{"id":"https://openalex.org/W4405181175","doi":"https://doi.org/10.1145/3658644.3691368","title":"Demo: Towards Reproducible Evaluations of ML-Based IDS Using Data-Driven Approaches","display_name":"Demo: Towards Reproducible Evaluations of ML-Based IDS Using Data-Driven Approaches","publication_year":2024,"publication_date":"2024-12-02","ids":{"openalex":"https://openalex.org/W4405181175","doi":"https://doi.org/10.1145/3658644.3691368"},"language":"en","primary_location":{"id":"doi:10.1145/3658644.3691368","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3691368","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3691368","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3691368","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081232607","display_name":"Solayman Ayoubi","orcid":"https://orcid.org/0000-0001-5711-4402"},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I39804081","display_name":"Sorbonne Universit\u00e9","ror":"https://ror.org/02en5vm52","country_code":"FR","type":"education","lineage":["https://openalex.org/I39804081"]},{"id":"https://openalex.org/I4210159731","display_name":"LIP6","ror":"https://ror.org/05krcen59","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I39804081","https://openalex.org/I4210159245","https://openalex.org/I4210159731"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Solayman Ayoubi","raw_affiliation_strings":["Sorbonne University, CNRS, LIP6, Paris, France"],"affiliations":[{"raw_affiliation_string":"Sorbonne University, CNRS, LIP6, Paris, France","institution_ids":["https://openalex.org/I4210159731","https://openalex.org/I1294671590","https://openalex.org/I39804081"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073883755","display_name":"S\u00e9bastien Tixeuil","orcid":"https://orcid.org/0000-0002-0948-7172"},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I185839726","display_name":"Institut Universitaire de France","ror":"https://ror.org/055khg266","country_code":"FR","type":"education","lineage":["https://openalex.org/I185839726"]},{"id":"https://openalex.org/I39804081","display_name":"Sorbonne Universit\u00e9","ror":"https://ror.org/02en5vm52","country_code":"FR","type":"education","lineage":["https://openalex.org/I39804081"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"S\u00e9bastien Tixeuil","raw_affiliation_strings":["Sorbonne University, CNRS, LIP6 &amp; Institut Universitaire de France, Paris, France"],"affiliations":[{"raw_affiliation_string":"Sorbonne University, CNRS, LIP6 &amp; Institut Universitaire de France, Paris, France","institution_ids":["https://openalex.org/I39804081","https://openalex.org/I185839726","https://openalex.org/I1294671590"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043016218","display_name":"Gr\u00e9gory Blanc","orcid":"https://orcid.org/0000-0001-8150-6617"},"institutions":[{"id":"https://openalex.org/I4210145102","display_name":"Institut Polytechnique de Paris","ror":"https://ror.org/042tfbd02","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210145102"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Gregory Blanc","raw_affiliation_strings":["SAMOVAR, T\u00e9l\u00e9com SudParis Institut Polytechnique de Paris, Palaiseau, France"],"affiliations":[{"raw_affiliation_string":"SAMOVAR, T\u00e9l\u00e9com SudParis Institut Polytechnique de Paris, Palaiseau, France","institution_ids":["https://openalex.org/I4210145102"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040720321","display_name":"Houda Jmila","orcid":"https://orcid.org/0000-0002-4864-5380"},"institutions":[{"id":"https://openalex.org/I2738703131","display_name":"Commissariat \u00e0 l'\u00c9nergie Atomique et aux \u00c9nergies Alternatives","ror":"https://ror.org/00jjx8s55","country_code":"FR","type":"government","lineage":["https://openalex.org/I2738703131"]},{"id":"https://openalex.org/I277688954","display_name":"Universit\u00e9 Paris-Saclay","ror":"https://ror.org/03xjwb503","country_code":"FR","type":"education","lineage":["https://openalex.org/I277688954"]},{"id":"https://openalex.org/I4210085861","display_name":"Laboratoire d'Int\u00e9gration des Syst\u00e8mes et des Technologies","ror":"https://ror.org/000dbcc61","country_code":"FR","type":"government","lineage":["https://openalex.org/I2738703131","https://openalex.org/I2738703131","https://openalex.org/I277688954","https://openalex.org/I4210085861","https://openalex.org/I4210117989"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Houda Jmila","raw_affiliation_strings":["Institute LIST, CEA, Paris-Saclay University, Palaiseau, France"],"affiliations":[{"raw_affiliation_string":"Institute LIST, CEA, Paris-Saclay University, Palaiseau, France","institution_ids":["https://openalex.org/I277688954","https://openalex.org/I2738703131","https://openalex.org/I4210085861"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5081232607"],"corresponding_institution_ids":["https://openalex.org/I1294671590","https://openalex.org/I39804081","https://openalex.org/I4210159731"],"apc_list":null,"apc_paid":null,"fwci":0.6868,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.73824956,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"5081","last_page":"5083"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8683304786682129},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7204502820968628},{"id":"https://openalex.org/keywords/standardization","display_name":"Standardization","score":0.7045214176177979},{"id":"https://openalex.org/keywords/strengths-and-weaknesses","display_name":"Strengths