{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T04:09:31Z","timestamp":1751688571666,"version":"3.41.0"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319914541"},{"type":"electronic","value":"9783319914558"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-91455-8_20","type":"book-chapter","created":{"date-parts":[[2018,5,11]],"date-time":"2018-05-11T09:35:37Z","timestamp":1526031337000},"page":"227-238","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Shapelets-Based Intrusion Detection for Protection Traffic Flooding Attacks"],"prefix":"10.1007","author":[{"given":"Yunbin","family":"Kim","sequence":"first","affiliation":[]},{"given":"Jaewon","family":"Sa","sequence":"additional","affiliation":[]},{"given":"Sunwook","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Sungju","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,12]]},"reference":[{"issue":"4","key":"20_CR1","doi-asserted-by":"publisher","first-page":"7953","DOI":"10.3390\/s150407953","volume":"15","author":"Y Chung","year":"2015","unstructured":"Chung, Y., Lee, S., Jeon, T., Park, D.: Fast video encryption using the H.264 error propagation property for smart mobile devices. Sensors 15(4), 7953\u20137968 (2015)","journal-title":"Sensors"},{"issue":"7","key":"20_CR2","doi-asserted-by":"publisher","first-page":"108","DOI":"10.3390\/sym9070108","volume":"9","author":"S Lee","year":"2017","unstructured":"Lee, S., Jeong, T.: Forecasting purpose data analysis and methodology comparison of neural model perspective. Symmetry 9(7), 108 (2017)","journal-title":"Symmetry"},{"issue":"11","key":"20_CR3","doi-asserted-by":"publisher","first-page":"14647","DOI":"10.3390\/s121114647","volume":"12","author":"S Lee","year":"2012","unstructured":"Lee, S., Kim, H., Chung, Y., Park, D.: Energy efficient image\/video data transmission on commercial multi-core processors. Sensors 12(11), 14647\u201314670 (2012)","journal-title":"Sensors"},{"issue":"8","key":"20_CR4","doi-asserted-by":"publisher","first-page":"20170227","DOI":"10.1587\/elex.14.20170227","volume":"14","author":"S Lee","year":"2017","unstructured":"Lee, S., Kim, H., Sa, J., Park, B., Chung, Y.: Real-time processing for intelligent-surveillance applications. IEICE Electr. Express 14(8), 20170227 (2017)","journal-title":"IEICE Electr. Express"},{"issue":"10","key":"20_CR5","doi-asserted-by":"publisher","first-page":"103","DOI":"10.3390\/sym8100103","volume":"8","author":"S Lee","year":"2016","unstructured":"Lee, S., Jeong, T.: Cloud-based parameter-driven statistical services and resource allocation in a heterogeneous platform on enterprise environment. Symmetry 8(10), 103 (2016)","journal-title":"Symmetry"},{"issue":"4","key":"20_CR6","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1016\/j.eswa.2005.05.002","volume":"29","author":"O Depren","year":"2005","unstructured":"Depren, O., Topallar, M., Anarim, E., Ciliz, M.K.: An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Expert Syst. Appl. 29(4), 713\u2013722 (2005)","journal-title":"Expert Syst. Appl."},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Moser, A., Kruegel, C., Kirda, E.: Limits of static analysis for malware detection. In: 23rd Computer Security Applications Conference, ACSAC 2007, pp. 421\u2013430. IEEE, Miami Beach (2007)","DOI":"10.1109\/ACSAC.2007.21"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Siddiqui, M., Wang, M.C., Lee, J.: A survey of data mining techniques for malware detection using file features. In: 46th Conference Proceedings on xx, pp. 509\u2013510. ACM, Alabama (2008)","DOI":"10.1145\/1593105.1593239"},{"key":"20_CR9","first-page":"949","volume":"13","author":"G Tahan","year":"2012","unstructured":"Tahan, G., Rokach, L., Shahar, Y.: Mal-ID: Automatic malware detection using common segment analysis and meta-features. J. Mach. Learn. Res. 13, 949\u2013979 (2012)","journal-title":"J. Mach. Learn. Res."},{"issue":"2","key":"20_CR10","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.jides.2016.10.009","volume":"3","author":"M Wojnowicz","year":"2016","unstructured":"Wojnowicz, M., Chisholm, G., Wolff, M., Zhao, X.: Wavelet decomposition of software entropy reveals symptoms of malicious code. J. Innovation Digit. Ecosyst. 