{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T22:24:08Z","timestamp":1750544648318,"version":"3.37.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319594149"},{"type":"electronic","value":"9783319594156"}],"license":[{"start":{"date-parts":[[2017,5,31]],"date-time":"2017-05-31T00:00:00Z","timestamp":1496188800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-59415-6_1","type":"book-chapter","created":{"date-parts":[[2017,5,30]],"date-time":"2017-05-30T08:42:30Z","timestamp":1496133750000},"page":"1-12","source":"Crossref","is-referenced-by-count":5,"title":["Detection of Network Attacks Using Hybrid ARIMA-GARCH Model"],"prefix":"10.1007","author":[{"given":"Tomasz","family":"Andrysiak","sequence":"first","affiliation":[]},{"given":"\u0141ukasz","family":"Saganowski","sequence":"additional","affiliation":[]},{"given":"Miros\u0142aw","family":"Maszewski","sequence":"additional","affiliation":[]},{"given":"Adam","family":"Marchewka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,31]]},"reference":[{"key":"1_CR1","unstructured":"Axelsson, S.: Intrusion detection systems: A survey and taxonomy. Technical report 99-15, Department of Computer Engineering (2000)"},{"key":"1_CR2","unstructured":"Jackson, K.: Intrusion Detection Systems (IDS), Product Survey. Los Alamos National Library, LA-UR-99-3883 (1999)"},{"issue":"5","key":"1_CR3","doi-asserted-by":"crossref","first-page":"1053","DOI":"10.1109\/TNN.2005.853414","volume":"16","author":"H Hajji","year":"2005","unstructured":"Hajji, H.: Statistical analysis of network traffic for adaptive faults detection. IEEE Trans. Neural Netw. 16(5), 1053\u20131063 (2005)","journal-title":"IEEE Trans. Neural Netw."},{"key":"1_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2015\/675926","volume":"2015","author":"P Kiedrowski","year":"2015","unstructured":"Kiedrowski, P.: Toward more efficient and more secure last mile smart metering and smart lighting communication systems with the use of PLC\/RF hybrid technology. Int. J. Distrib. Sens. Netw. 2015, 1\u20139 (2015). Article ID 675926. http:\/\/dx.doi.org\/10.1155\/2015\/675926","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Barford, P., Kline, J., Plonka, D., Ron, A.: A signal analysis of network traffic anomalies. In: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurement, pp. 71\u201382. ACM (2002)","DOI":"10.1145\/637201.637210"},{"issue":"3","key":"1_CR6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chondola","year":"2009","unstructured":"Chondola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 1\u201372 (2009)","journal-title":"ACM Comput. Surv."},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Yaacob, A., Tan, I., Chien, S., Tan, H.: ARIMA based network anomaly detection. In: Second International Conference on Communication Software and Networks, pp. 205\u2013209. IEEE (2010)","DOI":"10.1109\/ICCSN.2010.55"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Rodriguez, A., Mozos, M.: Improving network security through traffic log anomaly detection using time series analysis. In: Computational Intelligence in Security for Information Systems, pp. 125\u2013133 (2010)","DOI":"10.1007\/978-3-642-16626-6_14"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Liang, H., Xiaoming, B.: Research of DDoS attack mechanism and its defense frame. In: 3rd International Conference on Computer Research and Development, pp. 440\u2013442 (2011)","DOI":"10.1109\/ICCRD.2011.5763941"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Mirkovic, V.J., Prier, G., Reiher, P.: Attacking DDoS at the source. In: Proceedings of ICNP, pp. 312\u2013321 (2002)","DOI":"10.1109\/ICNP.2002.1181418"},{"issue":"8","key":"1_CR11","doi-asserted-by":"crossref","first-page":"2191","DOI":"10.1109\/TSP.2003.814797","volume":"51","author":"M Thottan","year":"2003","unstructured":"Thottan, M., Ji, C.: Anomaly detection in IP networks. IEEE Trans. Sig. Process. Spec. Issue Sig. Process. Netw. 51(8), 2191\u20132204 (2003)","journal-title":"IEEE Trans. Sig. Process. Spec. Issue Sig. Process. Netw."},{"key":"1_CR12","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1111\/j.1467-9892.1980.tb00297.x","volume":"1","author":"CWJ Granger","year":"1980","unstructured":"Granger, C.W.J., Joyeux, R.: An introduction to long-memory time series models and fractional differencing. J. Time Ser. Anal. 1, 15\u201329 (1980)","journal-title":"J. Time Ser. Anal."