{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T03:57:20Z","timestamp":1752983840829,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030633929"},{"type":"electronic","value":"9783030633936"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-63393-6_16","type":"book-chapter","created":{"date-parts":[[2020,12,22]],"date-time":"2020-12-22T09:04:28Z","timestamp":1608627868000},"page":"240-256","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Unsupervised Anomaly Detection in Daily WAN Traffic Patterns"],"prefix":"10.1007","author":[{"given":"Scott","family":"Campbell","sequence":"first","affiliation":[]},{"given":"Mariam","family":"Kiran","sequence":"additional","affiliation":[]},{"given":"Fatema Bannat","family":"Wala","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,18]]},"reference":[{"key":"16_CR1","unstructured":"Ahmed, M., Mahmood, A.N., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19\u201331 (2016). http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1084804515002891"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Benson, T., Akella, A., Maltz, D.A.: Network traffic characteristics of data centers in the wild. In: SIGCOMM conference on Internet measurement (2010)","DOI":"10.1145\/1879141.1879175"},{"key":"16_CR3","unstructured":"Campbell, S.: ESnet wan security project updates. In: Internet2 Technology Exchange (2018)"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Campbell, S., Lee, J.: Prototyping a 100g monitoring system. In: Euromicro International Conference on Parallel, Distributed and Network-Based Processing (2012)","DOI":"10.1109\/PDP.2012.95"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Claise, B.: Cisco systems netflow services export version 9. Internet Engineering Task Force [IETF] (2004)","DOI":"10.17487\/rfc3954"},{"key":"16_CR6","unstructured":"Dewaele, G., et al.: Unsupervised host behavior classification from connection patterns. Int. J. Netw. Manag. 20(5), 317\u2013337 (2010). https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.1002\/nem.750"},{"key":"16_CR7","doi-asserted-by":"publisher","unstructured":"Erman, J., Arlitt, M., Mahanti, A.: Traffic classification using clustering algorithms. In: SIGCOMM Workshop on Mining Network Data, pp. 281\u2013286. ACM (2006). https:\/\/doi.org\/10.1145\/1162678.1162679","DOI":"10.1145\/1162678.1162679"},{"key":"16_CR8","doi-asserted-by":"publisher","unstructured":"Erman, J., Mahanti, A., Arlitt, M., Cohen, I., Williamson, C.: Semi-supervised network traffic classification. In: International Conference on Measurement and Modeling of Computer Systems, pp. 369\u2013370. ACM (2007). https:\/\/doi.org\/10.1145\/1254882.1254934","DOI":"10.1145\/1254882.1254934"},{"key":"16_CR9","unstructured":"Zhang, J., Ilija Vukotic, R.G.: Anomaly detection in wide area network meshes using two machine learning algorithms. Future Gener. Comput. Syst. 93, 418\u2013426 (2019)"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Kim, H., Claffy, k., Fomenkov, M., Barman, D., Faloutsos, M., Lee, K.: Internet traffic classification demystified: myths, caveats, and the best practices. In: Conference on emerging Networking Experiments and Technologies, December 2008","DOI":"10.1145\/1544012.1544023"},{"key":"16_CR11","unstructured":"Kiran, M., Chhabra, A.: Understanding flows in high-speed scientific networks: a netflow data study. Future Gener. Comput. Syst. 94, 72\u201379 (2019). http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167739X18302322"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Kohout, J., Pevn\u00fd, T.: Unsupervised detection of malware in persistent web traffic. In: IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1757\u20131761 (2015)","DOI":"10.1109\/ICASSP.2015.7178272"},{"key":"16_CR13","doi-asserted-by":"publisher","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Diagnosing network-wide traffic anomalies. In: Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 219\u2013230. ACM (2004). https:\/\/doi.org\/10.1145\/1015467.1015492","DOI":"10.1145\/1015467.1015492"},{"issue":"4","key":"16_CR14","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1145\/1090191.1080118","volume":"35","author":"A Lakhina","year":"2005","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Mining anomalies using traffic feature distributions. SIGCOMM Comput. Commun. Rev. 35(4), 217\u2013228 (2005). https:\/\/doi.org\/10.1145\/1090191.1080118","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"16_CR15","doi-asserted-by":"publisher","first-page":"18042","DOI":"10.1109\/ACCESS.2017.2747560","volume":"5","author":"M