3(2), 130\u2013140 (2016)","journal-title":"J. Innovation Digit. Ecosyst."},{"issue":"2","key":"20_CR11","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1504\/IJESDF.2007.016865","volume":"1","author":"D Bilar","year":"2007","unstructured":"Bilar, D.: Opcodes as predictor for malware. Int. J. Electr. Secur. Digit. Forensics 1(2), 156\u2013168 (2007)","journal-title":"Int. J. Electr. Secur. Digit. Forensics"},{"key":"20_CR12","doi-asserted-by":"publisher","unstructured":"Friedman, J., Hastie, T., Tibshirani, R.: The Elements of Statistical Learning, vol. 1, pp. 337\u2013387. Springer, New York (2001). https:\/\/doi.org\/10.1007\/978-0-387-21606-5","DOI":"10.1007\/978-0-387-21606-5"},{"key":"20_CR13","unstructured":"Alazab, M., Venkatraman, S., Watters, P., Alazab, M.: Zero-day malware detection based on supervised learning algorithms of API call signatures. In: 9th International Conference Proceedings on Australasian Data Mining, vol. 121, pp. 171\u2013182. Australian Computer Society, Ballarat (2011)"},{"key":"20_CR14","unstructured":"Davis, A., Wolff, M.: Deep Learning on Disassembly Data. In: Black Hat, USA (2015)"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Kolter, J.Z., Maloof, M.A.: Learning to detect malicious executables in the wild. In: 10th ACM SIGKDD International Conference Proceedings on Knowledge Discovery and Data Mining, pp. 470\u2013478. ACM (2004)","DOI":"10.1145\/1014052.1014105"},{"issue":"2","key":"20_CR16","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2007.48","volume":"5","author":"R Lyda","year":"2007","unstructured":"Lyda, R., Hamrock, J.: Using entropy analysis to find encrypted and packed malware. IEEE Secur. Priv. 5(2), 40\u201345 (2007)","journal-title":"IEEE Secur. Priv."},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Schultz, M.G., Eskin, E., Zadok, F., Stolfo, S.J.: Data mining methods for detection of new malicious executables. In: Conference Proceedings on Security and Privacy, 2001 IEEE Symposium, pp. 38\u201349. IEEE, Oakland (2001)","DOI":"10.1109\/SECPRI.2001.924286"},{"issue":"1","key":"20_CR18","first-page":"16","volume":"14","author":"A Shabtai","year":"2009","unstructured":"Shabtai, A., Moskovitch, R., Elovici, Y., Glezer, C.: Detection of malicious code by applying machine learning classifiers on static features: a state-of-the-art survey. Elsevier 14(1), 16\u201329 (2009)","journal-title":"Elsevier"},{"key":"20_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-642-04342-0_7","volume-title":"Recent Advances in Intrusion Detection","author":"MZ Shafiq","year":"2009","unstructured":"Shafiq, M.Z., Tabish, S.M., Mirza, F., Farooq, M.: PE-Miner: mining structural information to detect malicious executables in realtime. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol. 5758, pp. 121\u2013141. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04342-0_7"},{"issue":"4","key":"20_CR20","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/s11416-013-0185-4","volume":"9","author":"D Baysa","year":"2013","unstructured":"Baysa, D., Low, R.M., Stamp, M.: Structural entropy and metamorphic malware. J. Comput. Virol. Hacking Tech. 9(4), 179\u2013192 (2013)","journal-title":"J. Comput. Virol. Hacking Tech."},{"issue":"4","key":"20_CR21","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/s11416-011-0153-9","volume":"7","author":"I Sorokin","year":"2011","unstructured":"Sorokin, I.: Comparing files using structural entropy. J. Comput. Virol. 7(4), 259 (2011)","journal-title":"J. Comput. Virol."},{"key":"20_CR22","unstructured":"Wojnowicz, M., Chisholm, G., Wolff, M.: Suspiciously structured entropy: wavelet decomposition of software entropy reveals symptoms of malware in the energy spectrum. In: International Conference Proceedings on FLAIRS, pp. 294\u2013298 (2016)"},{"issue":"5","key":"20_CR23","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MSP.2011.98","volume":"9","author":"P O\u2019Kane","year":"2011","unstructured":"O\u2019Kane, P., Sezer, S., McLaughlin, K.: Obfuscation: the hidden malware. IEEE Secur. Priv. 9(5), 41\u201347 (2011)","journal-title":"IEEE Secur. Priv."