{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:59:01Z","timestamp":1725811141848},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,29]],"date-time":"2017-08-29T00:00:00Z","timestamp":1503964800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,29]]},"DOI":"10.1145\/3098954.3106068","type":"proceedings-article","created":{"date-parts":[[2017,8,10]],"date-time":"2017-08-10T12:12:36Z","timestamp":1502367156000},"page":"1-6","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Machine Learning Approach for Detection of nonTor Traffic"],"prefix":"10.1145","author":[{"given":"Elike","family":"Hodo","sequence":"first","affiliation":[{"name":"University of Strathclyde, Scotland"}]},{"given":"Xavier","family":"Bellekens","sequence":"additional","affiliation":[{"name":"University of Abertay Dundee Scotland"}]},{"given":"Ephraim","family":"Iorkyase","sequence":"additional","affiliation":[{"name":"University of Strathclyde, Scotland"}]},{"given":"Andrew","family":"Hamilton","sequence":"additional","affiliation":[{"name":"University of Strathclyde, Scotland"}]},{"given":"Christos","family":"Tachtatzis","sequence":"additional","affiliation":[{"name":"University of Strathclyde, Scotland"}]},{"given":"Robert","family":"Atkinson","sequence":"additional","affiliation":[{"name":"University of Strathclyde, Scotland"}]}],"member":"320","published-online":{"date-parts":[[2017,8,29]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1109\/TIFS.2015.2465934"},{"key":"e_1_3_2_1_2_1","first-page":"19","volume-title":"Networks and Applications (ICFCNA 2014 - Malaysia)","author":"Ghafir I.","year":"2014"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/2516760.2516773"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1109\/TIT.1976.1055638"},{"unstructured":"R. Dingledine and P. Syverson \"Tor: The Second-Generation Onion Router.\" R. Dingledine and P. Syverson \"Tor: The Second-Generation Onion Router.\"","key":"e_1_3_2_1_5_1"},{"doi-asserted-by":"crossref","unstructured":"F. A. Saputra I. U. Nadhori and B. F. Barry \"Detecting and blocking onion router traffic using deep packet inspection \" in 2016 International Electronics Symposium (IES) 2016 pp. 283--288. F. A. Saputra I. U. Nadhori and B. F. Barry \"Detecting and blocking onion router traffic using deep packet inspection \" in 2016 International Electronics Symposium (IES) 2016 pp. 283--288.","key":"e_1_3_2_1_6_1","DOI":"10.1109\/ELECSYM.2016.7861018"},{"unstructured":"A. H. Lashkari G. D. Gil M. S. I. Mamun and A. A. Ghorbani \"Characterization of Tor Traffic using Time based Features \" pp. 253--262 2017. A. H. Lashkari G. D. Gil M. S. I. Mamun and A. A. Ghorbani \"Characterization of Tor Traffic using Time based Features \" pp. 253--262 2017.","key":"e_1_3_2_1_7_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1109\/SURV.2008.080406"},{"volume-title":"Proceedings of the 13th USENIX conference on System administration","year":"1999","first-page":"229","key":"e_1_3_2_1_9_1"},{"doi-asserted-by":"crossref","unstructured":"B. Subba S. Biswas and S. Karmakar \"A Neural Network based system for Intrusion Detection and attack classification \" in 2016 Twenty Second National Conference on Communication (NCC) 2016 pp. 1--6. B. Subba S. Biswas and S. Karmakar \"A Neural Network based system for Intrusion Detection and attack classification \" in 2016 Twenty Second National Conference on Communication (NCC) 2016 pp. 1--6.","key":"e_1_3_2_1_10_1","DOI":"10.1109\/NCC.2016.7561088"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1109\/CISIS.2015.73"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/2659651.2659723"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1109\/RAIT.2016.7507884"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/ICNC.2008.900"},{"key":"e_1_3_2_1_15_1","first-page":"1","volume-title":"Computers and Communications (ISNCC)","author":"Hodo