<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Comparison of feature extraction tools for network traffic data</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Borys</forename><surname>Lypa</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Ternopil Ivan Puluj National Technical University</orgName>
								<address>
									<addrLine>Ruska str</addrLine>
									<postCode>56</postCode>
									<settlement>Ternopil</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Ivan</forename><surname>Horyn</surname></persName>
							<email>ivan.horyn.0@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Ternopil Ivan Puluj National Technical University</orgName>
								<address>
									<addrLine>Ruska str</addrLine>
									<postCode>56</postCode>
									<settlement>Ternopil</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Natalia</forename><surname>Zagorodna</surname></persName>
							<email>zagorodna.n@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Ternopil Ivan Puluj National Technical University</orgName>
								<address>
									<addrLine>Ruska str</addrLine>
									<postCode>56</postCode>
									<settlement>Ternopil</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Dmytro</forename><surname>Tymoshchuk</surname></persName>
							<email>dmytro.tymoshchuk@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Ternopil Ivan Puluj National Technical University</orgName>
								<address>
									<addrLine>Ruska str</addrLine>
									<postCode>56</postCode>
									<settlement>Ternopil</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Taras</forename><surname>Lechachenko</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Ternopil Ivan Puluj National Technical University</orgName>
								<address>
									<addrLine>Ruska str</addrLine>
									<postCode>56</postCode>
									<settlement>Ternopil</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Comparison of feature extraction tools for network traffic data</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">9E38A2C159CF48F3EC96F0921CB4CCEB</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:41+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Cybersecurity, Big Data, Intrusion Detection System, Network, Traffic, Feature Extraction, Artificial Intelligence 1 1 D. Tymoshchuk 0009-0002-5970-6780 (B. Lypa)</term>
					<term>0009-0003-1235-3962 (I. Horyn)</term>
					<term>0000-0002-1808-835X (N. Zagorodna)</term>
					<term>0000-0003-0246-2236 (D. Tymoshchuk)</term>
					<term>0000-0003-1185-6448 (T. Lechachenko)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The comparison analysis of the most popular tools to extract features from network traffic is conducted in this paper. Feature extraction plays a crucial role in Intrusion Detection Systems (IDS) because it helps to transform huge raw network data into meaningful and manageable features for analysis and detection of malicious activities. The good choice of feature extraction tool is an essential step in construction of Artificial Intelligence-based Intrusion Detection Systems (AI-IDS), which can help to enhance the efficiency, accuracy, and scalability of such systems.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>With ever-increasing amounts of data passed through the internet, the problem of analyzing network traffic has gotten more complex and challenging than ever before. Network traffic analysis is the process of monitoring and analyzing network data flows to gain insights into the performance, security, and management of a computer network. Network traffic analysis involves packet inspection, traffic classification, anomaly detection, security monitoring, performance optimization. Packet inspection and traffic classification can be useful for identifying and blocking malicious traffic, or for prioritizing traffic for different applications. Anomaly detection involves detecting unusual patterns in network traffic, which can be useful for identifying malicious activity, such as denial-of-service attacks or intrusions. Performance monitoring involves monitoring network performance to identify bottlenecks and other problems.</p><p>This paper mostly describes a perspective of using network traffic analysis for network security in Intrusion Detection Systems (IDS).</p><p>One of the most popular IDSs are signature-based IDS that can detect attack/intrusion based on its "signature" by comparing data traffic against known attack signatures available in the relevant database <ref type="bibr" target="#b0">[1]</ref>. These signatures are essentially patterns or characteristics associated with known threats or attacks. When the IDS detects a match between the incoming data and any signature in its database, it raises an alert or takes predefined actions to mitigate the threat. <ref type="bibr" target="#b1">[2]</ref> This approach can give accurate detection of known attacks <ref type="bibr" target="#b2">[3]</ref>.