available in flow-based IDS, defining precise detection rules may not always
be feasible, potentially leading to reduced alert confidence and increased false positives.</p>
        <p>The generation of flow records introduces a delay between connection establishment and
record transmission to the IDS. Depending on configuration, records may only be emitted
postconnection closure or timeout, potentially affecting time-sensitive intrusion detection tasks.</p>
        <p>Flows may not have sufficient time resolution for some intrusion detection needs, such as
determining byte transmission timings. However, encrypted payloads do not interfere with
flow-based IDS functionality.</p>
        <p>NetFlow data, being aggregated, results in reduced processing requirements for the IDS,
generally lowering resource usage. Additionally, NetFlow data poses fewer privacy concerns
because most of the potentially sensitive content of the connection remains within the
transmission network.</p>
        <p>Some of the flow features could be extracted are flow size, flow duration, protocol, source and
destination IP addresses.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Most popular tools</title>
      <p>4.1.</p>
      <sec id="sec-4-1">
        <title>CICflowmeter</title>
        <p>
          CICFlowMeter is a network traffic flow generator and analyzer. [
          <xref ref-type="bibr" rid="ref5">5,6</xref>
          ] It can be used to generate
bidirectional flows, where the first packet determines the forward (source to destination) and
backward (destination to source) directions, hence more than 80 statistical network traffic
features such as Duration, Number of packets, Number of bytes, Length of packets, etc. can be
calculated separately in the forward and backward directions.
        </p>
        <p>Additional functionalities include, selecting features from the list of existing features, adding
new features, and controlling the duration of flow timeout. The output of the application is the
CSV format file that has six columns labeled for each flow (FlowID, SourceIP, DestinationIP,
SourcePort, DestinationPort, and Protocol) with more than 80 network traffic analysis features.</p>
        <p>CICFlowMeter was used for the creation of CIC-IDS2017 Intrusion detection evaluation
dataset. [10, 12] And was used for similar network threat detection research, such as [11].</p>
        <p>The original tool is available as Java package and source code [13]. There is also Python
version created by the community [14].
4.2.</p>
      </sec>
      <sec id="sec-4-2">
        <title>Wireshark</title>
        <p>Wireshark is a widely used network protocol analyzer. It lets you capture and interactively
browse the traffic running on a computer network in real-time. It's available for various
platforms like Windows, macOS, and Linux. [15]</p>
        <p>Wireshark can capture data from a live network connection or read data from a file. It
supports hundreds of protocols and can display the captured data in a user-friendly format. This
makes it an invaluable tool for network troubleshooting, analysis, software and protocol
development, and education.</p>
        <p>It provides detailed information about network packets, including their source and
destination addresses, protocols used, packet size, and even the contents of individual packets.
This level of insight into network traffic is crucial for diagnosing network issues, detecting
security breaches, and understanding how applications communicate over a network.
4.3.</p>
      </sec>
      <sec id="sec-4-3">
        <title>Argus</title>
        <p>Argus is a network flow monitoring tool used for collecting and analyzing network traffic data.
It differs from packet sniffers like Wireshark in that it focuses on summarizing network flows
rather than capturing and analyzing individual packets.</p>
        <p>Argus monitors network traffic and generates flow records containing information such as
source and destination IP addresses, port numbers, protocol types, timestamps, and packet
counts. These flow records provide a higher-level view of network activity, making it easier to
identify trends, detect anomalies, and analyze network performance.</p>
        <p>One of the key features of Argus is its ability to generate and export flow records in various
formats, such as ASCII, binary, and XML. This flexibility allows for seamless integration with
other network monitoring and analysis tools. [16]
Many Network Intrusion Detection Systems (NIDS), whether they rely on misuse or anomaly
detection methods, typically operate at the packet level. Among the most widely used
opensource tools for intrusion detection is Snort, known for its simplicity and lightweight design,
aligning with the misuse detection approach. Essentially, users input signatures, either in string
format or more advanced regular expressions, into the system. Its compact size facilitates swift
deployment across various network nodes. The system then scrutinizes network traffic for
matches with the provided signatures, triggering alarms upon detection. While effective for a
limited number of signatures, this approach often falters when faced with a large number of
signatures or heavy traffic volumes. Similarly, other systems employing signature-based
intrusion detection encounter comparable challenges.</p>
        <p>It has a community version available for free, the subscription includes the latest up-to-date
rules.
