{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:05:55Z","timestamp":1742969155245,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030199449"},{"type":"electronic","value":"9783030199456"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-19945-6_12","type":"book-chapter","created":{"date-parts":[[2019,5,10]],"date-time":"2019-05-10T11:36:02Z","timestamp":1557488162000},"page":"181-192","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["DNS Traffic Forecasting Using Deep Neural Networks"],"prefix":"10.1007","author":[{"given":"Diego","family":"Madariaga","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mart\u00edn","family":"Panza","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Javier","family":"Bustos-Jim\u00e9nez","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,5,10]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Akinaga, Y., Kaneda, S., Shinagawa, N., Miura, A.: A proposal for a mobile communication traffic forecasting method using time-series analysis for multi-variate data. In: IEEE Global Telecommunications Conference, GLOBECOM 2005, vol. 2, pp. 6-pp. IEEE (2005)","DOI":"10.1109\/GLOCOM.2005.1577810"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Alsirhani, A., Sampalli, S., Bodorik, P.: DDoS attack detection system: utilizing classification algorithms with apache spark. In: 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1\u20137. IEEE (2018)","DOI":"10.1109\/NTMS.2018.8328686"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Basu, S., Mukherjee, A., Klivansky, S.: Time series models for internet traffic. In: Fifteenth Annual Joint Conference of the IEEE Computer Societies. Networking the Next Generation. Proceedings IEEE INFOCOM 1996, vol. 2, pp. 611\u2013620. IEEE (1996)","DOI":"10.1109\/INFCOM.1996.493355"},{"issue":"7","key":"12_CR4","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1016\/j.comcom.2012.01.016","volume":"35","author":"P Casas","year":"2012","unstructured":"Casas, P., Mazel, J., Owezarski, P.: Unsupervised network intrusion detection systems: detecting the unknown without knowledge. Comput. Commun. 35(7), 772\u2013783 (2012)","journal-title":"Comput. Commun."},{"issue":"2","key":"12_CR5","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1111\/j.1468-0394.2010.00568.x","volume":"29","author":"P Cortez","year":"2012","unstructured":"Cortez, P., Rio, M., Rocha, M., Sousa, P.: Multi-scale internet traffic forecasting using neural networks and time series methods. Expert Syst. 29(2), 143\u2013155 (2012)","journal-title":"Expert Syst."},{"issue":"5","key":"12_CR6","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1016\/j.comnet.2003.10.003","volume":"44","author":"C Douligeris","year":"2004","unstructured":"Douligeris, C., Mitrokotsa, A.: Ddos attacks and defense mechanisms: classification and state-of-the-art. Comput. Netw. 44(5), 643\u2013666 (2004)","journal-title":"Comput. Netw."},{"key":"12_CR7","unstructured":"Feinstein, L., Schnackenberg, D., Balupari, R., Kindred, D.: Statistical approaches to DDoS attack detection and response. In: Null, p. 303. IEEE (2003)"},{"issue":"7196","key":"12_CR8","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1038\/nature06958","volume":"453","author":"MC Gonzalez","year":"2008","unstructured":"Gonzalez, M.C., Hidalgo, C.A., Barabasi, A.L.: Understanding individual human mobility patterns. Nature 453(7196), 779 (2008)","journal-title":"Nature"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Hu, X., Wu, J.: Traffic forecasting based on chaos analysis in GSM communication network. In: International Conference on Computational Intelligence and Security Workshops, CISW 2007, pp. 829\u2013833. IEEE (2007)","DOI":"10.1109\/CISW.2007.4425623"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Miao, D., Qin, X., Wang, W.: The periodic data traffic modeling based on multiplicative seasonal arima model. In: 2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP), pp. 1\u20135. IEEE (2014)","DOI":"10.1109\/WCSP.2014.6992053"},{"issue":"2","key":"12_CR11","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J Mirkovic","year":"2004","unstructured":"Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput. Commun. Rev. 34(2), 39\u201353 (2004)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Musashi, Y., Kumagai, M., Kubota, S., Sugitani, K.: Detection of Kaminsky DNS cache poisoning attack. In: 2011 4th International Conference on Intelligent Networks and Intelligent Systems (ICINIS), pp. 121\u2013124. IEEE (2011)","DOI":"10.1109\/ICINIS.2011.18"},{"key":"12_CR13","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.pmcj.2016.04.005","volume":"33","author":"EMR Oliveira","year":"2016","unstructured":"Oliveira, E.M.R., Viana, A.C., Sarraute, C., Brea, J., Alvarez-Hamelin, I.: On the regularity of human mobility. Pervasive Mob. Comput. 