{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T07:51:24Z","timestamp":1758268284373},"publisher-location":"Berlin, Heidelberg","reference-count":36,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642155116"},{"type":"electronic","value":"9783642155123"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15512-3_1","type":"book-chapter","created":{"date-parts":[[2010,8,31]],"date-time":"2010-08-31T12:27:39Z","timestamp":1283257659000},"page":"1-17","source":"Crossref","is-referenced-by-count":11,"title":["What Is the Impact of P2P Traffic on Anomaly Detection?"],"prefix":"10.1007","author":[{"given":"Irfan Ul","family":"Haq","sequence":"first","affiliation":[]},{"given":"Sardar","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Hassan","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Syed Ali","family":"Khayam","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Ipoque Internet Study Report 2008\/2009, http:\/\/www.ipoque.com\/resources\/internet-studies\/internet-study-2008_2009"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Maier, G., Feldmann, A., Paxson, V., Allman, M.: On Dominant Characteristics of Residential Broadband Internet Traffic. In: IMC (2009)","DOI":"10.1145\/1644893.1644904"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Erman, J., Gerber, A., Hajiaghayi, M.T., Pei, D., Spatscheck, O.: Network-Aware Forward Caching. In: WWW (2009)","DOI":"10.1145\/1526709.1526749"},{"key":"1_CR4","unstructured":"Labovitz, C., McPherson, D., Iekel-Johnson, S.: 2009 Internet Observatory Report. In: NANGO: NANGO47 (2009)"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Li, Z., Goyal, A., Chen, Y., Kuzmanovic, A.: Measurement and Diagnosis of Address Misconfigured P2P Traffic. In: IEEE INFOCOM (2010)","DOI":"10.1109\/INFCOM.2010.5461939"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Jung, J., Paxson, V., Berger, A.W., Balakrishnan, H.: Fast Portscan Detection Using Sequential Hypothesis Testing. In: IEEE Symposium on Security and Privacy (2004)","DOI":"10.1109\/SECPRI.2004.1301325"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/978-3-540-30143-1_4","volume-title":"Recent Advances in Intrusion Detection","author":"S.E. Schechter","year":"2004","unstructured":"Schechter, S.E., Jung, J., Berger, W.: Fast Detection of Scanning Worm Infections. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol.\u00a03224, pp. 59\u201381. Springer, Heidelberg (2004)"},{"key":"1_CR8","unstructured":"Williamson, M.M.: Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code. In: ACSAC (2002)"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Twycross, J., Williamson, M.M.: Implementing and Testing a Virus Throttle. In: Usenix Security (2003)","DOI":"10.1109\/CSAC.2003.1254312"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Gu, Y., McCullum, A., Towsley, D.: Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation. In: ACM IMC (2005)","DOI":"10.1145\/1330107.1330148"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Mahoney, M.V.: Network Traffic Anomaly Detection Based on Packet Bytes. In: ACM Symposium on Applied Computing (2003)","DOI":"10.1145\/952532.952601"},{"key":"1_CR12","unstructured":"Next-Generation Intrusion Detection Expert System (NIDES), http:\/\/www.csl.sri.com\/projects\/nides\/"},{"key":"1_CR13","unstructured":"Weaver, N., Staniford, S., Paxson, V.: Very Fast Containment of Scanning Worms. In: Usenix Security (2004)"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Diagnosing Network-wide Traffic Anomalies. In: ACM SIGCOMM (2004)","DOI":"10.1145\/1015467.1015492"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Mining Anomalies Using Traffic Feature Distributions. In: ACM SIGCOMM (2005)","DOI":"10.1145\/1080091.1080118"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Patcha, A., Park, J.: An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends. Elsevier Computer Networks (2007)","DOI":"10.1016\/j.comnet.2007.02.001"},{"key":"1_CR17","unstructured":"DARPA Intrusion Detection Data Sets, http:\/\/www.ll.mit.edu\/mission\/communications\/ist\/corpora\/ideval\/data\/index.html"},{"key":"1_CR18","unstructured":"LBNL\/ICSI Enterprise Tracing Project, http:\/\/www.icir.org\/enterprise-tracing\/download.html"},{"key":"1_CR19","unstructured":"Endpoint Dataset, http:\/\/wisnet.seecs.edu.pk\/projects\/ENS\/DataSets.html"},{"key":"1_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11863908_1","volume-title":"Computer Security \u2013 ESORICS 2006","author":"M. Collins","year":"2006","unstructured":"Collins, M., Reiter, M.: Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol.\u00a04189, pp. 1\u201317. Springer, Heidelberg (2006)"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Bartlett, G., Heidemann, J., Papadopoulos, C.: Inherent Behaviors for On-line Detection of Peer-to-Peer File Sharing. In: Proceedings of the 10th IEEE Global Internet (2007)","DOI":"10.1109\/GI.2007.4301431"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Liu, Y., Guo, Y., Liang, C.: A Survey on Peer-to-Peer Video Streaming Systems. In: Peer-to-peer Networking and Applications (2008)","DOI":"10.1007\/s12083-007-0006-y"},{"key":"1_CR23","unstructured":"OpenDPI, Ipoque\u2019s DPI software\u2019s Open Source Version, http:\/\/www.opendpi.org\/"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Broido, A., Brownlee, N., Claffy, K.C., Faloutsos, M.: Is P2P Dying or Just Hiding? In: IEEE Globecom (2004)","DOI":"10.1109\/GLOCOM.2004.1378239"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Sun, X., Torres, R., Rao, S.: DDoS Attacks by Subverting Membership Management in P2P Systems. In: 3rd IEEE Workshop on Secure Network Protocols (2007)","DOI":"10.1109\/NPSEC.2007.4371618"},{"key":"1_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/11767480_9","volume-title":"Applied Cryptography and Network Security","author":"E. Athanasopoulos","year":"2006","unstructured":"Athanasopoulos, E., Anagnostakis, K.G., Markatos, E.P.: Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol.\u00a03989, pp. 130\u2013145. Springer, Heidelberg (2006)"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Naoumov, N., Ross, K.: Exploiting P2P Systems for DDoS Attacks. In: INFOSCALE (2006)","DOI":"10.1145\/1146847.1146894"},{"key":"1_CR28","unstructured":"2010 Cyberthreat Forecast from Kaspersky Lab, http:\/\/usa.kaspersky.com\/about-us\/news-press-releases.php?smnr_id=900000322"},{"key":"1_CR29","unstructured":"Chien, E.: Malicious Threats of Peer-to-Peer Networking. Whitepaper, Symantec Security Response (2008)"},{"key":"1_CR30","unstructured":"McAfee Labs, Threat Predictions (2010), http:\/\/www.mcafee.com\/us\/local_content\/white_papers\/7985rpt_labs_threat_predict_1209_v2.pdf"},{"key":"1_CR31","unstructured":"Arbor Peakflow: IP Traffic Flow Monitoring System, http:\/\/www.arbornetworks.com\/index.php?option=com_content&task=view&id=1465&Itemid=692"},{"key":"1_CR32","unstructured":"Allot Service Protector, DDoS Protection, http:\/\/www.allot.com\/Service_Protector.html#products"},{"key":"1_CR33","unstructured":"Sandvine: Network Protection, http:\/\/www.sandvine.com\/products\/network_protection.asp"},{"key":"1_CR34","unstructured":"Ipoque Press Release: P2P Raid in Germany Shows Little Effect, http:\/\/www.ipoque.com\/news-and-events\/news\/pressemitteilung-ipoque-210606.html"},{"key":"1_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/978-3-540-87403-4_19","volume-title":"Recent Advances in Intrusion Detection","author":"A.B. Ashfaq","year":"2008","unstructured":"Ashfaq, A.B., Robert, M.J., Mumtaz, A., Ali, M.Q., Sajjad, A., Khayam, S.A.: A Comparative Analysis of Anomaly Detectors under Portscan Attacks. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol.\u00a05230, pp. 351\u2013371. Springer, Heidelberg (2008)"},{"key":"1_CR36","doi-asserted-by":"crossref","unstructured":"Javed, M., Ashfaq, A.B., Shafiq, M.Z., Khayam, S.A.: On the Inefficient Use of Entropy for Anomaly Detection. In: RAID (2009)","DOI":"10.1007\/978-3-642-04342-0_28"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15512-3_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:56:02Z","timestamp":1619787362000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15512-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642155116","9783642155123"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15512-3_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}