{"id":"https://openalex.org/W3036673316","doi":"https://doi.org/10.1007/978-3-030-50423-6_15","title":"On the Impact of Network Data Balancing in Cybersecurity Applications","display_name":"On the Impact of Network Data Balancing in Cybersecurity Applications","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3036673316","doi":"https://doi.org/10.1007/978-3-030-50423-6_15","mag":"3036673316"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-50423-6_15","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-030-50423-6_15","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-030-50423-6_15.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-030-50423-6_15.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088536972","display_name":"Marek Pawlicki","orcid":"https://orcid.org/0000-0001-5881-6406"},"institutions":[{"id":"https://openalex.org/I1300393620","display_name":"Bydgoszcz University of Science and Technology","ror":"https://ror.org/049eq0c58","country_code":"PL","type":"education","lineage":["https://openalex.org/I1300393620"]},{"id":"https://openalex.org/I4210118437","display_name":"Instytut Technik Telekomunikacyjnych i Informatycznych (Poland)","ror":"https://ror.org/02r65gs06","country_code":"PL","type":"company","lineage":["https://openalex.org/I4210118437"]},{"id":"https://openalex.org/I686019","display_name":"AGH University of Krakow","ror":"https://ror.org/00bas1c41","country_code":"PL","type":"education","lineage":["https://openalex.org/I686019"]}],"countries":["PL"],"is_corresponding":true,"raw_author_name":"Marek Pawlicki","raw_affiliation_strings":["ITTI Sp. z o.o., Pozna\u0144, Poland","UTP University of Science and Technology, Bydgoszcz, Poland"],"affiliations":[{"raw_affiliation_string":"ITTI Sp. z o.o., Pozna\u0144, Poland","institution_ids":["https://openalex.org/I4210118437"]},{"raw_affiliation_string":"UTP University of Science and Technology, Bydgoszcz, Poland","institution_ids":["https://openalex.org/I686019","https://openalex.org/I1300393620"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009283476","display_name":"Micha\u0142 Chora\u015b","orcid":"https://orcid.org/0000-0003-1405-9911"},"institutions":[{"id":"https://openalex.org/I1300393620","display_name":"Bydgoszcz University of Science and Technology","ror":"https://ror.org/049eq0c58","country_code":"PL","type":"education","lineage":["https://openalex.org/I1300393620"]},{"id":"https://openalex.org/I4210118437","display_name":"Instytut Technik Telekomunikacyjnych i Informatycznych (Poland)","ror":"https://ror.org/02r65gs06","country_code":"PL","type":"company","lineage":["https://openalex.org/I4210118437"]},{"id":"https://openalex.org/I686019","display_name":"AGH University of Krakow","ror":"https://ror.org/00bas1c41","country_code":"PL","type":"education","lineage":["https://openalex.org/I686019"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Micha\u0142 Chora\u015b","raw_affiliation_strings":["ITTI Sp. z o.o., Pozna\u0144, Poland","UTP University of Science and Technology, Bydgoszcz, Poland"],"affiliations":[{"raw_affiliation_string":"ITTI Sp. z o.o., Pozna\u0144, Poland","institution_ids":["https://openalex.org/I4210118437"]},{"raw_affiliation_string":"UTP University of Science and Technology, Bydgoszcz, Poland","institution_ids":["https://openalex.org/I686019","https://openalex.org/I1300393620"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042632349","display_name":"Rafa\u0142 Kozik","orcid":"https://orcid.org/0000-0001-7122-3306"},"institutions":[{"id":"https://openalex.org/I686019","display_name":"AGH University of Krakow","ror":"https://ror.org/00bas1c41","country_code":"PL","type":"education","lineage":["https://openalex.org/I686019"]},{"id":"https://openalex.org/I1300393620","display_name":"Bydgoszcz University of Science and Technology","ror":"https://ror.org/049eq0c58","country_code":"PL","type":"education","lineage":["https://openalex.org/I1300393620"]},{"id":"https://openalex.org/I4210118437","display_name":"Instytut Technik Telekomunikacyjnych i Informatycznych (Poland)","ror":"https://ror.org/02r65gs06","country_code":"PL","type":"company","lineage":["https://openalex.org/I4210118437"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Rafa\u0142 Kozik","raw_affiliation_strings":["ITTI Sp. z o.o., Pozna\u0144, Poland","UTP University of Science and Technology, Bydgoszcz, Poland"],"affiliations":[{"raw_affiliation_string":"ITTI Sp. z o.o., Pozna\u0144, Poland","institution_ids":["https://openalex.org/I4210118437"]},{"raw_affiliation_string":"UTP University of Science and Technology, Bydgoszcz, Poland","institution_ids":["https://openalex.org/I686019","https://openalex.org/I1300393620"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049392593","display_name":"Witold Ho\u0142ubowicz","orcid":"https://orcid.org/0000-0001-5945-8698"},"institutions":[{"id":"https://openalex.org/I1300393620","display_name":"Bydgoszcz University of Science and Technology","ror":"https://ror.org/049eq0c58","country_code":"PL","type":"education","lineage":["https://openalex.org/I1300393620"]},{"id":"https://openalex.org/I686019","display_name":"AGH University of Krakow","ror":"https://ror.org/00bas1c41","country_code":"PL","type":"education","lineage":["https://openalex.org/I686019"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Witold Ho\u0142ubowicz","raw_affiliation_strings":["UTP University of Science and Technology, Bydgoszcz, Poland"],"affiliations":[{"raw_affiliation_string":"UTP University of Science and