{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T11:56:43Z","timestamp":1773835003111,"version":"3.50.1"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319671796","type":"print"},{"value":"9783319671802","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,8,23]],"date-time":"2017-08-23T00:00:00Z","timestamp":1503446400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-67180-2_55","type":"book-chapter","created":{"date-parts":[[2017,8,22]],"date-time":"2017-08-22T04:06:53Z","timestamp":1503374813000},"page":"567-576","source":"Crossref","is-referenced-by-count":4,"title":["Time Series Forecasting Using Holt-Winters Model Applied to Anomaly Detection in Network Traffic"],"prefix":"10.1007","author":[{"given":"Tomasz","family":"Andrysiak","sequence":"first","affiliation":[]},{"given":"\u0141ukasz","family":"Saganowski","sequence":"additional","affiliation":[]},{"given":"Miros\u0142aw","family":"Maszewski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,23]]},"reference":[{"key":"55_CR1","unstructured":"SANS Institute. Top cyber security risks - zero-day vulnerability trends. http:\/\/www.sans.org\/top-cyber-security-risks\/zero-day.php"},{"key":"55_CR2","unstructured":"Internet Security Threat Report ISTR, vol. 22 (2017). https:\/\/www.symantec.com\/content\/dam\/Symantec\/docs\/reports\/istr-22-2017-en.pdf"},{"issue":"8","key":"55_CR3","first-page":"2191","volume":"51","author":"M Thottan","year":"2003","unstructured":"Thottan, M., Ji, C.: Anomaly detection in IP networks. IEEE Trans. Signal Process. Special Issue of Signal Processing in Networking 51(8), 2191\u20132204 (2003)","journal-title":"IEEE Trans. Signal Process. Special Issue of Signal Processing in Networking"},{"key":"55_CR4","doi-asserted-by":"crossref","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Characterization of network-wide anomalies in traffic flows. In: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement, pp. 201\u2013206 (2004)","DOI":"10.1145\/1028788.1028813"},{"issue":"3","key":"55_CR5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chondola","year":"2009","unstructured":"Chondola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 1\u201372 (2009)","journal-title":"ACM Comput. Surv."},{"key":"55_CR6","doi-asserted-by":"crossref","unstructured":"Barford, P., Kline, J., Plonka, D., Ron, A.: A signal analysis of network traffic anomalies. In: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurement, pp. 71\u201382. ACM (2002)","DOI":"10.1145\/637201.637210"},{"key":"55_CR7","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1016\/j.cose.2006.05.003","volume":"25","author":"M Amini","year":"2006","unstructured":"Amini, M., Jalili, R., Shahriari, H.R.: RT-UNNID: a practical solution to real-time network-based intrusion detection using unsupervised neural networks. Comput. Secur. 25, 459\u2013468 (2006)","journal-title":"Comput. Secur."},{"key":"55_CR8","doi-asserted-by":"crossref","unstructured":"Wei, L., Ghorbani, A.: Network anomaly detection based on wavelet analysis. EURASIP J. Adv. Signal Process. 2009 (2009)","DOI":"10.1155\/2009\/837601"},{"key":"55_CR9","doi-asserted-by":"crossref","unstructured":"Barbara, D., Couto, J., Jajodia, S., Popyack, L., Wu, N.: ADAM: detecting intrusions by data mining. In: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, T1A3 1100 United States Military Academy, West Point, NY, pp. 5\u20136 (2001)","DOI":"10.1145\/604264.604268"},{"issue":"1","key":"55_CR10","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1515\/ipc-2015-0027","volume":"20","author":"T Andrysiak","year":"2015","unstructured":"Andrysiak, T., Saganowski, \u0141., Maszewski, M., Grad, P.: A DDoS attacks detection based on conditional heteroscedastic time series models. Image Process. Commun. 20(1), 23\u201332 (2015)","journal-title":"Image Process. Commun."},{"key":"55_CR11","doi-asserted-by":"crossref","unstructured":"Andrysiak, T., Saganowski, \u0141., Choras, M., Kozik, R.: Network traffic prediction and anomaly detection based on ARFIMA model. In: de la Puerta, J.G., et al. (eds.) International Joint Conference SOCO\u201914-CISIS\u201914-ICEUTE\u201914. Advances in Intelligent Systems and Computing, vol. 299, pp. 545\u2013554 (2014)","DOI":"10.1007\/978-3-319-07995-0_54"},{"key":"55_CR12","doi-asserted-by":"crossref","unstructured":"Yaacob, A., Tan, I., Chien, S., Tan, H.: Arima based network anomaly detection. In: Second International Conference on Communication Software and Networks IEEE, pp. 205\u2013209 (2010)","DOI":"10.1109\/ICCSN.2010.55"},{"key":"55_CR13","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4419-0320-4","volume-title":"Time Series: Theory and Methods","author":"PJ Brockwell","year":"1991","unstructured":"Brockwell, P.J., Davis, R.A.: Time Series: Theory and Methods, 2nd edn. Springer, New