E.","year":"2016"},{"doi-asserted-by":"crossref","unstructured":"E. Biglar Beigi H. Hadian Jazi N. Stakhanova and A. A. Ghorbani \"Towards effective feature selection in machine learning-based botnet detection approaches \" in 2014 IEEE Conference on Communications and Network Security 2014 pp. 247--255. E. Biglar Beigi H. Hadian Jazi N. Stakhanova and A. A. Ghorbani \"Towards effective feature selection in machine learning-based botnet detection approaches \" in 2014 IEEE Conference on Communications and Network Security 2014 pp. 247--255.","key":"e_1_3_2_1_16_1","DOI":"10.1109\/CNS.2014.6997492"},{"unstructured":"\"The CAIDA UCSD {ISCX Tor-nonTor dataset} - {June 2017}.\" {Online}. Available: http:\/\/www.caida.org\/data\/{http:\/\/www.unb.ca\/cic\/research\/datasets\/tor.html}. \"The CAIDA UCSD {ISCX Tor-nonTor dataset} - {June 2017}.\" {Online}. Available: http:\/\/www.caida.org\/data\/{http:\/\/www.unb.ca\/cic\/research\/datasets\/tor.html}.","key":"e_1_3_2_1_17_1"},{"issue":"122","key":"e_1_3_2_1_18_1","first-page":"11","article-title":"Understanding Intrusion Detection Systems","author":"Rozenblum D.","year":"2001","journal-title":"SANS Inst."},{"unstructured":"E. Hodo X. Bellekens A. Hamilton C. Tachtatzis R. Atkinson \"Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey.\" {Online}. Available: https:\/\/arxiv.org\/ftp\/arxiv\/papers\/1701\/1701.02145.pdf. {Accessed: 31-Mar-2017}. E. Hodo X. Bellekens A. Hamilton C. Tachtatzis R. Atkinson \"Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey.\" {Online}. Available: https:\/\/arxiv.org\/ftp\/arxiv\/papers\/1701\/1701.02145.pdf. {Accessed: 31-Mar-2017}.","key":"e_1_3_2_1_19_1"},{"unstructured":"\"What it is Network intrusion detection system? | COMBOFIX.\" {Online}. Available: http:\/\/www.combofix.org\/what-it-is-network-intrusion-detection-system.php. {Accessed: 10-Dec-2015}. \"What it is Network intrusion detection system? | COMBOFIX.\" {Online}. Available: http:\/\/www.combofix.org\/what-it-is-network-intrusion-detection-system.php. {Accessed: 10-Dec-2015}.","key":"e_1_3_2_1_20_1"},{"unstructured":"K. Murphy \"Machine learning: a probabilistic perspective \" Chance encounters: Probability in ... 2012. {Online}. Available: http:\/\/link.springer.com\/chapter\/10.1007\/978-94-011-3532-0_2. {Accessed: 06-Jan-2015}. K. Murphy \"Machine learning: a probabilistic perspective \" Chance encounters: Probability in ... 2012. {Online}. Available: http:\/\/link.springer.com\/chapter\/10.1007\/978-94-011-3532-0_2. {Accessed: 06-Jan-2015}.","key":"e_1_3_2_1_21_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1109\/COMST.2014.2320099"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1023\/A:1009715923555"},{"unstructured":"W. Hu Y. Liao and V. R. Vemuri \"Robust Support Vector Machines for Anomaly Detection in Computer Security.\" W. Hu Y. Liao and V. R. Vemuri \"Robust Support Vector Machines for Anomaly Detection in Computer Security.\"","key":"e_1_3_2_1_24_1"},{"unstructured":"M. A. Hall \"Correlation-based Feature Selection for Machine Learning \" 1999. M. A. Hall \"Correlation-based Feature Selection for Machine Learning \" 1999.","key":"e_1_3_2_1_25_1"}],"event":{"acronym":"ARES '17","name":"ARES '17: International Conference on Availability, Reliability and Security","location":"Reggio Calabria Italy"},"container-title":["Proceedings of the 12th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3098954.3106068","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T03:53:59Z","timestamp":1673582039000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3098954.3106068"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,29]]},"references-count":25,"alternative-id":["10.1145\/3098954.3106068","10.1145\/3098954"],"URL":"https:\/\/doi.org\/10.1145\/3098954.3106068","relation":{},"subject":[],"published":{"date-parts":[[2017,8,29]]},"assertion":[{"value":"2017-08-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}