{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T11:37:51Z","timestamp":1771846671491,"version":"3.50.1"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319079943","type":"print"},{"value":"9783319079950","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07995-0_54","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T23:24:31Z","timestamp":1402442671000},"page":"545-554","source":"Crossref","is-referenced-by-count":19,"title":["Network Traffic Prediction and Anomaly Detection Based on ARFIMA Model"],"prefix":"10.1007","author":[{"given":"Tomasz","family":"Andrysiak","sequence":"first","affiliation":[]},{"given":"\u0141ukasz","family":"Saganowski","sequence":"additional","affiliation":[]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"54_CR1","unstructured":"Jackson, K.: Intrusion Detection Systems (IDS). Product Survey. Los Alamos National Library, LA-UR-99-3883 (1999)"},{"key":"54_CR2","doi-asserted-by":"crossref","unstructured":"Esposito, M., Mazzariello, C., Oliviero, F., Romano, S.P., Sansone, C.: Evaluating Pattern Recognition Techniques in Intrusion Detection Systems. PRIS, pp. 144\u2013153 (2005)","DOI":"10.5220\/0002575201440153"},{"key":"54_CR3","doi-asserted-by":"crossref","unstructured":"Esposito, M., Mazzariello, C., Oliviero, F., Romano, S.P., Sansone, C.: Real Time Detection of Novel Attacks by Means of Data Mining Techniques. ICEIS (3), 120\u2013127 (2005)","DOI":"10.5220\/0002536601200127"},{"key":"54_CR4","doi-asserted-by":"crossref","unstructured":"Lakhina, A., Crovella, M., Diot, C.H.: Characterization of network-wide anomalies in traffic flows. In: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement, pp. 201\u2013206 (2004)","DOI":"10.1145\/1028788.1028813"},{"issue":"1","key":"54_CR5","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/TDSC.2007.12","volume":"4","author":"A. Scherrer","year":"2007","unstructured":"Scherrer, A., Larrieu, N., Owezarski, P., Borgnat, P., Abry, P.: Non-Gaussian and Long Memory Statistical Characterizations for Internet Traffic with Anomalies. IEEE Transactions on Dependable and Secure Computing\u00a04(1), 56 (2007)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"54_CR6","series-title":"AISC","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-642-16626-6_14","volume-title":"Computational Intelligence in Security for Information Systems 2010","author":"A.C. Rodriguez","year":"2010","unstructured":"Rodriguez, A.C., de los Mozos, M.R.: Improving network security through traffic log anomaly detection using time series analysis. In: Herrero, \u00c1., Corchado, E., Redondo, C., Alonso, \u00c1. (eds.) Computational Intelligence in Security for Information Systems 2010. AISC, vol.\u00a085, pp. 125\u2013133. Springer, Heidelberg (2010)"},{"key":"54_CR7","doi-asserted-by":"crossref","unstructured":"Brockwell, P., Davis, R.: Introduction to time series and forecasting. Springer (2002)","DOI":"10.1007\/b97391"},{"key":"54_CR8","doi-asserted-by":"crossref","unstructured":"Celenk, M., Conley, T., Graham, J., Willis, J.: Anomaly Prediction in Network Traffic Using Adaptive Wiener Filtering and ARMA Modeling. In: IEEE International Conference on Systems, Man and Cybernetics, SMC, pp. 3548\u20133553 (2008)","DOI":"10.1109\/ICSMC.2008.4811848"},{"issue":"4","key":"54_CR9","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1111\/j.1467-9892.1983.tb00371.x","volume":"4","author":"John Geweke","year":"1983","unstructured":"Geweke, J., Porter-Hudak, S.: The Estimation and Application of Long Memory Time Series Models. Journal of Time Series Analysis\u00a0(4), 221\u2013238 (1983)","journal-title":"Journal of Time Series