</p><p>Nowadays the threat landscape is becoming more and more sophisticated and dynamic, requiring constant vigilance and innovative security measures to stay ahead of cyber adversaries. Signature-based network Intrusion Detection Systems are becoming less capable of detecting new threats. That's why cybersecurity companies all around the world invest huge amounts of resources into developing a reliable approach for the detection of network threats using AI algorithms. AI-based IDS show excellent results at anomaly detection, identification of activities or behaviors that significantly deviate from normal patterns. The need for AI-based systems is only increasing <ref type="bibr" target="#b3">[4]</ref>.</p><p>AI-based IDS encompasses machine learning techniques. Data collection and feature space construction is an essential and important step in development and analysis of Machine Learning-Based IDS. Data quality is as important as the choice of algorithm for such systems. Machine learning algorithms require input to be organized in a feature space which can be considered as a dataset of objects with relevant feature values. Network traffic is presented in a format of raw packet capture which could not be used for Machine Learning algorithms in its original form. Feature extraction is a process of transforming raw network traffic data into a set of features that represent characteristics of the traffic such as flow, packet, statistical, timebased, and frequency-based features. Feature selection can contribute to dimensionality and noise reduction, increasing efficiency and accuracy of IDS. But feature extraction is not a strictly predefined process. Different sets of features can be generated from the same raw network traffic data and they can contribute differently in final model efficiency.</p><p>A lot of researchers <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b5">6,</ref><ref type="bibr" target="#b6">7]</ref> use open datasets with extracted in advance features in order to construct and analyze their models. But such models cannot be easily embedded in IDS because they cannot work with original raw network traffic data. Moreover, we cannot really prognose the accuracy of such models based on real data.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Introduction to Network traffic data</head><p>In previous years, network administrators typically monitored a limited number of devices, usually operated with less than a thousand computers and network bandwidth often restricted to 100 Mbps. Nowadays , administrators contend with high-speed wired networks exceeding 1 Gbps, along with a diverse variety of wireless networks. That's why administrators have to rely on advanced traffic analysis tools in order to effectively manage networks, promptly address issues, prevent failures, and ensure security. Despite the fact that network traffic analysis facilitates robust security management, several challenges have recently arisen. Analysis has to be conducted across multiple levels, including packet, flow, and network levels. Researchers employ various techniques within a generic framework for network traffic analysis, involving preprocessing, subsequent analysis, and observation to discover patterns from network data.</p><p>Analyzing network data can be considered as a big data problem due to several factors. Firstly, the total volume of data generated by network devices, such as routers, switches, and servers, is immense. These devices continuously produce logs, packets, and other forms of data that need to be processed and analyzed. With the proliferation of internet-connected devices and the growth of digital communication, this volume is only increasing. It is estimated that the average person produces 1.7 MB per second or 6,120 MB per hour. The average number of members globally is 3.45 on a household scale, meaning a family can create about 506,736 MB daily. <ref type="bibr">[8]</ref> Secondly, network data is often generated at high velocity. Data packets are transmitted rapidly across networks, and real-time analysis is often necessary to detect and respond to security threats, performance issues, or anomalies.</p><p>Thirdly, network data encompasses various types of data, including packet headers, payload content, session logs, flow records, and more. Analyzing this diverse range of data sources requires flexible and scalable processing techniques.</p><p>Overall, the combination of volume, velocity and variety makes network data a prime candidate for big data analytics. It requires scalable infrastructure, sophisticated algorithms, and efficient processing mechanisms to derive actionable insights from the huge amount of data generated by modern networks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Feature extraction for network traffic data</head><p>Various techniques can be employed to derive characteristics from a network connection. The most commonly used methods encompass:</p><p> Packet capture and analysis: it involves capturing packets of network traffic and analyzing them to extract features such as packet size, protocol, source and destination IP addresses, port numbers, and flags.  Flow analysis: it involves grouping packets into flows, which are sequences of packets of the same communication session. Flow size, duration, and protocol are flow features that can be extracted from network traffic flow.  