Technology, Bydgoszcz, Poland","institution_ids":["https://openalex.org/I686019","https://openalex.org/I1300393620"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5088536972"],"corresponding_institution_ids":["https://openalex.org/I1300393620","https://openalex.org/I4210118437","https://openalex.org/I686019"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392},"fwci":10.8884,"has_fulltext":true,"cited_by_count":24,"citation_normalized_percentile":{"value":0.98821861,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"196","last_page":"210"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8827255964279175},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.5842037796974182},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5467272996902466},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.54006028175354},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.523903489112854},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.44902101159095764},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4471830427646637},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.43352988362312317},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3517678380012512}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8827255964279175},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.5842037796974182},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5467272996902466},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.54006028175354},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.523903489112854},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.44902101159095764},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4471830427646637},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.43352988362312317},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3517678380012512},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-030-50423-6_15","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-030-50423-6_15","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-030-50423-6_15.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:pubmedcentral.nih.gov:7303680","is_oa":true,"landing_page_url":"https://www.ncbi.nlm.nih.gov/pmc/articles/7303680","pdf_url":null,"source":{"id":"https://openalex.org/S2764455111","display_name":"PubMed Central","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computational Science \u2013 ICCS 2020","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.1007/978-3-030-50423-6_15","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-030-50423-6_15","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-030-50423-6_15.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1408323592","display_name":null,"funder_award_id":"830892","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G4956428346","display_name":null,"funder_award_id":"Horizon 2020 research and innovatio","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G5036817778","display_name":null,"funder_award_id":"European Union's Horizon 2020 research and innov","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8318064016","display_name":null,"funder_award_id":"Horizon","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8633428685","display_name":null,"funder_award_id":"European Union's Horizon 2020 research and innovat","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3036673316.pdf","grobid_xml":"https://content.openalex.org/works/W3036673316.grobid-xml"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W1591261915","https://openalex.org/W1993398788","https://openalex.org/W2002830978","https://openalex.org/W2061068374","https://openalex.org/W2101807845","https://openalex.org/W2132791018","https://openalex.org/W2466964703","https://openalex.org/W2602509076","https://openalex.org/W2725958610","https://openalex.org/W2789600509","https://openalex.org/W2789828921","https://openalex.org/W2796206070","https://openalex.org/W2799416244","https://openalex.org/W2807544420","https://openalex.org/W2888030392","https://openalex.org/W2889773516","https://openalex.org/W2903652620","https://openalex.org/W2911964244","https://openalex.org/W2951146859","https://openalex.org/W2971986980","https://openalex.org/W3100268192","https://openalex.org/W3155649056","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2349835884","https://openalex.org/W4220688378","https://openalex.org/W3171671300","https://openalex.org/W3045016378","https://openalex.org/W2961085424","https://openalex.org/W4388533926","https://openalex.org/W2095691935","https://openalex.org/W4224009465","https://openalex.org/W4285551868","https://openalex.org/W4306674287"],"abstract_inverted_index":{"Machine":[0],"learning":[1,64,99,125],"methods":[2],"are":[3,85],"now":[4],"widely":[5],"used":[6,17],"to":[7,52,69],"detect":[8],"a":[9,67],"wide":[10],"range":[11],"of":[12,22,27,41,44,98,113],"cyberattacks.":[13],"Nevertheless,":[14],"the":[15,42,57,96,106],"commonly":[16],"algorithms":[18],"come":[19],"with":[20,119],"challenges":[21],"their":[23,120],"own":[24],"-":[25],"one":[26],"them":[28],"lies":[29],"in":[30,39,80,93,105],"network":[31,81,102],"dataset":[32,35],"characteristics.":[33],"The":[34],"should":[36],"be":[37],"well-balanced":[38],"terms":[40],"number":[43,112],"malicious":[45,88],"data":[46,58,83,104],"samples":[47,51,73,89],"vs.":[48],"benign":[49,91],"traffic":[50,82,103],"achieve":[53],"adequate":[54],"results.":[55],"When":[56],"is":[59,109,116],"not":[60],"balanced,":[61],"numerous":[62],"machine":[63,124],"approaches":[65,115],"show":[66],"tendency":[68],"classify":[70],"minority":[71],"class":[72,76],"as":[74],"majority":[75],"samples.":[77],"Since":[78],"usually":[79],"there":[84],"significantly":[86],"fewer":[87],"than":[90],"samples,":[92],"this":[94],"work":[95],"problem":[97],"from":[100],"imbalanced":[101],"cybersecurity":[107],"domain":[108],"addressed.":[110],"A":[111],"balancing":[114],"evaluated":[117],"along":[118],"impact":[121],"on":[122],"different":[123],"algorithms.":[126]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":7}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