4.5.</p>
      </sec>
      <sec id="sec-4-4">
        <title>Zeek</title>
        <p>Zeek, an open-source network intrusion detection system, while less popular than Snort, boasts
compatibility with various Unix flavors. Its architecture is built on multiple layers, spanning
from traffic capture to in-depth analysis, enabling easy extension of its capabilities. Zeek offers
the flexibility to integrate Snort rules into its framework. Although its creators claim it does not
strictly adhere to either misuse or anomaly detection paradigms, it tends to align more closely
with the misuse paradigm, albeit from a basic standpoint. However, its fundamental design
diverges from signature-based IDS by adopting an event-driven schema. Leveraging complex
policies and Zeek's state awareness, it can also function as an anomaly detection system. In
contrast to Snort, Zeek exhibits high state awareness, capable of maintaining states across
connection boundaries. This enables the modeling of attack patterns based on events occurring
hours or even days apart.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Feature tool comparison</title>
      <p>In this section we conduct comparative analysis of tools for network traffic feature extraction.
Key features of the most popular tools are presented here. All of selected tools are open-source
software, but some have a full version with advanced options that could be unlocked with a paid
subscription (Snort requires subscription for an access to up to date rules for IDS). Table 1
includes the list of chosen tools and their basic characteristics.</p>
      <sec id="sec-5-1">
        <title>Level</title>
      </sec>
      <sec id="sec-5-2">
        <title>Flow</title>
      </sec>
      <sec id="sec-5-3">
        <title>Packet</title>
      </sec>
      <sec id="sec-5-4">
        <title>Able to analyze real-time traffic No Yes</title>
      </sec>
      <sec id="sec-5-5">
        <title>Snort</title>
      </sec>
      <sec id="sec-5-6">
        <title>Zeek</title>
      </sec>
      <sec id="sec-5-7">
        <title>Packet, application</title>
      </sec>
      <sec id="sec-5-8">
        <title>Packet, flow, application Yes Yes</title>
        <p>Yes</p>
        <p>Wireshark is primarily a network protocol analyzer used for analyzing and troubleshooting
network traffic. While it's not a dedicated Intrusion Detection System (IDS) like Zeek or Snort, it
can be used as a component within an IDS setup. Wireshark captures packets on a network
interface, making it possible to inspect the traffic in detail. Wireshark provides detailed analysis
of captured packets, including used protocols, packet contents, source and destination
addresses, etc. Patterns or anomalies in network traffic that may indicate suspicious or malicious
activity can be detected via Wireshark's packet filtering and search capabilities.</p>
        <p>Snort operates as a traditional IDS/IPS, conducting deep packet inspection and then applying
signatures to traffic to detect and potentially block attacks. Therefore, it doesn’t seem suitable
for integration with AI systems.</p>
        <p>In contrast, open-source software Zeek positions itself not as an IDS but as a network
monitor and traffic analyzer. Its main function is to focus on comprehensive traffic inspection
for signs of suspicious activity. Zeek supports a broad spectrum of traffic analysis tasks,
extending beyond security to include performance measurement and troubleshooting.</p>
        <p>Zeek's primary role appears to be capturing traffic details for external analysis systems. It
emphasizes collecting comprehensive traffic information, sometimes integrating custom
protocol dissectors tailored to the environment's protocols. While there's a functional overlap
among these tools, their core objectives and utilization scenarios differ.</p>
        <p>In this paper, we focus on using flow-based extraction tools, as they reduce the amount of
resources required for processing data</p>
      </sec>
      <sec id="sec-5-9">
        <title>Primarily focuses on Focuses on high- Primarily</title>
        <p>network flow data level network designed for
analysis. It captures and protocol analysis. It flow-based
analyzes network traffic performs deep packet network traffic
to generate flow records, inspection to extract analysis,
which provide detailed higher-level network particularly for
Data Collection</p>
      </sec>
      <sec id="sec-5-10">
        <title>Analysis</title>
        <p>Flexibility</p>
        <p>Collects flow data, Collects detailed It collects
including information protocol-level flow data similar
such as source and metadata from to Argus but
destination IP addresses, network traffic, with a specific
ports, protocols, and including HTTP, focus on
timestamps. DNS, FTP, SMTP,
cybersecurityand more. It can related features
extract information such as attack
such as HTTP detection and
headers, DNS anomaly
queries, and file detection.