Analysis"},{"key":"54_CR10","doi-asserted-by":"crossref","unstructured":"Yaacob, A., Tan, I., Chien, S., Tan, H.: Arima based network anomaly detection. In: Second International Conference on Communication Software and Networks, pp. 205\u2013209. IEEE (2010)","DOI":"10.1109\/ICCSN.2010.55"},{"key":"54_CR11","volume-title":"Time series analysis forecasting and control","author":"G.E. Box","year":"1976","unstructured":"Box, G.E., Jenkins, M.G.: Time series analysis forecasting and control, 2nd edn. Holden-Day, San Francisco (1976)","edition":"2"},{"issue":"1","key":"54_CR12","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1093\/biomet\/68.1.165","volume":"68","author":"J. R. M. HOSKING","year":"1981","unstructured":"Hosking, J.R.M.: Fractional differencing. Biometrika\u00a0(68), 165\u2013176 (1981)","journal-title":"Biometrika"},{"issue":"1","key":"54_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2307\/2347679","volume":"38","author":"J. Haslett","year":"1989","unstructured":"Haslett, J., Raftery, A.E.: Space-time modelling with long-memory dependence: assessing Ireland\u2019s wind power resource (with Discussion). Applied Statistics\u00a038(1), 1\u201350 (1989)","journal-title":"Applied Statistics"},{"issue":"3","key":"54_CR14","first-page":"1","volume":"27","author":"R.J. Hyndman","year":"2008","unstructured":"Hyndman, R.J., Khandakar, Y.: Automatic time series forecasting: the forecast Package for R. Journal of Statistical Softwar\u00a027(3), 1\u201322 (2008)","journal-title":"Journal of Statistical Softwar"},{"key":"54_CR15","volume-title":"Econometric methods","author":"J. Johnston","year":"1997","unstructured":"Johnston, J., DiNardo, J.: Econometric methods, 4th edn. McGraw-Hill, Singapore (1997)","edition":"4"},{"key":"54_CR16","unstructured":"Box, G., Jenkins, G., Reinsel, G.: Time series analysis. Holden-day San Francisco (1970)"},{"key":"54_CR17","unstructured":"Defense Advanced Research Projects Agency DARPA Intrusion Detection Evaluation Data Set, http:\/\/www.ll.mit.edu\/mission\/communications\/ist\/corpora\/ideval\/data\/index.html"},{"key":"54_CR18","unstructured":"CAIDA benchmark dataset (2009), http:\/\/www.caida.org\/data\/overview\/"},{"key":"54_CR19","unstructured":"Benchmark Data (2010), http:\/\/www.takakura.com\/\/Kyoto_data\/"},{"key":"54_CR20","doi-asserted-by":"crossref","unstructured":"Wei, L., Ghorbani, A.: Network Anomaly Detection Based on Wavelet Analysis. EURASIP Journal on Advances in Signal Processing\u00a02009, Article ID 837601, 16 pages (2009), doi:10.1155\/2009\/837601","DOI":"10.1155\/2009\/837601"},{"key":"54_CR21","doi-asserted-by":"crossref","unstructured":"Dainotti, A., Pescape, A., Ventre, G.: Wavelet-based Detection of DoS Attacks. In: IEEE GLOBECOM, San Francisco, CA, USA (November 2006)","DOI":"10.1109\/GLOCOM.2006.279"},{"issue":"02","key":"54_CR22","doi-asserted-by":"crossref","first-page":"1250005","DOI":"10.1142\/S0129065712500050","volume":"22","author":"\u00c1LVARO HERRERO","year":"2012","unstructured":"Herrero, A., Zurutuza, U., Corchado, E.: A neural-visualization ids for honeynet data. International Journal of Neural Systems\u00a022(2)","journal-title":"International Journal of Neural Systems"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference SOCO\u201914-CISIS\u201914-ICEUTE\u201914"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07995-0_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T09:15:53Z","timestamp":1746263753000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-07995-0_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319079943","9783319079950"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07995-0_54","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}