{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T06:29:16Z","timestamp":1743056956007,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319940298"},{"type":"electronic","value":"9783319940304"}],"license":[{"start":{"date-parts":[[2018,7,4]],"date-time":"2018-07-04T00:00:00Z","timestamp":1530662400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-319-94030-4_10","type":"book-chapter","created":{"date-parts":[[2018,7,3]],"date-time":"2018-07-03T08:22:48Z","timestamp":1530606168000},"page":"233-267","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Network Traffic Analytics for Internet Service Providers\u2014Application in Early Prediction of DDoS Attacks"],"prefix":"10.1007","author":[{"given":"Apostolos P.","family":"Leros","sequence":"first","affiliation":[]},{"given":"Antonios S.","family":"Andreatos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,4]]},"reference":[{"key":"10_CR1","unstructured":"Anderson, B.D.O., Moore, J.B.: Optimal filtering. In: Kailath, T. (ed.) Information and System Sciences Series. Prentice-Hall, Inc., Englewood Cliffs, N.J. (1979)"},{"key":"10_CR2","unstructured":"Anjali, T., Scoglio, C., Chen, L.C., Akyildiz, I.F., Uhl, G.: ABEst: an available bandwidth estimator within an autonomous system. In: IEEE Global Telecommunications Conference, Nov 2002"},{"key":"10_CR3","unstructured":"Arbor Networks: Worldwide infrastructure security reports series (2005\u20132012) (2012). \n                    http:\/\/www.arbornetworks.com\/report"},{"key":"10_CR4","doi-asserted-by":"publisher","first-page":"1912","DOI":"10.1016\/j.apm.2007.06.026","volume":"32","author":"AP Bougioukou","year":"2008","unstructured":"Bougioukou, A.P., Leros, A.P., Papakonstantinou, V.: Modelling of non-stationary ground motion using the mean reverting stochastic process. Appl. Math. Model. 32, 1912\u20131932 (2008)","journal-title":"Appl. Math. Model."},{"key":"10_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/b97391","volume-title":"Introduction time series and forecasting","author":"PJ Brockwell","year":"2002","unstructured":"Brockwell, P.J., Davis, R.A.: Introduction time series and forecasting. Springer, New York (2002)"},{"key":"10_CR6","volume-title":"Practical Econometrics: An Introduction to State Space Time Series Analysis","author":"JJF Commandeur","year":"2007","unstructured":"Commandeur, J.J.F., Koopman, S.J.: Practical Econometrics: An Introduction to State Space Time Series Analysis. Oxford University Press, New York (2007)"},{"issue":"2","key":"10_CR7","doi-asserted-by":"publisher","first-page":"385","DOI":"10.2307\/1911242","volume":"53","author":"JC Cox","year":"1985","unstructured":"Cox, J.C., Ingersoll, Jonathan E., Ross, Stephen A.: A theory of the term structure of interest rates. Econometrica 53(2), 385\u2013408 (1985)","journal-title":"Econometrica"},{"key":"10_CR8","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MSP.2013.55","volume":"12","author":"M Geva","year":"2013","unstructured":"Geva, M., Herzberg, A., Gev, Y.: Bandwidth distributed Denial of service: attacks and defenses. IEEE Secur. Priv. 12, 54\u201361 (2013)","journal-title":"IEEE Secur. Priv."},{"key":"10_CR9","unstructured":"Giannopoulos, I.K., Leros, A.P., Leros, A.K., Tsaramirsis, G.: A stochastic model with an adaptive proportional controller for the evolution of user-router bandwidth demand for quality of service (QoS) aspects. In: Ad Hoc and Sensor Wireless Networks (2014)"},{"key":"10_CR10","unstructured":"Giannopoulos, I.K., Leros, A.P., Leros, A.K.: A model for the evolution of router bandwidth. In: WCE2015, pp. 547\u2013551 (2015)"},{"issue":"3","key":"10_CR11","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1137\/S0036144500378302","volume":"43","author":"DJ Higham","year":"2001","unstructured":"Higham, D.J.: An algorithmic introduction to numerical simulation of stochastic differential equations. SIAM Rev. 43(3), 525\u2013546 (2001)","journal-title":"SIAM Rev."