},{"issue":"2","key":"20_CR24","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/s10115-004-0172-7","volume":"8","author":"E Keogh","year":"2005","unstructured":"Keogh, E., Lin, J.: Clustering of time-series subsequences is meaningless: implications for previous and future research. Knowl. Inf. Syst. 8(2), 154\u2013177 (2005)","journal-title":"Knowl. Inf. Syst."},{"key":"20_CR25","unstructured":"Berndt, D.J., Clifford, J.: Using dynamic time warping to find patterns in time series. In: International Conference Proceedings on Discovery Data Mining, vol. 10, pp. 359\u2013370 (1994)"},{"issue":"3","key":"20_CR26","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1007\/s10115-004-0154-9","volume":"7","author":"E Keogh","year":"2005","unstructured":"Keogh, E., Ratanamahatana, C.A.: Exact indexing of dynamic time warping. Knowl. Inf. Syst. 7(3), 358\u2013386 (2005)","journal-title":"Knowl. Inf. Syst."},{"issue":"3","key":"20_CR27","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/s10618-005-0039-x","volume":"13","author":"X Wang","year":"2006","unstructured":"Wang, X., Smith, K., Hyndman, R.: Characteristic-based clustering for time series data. Data. Min. Knowl. Discov. 13(3), 335\u2013364 (2006)","journal-title":"Data. Min. Knowl. Discov."},{"key":"20_CR28","unstructured":"MacQueen, J.: Some methods for classification and analysis of multivariate observations. In: 5th Proceedings on Berkeley symposium, vol. 1(14), pp. 281\u2013297 (1967)"},{"issue":"2","key":"20_CR29","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/s10844-012-0196-5","volume":"39","author":"J Lin","year":"2012","unstructured":"Lin, J., Khade, R., Li, Y.: Rotation-invariant similarity in time series using bag-of-patterns representation. J. Intell. Inf. Syst. 39(2), 287\u2013315 (2012)","journal-title":"J. Intell. Inf. Syst."},{"key":"20_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/3-540-57301-1_5","volume-title":"Foundations of data organization and algorithms","author":"R Agrawal","year":"1993","unstructured":"Agrawal, R., Faloutsos, C., Swami, A.: Efficient similarity search in sequence databases. In: Lomet, D.B. (ed.) FODO 1993. LNCS, vol. 730, pp. 69\u201384. Springer, Heidelberg (1993). https:\/\/doi.org\/10.1007\/3-540-57301-1_5"},{"key":"20_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-540-24741-8_8","volume-title":"Advances in Database Technology - EDBT 2004","author":"J Lin","year":"2004","unstructured":"Lin, J., Vlachos, M., Keogh, E., Gunopulos, D.: Iterative incremental clustering of time series. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., B\u00f6hm, K., Ferrari, E. (eds.) EDBT 2004. LNCS, vol. 2992, pp. 106\u2013122. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24741-8_8"},{"key":"20_CR32","doi-asserted-by":"crossref","unstructured":"Korn, F., Jagadish, H.V., Faloutsos, C.: Efficiently supporting ad hoc queries in large datasets of time sequences. In: International Conference Proceeding on Management of data, vol. 26(2), pp. 289\u2013300. ACM, Tucson (1997)","DOI":"10.1145\/253260.253332"},{"key":"20_CR33","doi-asserted-by":"crossref","unstructured":"Keogh, E., Chakrabarti, K., Pazzani, M., Mehrotra, S.: Locally adaptive dimensionality reduction for indexing large time series databases. In: International Conference Proceeding on Management of data, vol. 30(2), pp. 151\u2013162. ACM, Santa Barbara (2001)","DOI":"10.1145\/375663.375680"},{"key":"20_CR34","doi-asserted-by":"crossref","unstructured":"Chan, K.P., Fu, A.W.C.: Efficient time series matching by wavelets. In: 15th International Conference Proceedings on Data Engineering, pp. 126\u2013133. IEEE, Sydney (1999)","DOI":"10.1109\/ICDE.1999.754915"},{"key":"20_CR35","doi-asserted-by":"crossref","unstructured":"Popivanov, I., Miller, R.J.: Similarity search over time-series data using wavelets. In: 18th International Conference Proceeding on Data Engineering, pp. 212\u2013221. IEEE, San Jose (2002)","DOI":"10.1109\/ICDE.2002.994711"},{"key":"20_CR36","unstructured":"Vlachos, M., Lin, J., Keogh, E., Gunopulos, D.: A wavelet-based anytime algorithm for k-means clustering of time series. In: Proceedings Workshop on Clustering High Dimensionality Data and its Applications, pp. 23\u201330 (2003)"},{"issue":"1","key":"20_CR37","first-page":"1350003","volume":"11","author":"A Antoniadis","year":"2013","unstructured":"Antoniadis, A., Brossat, X., Cugliari, J., Poggi, J.M.: Clustering functional data using wavelets. Int. J. Wavelets 11(1), 1350003 (2013)","journal-title":"Int. J. Wavelets"},{"issue":"4","key":"20_CR38","doi-asserted-by":"publisher","first-page":"851","DOI":"10.1007\/s10618-013-0322-1","volume":"28","author":"J Hills","year":"2014","unstructured":"Hills, J., Lines, J., Baranauskas, E., Mapp, J., Bagnall, A.: Classification of time series by shapelet transformation. Data. Min. Knowl. Discov. 