{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:44:13Z","timestamp":1740102253235,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","funder":[{"name":"Direction G\u00e9n\u00e9rale de l\u00f0Armement"},{"name":"R\u00e9gion Bretagne"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,16]]},"DOI":"10.1145\/3607199.3607247","type":"proceedings-article","created":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T22:30:51Z","timestamp":1696372251000},"page":"135-150","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Towards Understanding Alerts raised by Unsupervised Network Intrusion Detection Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-0368-2153","authenticated-orcid":false,"given":"Maxime","family":"Lanvin","sequence":"first","affiliation":[{"name":"CentraleSup\u00e9lec, Univ. Rennes, IRISA, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4238-4423","authenticated-orcid":false,"given":"Pierre-Fran\u00e7ois","family":"Gimenez","sequence":"additional","affiliation":[{"name":"CentraleSup\u00e9lec, Univ. Rennes, IRISA, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9035-6718","authenticated-orcid":false,"given":"Yufei","family":"Han","sequence":"additional","affiliation":[{"name":"Inria, Univ. Rennes, IRISA, France"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-9558-397X","authenticated-orcid":false,"given":"Fr\u00e9d\u00e9ric","family":"Majorczyk","sequence":"additional","affiliation":[{"name":"DGA-MI, Univ. Rennes, IRISA, France"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-1103-2430","authenticated-orcid":false,"given":"Ludovic","family":"M\u00e9","sequence":"additional","affiliation":[{"name":"Inria, Univ. Rennes, France, France"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-2774-007X","authenticated-orcid":false,"given":"Eric","family":"Totel","sequence":"additional","affiliation":[{"name":"Samovar, T\u00e9l\u00e9com SudParis, Institut Polytechnique de Paris, France"}]}],"member":"320","published-online":{"date-parts":[[2023,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2870052"},{"key":"e_1_3_2_1_2_1","volume-title":"Towards an interpretable autoencoder: A decision-tree-based autoencoder and its application in anomaly detection","author":"Aguilar Diana\u00a0Laura","year":"2022","unstructured":"Diana\u00a0Laura Aguilar, Miguel\u00a0Angel Medina-P\u00e9rez, Octavio Loyola-Gonzalez, Kim-Kwang\u00a0Raymond Choo, and Edoardo Bucheli-Susarrey. 2022. Towards an interpretable autoencoder: A decision-tree-based autoencoder and its application in anomaly detection. IEEE transactions on dependable and secure computing 20, 2 (2022), 1048\u20131059."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4150"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117144"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115736"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP49622.2020.9259390"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1164015"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-022-00926-7"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015399"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833671"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3430984.3431015"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23349"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2022.09.550"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 34th International Conference on Machine Learning(Proceedings of Machine Learning Research, Vol.\u00a070)","author":"Koh Pang\u00a0Wei","year":"2017","unstructured":"Pang\u00a0Wei Koh and Percy Liang. 2017. Understanding Black-box Predictions via Influence Functions. In Proceedings of the 34th International Conference on Machine Learning(Proceedings of Machine Learning Research, Vol.\u00a070), Doina Precup and Yee\u00a0Whye Teh (Eds.). PMLR, 1885\u20131894. https:\/\/proceedings.mlr.press\/v70\/koh17a.html"},{"volume-title":"Risks and Security of Internet and Systems, Slim Kallel, Mohamed Jmaiel, Mohammad Zulkernine, Ahmed Hadj\u00a0Kacem, Fr\u00e9d\u00e9ric Cuppens","author":"Lanvin Maxime","key":"e_1_3_2_1_15_1","unstructured":"Maxime Lanvin, Pierre-Fran\u00e7ois Gimenez, Yufei Han, Fr\u00e9d\u00e9ric Majorczyk, Ludovic M\u00e9, and \u00c9ric Totel. 2023. Errors in\u00a0the\u00a0CICIDS2017 Dataset and\u00a0the\u00a0Significant Differences in\u00a0Detection Performances It Makes. In Risks and Security of Internet and Systems, Slim Kallel, Mohamed Jmaiel, Mohammad Zulkernine, Ahmed Hadj\u00a0Kacem, Fr\u00e9d\u00e9ric Cuppens, and Nora Cuppens (Eds.). Springer Nature Switzerland, Cham, 18\u201333."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Laetitia Leichtnam Eric Totel Nicolas Prigent and Ludovic M\u00e9. 2020. Sec2graph: Network Attack Detection Based on Novelty Detection on Graph Structured Data. In DIMVA. 238\u2013258.","DOI":"10.1007\/978-3-030-52683-2_12"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS56114.2022.9947235"},{"key":"e_1_3_2_1_18_1","volume-title":"Lundberg and Su-In Lee","author":"M.","year":"2017","unstructured":"Scott\u00a0M. Lundberg and Su-In Lee. 2017. A Unified Approach to Interpreting Model Predictions. In NIPS."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2019.8802833"},{"key":"e_1_3_2_1_20_1","unstructured":"Rattana Pukdee Dylan Sam Maria-Florina Balcan and Pradeep Ravikumar. 2023. Label Propagation with Weak Supervision. arxiv:2210.03594\u00a0[cs.LG]"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5220\/0010774000003120"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Iman Sharafaldin Arash\u00a0Habibi Lashkari and Ali\u00a0A. Ghorbani. 2018. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. In ICISSP.","DOI":"10.5220\/0006639801080116"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2021.101946"}],"event":{"name":"RAID 2023: The 26th International Symposium on Research in Attacks, Intrusions and Defenses","acronym":"RAID 2023","location":"Hong Kong China"},"container-title":["Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607199.3607247","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T10:29:31Z","timestamp":1729074571000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607199.3607247"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":24,"alternative-id":["10.1145\/3607199.3607247","10.1145\/3607199"],"URL":"https:\/\/doi.org\/10.1145\/3607199.3607247","relation":{},"subject":[],"published":{"date-parts":[[2023,10,16]]},"assertion":[{"value":"2023-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}