Lopez-Martin","year":"2017","unstructured":"Lopez-Martin, M., Carro, B., Sanchez-Esguevillas, A., Lloret, J.: Network traffic classifier with convolutional and recurrent neural networks for internet of things. IEEE Access 5, 18042\u201318050 (2017)","journal-title":"IEEE Access"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Nguyen, T.T.T., Armitage, G.: Training on multiple sub-flows to optimise the use of machine learning classifiers in real-world IP networks. In: IEEE Conference on Local Computer Networks, pp. 369\u2013376 (2006)","DOI":"10.1109\/LCN.2006.322122"},{"issue":"4","key":"16_CR17","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/SURV.2008.080406","volume":"10","author":"TTT Nguyen","year":"2008","unstructured":"Nguyen, T.T.T., Armitage, G.: A survey of techniques for internet traffic classification using machine learning. IEEE Commun. Surv. Tutor. 10(4), 56\u201376 (2008)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"6","key":"16_CR18","doi-asserted-by":"publisher","first-page":"1880","DOI":"10.1109\/TNET.2012.2187305","volume":"20","author":"TTT Nguyen","year":"2012","unstructured":"Nguyen, T.T.T., Armitage, G., Branch, P., Zander, S.: Timely and continuous machine-learning-based classification for interactive IP traffic. IEEE\/ACM Trans. Netw. 20(6), 1880\u20131894 (2012)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Sommer, R., Paxson, V.: Outside the closed world: on using machine learning for network intrusion detection. In: IEEE Symposium on Security and Privacy (2010)","DOI":"10.1109\/SP.2010.25"},{"key":"16_CR20","unstructured":"Tari, R.M.: On the move to meaningful internet systems. In: Confederated International Conferences on the Move to Meaningful Internet Systems, vol. 2 (2007)"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Zander, S., Nguyen, T., Armitage, G.: Automated traffic classification and application identification using machine learning. In: IEEE Conference on Local Computer Networks, pp. 250\u2013257 (2005)","DOI":"10.1109\/LCN.2005.35"},{"key":"16_CR22","unstructured":"Zhang, H., Lu, G., Qassrawi, M.T., Zhang, Y., Yu, X.: Feature selection for optimizing traffic classification. Comput. Commun. 35(12), 1457\u20131471 (2012). http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0140366412001259"},{"issue":"1","key":"16_CR23","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1109\/TPDS.2012.98","volume":"24","author":"J Zhang","year":"2013","unstructured":"Zhang, J., Xiang, Y., Wang, Y., Zhou, W., Xiang, Y., Guan, Y.: Network traffic classification using correlation information. IEEE Trans. Parallel Distrib. Syst. 24(1), 104\u2013117 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"16_CR24","doi-asserted-by":"crossref","unstructured":"Zhang, J., Zulkernine, M.: Anomaly based network intrusion detection with unsupervised outlier detection. In: IEEE International Conference on Communications, vol. 5, pp. 2388\u20132393 (2006)","DOI":"10.1109\/ICC.2006.255127"},{"key":"16_CR25","unstructured":"Zhao, J., Huang, X., Sun, Q., Ma, Y.: Real-time feature selection in traffic classification. J. China Universities Posts Telecommun. 15, 68\u201372 (2008). http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1005888508601582"}],"container-title":["Communications in Computer and Information Science","Driving Scientific and Engineering Discoveries Through the Convergence of HPC, Big Data and AI"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-63393-6_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T22:06:52Z","timestamp":1619302012000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-63393-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030633929","9783030633936"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-63393-6_16","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"18 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SMC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Smoky Mountains Computational Sciences and Engineering Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oak Ridge, TN","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 August 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"smc2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/smc.ornl.gov\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"94","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.75","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}