},{"key":"1_CR13","doi-asserted-by":"crossref","first-page":"987","DOI":"10.2307\/1912773","volume":"50","author":"R Engle","year":"1982","unstructured":"Engle, R.: Autoregressive conditional heteroskedasticity with estimates of the variance of UK inflation. Econometrica 50, 987\u20131008 (1982)","journal-title":"Econometrica"},{"key":"1_CR14","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1016\/0304-4076(86)90063-1","volume":"31","author":"T Bollerslev","year":"1986","unstructured":"Bollerslev, T.: Generalized autoregressive conditional heteroskedasticity. J. Econometrics 31, 307\u2013327 (1986)","journal-title":"J. Econometrics"},{"issue":"3","key":"1_CR15","doi-asserted-by":"crossref","first-page":"175","DOI":"10.17713\/ajs.v41i3.172","volume":"41","author":"M Tayefi","year":"2012","unstructured":"Tayefi, M., Ramanathan, T.V.: An overview of FIGARCH and related time series models. Austrian J. Stat. 41(3), 175\u2013196 (2012)","journal-title":"Austrian J. Stat."},{"key":"1_CR16","volume-title":"Time Series Analysis","author":"G Box","year":"1970","unstructured":"Box, G., Jenkins, G., Reinsel, G.: Time Series Analysis. Holden-day, San Francisco (1970)"},{"key":"1_CR17","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/S0304-4076(95)01749-6","volume":"74","author":"R Baillie","year":"1996","unstructured":"Baillie, R., Bollerslev, T., Mikkelsen, H.: Fractionally integrated generalized autoregressive conditional heteroskedasticity. J. Econometrics 74, 3\u201330 (1996)","journal-title":"J. Econometrics"},{"key":"1_CR18","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1093\/biomet\/68.1.165","volume":"68","author":"J Hosking","year":"1981","unstructured":"Hosking, J.: Fractional differencing. Biometrika 68, 165\u2013176 (1981)","journal-title":"Biometrika"},{"key":"1_CR19","unstructured":"Andersen, T.G., Bollerslev, T.: ARCH and GARCH models. In: Kotz, S., Read, C.B. Banks, D.L. (eds.) Encyclopaedia of Statistical Sciences, vol. 2. John Wiley and Sons (1998)"},{"key":"1_CR20","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.eneco.2013.02.006","volume":"37","author":"H Liu","year":"2013","unstructured":"Liu, H., Shi, J.: Applying ARMA-GARCH approaches to forecasting short-term electricity prices. Energy Economics 37, 152\u2013166 (2013)","journal-title":"Energy Economics"},{"key":"1_CR21","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1111\/j.2517-6161.1964.tb00553.x","volume":"26","author":"GEP Box","year":"1964","unstructured":"Box, G.E.P., Cox, D.R.: An analysis of transformations. J. Roy. Stat. Soc. B 26, 211\u2013252 (1964)","journal-title":"J. Roy. Stat. Soc. B"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Brockwell, P., Davis, R.: Introduction to time series and forecasting. Springer Verlag (2002)","DOI":"10.1007\/b97391"},{"issue":"3","key":"1_CR23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.18637\/jss.v027.i03","volume":"27","author":"RJ Hyndman","year":"2008","unstructured":"Hyndman, R.J., Khandakar, Y.: Automatic time series forecasting: the forecast package for R. J. Stat. Softw. 27(3), 1\u201322 (2008)","journal-title":"J. Stat. Softw."},{"key":"1_CR24","unstructured":"SNORT - Intrusion Detection System. https:\/\/www.snort.org"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Andrysiak, T., Saganowski, \u0141., Choras, M., Kozik, R.: Network traffic prediction and anomaly detection based on ARFIMA model. In: de la Puerta, J.G. et al., International Joint Conference SOCO\u201914-CISIS\u201914-ICEUTE\u201914 Advances in Intelligent Systems and Computing, vol. 299, pp. 545\u2013554 (2014)","DOI":"10.1007\/978-3-319-07995-0_54"},{"key":"1_CR26","unstructured":"Kali Linux. https:\/\/www.kali.org"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Dependability Engineering of Complex Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59415-6_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T12:04:32Z","timestamp":1719230672000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59415-6_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,31]]},"ISBN":["9783319594149","9783319594156"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59415-6_1","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,5,31]]}}}