{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T14:28:58Z","timestamp":1744900138553,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662452363"},{"type":"electronic","value":"9783662452370"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-45237-0_43","type":"book-chapter","created":{"date-parts":[[2014,10,25]],"date-time":"2014-10-25T10:37:20Z","timestamp":1414233440000},"page":"465-478","source":"Crossref","is-referenced-by-count":12,"title":["Network Anomaly Detection Using Parameterized Entropy"],"prefix":"10.1007","author":[{"given":"Przemys\u0142aw","family":"Berezi\u0144ski","sequence":"first","affiliation":[]},{"given":"Marcin","family":"Szpyrka","sequence":"additional","affiliation":[]},{"given":"Bartosz","family":"Jasiul","sequence":"additional","affiliation":[]},{"given":"Micha\u0142","family":"Mazur","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"43_CR1","unstructured":"IETF IPFIX Working Group, \n                    \n                      http:\/\/datatracker.ietf.org\/wg\/ipfix\/charter"},{"key":"43_CR2","unstructured":"Verizon. 2014 Data Breach Investigations Report, \n                    \n                      http:\/\/www.verizonenterprise.com\/DBIR\/2014\/"},{"key":"43_CR3","unstructured":"Weka project homepage, \n                    \n                      http:\/\/www.cs.waikato.ac.nz\/ml\/weka"},{"key":"43_CR4","series-title":"AISC","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-319-07013-1_5","volume-title":"Proceedings of the Ninth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX. June 30 \u2013 July 4, 2014, Brun\u00f3w, Poland","author":"P. Berezi\u0144ski","year":"2014","unstructured":"Berezi\u0144ski, P., Pawelec, J., Ma\u0142owidzki, M., Piotrowski, R.: Entropy-based internet traffic anomaly detection: A case study. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds.) Proceedings of the Ninth International Conference on DepCoS-RELCOMEX. AISC, vol.\u00a0286, pp. 47\u201358. Springer, Heidelberg (2014)"},{"key":"43_CR5","volume-title":"Network traffic anomaly detection and evaluation","author":"D. Brauckhoff","year":"2010","unstructured":"Brauckhoff, D.: Network traffic anomaly detection and evaluation. ETH, Zurich (2010)"},{"key":"43_CR6","doi-asserted-by":"crossref","unstructured":"Brauckhoff, D., Tellenbach, B., Wagner, A., May, M., Lakhina, A.: Impact of packet sampling on anomaly detection metrics. In: Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, IMC 2006, pp. 159\u2013164. ACM (2006)","DOI":"10.1145\/1177080.1177101"},{"key":"43_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"15","author":"V. Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Computing Surveys 41(3)\u00a015, 1\u201315 (2009)","journal-title":"ACM Computing Surveys 41(3)"},{"key":"43_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-642-24755-2_9","volume-title":"Towards a Service-Based Internet","author":"M. Chora\u015b","year":"2011","unstructured":"Chora\u015b, M., Kozik, R., Piotrowski, R., Brzostek, J., Ho\u0142ubowicz, W.: Network events correlation for federated networks protection system. In: Abramowicz, W., Llorente, I.M., Surridge, M., Zisman, A., Vayssi\u00e8re, J. (eds.) ServiceWave 2011. LNCS, vol.\u00a06994, pp. 100\u2013111. Springer, Heidelberg (2011)"},{"key":"43_CR9","doi-asserted-by":"crossref","unstructured":"Davis, J., Goadrich, M.: The relationship between precision-recall and roc curves. In: Proc. of the 23rd Int. Conference on Machine Learning, ICML 2006, pp. 233\u2013240. ACM (2006)","DOI":"10.1145\/1143844.1143874"},{"issue":"17","key":"43_CR10","doi-asserted-by":"publisher","first-page":"3248","DOI":"10.1016\/j.comnet.2008.08.014","volume":"52","author":"X. Dimitropoulos","year":"2008","unstructured":"Dimitropoulos, X., Stoecklin, M., Hurley, P., Kind, A.: The eternal sunshine of the sketch data structure. Computer Networks\u00a052(17), 3248\u20133257 (2008)","journal-title":"Computer Networks"},{"key":"43_CR11","unstructured":"Fillatre, L., Nikiforov, I., Casas, P., Vaton, S.: Optimal volume anomaly detection in network traffic flows. In: Proceedings of the 16th European Signal Processing Conference, EURASIPCO 2008. EURASIP (2008)"},{"key":"43_CR12","doi-asserted-by":"crossref","unstructured":"Jasiul, B., \u015aliwa, J., Gleba, K., Szpyrka, M.: Identification of malware activities with rules. In: Proceedings of the Federated Conference on Computer Science and Information Systems, Warsaw, Poland (2014)","DOI":"10.15439\/2014F265"},{"key":"43_CR13","series-title":"LNCS","first-page":"667","volume-title":"CISIM 2014","author":"B. Jasiul","year":"2014","unstructured":"Jasiul, B., Szpyrka, M., \u015aliwa, J.: Malware behavior modeling with Colored Petri nets. In: Saeed, K., Sn\u00e1\u0161el, V. (eds.) CISIM 2014. LNCS, vol.