{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T09:48:16Z","timestamp":1775036896788,"version":"3.50.1"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319106618","type":"print"},{"value":"9783319106625","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-10662-5_31","type":"book-chapter","created":{"date-parts":[[2014,8,25]],"date-time":"2014-08-25T11:19:48Z","timestamp":1408965588000},"page":"255-261","source":"Crossref","is-referenced-by-count":5,"title":["Network Anomaly Detection Based on ARFIMA Model"],"prefix":"10.1007","author":[{"given":"Tomasz","family":"Andrysiak","sequence":"first","affiliation":[]},{"given":"\u0141ukasz","family":"Saganowski","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Geweke, J., Porter-Hudak, S.: The Estimation and Application of Long Memory Time Series Models. Journal of Time Series Analysis (4), 221\u2013238 (1983)","DOI":"10.1111\/j.1467-9892.1983.tb00371.x"},{"key":"31_CR2","series-title":"AISC","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-642-16626-6_14","volume-title":"Computational Intelligence in Security for Information Systems 2010","author":"A.C. Rodriguez","year":"2010","unstructured":"Rodriguez, A.C., de los Mozos, M.R.: Improving network security through traffic log anomaly detection using time series analysis. In: Herrero, \u00c1., Corchado, E., Redondo, C., Alonso, \u00c1. (eds.) Computational Intelligence in Security for Information Systems 2010. AISC, vol.\u00a085, pp. 125\u2013133. Springer, Heidelberg (2010)"},{"key":"31_CR3","doi-asserted-by":"crossref","unstructured":"Celenk, M., Conley, T., Graham, J., Willis, J.: Anomaly Prediction in Network Traffic Using Adaptive Wiener Filtering and ARMA Modeling. In: SMC IEEE International Conferenceon Systems, Man and Cybernetics, pp. 3548\u20133553 (2008)","DOI":"10.1109\/ICSMC.2008.4811848"},{"key":"31_CR4","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1093\/biomet\/68.1.165","volume":"68","author":"J.R.M. Hosking","year":"1981","unstructured":"Hosking, J.R.M.: Fractional differencing. Biometrika\u00a068, 165\u2013176 (1981)","journal-title":"Biometrika"},{"key":"31_CR5","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4419-0320-4","volume-title":"Time Series: Theory and Methods","author":"P.J. Brockwell","year":"1991","unstructured":"Brockwell, P.J., Davis, R.A.: Time Series: Theory and Methods. Springer, New York (1991)"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Brockwell, P., Davis, R.: Introduction to time series and forecasting. Springer (2002)","DOI":"10.1007\/b97391"},{"key":"31_CR7","volume-title":"Time series analysis forecasting and control","author":"G.E. Box","year":"1976","unstructured":"Box, G.E., Jenkins, M.G.: Time series analysis forecasting and control, 2nd edn. Holden-Day, San Francisco (1976)","edition":"2"},{"key":"31_CR8","volume-title":"Time series analysis","author":"G. Box","year":"1970","unstructured":"Box, G., Jenkins, G., Reinsel, G.: Time series analysis. Holden-day, San Francisco (1970)"},{"key":"31_CR9","unstructured":"Schmidt, C.M., Tschernig, R.: Identification of Fractional ARIMA Models in the Presence of Long Memory. Paper presented at the FAC Workshop on Economic Time Series Analysis and System Identification, Vienna (July 1993)"},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Crato, N., Ray, B.K.: Model Selection and Forecasting for Long-range Dependent Processes. Journal of Forecasting, 107\u2013125 (1996)","DOI":"10.1002\/(SICI)1099-131X(199603)15:2<107::AID-FOR612>3.0.CO;2-D"},{"issue":"2","key":"31_CR11","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/S0378-3758(98)00254-7","volume":"80","author":"V.A. Reisen","year":"1999","unstructured":"Reisen, V.A., Lopes, S.: Some Simulations and Applications of Forecasting Long-Memory Time Series Models. Journal of Statistical Planning and Inference\u00a080(2), 269\u2013287 (1999)","journal-title":"Journal of Statistical Planning and Inference"},{"key":"31_CR12","unstructured":"SNORT IDS (2014), http:\/\/www.snort.org\/"},{"key":"31_CR13","series-title":"AISC","first-page":"223","volume-title":"Image Processing and Communications Challenges 4","author":"\u0141. Saganowski","year":"2013","unstructured":"Saganowski, \u0141., Goncerzewicz, M., Andrysiak, T.: Anomaly Detection Preprocessor for SNORT IDS System. In: Chora\u015b, R.S. (ed.) Image Processing and Communications Challenges 4. AISC, vol.\u00a0184, pp. 223\u2013230. Springer, Heidelberg (2013)"},{"key":"31_CR14","unstructured":"BackTrack Linux (2014), http:\/\/www.backtrack-linux.org\/"},{"key":"31_CR15","doi-asserted-by":"crossref","unstructured":"Esposito, M., Mazzariello, C., Oliviero, F., Romano, S.P., Sansone, C.: Real Time Detection of Novel Attacks by Means of Data Mining Techniques. In: ICEIS (3), pp. 120\u2013127 (2005)","DOI":"10.5220\/0002536601200127"},{"key":"31_CR16","unstructured":"Esposito, M., Mazzariello, C., Oliviero, F., Romano, S.P., Sansone, C.: Evaluating Pattern Recognition Techniques in Intrusion Detection Systems. In: PRIS, pp. 144\u2013153 (2005)"},{"key":"31_CR17","doi-asserted-by":"crossref","unstructured":"Lakhina, A., Crovella, M., Diot, C.H.: Characterization of network-wide anomalies in traffic flows. In: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement, pp. 201\u2013206 (2004)","DOI":"10.1145\/1028788.1028813"},{"key":"31_CR18","doi-asserted-by":"crossref","unstructured":"Yaacob, A., Tan, I., Chien, S., Tan, H.: Arima based network anomaly detection. In: Second International Conference on Communication Software and Networks, pp. 205\u2013209. IEEE (2010)","DOI":"10.1109\/ICCSN.2010.55"}],"container-title":["Advances in Intelligent Systems and Computing","Image Processing &amp; Communications Challenges 6"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10662-5_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T10:02:36Z","timestamp":1746352956000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-10662-5_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319106618","9783319106625"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10662-5_31","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}