and weaknesses","score":0.5711677670478821},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.48931095004081726},{"id":"https://openalex.org/keywords/interface","display_name":"Interface (matter)","score":0.46646037697792053},{"id":"https://openalex.org/keywords/proposition","display_name":"Proposition","score":0.4385313391685486},{"id":"https://openalex.org/keywords/graphical-user-interface","display_name":"Graphical user interface","score":0.42070603370666504},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.336311936378479},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.06711271405220032}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8683304786682129},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7204502820968628},{"id":"https://openalex.org/C188087704","wikidata":"https://www.wikidata.org/wiki/Q369577","display_name":"Standardization","level":2,"score":0.7045214176177979},{"id":"https://openalex.org/C63882131","wikidata":"https://www.wikidata.org/wiki/Q17122954","display_name":"Strengths and weaknesses","level":2,"score":0.5711677670478821},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.48931095004081726},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.46646037697792053},{"id":"https://openalex.org/C2777152325","wikidata":"https://www.wikidata.org/wiki/Q108163","display_name":"Proposition","level":2,"score":0.4385313391685486},{"id":"https://openalex.org/C37789001","wikidata":"https://www.wikidata.org/wiki/Q782543","display_name":"Graphical user interface","level":2,"score":0.42070603370666504},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.336311936378479},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.06711271405220032},{"id":"https://openalex.org/C157915830","wikidata":"https://www.wikidata.org/wiki/Q2928001","display_name":"Bubble","level":2,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C129307140","wikidata":"https://www.wikidata.org/wiki/Q6795880","display_name":"Maximum bubble pressure method","level":3,"score":0.0},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3658644.3691368","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3691368","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3691368","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3658644.3691368","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3691368","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3691368","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.6600000262260437,"display_name":"Gender equality","id":"https://metadata.un.org/sdg/5"}],"awards":[{"id":"https://openalex.org/G5640223212","display_name":null,"funder_award_id":"ANR-20-CE39-0011","funder_id":"https://openalex.org/F4320323817","funder_display_name":"Universitas Brawijaya"}],"funders":[{"id":"https://openalex.org/F4320323817","display_name":"Universitas Brawijaya","ror":"https://ror.org/01wk3d929"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4405181175.pdf","grobid_xml":"https://content.openalex.org/works/W4405181175.grobid-xml"},"referenced_works_count":6,"referenced_works":["https://openalex.org/W2296509296","https://openalex.org/W2746600820","https://openalex.org/W2979344246","https://openalex.org/W3106412272","https://openalex.org/W4252567752","https://openalex.org/W4282047883"],"related_works":["https://openalex.org/W2378767206","https://openalex.org/W1540871478","https://openalex.org/W328308450","https://openalex.org/W282641168","https://openalex.org/W2376963063","https://openalex.org/W2066396794","https://openalex.org/W2366734808","https://openalex.org/W2391444248","https://openalex.org/W2390716080","https://openalex.org/W2355065378"],"abstract_inverted_index":{"Network-based":[0],"Intrusion":[1,37],"Detection":[2,38],"Systems":[3,39],"(NIDS)":[4],"are":[5,12],"crucial":[6],"in":[7,18,102],"cybersecurity,":[8],"but":[9],"evaluation":[10,32,96],"methodologies":[11],"outdated":[13],"and":[14,20,49,81,98],"lack":[15],"standardization,":[16],"resulting":[17],"incomplete":[19],"unreliable":[21],"assessments.":[22],"To":[23],"address":[24],"these":[25],"issues,":[26],"we":[27,73],"first":[28],"proposed":[29],"a":[30,67,75,79,106],"comprehensive":[31],"framework":[33,42],"for":[34,44],"Machine":[35],"Learning-based":[36],"[1].":[40],"This":[41],"accounts":[43],"the":[45,55,109],"unique":[46],"aspects,":[47],"strengths,":[48],"weaknesses":[50],"of":[51,77,84],"ML":[52],"algorithms.":[53],"However,":[54],"initial":[56],"proposition":[57],"lacked":[58],"practicality,":[59],"as":[60],"it":[61],"presented":[62],"an":[63,88],"abstract":[64],"methodology":[65,97],"without":[66],"substantive":[68],"solution.":[69],"In":[70],"this":[71],"paper,":[72],"present":[74],"demo":[76],"FREIDA":[78],"precise":[80],"concrete":[82],"implementation":[83],"our":[85],"framework,":[86],"featuring":[87],"easy-to-use":[89],"graphical":[90],"interface.":[91],"We":[92],"also":[93],"outline":[94],"FREIDA's":[95],"demonstrate":[99],"its":[100],"application":[101],"evaluating":[103],"IDS":[104],"using":[105],"dataset":[107],"from":[108],"literature.":[110]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