Application layer monitoring: it involves monitoring network traffic at the application layer to extract features such as the type of application traffic, the URLs accessed, and the amount of data transferred. Features are often extracted from Packet captures or PCAP. It's a file format used to store network traffic captured by packet sniffers or network monitoring tools. These tools capture data packets as they traverse a network, including such information as source and destination IP addresses, ports, protocols, and the contents of the packets themselves. PCAP are commonly used files for network analysis, troubleshooting, and security purposes, which allow cybersecurity researchers to inspect network traffic for anomalies, malicious activity, or performance issues.</p><p>The specific features that are extracted will depend on the specific application and will affect algorithm efficiency. For example, an application, used to detect malicious traffic, may extract different features compared to an application, used to monitor network performance.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Packet level features</head><p>Packet-based Intrusion Detection Systems (IDS) are highly regarded for their flexibility in intrusion detection patterns due to the comprehensive volume of data they capture, including all headers up to the application layer (OSI layer 7) and the complete payload. This enables precise rule definition on any part of the traffic, resulting in less number of false positives and higher alert confidence. Implementing simple packet-based IDS is comparatively straightforward, as there's no need to decode protocols beforehand. In some scenarios, when complete data is available in real-time, packet-based IDSs do an excellent job with maximum time resolution. However, encrypted payloads pose a challenge for such systems as signature matching becomes impractical and decreases detection performance.</p><p>Packet-based IDSs process all traffic forwarded to them, which lead to higher resource usage. Filtering, aggregation, and state handling are managed entirely on the IDS machine: either through libraries like PCAP or within the IDS itself. Packet-based IDS, particularly without hardware pre-filters, can have a significant processing load, which can lead to system overload. Additionally, packet-based IDSs receive the full payload data of every packet, raising issues about the exposure of confidential information. <ref type="bibr" target="#b7">[9]</ref> Packet-level features include, but not limited to packet size, protocol, source, destination, IP addresses, port numbers, flags.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Flow level features</head><p>Cisco NetFlow is a proprietary but openly documented format for transmitting aggregated network data, widely recognized as a standard for flow records. Although it is primarily used for network monitoring rather than intrusion detection, its widespread implementation allows it to be further exploited for intrusion detection without additional computational expenses. Despite its original purpose was not intrusion detection, research demonstrates its effectiveness in detecting certain attacks.</p><p>Flow-based feature extraction often relies on the NetFlow protocol. NetFlow records typically contain aggregated data up to the network layer (OSI layer 3), and, depending on probe configuration, may include specific transport (OSI layer 4) information such as TCP flags. Due to the restricted data available in flow-based IDS, defining precise detection rules may not always be feasible, potentially leading to reduced alert confidence and increased false positives.</p><p>The generation of flow records introduces a delay between connection establishment and record transmission to the IDS. Depending on configuration, records may only be emitted postconnection closure or timeout, potentially affecting time-sensitive intrusion detection tasks.</p><p>Flows may not have sufficient time resolution for some intrusion detection needs, such as determining byte transmission timings. However, encrypted payloads do not interfere with flow-based IDS functionality.</p><p>NetFlow data, being aggregated, results in reduced processing requirements for the IDS, generally lowering resource usage. Additionally, NetFlow data poses fewer privacy concerns because most of the potentially sensitive content of the connection remains within the transmission network. Some of the flow features could be extracted are flow size, flow duration, protocol, source and destination IP addresses.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Most popular tools 4.1. CICflowmeter</head><p>CICFlowMeter is a network traffic flow generator and analyzer. <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b5">6]</ref> It can be used to generate bidirectional flows, where the first packet determines the forward (source to destination) and backward (destination to source) directions, hence more than 80 statistical network traffic features such as Duration, Number of packets, Number of bytes, Length of packets, etc. can be calculated separately in the forward and backward directions.</p><p>Additional functionalities include, selecting features from the list of existing features, adding new features, and controlling the duration of flow timeout. The output of the application is the CSV format file that has six columns labeled for each flow (FlowID, SourceIP, DestinationIP, SourcePort, DestinationPort, and Protocol) with more than 80 network traffic analysis features.