{"id":"https://openalex.org/W4318185305","doi":"https://doi.org/10.1109/bigdata55660.2022.10020792","title":"Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware: Neural Network Algorithms for Network Denial of Service (DOS) Detection","display_name":"Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware: Neural Network Algorithms for Network Denial of Service (DOS) Detection","publication_year":2022,"publication_date":"2022-12-17","ids":{"openalex":"https://openalex.org/W4318185305","doi":"https://doi.org/10.1109/bigdata55660.2022.10020792"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata55660.2022.10020792","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/bigdata55660.2022.10020792","pdf_url":null,"source":{"id":"https://openalex.org/S4363607709","display_name":"2022 IEEE International Conference on Big Data (Big Data)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007582133","display_name":"Md Jobair Hossain Faruk","orcid":"https://orcid.org/0000-0002-6316-5334"},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Md Jobair Hossain Faruk","raw_affiliation_strings":["Kennesaw State University,Department of Software Engineering and Game Development,USA","Department of Software Engineering and Game Development, Kennesaw State University, USA"],"affiliations":[{"raw_affiliation_string":"Kennesaw State University,Department of Software Engineering and Game Development,USA","institution_ids":["https://openalex.org/I172980758"]},{"raw_affiliation_string":"Department of Software Engineering and Game Development, Kennesaw State University, USA","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052820694","display_name":"Hossain Shahriar","orcid":"https://orcid.org/0000-0003-1021-7986"},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hossain Shahriar","raw_affiliation_strings":["Kennesaw State University,Department of Information Technology,USA","Department of Information Technology, Kennesaw State University, USA"],"affiliations":[{"raw_affiliation_string":"Kennesaw State University,Department of Information Technology,USA","institution_ids":["https://openalex.org/I172980758"]},{"raw_affiliation_string":"Department of Information Technology, Kennesaw State University, USA","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102803079","display_name":"Kai Qian","orcid":"https://orcid.org/0000-0002-2112-1819"},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kai Qian","raw_affiliation_strings":["Kennesaw State University,Institute for Cyber Workforce Development,USA","Institute for Cyber Workforce Development, Kennesaw State University, USA"],"affiliations":[{"raw_affiliation_string":"Kennesaw State University,Institute for Cyber Workforce Development,USA","institution_ids":["https://openalex.org/I172980758"]},{"raw_affiliation_string":"Institute for Cyber Workforce Development, Kennesaw State University, USA","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085923839","display_name":"Dan Lo","orcid":"https://orcid.org/0000-0003-4396-0370"},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dan Lo","raw_affiliation_strings":["Kennesaw State University,Institute for Cyber Workforce Development,USA","Institute for Cyber Workforce Development, Kennesaw State University, USA"],"affiliations":[{"raw_affiliation_string":"Kennesaw State University,Institute for Cyber Workforce Development,USA","institution_ids":["https://openalex.org/I172980758"]},{"raw_affiliation_string":"Institute for Cyber Workforce Development, Kennesaw State University, USA","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083736242","display_name":"Michael E. Whitman","orcid":"https://orcid.org/0000-0002-4075-0995"},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael Whitman","raw_affiliation_strings":["Kennesaw State University,Department Computer Science,USA","Department Computer Science, Kennesaw State University, USA"],"affiliations":[{"raw_affiliation_string":"Kennesaw State University,Department Computer Science,USA","institution_ids":["https://openalex.org/I172980758"]},{"raw_affiliation_string":"Department Computer Science, Kennesaw State University, USA","institution_ids":["https://openalex.org/I172980758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053225136","display_name":"Alfredo Cuzzocrea","orcid":"https://orcid.org/0000-0002-7104-6415"},"institutions":[{"id":"https://openalex.org/I45204951","display_name":"University of Calabria","ror":"https://ror.org/02rc97e94","country_code":"IT","type":"education","lineage":["https://openalex.org/I45204951"]},{"id":"https://openalex.org/I4210121838","display_name":"Laboratoire Lorrain de Recherche en Informatique et ses Applications","ror":"https://ror.org/02vnf0c38","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I277688954","https://openalex.org/I4210107720","https://openalex.org/I4210121838","https://openalex.org/I4210159245","https://openalex.org/I90183372"]}],"countries":["FR","IT"],"is_corresponding":false,"raw_author_name":"Alfredo Cuzzocrea","raw_affiliation_strings":["University of Calabria,iDEA Lab,Rende,Italy","LORIA, Nancy, France","iDEA Lab, University of Calabria, Rende, Italy"],"affiliations":[{"raw_affiliation_string":"University of Calabria,iDEA Lab,Rende,Italy","institution_ids":["https://openalex.org/I45204951"]},{"raw_affiliation_string":"LORIA, Nancy, France","institution_ids":["https://openalex.org/I4210121838"]},{"raw_affiliation_string":"iDEA Lab, University of Calabria, Rende, Italy","institution_ids":["https://openalex.org/I45204951"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101803324","display_name":"Fan Wu","orcid":"https://orcid.org/0000-0002-6248-2784"},"institutions":[{"id":"https://openalex.org/I6026837","display_name":"Tuskegee University","ror":"https://ror.org/0137n4m74","country_code":"US","type":"education","lineage":["https://openalex.org/I6026837"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fan Wu","raw_affiliation_strings":["Tuskegee University,Department of Computer Science,USA","Department of Computer Science, Tuskegee University, USA"],"affiliations":[{"raw_affiliation_string":"Tuskegee