{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:59:18Z","timestamp":1755838758386},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030050627"},{"type":"electronic","value":"9783030050634"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05063-4_13","type":"book-chapter","created":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T19:23:45Z","timestamp":1544124225000},"page":"153-165","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Detecting Advanced Persistent Threats Based on Entropy and Support Vector Machine"],"prefix":"10.1007","author":[{"given":"Jiayu","family":"Tan","sequence":"first","affiliation":[]},{"given":"Jian","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"key":"13_CR1","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-319-26450-9_9","volume-title":"Recent Advances in Computational Intelligence in Defense and Security","author":"F Barcel\u00f3-Rico","year":"2016","unstructured":"Barcel\u00f3-Rico, F., Esparcia-Alc\u00e1zar, A.I., Villal\u00f3n-Huerta, A.: Semi-supervised classification system for the detection of advanced persistent threats. In: Abielmona, R., Falcon, R., Zincir-Heywood, N., Abbass, H.A. (eds.) Recent Advances in Computational Intelligence in Defense and Security. SCI, vol. 621, pp. 225\u2013248. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-26450-9_9"},{"key":"13_CR2","first-page":"1","volume":"14","author":"B Bencs\u00e1th","year":"2011","unstructured":"Bencs\u00e1th, B., P\u00e9k, G., Butty\u00e1n, L., F\u00e9legyh\u00e1zi, M.: Duqu: a stuxnet-like malware found in the wild. CrySyS Lab Tech. Rep. 14, 1\u201360 (2011)","journal-title":"CrySyS Lab Tech. Rep."},{"issue":"4","key":"13_CR3","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1353-4858(14)70040-6","volume":"2014","author":"R Brewer","year":"2014","unstructured":"Brewer, R.: Advanced persistent threats: minimising the damage. Netw. Secur. 2014(4), 5\u20139 (2014)","journal-title":"Netw. Secur."},{"key":"13_CR4","unstructured":"Chien, E., O\u2019Murchu, L., Falliere, N.: W32.Duqu: the precursor to the next stuxnet. In: LEET (2012)"},{"issue":"2","key":"13_CR5","first-page":"45","volume":"2","author":"SR Devi","year":"2012","unstructured":"Devi, S.R., Yogesh, P.: A hybrid approach to counter application layer DDoS attacks. Int. J. Crypt. Inf. Secur. (IJCIS) 2(2), 45 (2012)","journal-title":"Int. J. Crypt. Inf. Secur. (IJCIS)"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Ferreira, D.C., V\u00e1zquez, F.I., Vormayr, G., Bachl, M., Zseby, T.: A meta-analysis approach for feature selection in network traffic research. In: Proceedings of the Reproducibility Workshop, pp. 17\u201320. ACM (2017)","DOI":"10.1145\/3097766.3097771"},{"issue":"1\u20133","key":"13_CR7","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s10994-014-5473-9","volume":"101","author":"F Iglesias","year":"2015","unstructured":"Iglesias, F., Zseby, T.: Analysis of network traffic features for anomaly detection. Mach. Learn. 101(1\u20133), 59\u201384 (2015)","journal-title":"Mach. Learn."},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Lu, J., Zhang, X., Junfeng, W., Lingyun, Y.: APT traffic detection based on time transform. In: 2016 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS), pp. 9\u201313. IEEE (2016)","DOI":"10.1109\/ICITBS.2016.87"},{"key":"13_CR9","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.comnet.2016.05.018","volume":"109","author":"M Marchetti","year":"2016","unstructured":"Marchetti, M., Pierazzi, F., Colajanni, M., Guido, A.: Analysis of high volumes of network traffic for advanced persistent threat detection. Comput. Netw. 109, 127\u2013141 (2016)","journal-title":"Comput. Netw."},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Marchetti, M., Pierazzi, F., Guido, A., Colajanni, M.: Countering advanced persistent threats through security intelligence and big data analytics. In: 2016 8th International Conference on Cyber Conflict (CyCon), pp. 243\u2013261. IEEE (2016)","DOI":"10.1109\/CYCON.2016.7529438"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"McAfee: Combating advanced persistent threats-how to prevent, detect, and remediate APTs (2011). www.write-angle.com\/wp-content\/uploads\/2011\/04\/Combating-Advanced-Persistent-Threats.pdf","DOI":"10.1016\/S1353-4858(11)70086-1"},{"key":"13_CR12","unstructured":"McClure, N.: Tensorflow machine learning cookbook (2017)"},{"key":"13_CR13","first-page":"1","volume":"21","author":"S Ng","year":"2016","unstructured":"Ng, S., Bakhtiarib, M.: Advanced persistent threat detection based on network traffic noise pattern and analysis. J. Adv. Res. Comput. Appl. 21, 1\u201318 (2016)","journal-title":"J. Adv. Res. Comput. Appl."},{"key":"13_CR14","unstructured":"Parkour, M.: Contagio malware database (2013). www.mediafire.com\/folder\/c2az029ch6cke\/TRAFFIC_PATTERNS_COLLECTION"},{"issue":"3","key":"13_CR15","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27(3), 379\u2013423 (1948)","journal-title":"Bell Syst. Tech. J."},{"key":"13_CR16","unstructured":"Shick, D., Horneman, A.: Investigating advanced persistent threat 1 (APT1) (2014)"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Siddiqui, S., Khan, M.S., Ferens, K., Kinsner, W.: Detecting advanced persistent threats using fractal dimension based machine learning classification. In: Proceedings of the 2016 ACM on International Workshop on Security and Privacy Analytics, pp. 64\u201369. ACM (2016)","DOI":"10.1145\/2875475.2875484"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Wang, X., Zheng, K., Niu, X., Wu, B., Wu, C.: Detection of command and control in advanced persistent threat based on independent access. In: 2016 IEEE International Conference on Communications (ICC), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/ICC.2016.7511197"},{"key":"13_CR19","unstructured":"Wireshark: (2015). www.wireshark.org\/docs\/man-pages\/tshark.html"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05063-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T18:17:44Z","timestamp":1573064264000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05063-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030050627","9783030050634"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05063-4_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ica3pp2018\/authors.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"407","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"141","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"50","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2.3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"7.3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}