{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T08:45:32Z","timestamp":1743497132846,"version":"3.37.3"},"reference-count":62,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100003725","name":"Global Research Laboratory (GRL) Program through the National Research Foundation of Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003621","name":"Ministry of Science and ICT","doi-asserted-by":"publisher","award":["NRF-2016K1A1A2912757"],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Korean government","award":["NRF-2019R1F1A1059898","NRF-2020R1A2C2009372"]},{"DOI":"10.13039\/501100003725","name":"Basic Science Research Program through the National Research Foundation of Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010002","name":"Ministry of Education","doi-asserted-by":"publisher","award":["NRF-2020R1A4A1018774"],"id":[{"id":"10.13039\/100010002","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2021.3137318","type":"journal-article","created":{"date-parts":[[2021,12,23]],"date-time":"2021-12-23T22:22:35Z","timestamp":1640298155000},"page":"5801-5823","source":"Crossref","is-referenced-by-count":20,"title":["Investigating the Effect of Traffic Sampling on Machine Learning-Based Network Intrusion Detection Approaches"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3103-6033","authenticated-orcid":false,"given":"Jumabek","family":"Alikhanov","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3417-6851","authenticated-orcid":false,"given":"Rhongho","family":"Jang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3368-6024","authenticated-orcid":false,"given":"Mohammed","family":"Abuhamad","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3227-2505","authenticated-orcid":false,"given":"David","family":"Mohaisen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5183-891X","authenticated-orcid":false,"given":"Daehun","family":"Nyang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9173-1575","authenticated-orcid":false,"given":"Youngtae","family":"Noh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2321898"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2011.5990529"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7011"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.05.009"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3954"},{"volume-title":"Network Intrusion Detection on UNSW-NB15","year":"2021","author":"Kumar","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895334"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-016-2418-1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-017-0630-0"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2772792"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/icscsr19.16"},{"key":"ref14","article-title":"Revisiting small batch training for deep neural networks","author":"Masters","year":"2018","journal-title":"arXiv:1804.07612"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/167954.166256"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2004.1281630"},{"volume-title":"Using NetFlow Sampling to Select the Network Traffic to Track","year":"2021","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155252"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.326"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2011.112311.100622"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452551"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.01.015"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.846400"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.863456"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452550"},{"key":"ref26","first-page":"151","article-title":"Towards next-generation intrusion detection","volume-title":"Proc. 3rd Int. Conf. Cyber Conflict","author":"Koch"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2555109"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.05.019"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com:20070231"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.884027"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177102"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.03.018"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9348167"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23204"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10111341"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3390\/app10197009"},{"volume-title":"CICFlowmeter-V4.0. Github","year":"2021","author":"Lashkari","key":"ref39"},{"volume-title":"NetFlow","year":"2021","key":"ref40"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2722"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3917"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2012.6135854"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"volume-title":"CSE-CIC-IDS 2018 on AWS","year":"2019","author":"Lashkari","key":"ref45"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00202"},{"key":"ref47","first-page":"311","article-title":"FlowRadar: A better netflow for data centers","volume-title":"Proc. 13th USENIX Symp. Netw. Syst. Design Implement. (NSDI)","author":"Li"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3178582"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8126009"},{"key":"ref50","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"Pedregosa","year":"2011","journal-title":"J. Mach. Learn. Res."},{"volume-title":"Training a Single AI Model Can Emit as Much Carbon as Five Cars in Their Lifetimes","year":"2021","author":"Hao","key":"ref51"},{"volume-title":"Keras","year":"2021","author":"Gulli","key":"ref52"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.09.038"},{"key":"ref55","first-page":"8024","article-title":"PyTorch: An imperative style, high-performance deep learning library","volume-title":"Proc. NeurIPS","author":"Paszke"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106944"},{"key":"ref57","first-page":"229","article-title":"Snort\u2013lightweight intrusion detection for networks","volume-title":"Proc. 13th USENIX Conf. Syst. Admin.","author":"Roesch"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-021-05998-6"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1049\/iet-its.2019.0784"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v11i4.pp3013-3021"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2021.3074785"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.3390\/s21113922"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09661375.pdf?arnumber=9661375","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T00:07:03Z","timestamp":1704845223000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9661375\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":62,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3137318","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2022]]}}}