{"id":"https://openalex.org/W4327774312","doi":"https://doi.org/10.1109/candarw57323.2022.00024","title":"Koga2022 Dataset: Comprehensive Dataset with Detailed Classification for Network Intrusion Detection Systems","display_name":"Koga2022 Dataset: Comprehensive Dataset with Detailed Classification for Network Intrusion Detection Systems","publication_year":2022,"publication_date":"2022-11-01","ids":{"openalex":"https://openalex.org/W4327774312","doi":"https://doi.org/10.1109/candarw57323.2022.00024"},"language":"en","primary_location":{"id":"doi:10.1109/candarw57323.2022.00024","is_oa":false,"landing_page_url":"https://doi.org/10.1109/candarw57323.2022.00024","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 Tenth International Symposium on Computing and Networking Workshops (CANDARW)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015367634","display_name":"Hideya Sato","orcid":null},"institutions":[{"id":"https://openalex.org/I116465919","display_name":"Kogakuin University","ror":"https://ror.org/01wc2tq75","country_code":"JP","type":"education","lineage":["https://openalex.org/I116465919"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Hideya Sato","raw_affiliation_strings":["Kogakuin University,Tokyo,Japan","Kogakuin University, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Kogakuin University,Tokyo,Japan","institution_ids":["https://openalex.org/I116465919"]},{"raw_affiliation_string":"Kogakuin University, Tokyo, Japan","institution_ids":["https://openalex.org/I116465919"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101610974","display_name":"Ryotaro Kobayashi","orcid":"https://orcid.org/0000-0001-5956-3455"},"institutions":[{"id":"https://openalex.org/I116465919","display_name":"Kogakuin University","ror":"https://ror.org/01wc2tq75","country_code":"JP","type":"education","lineage":["https://openalex.org/I116465919"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Ryotaro Kobayashi","raw_affiliation_strings":["Kogakuin University,Tokyo,Japan","Kogakuin University, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Kogakuin University,Tokyo,Japan","institution_ids":["https://openalex.org/I116465919"]},{"raw_affiliation_string":"Kogakuin University, Tokyo, Japan","institution_ids":["https://openalex.org/I116465919"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5015367634"],"corresponding_institution_ids":["https://openalex.org/I116465919"],"apc_list":null,"apc_paid":null,"fwci":0.1381,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.51373045,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"351","last_page":"357"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8504784107208252},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6627663969993591},{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.6556616425514221},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5694020986557007},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4009261727333069},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.34376394748687744},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1478809118270874}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8504784107208252},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6627663969993591},{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.6556616425514221},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5694020986557007},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4009261727333069},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.34376394748687744},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1478809118270874}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/candarw57323.2022.00024","is_oa":false,"landing_page_url":"https://doi.org/10.1109/candarw57323.2022.00024","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 Tenth International Symposium on Computing and Networking Workshops (CANDARW)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W2078910959","https://openalex.org/W2296509296","https://openalex.org/W2334853001","https://openalex.org/W2625602624","https://openalex.org/W2740755977","https://openalex.org/W2772996140","https://openalex.org/W3012141251","https://openalex.org/W3022034716","https://openalex.org/W3102359135","https://openalex.org/W3119889024","https://openalex.org/W3126389064","https://openalex.org/W3129181283","https://openalex.org/W3129273143"],"related_works":["https://openalex.org/W2312996858","https://openalex.org/W2392120181","https://openalex.org/W2307276533","https://openalex.org/W2390124310","https://openalex.org/W2594597562","https://openalex.org/W2961085424","https://openalex.org/W4306674287","https://openalex.org/W3046775127","https://openalex.org/W3107602296","https://openalex.org/W3170094116"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,97],"have":[4],"created":[5,98],"a":[6,19,104,119],"communication":[7,15,109],"dataset":[8,56],"that":[9,73,84,121,137,145],"addresses":[10],"the":[11,37,54,99,125,131,134,154,157],"problems":[12],"of":[13,22,39,107,133,156],"existing":[14,55,150],"datasets":[16,30,151],"and":[17,33,62,66,152],"provides":[18],"fine-grained":[20],"classification":[21,106],"malicious":[23,34,78,108],"communications.":[24],"Related":[25],"research":[26],"used":[27],"publicly":[28],"available":[29],"labeled":[31],"normal":[32,65],"to":[35,45,49,124],"increase":[36],"accuracy":[38],"NIDS":[40,47],"detection,":[41],"as":[42,44,116,118],"well":[43,117],"study":[46],"specific":[48],"certain":[50],"attack":[51,71],"scenarios.":[52],"However,":[53],"has":[57],"an":[58],"outdated":[59],"creation":[60],"date":[61],"only":[63],"labels":[64],"malignant.":[67],"Furthermore,":[68],"even":[69],"if":[70],"scenarios":[72],"indicate":[74,85],"broad":[75],"policies":[76],"for":[77],"communications":[79],"are":[80,89],"known,":[81],"detailed":[82,105],"classifications":[83],"actual":[86],"methods,":[87],"etc.,":[88],"few":[90],"or":[91],"unknown.":[92],"To":[93],"solve":[94],"these":[95],"problems,":[96],"Koga2022":[100,135,158],"Dataset,":[101],"which":[102],"is":[103,122],"data":[110],"collected":[111],"using":[112],"multiple":[113],"penetration":[114],"tools":[115],"honeypot":[120],"open":[123],"outside":[126],"world.":[127],"This":[128],"paper":[129],"presents":[130],"statistics":[132],"Dataset":[136],"was":[138],"created.":[139],"We":[140],"then":[141],"discuss":[142],"validation":[143],"methods":[144],"may":[146],"be":[147],"difficult":[148],"with":[149],"demonstrate":[153],"usefulness":[155],"Dataset.":[159]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