28(4), 851\u2013881 (2014)","journal-title":"Data. Min. Knowl. Discov."},{"key":"20_CR39","doi-asserted-by":"crossref","unstructured":"Zakaria, J., Mueen, A., Keogh, E.: Clustering time series using unsupervised-shapelets. In: 12th International Conference Proceedings on Data Mining (ICDM), pp. 785\u2013794. IEEE, Brussels (2012)","DOI":"10.1109\/ICDM.2012.26"},{"issue":"1","key":"20_CR40","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s10618-015-0411-4","volume":"30","author":"J Zakaria","year":"2016","unstructured":"Zakaria, J., Mueen, A., Keogh, E., Young, N.: Accelerating the discovery of unsupervised-shapelets. Data. Min. Knowl. Discov. 30(1), 243\u2013281 (2016)","journal-title":"Data. Min. Knowl. Discov."},{"key":"20_CR41","doi-asserted-by":"crossref","unstructured":"Patri, O., Wojnowicz, M., and Wolff, M.: Discovering malware with time series shapelets. In: 50th International Conference Proceedings on System Science, Hawaii (2017)","DOI":"10.24251\/HICSS.2017.734"},{"issue":"9","key":"20_CR42","doi-asserted-by":"publisher","first-page":"7934","DOI":"10.1109\/TVT.2017.2679076","volume":"66","author":"D Castro-Hernandez","year":"2017","unstructured":"Castro-Hernandez, D., Paranjape, R.: Classification of user trajectories in LTE HetNets using unsupervised shapelets and multiresolution wavelet decomposition. IEEE Trans. Veh. Technol. 66(9), 7934\u20137946 (2017)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"20_CR43","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 1999 data set. In: Computational Intelligence for Security and Defense Applications, CISDA 2009, pp. 1\u20136. IEEE, Ottawa (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"20_CR44","doi-asserted-by":"crossref","unstructured":"Ye, L., Keogh, E.: Time series shapelets: a new primitive for data mining. In: 15th ACM SIGKDD International Conference Proceedings on Knowledge discovery and data mining, pp. 947\u2013956. ACM, Paris (2009)","DOI":"10.1145\/1557019.1557122"},{"key":"20_CR45","doi-asserted-by":"crossref","unstructured":"Rakthanmanon, T., Keogh, E.: Fast shapelets: a scalable algorithm for discovering time series shapelets. In: International Conference Proceedings on Data Mining, pp. 668\u2013676. Society for Industrial and Applied Mathematics (2013)","DOI":"10.1137\/1.9781611972832.74"},{"key":"20_CR46","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1016\/j.jmsy.2017.01.003","volume":"43","author":"Y Gao","year":"2017","unstructured":"Gao, Y., Feng, Y., Tan, J.: Exploratory study on cognitive information gain modeling and optimization of personalized recommendations for knowledge reuse. J. Manuf. Syst. 43, 400\u2013408 (2017)","journal-title":"J. Manuf. Syst."}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91455-8_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T12:56:43Z","timestamp":1751633803000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-91455-8_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319914541","9783319914558"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91455-8_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"DASFAA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Database Systems for Advanced Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gold Coast, QLD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 May 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 May 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dasfaa2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ict.griffith.edu.au\/conferences\/dasfaa2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}