</p><p>CICFlowMeter was used for the creation of CIC-IDS2017 Intrusion detection evaluation dataset. <ref type="bibr" target="#b8">[10,</ref><ref type="bibr" target="#b10">12]</ref> And was used for similar network threat detection research, such as <ref type="bibr" target="#b9">[11]</ref>.</p><p>The original tool is available as Java package and source code <ref type="bibr" target="#b11">[13]</ref>. There is also Python version created by the community <ref type="bibr" target="#b12">[14]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">Wireshark</head><p>Wireshark is a widely used network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network in real-time. It's available for various platforms like Windows, macOS, and Linux. <ref type="bibr">[15]</ref> Wireshark can capture data from a live network connection or read data from a file. It supports hundreds of protocols and can display the captured data in a user-friendly format. This makes it an invaluable tool for network troubleshooting, analysis, software and protocol development, and education.</p><p>It provides detailed information about network packets, including their source and destination addresses, protocols used, packet size, and even the contents of individual packets. This level of insight into network traffic is crucial for diagnosing network issues, detecting security breaches, and understanding how applications communicate over a network.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3.">Argus</head><p>Argus is a network flow monitoring tool used for collecting and analyzing network traffic data. It differs from packet sniffers like Wireshark in that it focuses on summarizing network flows rather than capturing and analyzing individual packets.</p><p>Argus monitors network traffic and generates flow records containing information such as source and destination IP addresses, port numbers, protocol types, timestamps, and packet counts. These flow records provide a higher-level view of network activity, making it easier to identify trends, detect anomalies, and analyze network performance.</p><p>One of the key features of Argus is its ability to generate and export flow records in various formats, such as ASCII, binary, and XML. This flexibility allows for seamless integration with other network monitoring and analysis tools. [16]</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.4.">Snort</head><p>Many Network Intrusion Detection Systems (NIDS), whether they rely on misuse or anomaly detection methods, typically operate at the packet level. Among the most widely used opensource tools for intrusion detection is Snort, known for its simplicity and lightweight design, aligning with the misuse detection approach. Essentially, users input signatures, either in string format or more advanced regular expressions, into the system. Its compact size facilitates swift deployment across various network nodes. The system then scrutinizes network traffic for matches with the provided signatures, triggering alarms upon detection. While effective for a limited number of signatures, this approach often falters when faced with a large number of signatures or heavy traffic volumes. Similarly, other systems employing signature-based intrusion detection encounter comparable challenges.</p><p>It has a community version available for free, the subscription includes the latest up-to-date rules.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.5.">Zeek</head><p>Zeek, an open-source network intrusion detection system, while less popular than Snort, boasts compatibility with various Unix flavors. Its architecture is built on multiple layers, spanning from traffic capture to in-depth analysis, enabling easy extension of its capabilities. Zeek offers the flexibility to integrate Snort rules into its framework. Although its creators claim it does not strictly adhere to either misuse or anomaly detection paradigms, it tends to align more closely with the misuse paradigm, albeit from a basic standpoint. However, its fundamental design diverges from signature-based IDS by adopting an event-driven schema. Leveraging complex policies and Zeek's state awareness, it can also function as an anomaly detection system. In contrast to Snort, Zeek exhibits high state awareness, capable of maintaining states across connection boundaries. This enables the modeling of attack patterns based on events occurring hours or even days apart.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Feature tool comparison</head><p>In this section we conduct comparative analysis of tools for network traffic feature extraction. Key features of the most popular tools are presented here. All of selected tools are open-source software, but some have a full version with advanced options that could be unlocked with a paid subscription (Snort requires subscription for an access to up to date rules for IDS). Table <ref type="table" target="#tab_0">1</ref> includes the list of chosen tools and their basic characteristics. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Yes</head><p>Wireshark is primarily a network protocol analyzer used for analyzing and troubleshooting network traffic. While it's not a dedicated Intrusion Detection System (IDS) like Zeek or Snort, it can be used as a component within an IDS setup. Wireshark captures packets on a network interface, making it possible to inspect the traffic in detail. Wireshark provides detailed analysis of captured packets, including used protocols, packet contents, source and destination addresses, etc. Patterns or anomalies in network traffic that may indicate suspicious or malicious activity can be detected via Wireshark's packet filtering and search capabilities.</p><p>Snort operates as a traditional IDS/IPS, conducting deep packet inspection and then applying signatures to traffic to detect and potentially block attacks. Therefore, it doesn't seem suitable for integration with AI systems.</p><p>In contrast, open-source software Zeek positions itself not as an IDS but as a network monitor and traffic analyzer. Its main function is to focus on comprehensive traffic inspection for signs of suspicious activity. Zeek supports a broad spectrum of traffic analysis tasks, extending beyond security to include performance measurement and troubleshooting.</p><p>Zeek's primary role appears to be capturing traffic details for external analysis systems. It emphasizes collecting comprehensive traffic information, sometimes integrating custom protocol dissectors tailored to the environment's protocols. While there's a functional overlap among these tools, their core objectives and utilization scenarios differ.</p><p>In this paper, we focus on using flow-based extraction tools, as they reduce the amount of resources required for processing data  In <ref type="bibr" target="#b14">[18]</ref>, results showed a constant superiority of Netflow compared to CICFlowmeter. Moreover, according to <ref type="bibr" target="#b15">[19,</ref><ref type="bibr" target="#b16">20]</ref>, the CICFlowMeter tool may present some incorrect implementation aspects both in the construction of the TCP protocol flows and in the extraction of attributes. Although the CICFlowTool was used in the most popular IDS benchmarking dataset (CIC-IDS-2017), it falls behind other tools compared here.</p><p>Because of all the criticism of CICFlowMeter presented, the most promising systems for IDS are Argus and Zeek.</p><p>In summary, while Argus and Zeek are valuable network monitoring tools, they have different strengths and are suitable for different use cases. Argus is ideal for flow data analysis and basic network traffic monitoring, while Zeek excels in deep protocol analysis and customizable network security monitoring.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusions</head><p>Effective network traffic data analysis is essential for understanding, managing, and securing modern computer networks. It provides valuable insights that empower organizations to optimize performance, detect threats, and make informed decisions. As technology evolves, network traffic data analysis remains critical for network security.</p><p>The importance of AI-based IDS has been discussed here. They can be used from intrusion detection to user behavior analysis. Advancements in machine learning and big data analytics can enhance its capabilities. However, machine learning algorithms can not work with raw network flow, so feature space has to be constructed in advance. The comparative analysis of key tools that allow feature extraction for various applications has been conducted in this paper. Additionally, some flow-based tools for network feature extraction have been compared, highlighting the strengths and weaknesses of each tool. It was shown that the final efficiency of models depends on feature space and can differ even for the same raw network traffic. In the future, we plan to make a more extensive comparison of tools, including packet-based systems as well.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc>Tools comparison</figDesc><table><row><cell>Name of the tool</cell><cell>Level</cell><cell>Able to analyze</cell></row><row><cell></cell><cell></cell><cell>real-time traffic</cell></row><row><cell>CICFlowmeter</cell><cell>Flow</cell><cell>No</cell></row><row><cell>Wireshark</cell><cell>Packet</cell><cell>Yes</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2</head><label>2</label><figDesc>Comparison of flow-based toolsThe following table includes the comparison of efficiency of the Random Forest classification model based on the same CIC-IDS2017 dataset with differently extracted features by CICFlowmeter and Zeek. The binary classification has been carried out, which labels network traffic as either "benign" (normal traffic) or "attack".