{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T16:10:57Z","timestamp":1725725457369},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642380266"},{"type":"electronic","value":"9783642380273"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38027-3_47","type":"book-chapter","created":{"date-parts":[[2013,5,4]],"date-time":"2013-05-04T11:40:44Z","timestamp":1367667644000},"page":"443-452","source":"Crossref","is-referenced-by-count":5,"title":["DDoS Analysis Using Correlation Coefficient Based on Kolmogorov Complexity"],"prefix":"10.1007","author":[{"given":"Sung-ju","family":"Kim","sequence":"first","affiliation":[]},{"given":"Byung Chul","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Jae Yong","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"47_CR1","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/s10922-005-9016-3","volume":"14","author":"A. Kulkarni","year":"2006","unstructured":"Kulkarni, A., Bush, S.: Detecting Distributed Denial-of-Service Attacks Using Kolmogoriv Complexity Metrics. Journal of Network and Systems Management\u00a014(1), 69\u201380 (2006)","journal-title":"Journal of Network and Systems Management"},{"key":"47_CR2","unstructured":"Lee, W., Stolfo, S.J.: Data Mining Approaches for Intrusion Detection. In: Proc. of the 7th USENIX Security Symposium, pp. 79\u201384 (January 1998)"},{"issue":"4","key":"47_CR3","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1080\/15427951.2004.10129096","volume":"1","author":"A. Broder","year":"2003","unstructured":"Broder, A., Mitzenmacher, M.: Network Applications of Bloom Filters. Internet Mathematics\u00a01(4), 485\u2013509 (2003)","journal-title":"Internet Mathematics"},{"key":"47_CR4","doi-asserted-by":"crossref","unstructured":"Lu, W., Traore, I.: A novel unsupervised anomaly detection framework for detecting network attacks in real-time. In: 4th International Conference on Cryptology and Network Security, China (December 2005)","DOI":"10.1007\/11599371_9"},{"key":"47_CR5","doi-asserted-by":"crossref","unstructured":"Eskin, E., Arnold, A., Prerau, M., Portnoy, L., Stolfo, S.: A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data. Kluwer (2002)","DOI":"10.1007\/978-1-4615-0953-0_4"},{"key":"47_CR6","doi-asserted-by":"crossref","unstructured":"Peddabachigari, S., Abraham, A., Grosan, C., Thomas, J.: Modeling intrusion detection system using hybrid intelligent systems. Journal of Network and Computer Applications, 114\u2013132 (January 2007)","DOI":"10.1016\/j.jnca.2005.06.003"},{"key":"47_CR7","doi-asserted-by":"crossref","unstructured":"Guan, Y., Ghorbani, A.A., Belacel, N.: An unsupervised clustering algorithm for intrusion detection. In: Proc. of the 16th Canadian Conference on Artificial Intelligence, Canada, pp. 616\u2013617. Springer (2003)","DOI":"10.1007\/3-540-44886-1_60"},{"key":"47_CR8","doi-asserted-by":"crossref","unstructured":"Lu, W., Traore, I.: Detecting new forms of network intrusions using genetic programming. In: Computational Intelligence, pp. 475\u2013494 (August 2004)","DOI":"10.1111\/j.0824-7935.2004.00247.x"},{"key":"47_CR9","unstructured":"Shyu, M.L., Chen, S., Sarinnapakorn, K., Chang, L.: A novel anomaly detection scheme based on principal component classifier. In: Proc. of the IEEE Foundations and New Directions of Data Mining Workshop, in Conjunction with the 3rd IEEE International Conference on Data Mining, pp. 172\u2013179 (November 2003)"},{"key":"47_CR10","doi-asserted-by":"crossref","unstructured":"Jin, S., Yeung, D.S., Wang, X.: Network intrusion detection in covariance feature space. Pattern Recognition, 2185\u20132197 (August 2007)","DOI":"10.1016\/j.patcog.2006.12.010"},{"key":"47_CR11","doi-asserted-by":"crossref","unstructured":"Soule, A., Salamatian, K., Taft, N.: Combining Filtering and Statistical Methods for Anomaly Detection. In: Proc. of IEEE INFOCOM (2006)","DOI":"10.1145\/1330107.1330147"},{"key":"47_CR12","doi-asserted-by":"crossref","unstructured":"Kapoor, R., Chen, L., Lao, L., Gerla, M., Sanadidi, M.: CapProbe: a simple and accurate capacity estimation technique. In: Proc. ACM SIGCOMM 2004, USA, pp. 67\u201378 (2004)","DOI":"10.1145\/1015467.1015476"},{"key":"47_CR13","unstructured":"Antoniades, D., Athanatos, M., Papadogiannakis, A., Markatos, E., Dovrolis, C.: Available bandwidth measurement as simple as running wget. In: Proc. PAM 2006 (March 2006)"},{"key":"47_CR14","unstructured":"Rebeiro, V., Reidi, R., Baranuik, R., Navratil, J., Cottrell, L.: pathChirp: efficient available bandwidth estimation for network paths. In: Proc. PAM 2003 (April 2003)"},{"key":"47_CR15","doi-asserted-by":"crossref","unstructured":"Shevtekar, A., Ansari, N.: Is It Congestion or a DDoS Attack? IEEE Communications Letters\u00a013(7) (July 2009)","DOI":"10.1109\/LCOMM.2009.090628"},{"key":"47_CR16","unstructured":"Bezeq, R., Kim, H., Rozovskii, B., Tartakovsky, A.: A Novel Approach to Detection of Denial-of-Service Attacks via Adaptive Sequential and Batch-Sequential Change-Point Methods. In: IEEE Systems, Man and Cybernetics Information Assurance Workshop (June 2001)"}],"container-title":["Lecture Notes in Computer Science","Grid and Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38027-3_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T17:30:50Z","timestamp":1557682250000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38027-3_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642380266","9783642380273"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38027-3_47","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}