University,Department of Computer Science,USA","institution_ids":["https://openalex.org/I6026837"]},{"raw_affiliation_string":"Department of Computer Science, Tuskegee University, USA","institution_ids":["https://openalex.org/I6026837"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111391312","display_name":"Victor Clincy","orcid":null},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Victor Clincy","raw_affiliation_strings":["Kennesaw State University,Institute for Cyber Workforce Development,USA","Institute for Cyber Workforce Development, Kennesaw State University, USA"],"affiliations":[{"raw_affiliation_string":"Kennesaw State University,Institute for Cyber Workforce Development,USA","institution_ids":["https://openalex.org/I172980758"]},{"raw_affiliation_string":"Institute for Cyber Workforce Development, Kennesaw State University, USA","institution_ids":["https://openalex.org/I172980758"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5007582133"],"corresponding_institution_ids":["https://openalex.org/I172980758"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17345972,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"5715","last_page":"5720"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9803000092506409,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7758901715278625},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7417892813682556},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5384070873260498},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5293762683868408},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5272207260131836},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.520132839679718},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.5200724005699158},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4822445809841156},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.47052323818206787},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4426499009132385},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2550423741340637},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.12783464789390564}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7758901715278625},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7417892813682556},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5384070873260498},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5293762683868408},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5272207260131836},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.520132839679718},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.5200724005699158},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4822445809841156},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.47052323818206787},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4426499009132385},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2550423741340637},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.12783464789390564},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bigdata55660.2022.10020792","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/bigdata55660.2022.10020792","pdf_url":null,"source":{"id":"https://openalex.org/S4363607709","display_name":"2022 IEEE International Conference on Big Data (Big Data)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W2030488007","https://openalex.org/W2166486223","https://openalex.org/W2913389335","https://openalex.org/W2970967123","https://openalex.org/W4205416355","https://openalex.org/W4214880555","https://openalex.org/W4298418696","https://openalex.org/W6684333564","https://openalex.org/W6731443911"],"related_works":["https://openalex.org/W1629725936","https://openalex.org/W2363749335","https://openalex.org/W1657769681","https://openalex.org/W2142794587","https://openalex.org/W2188496831","https://openalex.org/W2803290920","https://openalex.org/W2369077588","https://openalex.org/W2904582993","https://openalex.org/W2153106229","https://openalex.org/W4250052314"],"abstract_inverted_index":{"The":[0],"primary":[1,155],"goal":[2,156],"of":[3,56,121,136,146,157,178],"the":[4,128],"authentic":[5],"learning":[6,16,41,53,100],"approach":[7,25],"is":[8,160,166],"to":[9,74,138,161],"engage":[10,97],"and":[11,38,59,81,87,93,102],"motivate":[12],"students":[13,21,27,78,98],"in":[14,22,31,99,149],"a":[15,133,143,150,164,167],"environment":[17],"that":[18,77],"encourages":[19],"all":[20],"learning.":[23],"This":[24],"provides":[26],"with":[28,48],"hands-on":[29,84,107],"experiences":[30],"solving":[32],"real-world":[33],"security":[34],"problems.":[35],"We":[36],"designed":[37],"developed":[39],"ten":[40],"modules":[42],"based":[43],"on":[44,69],"10":[45],"cybersecurity":[46,75],"cases":[47],"different":[49],"ML":[50,73],"solutions.":[51],"Each":[52],"module":[54],"consists":[55],"pre-lab,":[57],"lab,":[58],"post-lab":[60],"(Pre/Lab/Post)":[61],"activities.":[62],"All":[63],"portable":[64],"labs":[65,85],"are":[66],"made":[67],"available":[68],"Google":[70],"CoLab":[71],"for":[72,106,118],"so":[76],"can":[79],"access":[80],"practice":[82],"these":[83],"anywhere":[86],"anytime":[88],"without":[89],"time":[90],"tedious":[91],"installation":[92],"configuration":[94],"which":[95,141],"will":[96],"concepts":[101],"getting":[103],"more":[104],"experience":[105],"problem-solving":[108],"skills.":[109],"In":[110],"this":[111,158],"paper,":[112],"we":[113,126],"adopt":[114],"Neural":[115],"Network":[116,119],"Algorithms":[117],"Denial":[120],"Service":[122],"(DOS)":[123],"Detection":[124],"where":[125],"apply":[127],"KDDCup":[129],"1999":[130],"datasets":[131],"contain":[132],"standard":[134],"set":[135],"data":[137],"be":[139],"audited,":[140],"includes":[142],"wide":[144],"variety":[145],"intrusions":[147],"simulated":[148],"military":[151],"network":[152],"environment.":[153],"Our":[154,172],"lab":[159],"show":[162],"whether":[163],"link":[165],"malicious":[168],"or":[169],"safe":[170],"connection.":[171],"demonstration":[173],"shows":[174],"an":[175],"achieved":[176],"accuracy":[177],"99.89%.":[179]},"counts_by_year":[],"updated_date":"2025-12-24T23:09:58.560324","created_date":"2025-10-10T00:00:00"}