</figDesc><table><row><cell>Feature</cell><cell>Argus</cell><cell>Zeek</cell><cell></cell><cell cols="2">CICFlowMeter</cell></row><row><cell>Focus</cell><cell>Primarily focuses on</cell><cell cols="2">Focuses on high-</cell><cell>Primarily</cell></row><row><cell></cell><cell>network flow data</cell><cell>level</cell><cell>network</cell><cell>designed</cell><cell>for</cell></row><row><cell></cell><cell>analysis. It captures and</cell><cell cols="2">protocol analysis. It</cell><cell>flow-based</cell></row><row><cell></cell><cell>analyzes network traffic</cell><cell cols="2">performs deep packet</cell><cell cols="2">network traffic</cell></row><row><cell></cell><cell>to generate flow records,</cell><cell cols="2">inspection to extract</cell><cell>analysis,</cell></row><row><cell></cell><cell>which provide detailed</cell><cell cols="2">higher-level network</cell><cell cols="2">particularly for</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 3</head><label>3</label><figDesc>Comparative results of Zeek and CICFlowmeter on CIC-IDS2017<ref type="bibr" target="#b13">[17]</ref> </figDesc><table><row><cell>Name of the tool</cell><cell>LABEL</cell><cell>Random forest</cell></row><row><cell></cell><cell></cell><cell>F1 score</cell></row><row><cell></cell><cell>Benign</cell><cell>0.994</cell></row><row><cell>CICFlowmeter</cell><cell></cell><cell></cell></row><row><cell></cell><cell>Attack</cell><cell>0.976</cell></row><row><cell></cell><cell>Benign</cell><cell>0.998</cell></row><row><cell>Zeek</cell><cell></cell><cell></cell></row><row><cell></cell><cell>Attack</cell><cell>0.992</cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Signature-based Approach to Detecting Malicious Outgoing Traffic</title>
		<author>
			<persName><forename type="first">N</forename><surname>Petliak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Klots</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Titova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Cheshun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Boyarchuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">4th International Workshop on Intelligent Information Technologies and Systems of Information Security, IntellTSIS 2023</title>
				<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="486" to="506" />
		</imprint>
	</monogr>
	<note>CEUR Workshop Proceedings</note>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Accepted: 2018) A Signature-based Intrusion Detection System for the Internet of Things</title>
		<author>
			<persName><forename type="first">Philokypros</forename><surname>Ioulianou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Vasileios</forename><surname>Vasilakis</surname></persName>
		</author>
		<author>
			<persName><surname>Orcid</surname></persName>
		</author>
		<idno>org/0000-0003-4902-8226</idno>
	</analytic>
	<monogr>
		<title level="m">Information and Communication Technology Form</title>
				<imprint>
			<publisher>Press</publisher>
			<date type="published" when="2018-07-13">11-13 Jul 2018</date>
		</imprint>
		<respStmt>
			<orgName>Moscholios, Ioannis et al.</orgName>
		</respStmt>
	</monogr>
	<note>1 more author</note>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Evaluation of the efficiency of the system for detecting malicious outgoing traffic in public networks</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Klots</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Petliak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Titova</surname></persName>
		</author>
		<idno type="DOI">10.1109/DESSERT61349.2023.10416502</idno>
	</analytic>
	<monogr>
		<title level="m">13th International Conference on Dependable Systems, Services and Technologies (DESSERT)</title>
				<meeting><address><addrLine>Athens, Greece</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2023">2023. 2023</date>
			<biblScope unit="page" from="1" to="5" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Towards evaluation of nidss in adversarial setting</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">J</forename><surname>Hashemi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Cusack</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Keller</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 3rd ACM CoNEXT Workshop on Big DAta, Machine Learning and Artificial Intelligence for Data Communication Networks</title>
				<meeting>the 3rd ACM CoNEXT Workshop on Big DAta, Machine Learning and Artificial Intelligence for Data Communication Networks</meeting>
		<imprint>
			<date type="published" when="2019-12">2019. December</date>
			<biblScope unit="page" from="14" to="21" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Network Attack Detection Using Machine Learning Methods</title>
		<author>
			<persName><forename type="first">N</forename><surname>Zagorodna</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Stadnyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Lypa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Gavrylov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Kozak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Challenges to national defence in contemporary geopolitical situation</title>
				<imprint>
			<date type="published" when="2022">2022. 2022</date>
			<biblScope unit="page" from="55" to="61" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Evaluating standard feature sets towards increased generalisability and explainability of ML-based network intrusion detection</title>
		<author>
			<persName><forename type="first">M</forename><surname>Sarhan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Layeghy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Portmann</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Big Data Research</title>
		<imprint>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="page">100359</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Feature selection for intrusion detection system in Internet-of-Things (IoT)</title>