transfers, as well as
flow data.</p>
        <p>Can be used to Performs deep Specializes in
analyze network flow protocol analysis to cybersecurity
data to identify patterns, generate rich analysis,
anomalies, and potential network logs. It can leveraging flow
security threats. It's be used to detect data to extract
well-suited for complex network features from
analyzing traffic behaviors, such as network data.
volume, trends, and reconnaissance
basic behavior. activities, malware
communication, and
suspicious network
traffic patterns.</p>
        <p>Offers flexibility in Highly extensible
terms of capturing and through its scripting
exporting flow data, but language. Users can
its focus is primarily on customize and
flow analysis. extend its
functionality to suit
specific network
monitoring and</p>
        <p>Only
available as Java
tool used for
feature
extraction from
network
captures.</p>
        <p>security needs.</p>
        <p>Has a large and Used in some
active user of the most
community, with a popular IDS
wealth of benchmark
community- datasets. Beside
contributed scripts, that doesn’t
plugins, and seem to be
integrations. It's adopted
widely adopted anywhere. Also
across various some researches
industries, including criticize it.
cybersecurity,
network operations,
and research.</p>
        <p>The following table includes the comparison of efficiency of the Random Forest classification
model based on the same CIC-IDS2017 dataset with differently extracted features by
CICFlowmeter and Zeek. The binary classification has been carried out, which labels network
traffic as either “benign” (normal traffic) or “attack”.</p>
        <p>In [18], results showed a constant superiority of Netflow compared to CICFlowmeter.
Moreover, according to [19, 20], the CICFlowMeter tool may present some incorrect
implementation aspects both in the construction of the TCP protocol flows and in the extraction
of attributes. Although the CICFlowTool was used in the most popular IDS benchmarking
dataset (CIC-IDS-2017), it falls behind other tools compared here.</p>
        <p>Because of all the criticism of CICFlowMeter presented, the most promising systems for IDS
are Argus and Zeek.</p>
        <p>In summary, while Argus and Zeek are valuable network monitoring tools, they have
different strengths and are suitable for different use cases. Argus is ideal for flow data analysis
and basic network traffic monitoring, while Zeek excels in deep protocol analysis and
customizable network security monitoring.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusions</title>
      <p>Effective network traffic data analysis is essential for understanding, managing, and securing
modern computer networks. It provides valuable insights that empower organizations to
optimize performance, detect threats, and make informed decisions. As technology evolves,
network traffic data analysis remains critical for network security.</p>
      <p>The importance of AI-based IDS has been discussed here. They can be used from intrusion
detection to user behavior analysis. Advancements in machine learning and big data analytics
can enhance its capabilities. However, machine learning algorithms can not work with raw
network flow, so feature space has to be constructed in advance. The comparative analysis of
key tools that allow feature extraction for various applications has been conducted in this paper.
Additionally, some flow-based tools for network feature extraction have been compared,
highlighting the strengths and weaknesses of each tool. It was shown that the final efficiency of
models depends on feature space and can differ even for the same raw network traffic. In the
future, we plan to make a more extensive comparison of tools, including packet-based systems
as well.
[6] Sarhan, M., Layeghy, S., &amp; Portmann, M. (2022). Evaluating standard feature sets towards
increased generalisability and explainability of ML-based network intrusion detection. Big
Data Research, 30, 100359.
[7] Nimbalkar, P., &amp; Kshirsagar, D. (2021). Feature selection for intrusion detection system in</p>
      <p>Internet-of-Things (IoT). ICT Express, 7(2), 177-181.
[8] Data never sleeps URL: https://www.domo.com/solution/data-never-sleeps-6
[9] Andreas, B., Dilruksha, J., &amp; McCandless, E. (2020). Flow-based and packet-based intrusion
detection using BLSTM. SMU Data Science Review, 3(3), 8.
[10] CICFlowMeter (2017). Canadian institute for cybersecurity (cic).
[11] Habibi Lashkari, A., Draper Gil, G., Mamun, M. S. I., and Ghorbani, A. A. (2017).</p>
      <p>Characterization of tor traffic using time based features. In In Proceedings of the 3rd
International Conference on Information Systems Security and Privacy (ICISSP), pages
253–262.