\u00a08838, pp. 667\u2013679. Springer, Heidelberg (2014)"},{"issue":"2","key":"43_CR14","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1109\/TNSM.2009.090604","volume":"6","author":"A. Kind","year":"2009","unstructured":"Kind, A., Stoecklin, M.P., Dimitropoulos, X.: Histogram-based traffic anomaly detection. IEEE Trans. on Netw. and Serv. Manag.\u00a06(2), 110\u2013121 (2009)","journal-title":"IEEE Trans. on Netw. and Serv. Manag."},{"issue":"1","key":"43_CR15","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1109\/JCN.2008.6388332","volume":"10","author":"Y. Kopylova","year":"2008","unstructured":"Kopylova, Y., Buell, D.A., Huang, C.-T., Janies, J.: Mutual information applied to anomaly detection. Journal of Communications and Networks\u00a010(1), 89\u201397 (2008)","journal-title":"Journal of Communications and Networks"},{"key":"43_CR16","doi-asserted-by":"crossref","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Mining anomalies using traffic feature distributions. In: Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM 2005, pp. 217\u2013228. ACM (2005)","DOI":"10.1145\/1080091.1080118"},{"key":"43_CR17","doi-asserted-by":"crossref","unstructured":"Nychis, G., Sekar, V., Andersen, D.G., Kim, H., Zhang, H.: An empirical evaluation of entropy-based traffic anomaly detection. In: Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement, IMC 2008, pp. 151\u2013156. ACM (2008)","DOI":"10.1145\/1452520.1452539"},{"key":"43_CR18","unstructured":"Renyi, A.: Probability Theory. Dover Books on Mathematics Series. Dover Publ. Inc. (1973)"},{"issue":"3","key":"43_CR19","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.cose.2011.12.012","volume":"31","author":"A. Shiravi","year":"2012","unstructured":"Shiravi, A., Shiravi, H., Tavallaee, M., Ghorbani, A.: Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Computers and Security\u00a031(3), 357\u2013374 (2012)","journal-title":"Computers and Security"},{"key":"43_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-642-40925-7_26","volume-title":"Computer Information Systems and Industrial Management","author":"M. Szpyrka","year":"2013","unstructured":"Szpyrka, M., Jasiul, B., Wrona, K., Dziedzic, F.: Telecommunications networks risk assessment with bayesian networks. In: Saeed, K., Chaki, R., Cortesi, A., Wierzcho\u0144, S. (eds.) CISIM 2013. LNCS, vol.\u00a08104, pp. 277\u2013288. Springer, Heidelberg (2013)"},{"issue":"15","key":"43_CR21","doi-asserted-by":"publisher","first-page":"3485","DOI":"10.1016\/j.comnet.2011.07.008","volume":"55","author":"B. Tellenbach","year":"2011","unstructured":"Tellenbach, B., Burkhart, M., Schatzmann, D., Gugelmann, D., Sornette, D.: Accurate network anomaly classification with generalized entropy metrics. Computer Networks\u00a055(15), 3485\u20133502 (2011)","journal-title":"Computer Networks"},{"key":"43_CR22","unstructured":"Tsallis, C., de Pesquisas F\u00edsicas, C.B.: Possible Generalization of Boltzmann-Gibbs Statistics. Notas de f\u00edsica. Centro Brasileiro de Pesquisas F\u00edsicas (1987)"},{"issue":"2","key":"43_CR23","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1109\/TIFS.2011.2107320","volume":"6","author":"Y. Xiang","year":"2011","unstructured":"Xiang, Y., Li, K., Zhou, W.: Low-rate ddos attacks detection and traceback by using new information metrics. Trans. Info. For. Sec.\u00a06(2), 426\u2013437 (2011)","journal-title":"Trans. Info. For. Sec."}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-45237-0_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T04:47:07Z","timestamp":1559018827000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-45237-0_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662452363","9783662452370"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-45237-0_43","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}