		<author>
			<persName><forename type="first">P</forename><surname>Nimbalkar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Kshirsagar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ICT Express</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="177" to="181" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Flow-based and packet-based intrusion detection using BLSTM</title>
		<author>
			<persName><forename type="first">B</forename><surname>Andreas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Dilruksha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Mccandless</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">SMU Data Science Review</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page">8</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<author>
			<persName><surname>Cicflowmeter</surname></persName>
		</author>
		<title level="m">Canadian institute for cybersecurity</title>
				<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
	<note>cic</note>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Characterization of tor traffic using time based features</title>
		<author>
			<persName><forename type="first">A</forename><surname>Habibi Lashkari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Draper Gil</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">S I</forename><surname>Mamun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Ghorbani</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 3rd International Conference on Information Systems Security and Privacy (ICISSP)</title>
				<meeting>the 3rd International Conference on Information Systems Security and Privacy (ICISSP)</meeting>
		<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="253" to="262" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Toward generating a new intrusion detection dataset and intrusion traffic characterization</title>
		<author>
			<persName><forename type="first">I</forename><surname>Sharafaldin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">H</forename><surname>Lashkari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Ghorbani</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ICISSp</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="108" to="116" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<ptr target="https://github.com/ahlashkari/CICFlowMeter" />
		<title level="m">CICFlowMeter GitHub</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<ptr target="https://github.com/hieulw/cicflowmeter" />
		<title level="m">Python CICFlowMeter</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Evaluation of machine learning techniques for traffic flow-based intrusion detection</title>
		<author>
			<persName><forename type="first">M</forename><surname>Rodríguez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Á</forename><surname>Alesanco</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Mehavilla</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>García</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Sensors</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<biblScope unit="issue">23</biblScope>
			<date type="published" when="2022">2022. 9326</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Evaluating standard feature sets towards increased generalisability and explainability of ML-based network intrusion detection</title>
		<author>
			<persName><forename type="first">M</forename><surname>Sarhan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Layeghy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Portmann</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Big Data Research</title>
		<imprint>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="page">100359</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Troubleshooting an intrusion detection dataset: The CICIDS2017 case study</title>
		<author>
			<persName><forename type="first">G</forename><surname>Engelen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Rimmer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Joosen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2021 IEEE Symposium on Security and Privacy Workshops</title>
				<meeting>the 2021 IEEE Symposium on Security and Privacy Workshops<address><addrLine>SPW, San Francisco, CA, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2021-05-27">27-27 May 2021</date>
			<biblScope unit="page" from="7" to="12" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Network intrusion detection: A comprehensive analysis of CIC-IDS2017</title>
		<author>
			<persName><forename type="first">A</forename><surname>Rosay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Cheval</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Carlier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Leroux</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 8th International Conference on Information Systems Security and Privacy (ICISSP 2022)</title>
				<meeting>the 8th International Conference on Information Systems Security and Privacy (ICISSP 2022)</meeting>
		<imprint>
			<date type="published" when="2022-02-11">9-11 February 2022</date>
			<biblScope unit="page" from="25" to="36" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