},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Kuan Hoong, P., Tan, I.K.T., Yik Keong, C.: Bit torrent network traffic forecasting with ARIMA. IJCNC 4(4) (2012)","DOI":"10.5121\/ijcnc.2012.4409"},{"key":"10_CR13","unstructured":"Lipschutz, S., Lipson, M.L.: Linear Algebra, 4th edn. In: Schaum\u2019s Outline Series. The McGraw-Hill Companies, Inc. (2009)"},{"key":"10_CR14","unstructured":"Ludwing, A.: Stochastic Differential Equations: Theory and Applications. Wiley (1973)"},{"key":"10_CR15","unstructured":"Mahanta, D., Ahmed, M., Bora, U.J.: A study of bandwidth management in computer networks. Int. J. Innov. Technol. Explor. Eng. 2(2) (2013)"},{"key":"10_CR16","unstructured":"Maybeck, P.: Stochastic Models, Estimation and Control, vol. I. Academic Press (1979)"},{"key":"10_CR17","unstructured":"Mitrokotsa, A., Douligeris C.: DDoS attacks and defense mechanisms: a classification. In: 3rd IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2003)"},{"issue":"4","key":"10_CR18","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/s001900050236","volume":"73","author":"AH Mohamed","year":"1999","unstructured":"Mohamed, A.H., Schwarz, K.P.: Adaptive Kalman filtering for INS\/GPS. J. Geodesy 73(4), 193\u2013203 (1999)","journal-title":"J. Geodesy"},{"key":"10_CR19","unstructured":"Moussas, V.C., Daglis, M., Kolega, E.: Network traffic modeling and prediction using multiplicative seasonal ARIMA models. In: Proceedings of the 1st International Conference on Experiments\/Process\/System Modeling\/Simulation\/Optimization, Athens, 6\u20139 July 2005"},{"key":"10_CR20","unstructured":"Moussas, V.C., Pappas, S.S.: Adaptive network anomaly detection using bandwidth utilization data. In: Proceedings of the 1st International Conference on Experiments\/Process\/System Modeling\/Simulation\/Optimization, Athens, 6\u20139 July 2005"},{"key":"10_CR21","unstructured":"Moussas, V.C.: Network traffic flow prediction using multi-model partitioning algorithms. In: Tsahalis, D.T. (ed) Proceedings of the 2nd SCCE International Conference \u201cFrom Scientific Computing to Computational Engineering\u201d, Athens, 5\u20138 July 2006"},{"key":"10_CR22","unstructured":"Moussas, V.C.: Adaptive traffic modelling for network anomaly detection (chapter 1). In: Daras, N.J. (ed). Springer (2016)"},{"key":"10_CR23","unstructured":"Oetiker, T.: Multi Router Traffic Grapher (MRTG) tool, Software Package and Manuals (2018). \n                    http:\/\/oss.oetiker.ch\/mrtg\/"},{"key":"10_CR24","unstructured":"Oetiker, T.: MRTG: Multi Router Traffic Grapher (2018). \n                    http:\/\/people.ee.ethz.ch\/oetiker\/webtools\/mrtg\/"},{"key":"10_CR25","unstructured":"Oetiker, T.: Round Robin Database Tool (RRD tool), Software Package and Manuals (2018). \n                    http:\/\/oss.oetiker.ch\/rrdtool\/"},{"key":"10_CR26","unstructured":"P. T. Inc.: Prolexic Attack Report, Q3 2011\u2013Q4 2012 (2011\/2012). \n                    http:\/\/www.prolexic.com\/attackreports"},{"key":"10_CR27","unstructured":"Shu, Y., Yu, M., Liu, J., Yang, O.W.W.: Wireless traffic modeling and prediction using seasonal ARIMA models. In: IEEE International Conference on Communication, ICC\u201903, vol. 3, May 2003"},{"issue":"8","key":"10_CR28","doi-asserted-by":"publisher","first-page":"2191","DOI":"10.1109\/TSP.2003.814797","volume":"51","author":"M Thottan","year":"2003","unstructured":"Thottan, M., Ji, C.: Detection in IP networks. IEEE Trans. Signal Process. 51(8), 2191\u20132204 (2003)","journal-title":"IEEE Trans. Signal Process."},{"key":"10_CR29","unstructured":"White Paper: Understanding fiber ethernet bandwidth vs. end user experience. \n                    http:\/\/fiberinternetcenter.com\/WhitePapers-Podcasts\/WhitePaperEthervsEndUser.pdf"}],"container-title":["Intelligent Systems Reference Library","Machine Learning Paradigms"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-94030-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T01:58:01Z","timestamp":1558403881000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-94030-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,4]]},"ISBN":["9783319940298","9783319940304"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-94030-4_10","relation":{},"ISSN":["1868-4394","1868-4408"],"issn-type":[{"type":"print","value":"1868-4394"},{"type":"electronic","value":"1868-4408"}],"subject":[],"published":{"date-parts":[[2018,7,4]]},"assertion":[{"value":"4 July 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}