York (1991)","edition":"2"},{"key":"55_CR14","doi-asserted-by":"crossref","DOI":"10.1007\/b97391","volume-title":"Introduction to Time Series and Forecasting","author":"P Brockwell","year":"2002","unstructured":"Brockwell, P., Davis, R.: Introduction to Time Series and Forecasting. Springer, New York (2002)"},{"key":"55_CR15","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-71918-2","volume-title":"Forecasting with Exponential Smoothing: The State Space Approach","author":"RJ Hyndman","year":"2008","unstructured":"Hyndman, R.J., Koehler, A.B., Ord, J.K., Snyder, R.D.: Forecasting with Exponential Smoothing: The State Space Approach. Springer, Heidelberg (2008)"},{"key":"55_CR16","volume-title":"Statistical Forecasting for Inventory Control","author":"RG Brown","year":"1959","unstructured":"Brown, R.G.: Statistical Forecasting for Inventory Control. McGrow Hill, New York (1959)"},{"key":"55_CR17","volume-title":"Smoothing","author":"RG Brown","year":"1963","unstructured":"Brown, R.G.: Smoothing. Forecasting and Prediction of Discrete Time Series. Prentice-Hall, Englewood Cliffs (1963)"},{"key":"55_CR18","unstructured":"Holt, C.C.: Forecasting seasonals and trends by exponentially weighted moving averages, ONR Memorandum, vol. 52. Carnegie Institute of Technology, Pittsburgh, PA. Available from the Engineering Library, University of Texas at Austin (1957)"},{"key":"55_CR19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/for.3980040103","volume":"4","author":"ES Gardner","year":"1985","unstructured":"Gardner, E.S.: Exponential smoothing: the state of the art. J. Forecast. 4, 1\u201328 (1985)","journal-title":"J. Forecast."},{"key":"55_CR20","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1016\/j.ijforecast.2006.03.005","volume":"22","author":"ES Gardner","year":"2006","unstructured":"Gardner, E.S.: Exponential smoothing: the state of the art Part II. Int. J. Forecast. 22, 637\u2013666 (2006)","journal-title":"Int. J. Forecast."},{"key":"55_CR21","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1287\/mnsc.6.3.324","volume":"6","author":"PR Winters","year":"1960","unstructured":"Winters, P.R.: Forecasting sales by exponentially weighted moving averages. Manage. Sci. 6, 324\u2013342 (1960)","journal-title":"Manage. Sci."},{"key":"55_CR22","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/0169-2070(90)90005-V","volume":"6","author":"BC Archibald","year":"1990","unstructured":"Archibald, B.C.: Parameter space of the Holt-Winters\u2019 model. Int. J. Forecast. 6, 199\u2013209 (1990)","journal-title":"Int. J. Forecast."},{"key":"55_CR23","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-96985-0","volume-title":"State Space Modeling of Time Series","author":"M Aoki","year":"1987","unstructured":"Aoki, M.: State Space Modeling of Time Series. Springer, Berlin (1987)"},{"issue":"3","key":"55_CR24","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1016\/S0169-2070(01)00110-8","volume":"18","author":"RJ Hyndman","year":"2002","unstructured":"Hyndman, R.J., Koehler, A.B., Snyder, R.D., Grose, S.: A state space framework for automatic forecasting using exponential smoothing methods. Int. J. Forecast. 18(3), 439\u2013454 (2002)","journal-title":"Int. J. Forecast."},{"key":"55_CR25","volume-title":"Time Series Analysis by State Space Methods","author":"J Durbin","year":"2001","unstructured":"Durbin, J., Koopman, S.J.: Time Series Analysis by State Space Methods. Oxford University Press, Oxford (2001)"},{"key":"55_CR26","doi-asserted-by":"crossref","unstructured":"Hyndman, R.J., Khandakar, Y.: Automatic time series forecasting: the forecast package for R. J. Stat. Softw. 27(3) (2008)","DOI":"10.18637\/jss.v027.i03"},{"key":"55_CR27","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1007\/BF02294361","volume":"52","author":"H Bozdogan","year":"1987","unstructured":"Bozdogan, H.: Model selection and Akaike\u2019s Information Criterion (AIC): the general theory and its analytical extensions. Psychometrika 52, 345\u2013370 (1987)","journal-title":"Psychometrika"},{"key":"55_CR28","unstructured":"SNORT - Intrusion Detection System. https:\/\/www.snort.org\/"},{"key":"55_CR29","unstructured":"Kali Linux. https:\/\/www.kali.org\/"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference SOCO\u201917-CISIS\u201917-ICEUTE\u201917 Le\u00f3n, Spain, September 6\u20138, 2017, Proceeding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67180-2_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T17:05:15Z","timestamp":1570035915000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67180-2_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,23]]},"ISBN":["9783319671796","9783319671802"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67180-2_55","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,8,23]]}}}