{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:01:30Z","timestamp":1742925690045,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030011673"},{"type":"electronic","value":"9783030011680"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01168-0_9","type":"book-chapter","created":{"date-parts":[[2018,9,28]],"date-time":"2018-09-28T00:03:17Z","timestamp":1538092997000},"page":"89-101","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["State of the Art Literature Review on Network Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Tero","family":"Bodstr\u00f6m","sequence":"first","affiliation":[]},{"given":"Timo","family":"H\u00e4m\u00e4l\u00e4inen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,29]]},"reference":[{"key":"9_CR1","doi-asserted-by":"publisher","unstructured":"Andropov, S., Guirik, A., Budko, M., Budko, M.: Network anomaly detection using artificial neural networks. In: 2017 20th Conference of Open Innovations Association (FRUCT) (2017). \nhttps:\/\/doi.org\/10.23919\/FRUCT.2017.8071288","DOI":"10.23919\/FRUCT.2017.8071288"},{"key":"9_CR2","doi-asserted-by":"publisher","unstructured":"Aygun, R.C., Yavuz, A.G.: Network anomaly detection with stochastically improved autoencoder based models. In: 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing, pp. 193\u2013198 (2017). \nhttps:\/\/doi.org\/10.1109\/CSCloud.2017.39","DOI":"10.1109\/CSCloud.2017.39"},{"key":"9_CR3","doi-asserted-by":"publisher","unstructured":"Yuan, X., Li, C., Li, X.: DeepDefense: identifying DDoS attack via deep learning. In: 2017 IEEE International Conference on Smart Computing (SMARTCOMP) (2017). \nhttps:\/\/doi.org\/10.1109\/SMARTCOMP.2017.7946998","DOI":"10.1109\/SMARTCOMP.2017.7946998"},{"key":"9_CR4","doi-asserted-by":"publisher","unstructured":"Kim, J., Yoo, A., Sim, A., Suh, S., Kim, I.: A lightweight network anomaly detection technique. In: 2017 Workshop on Computing, Networking and Communications (CNC) (2017). \nhttps:\/\/doi.org\/10.1109\/ICCNC.2017.7876251","DOI":"10.1109\/ICCNC.2017.7876251"},{"key":"9_CR5","doi-asserted-by":"publisher","unstructured":"Iordache, M., Jouet, S., Marnerides, A.K., Dimitrios, P.P.: Distributed, multi-level network anomaly detection for datacentre networks. In: IEEE ICC 2017 Next Generation Networking and Internet Symposium (2017). \nhttps:\/\/doi.org\/10.1109\/ICC.2017.7996569","DOI":"10.1109\/ICC.2017.7996569"},{"key":"9_CR6","doi-asserted-by":"publisher","unstructured":"Terzi, D.S., Terzi, R., Sagiroglu, S.: Big data analytics for network anomaly detection from netflow data. In: 2017 International Conference on Computer Science and Engineering (UBMK), pp. 592\u2013597 (2017). \nhttps:\/\/doi.org\/10.1109\/UBMK.2017.8093473","DOI":"10.1109\/UBMK.2017.8093473"},{"key":"9_CR7","doi-asserted-by":"publisher","unstructured":"Elkhadir, Z., Chougdali, K., Benattou, M.: Combination of R1-PCA and median LDA for anomaly network detection. In: Intelligent Systems and Computer Vision (ISCV) (2017). \nhttps:\/\/doi.org\/10.1109\/ISACV.2017.8054985","DOI":"10.1109\/ISACV.2017.8054985"},{"key":"9_CR8","doi-asserted-by":"publisher","unstructured":"Ussath, M. Jaeger, D., Cheng, F., Meinel, C.: Advanced persistent threats: behind the scenes. In: 2016 Annual Conference on Information Science and Systems (CISS) (2016). \nhttps:\/\/doi.org\/10.1109\/CISS.2016.7460498","DOI":"10.1109\/CISS.2016.7460498"},{"key":"9_CR9","doi-asserted-by":"publisher","unstructured":"Pamukchiev, A., Jouet, S., Pezaros, D.P.: Distributed network anomaly detection on an event processing framework. In: 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 659\u2013664 (2017).\nhttps:\/\/doi.org\/10.1109\/CCNC.2017.7983209","DOI":"10.1109\/CCNC.2017.7983209"},{"key":"9_CR10","doi-asserted-by":"publisher","unstructured":"Callegari, C., Giordano, S., Pagano, M.: Entropy-based network anomaly detection. In: 2017 International Conference on Computing, Networking and Communications (ICNC): Communications and Information Security Symposium (2017). \nhttps:\/\/doi.org\/10.1109\/ICCNC.2017.7876150","DOI":"10.1109\/ICCNC.2017.7876150"},{"key":"9_CR11","doi-asserted-by":"publisher","unstructured":"Dromard, J., Owezarski, P.: Integrating short history for improving clustering based network traffic anomaly detection. In: 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W), pp. 227\u2013234 (2017). \nhttps:\/\/doi.org\/10.1109\/FAS-W.2017.152","DOI":"10.1109\/FAS-W.2017.152"},{"key":"9_CR12","doi-asserted-by":"publisher","unstructured":"Liu, Y., et al.: Network anomaly detection based on dynamic hierarchical clustering of cross domain data. In: 2017 IEEE International Conference on Software Quality, Reliability and Security (Companion Volume), pp. 200\u2013204 (2017). \nhttps:\/\/doi.org\/10.1109\/FAS-W.2017.152","DOI":"10.1109\/FAS-W.2017.152"},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/978-3-319-64701-2_40","volume-title":"Network and System Security","author":"E Ivannikova","year":"2017","unstructured":"Ivannikova, E., Zolotukhin, M., H\u00e4m\u00e4l\u00e4inen, T.: Probabilistic transition-based approach for detecting application-layer DDoS attacks in encrypted software-defined networks. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds.) NSS 2017. LNCS, vol. 10394, pp. 531\u2013543. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-64701-2_40"},{"key":"9_CR14","unstructured":"Baddar, S., Merlo, A., Migliardi, M.: Anomaly detection in computer networks: a state-of-the-art review. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 5, 29\u201364 (2014). \nhttps:\/\/www.researchgate.net\/publication\/270274504_Anomaly_Detection_in_Computer_Networks_A_StateoftheArt_Review"}],"container-title":["Lecture Notes in Computer Science","Internet of Things, Smart Spaces, and Next Generation Networks and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01168-0_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,14]],"date-time":"2018-12-14T23:53:37Z","timestamp":1544831617000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01168-0_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030011673","9783030011680"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01168-0_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ruSMART","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on Internet of Things and Smart Spaces","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"St. Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rusmart2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/rusmart.e-werest.org\/2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EDAS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"186","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"64","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}