{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:00:01Z","timestamp":1725537601093},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044915"},{"type":"electronic","value":"9783642044922"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04492-2_39","type":"book-chapter","created":{"date-parts":[[2009,9,15]],"date-time":"2009-09-15T04:01:51Z","timestamp":1252987311000},"page":"385-394","source":"Crossref","is-referenced-by-count":0,"title":["Baseline Traffic Modeling for Anomalous Traffic Detection on Network Transit Points"],"prefix":"10.1007","author":[{"given":"Yoohee","family":"Cho","sequence":"first","affiliation":[]},{"given":"Koohong","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Ikkyun","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Kitae","family":"Jeong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","unstructured":"Foster, J.C.: IDS: Signature versus anomaly detection (2005), http:\/\/searchsecurity.techtarget.com"},{"key":"39_CR2","doi-asserted-by":"publisher","first-page":"2191","DOI":"10.1109\/TSP.2003.814797","volume":"51","author":"M. Thottan","year":"2003","unstructured":"Thottan, M., Ji, C.: Anomaly detection in ip networks. IEEE Transactions on Signal Processing\u00a051, 2191\u20132204 (2003)","journal-title":"IEEE Transactions on Signal Processing"},{"key":"39_CR3","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/505202.505211","volume-title":"Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement","author":"P. Barford","year":"2001","unstructured":"Barford, P., Plonka, D.: Characteristics of network traffic flow anomalies. In: Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement, pp. 69\u201373. ACM, New York (2001)"},{"key":"39_CR4","unstructured":"Brutlag, J.D.: Aberrant behavior detection in time series for network monitoring. In: LISA 2000: Proceedings of the 14th USENIX conference on System administration, pp. 139\u2013146. USENIX Association (2000)"},{"key":"39_CR5","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1145\/952532.952601","volume-title":"SAC 2003: Proceedings of the 2003 ACM symposium on Applied computing","author":"M.V. Mahoney","year":"2003","unstructured":"Mahoney, M.V.: Network traffic anomaly detection based on packet bytes. In: SAC 2003: Proceedings of the 2003 ACM symposium on Applied computing, pp. 346\u2013350. ACM, New York (2003)"},{"key":"39_CR6","unstructured":"Anderson, D., Frivold, T., Valdes, A.: Next-generation intrusion-detection expert system (NIDES). Technical Report SRI-CSL-95-07, Computer Science Laboratory, SRI International (1995)"},{"key":"39_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-540-87357-0_2","volume-title":"IP Operations and Management","author":"A. Sperotto","year":"2008","unstructured":"Sperotto, A., Sadre, R., Pras, A.: Anomaly characterization in flow-based traffic time series. In: Akar, N., Pioro, M., Skianis, C. (eds.) IPOM 2008. LNCS, vol.\u00a05275, pp. 15\u201327. Springer, Heidelberg (2008)"},{"key":"39_CR8","doi-asserted-by":"publisher","first-page":"1639","DOI":"10.1016\/j.comcom.2005.07.015","volume":"29","author":"M.S. Kim","year":"2006","unstructured":"Kim, M.S., Won, Y.J., Hong, J.W.: Characteristic analysis of internet traffic from the perspective of flows. Computer Communications\u00a029, 1639\u20131652 (2006); Monitoring and Measurements of IP Networks","journal-title":"Computer Communications"},{"key":"39_CR9","volume-title":"Introduction to Linear Regression Analysis","author":"D. Montgomery","year":"1992","unstructured":"Montgomery, D., Peck, E.A.: Introduction to Linear Regression Analysis, 2nd edn. John Wiley and Sons, Inc., Chichester (1992)","edition":"2"},{"key":"39_CR10","unstructured":"SPSS: (Spss manual), http:\/\/www.spss.com\/"}],"container-title":["Lecture Notes in Computer Science","Management Enabling the Future Internet for Changing Business and New Computing Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04492-2_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T18:46:38Z","timestamp":1633891598000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04492-2_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044915","9783642044922"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04492-2_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}