33, 73\u201390 (2016)","journal-title":"Pervasive Mob. Comput."},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Papagiannaki, K., Taft, N., Zhang, Z.L., Diot, C.: Long-term forecasting of internet backbone traffic: observations and initial models. In: Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, INFOCOM 2003, IEEE Societies, vol. 2, pp. 1178\u20131188. IEEE (2003)","DOI":"10.1109\/INFCOM.2003.1208954"},{"issue":"23\u201324","key":"12_CR15","doi-asserted-by":"publisher","first-page":"2435","DOI":"10.1016\/S1389-1286(99)00112-7","volume":"31","author":"V Paxson","year":"1999","unstructured":"Paxson, V.: Bro: a system for detecting network intruders in real-time. Comput. Netw. 31(23\u201324), 2435\u20132463 (1999)","journal-title":"Comput. Netw."},{"key":"12_CR16","unstructured":"Qiao, J.: .nz DNS traffic: trend and anomalies (2017). https:\/\/blog.nzrs.net.nz\/nz-dns-traffic-trend-and-anomalies\/"},{"key":"12_CR17","unstructured":"Roesch, M., et al.: Snort: lightweight intrusion detection for networks. In: Lisa, vol. 99, pp. 229\u2013238 (1999)"},{"key":"12_CR18","unstructured":"Shu, Y., Yu, M., Liu, J., Yang, O.W.: Wireless traffic modeling and prediction using seasonal arima models. In: IEEE International Conference on Communications, ICC 2003, vol. 3, pp. 1675\u20131679. IEEE (2003)"},{"issue":"1","key":"12_CR19","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1080\/00031305.2017.1380080","volume":"72","author":"SJ Taylor","year":"2018","unstructured":"Taylor, S.J., Letham, B.: Forecasting at scale. Am. Stat. 72(1), 37\u201345 (2018)","journal-title":"Am. Stat."},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Thomas, M., Mohaisen, A.: Kindred domains: detecting and clustering botnet domains using DNS traffic. In: Proceedings of the 23rd International Conference on World Wide Web, pp. 707\u2013712. ACM (2014)","DOI":"10.1145\/2567948.2579359"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Wang, H., Xu, F., Li, Y., Zhang, P., Jin, D.: Understanding mobile traffic patterns of large scale cellular towers in urban environment. In: Proceedings of the 2015 Internet Measurement Conference, pp. 225\u2013238. ACM (2015)","DOI":"10.1145\/2815675.2815680"},{"issue":"5","key":"12_CR22","doi-asserted-by":"publisher","first-page":"796","DOI":"10.1109\/TSC.2016.2599878","volume":"9","author":"F Xu","year":"2016","unstructured":"Xu, F., et al.: Big data driven mobile traffic understanding and forecasting: a time series approach. IEEE Trans. Serv. Comput. 9(5), 796\u2013805 (2016)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"5","key":"12_CR23","doi-asserted-by":"publisher","first-page":"1663","DOI":"10.1109\/TNET.2012.2184552","volume":"20","author":"S Yadav","year":"2012","unstructured":"Yadav, S., Reddy, A.K.K., Reddy, A.N., Ranjan, S.: Detecting algorithmically generated domain-flux attacks with DNS traffic analysis. IEEE\/ACM Trans. Netw. 20(5), 1663\u20131677 (2012)","journal-title":"IEEE\/ACM Trans. Netw."}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-19945-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T13:29:46Z","timestamp":1709818186000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-19945-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030199449","9783030199456"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-19945-6_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"10 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MLN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Networking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mln2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.adda-association.org\/mln\/Home.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}