[12] Sharafaldin, I., Lashkari, A. H., &amp; Ghorbani, A. A. (2018). Toward generating a new
intrusion detection dataset and intrusion traffic characterization. ICISSp, 1, 108-116.
[13] CICFlowMeter GitHub. URL: https://github.com/ahlashkari/CICFlowMeter
[14] Python CICFlowMeter. URL: https://github.com/hieulw/cicflowmeter
[15] Wireshark. URL: https://www.wireshark.org/
[16] Argus. URL: https://openargus.org/
[17] Rodríguez, M., Alesanco, Á., Mehavilla, L., &amp; García, J. (2022). Evaluation of machine
learning techniques for traffic flow-based intrusion detection. Sensors, 22(23), 9326.
[18] Sarhan, M., Layeghy, S., &amp; Portmann, M. (2022). Evaluating standard feature sets towards
increased generalisability and explainability of ML-based network intrusion detection. Big
Data Research, 30, 100359.
[19] Engelen, G.; Rimmer, V.; Joosen, W. Troubleshooting an intrusion detection dataset: The
CICIDS2017 case study. In Proceedings of the 2021 IEEE Symposium on Security and
Privacy Workshops, SPW, San Francisco, CA, USA, 27–27 May 2021; pp. 7–12.
[20] Rosay, A.; Cheval, E.; Carlier, F.; Leroux, P. Network intrusion detection: A comprehensive
analysis of CIC-IDS2017. In Proceedings of the 8th International Conference on
Information Systems Security and Privacy (ICISSP 2022), Online, 9–11 February 2022; pp.
25–36.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Petliak</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Klots</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Titova</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cheshun</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boyarchuk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <article-title>Signature-based Approach to Detecting Malicious Outgoing Traffic</article-title>
          .
          <source>4th International Workshop on Intelligent Information Technologies and Systems of Information Security</source>
          ,
          <string-name>
            <surname>IntellTSIS</surname>
          </string-name>
          <year>2023</year>
          . CEUR Workshop Proceedings,
          <year>2023</year>
          ,
          <volume>3373</volume>
          , pp.
          <fpage>486</fpage>
          -
          <lpage>506</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Ioulianou</surname>
          </string-name>
          , Philokypros, Vasilakis, Vasileios orcid.
          <source>org/0000-0003-4902-8226</source>
          , Moscholios, Ioannis et al. (
          <article-title>1 more author) (Accepted: 2018) A Signature-based Intrusion Detection System for the Internet of Things</article-title>
          .
          <source>In: Information and Communication Technology Form</source>
          ,
          <fpage>11</fpage>
          -
          <lpage>13</lpage>
          Jul
          <year>2018</year>
          . (In Press)
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Klots</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Petliak</surname>
          </string-name>
          and
          <string-name>
            <given-names>V.</given-names>
            <surname>Titova</surname>
          </string-name>
          ,
          <article-title>"Evaluation of the efficiency of the system for detecting malicious outgoing traffic in public networks,"</article-title>
          <source>2023 13th International Conference on Dependable Systems, Services and Technologies (DESSERT)</source>
          , Athens, Greece,
          <year>2023</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          , doi: 10.1109/DESSERT61349.
          <year>2023</year>
          .
          <volume>10416502</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Hashemi</surname>
            ,
            <given-names>M. J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cusack</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          , &amp; Keller, E. (
          <year>2019</year>
          , December).
          <article-title>Towards evaluation of nidss in adversarial setting</article-title>
          .
          <source>In Proceedings of the 3rd ACM CoNEXT Workshop on Big DAta, Machine Learning and Artificial Intelligence for Data Communication Networks</source>
          (pp.
          <fpage>14</fpage>
          -
          <lpage>21</lpage>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>ZAGORODNA</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>STADNYK</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>LYPA</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>GAVRYLOV</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>&amp;</surname>
          </string-name>
          <string-name>
            <surname>KOZAK</surname>
          </string-name>
          ,
          <string-name>
            <surname>R.</surname>
          </string-name>
          (
          <year>2022</year>
          ).
          <article-title>Network Attack Detection Using Machine Learning Methods</article-title>
          .
          <article-title>Challenges to national defence in contemporary geopolitical situation</article-title>
          ,
          <source>2022(1)</source>
          ,
          <fpage>55</fpage>
          -
          <lpage>61</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>