{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T06:22:52Z","timestamp":1762928572712},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811302916"},{"type":"electronic","value":"9789811302923"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-13-0292-3_11","type":"book-chapter","created":{"date-parts":[[2018,4,13]],"date-time":"2018-04-13T14:39:00Z","timestamp":1523630340000},"page":"173-191","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Distributed Detection of Zero-Day Network Traffic Flows"],"prefix":"10.1007","author":[{"given":"Yuantian","family":"Miao","sequence":"first","affiliation":[]},{"given":"Lei","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Sutharshan","family":"Rajasegarar","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Leckie","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,14]]},"reference":[{"issue":"4","key":"11_CR1","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/SURV.2008.080406","volume":"10","author":"TT Nguyen","year":"2008","unstructured":"Nguyen, T.T., Armitage, G.: A survey of techniques for internet traffic classification using machine learning. IEEE Commun. Surv. Tutor. 10(4), 56\u201376 (2008)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"5","key":"11_CR2","doi-asserted-by":"publisher","first-page":"1505","DOI":"10.1109\/TNET.2010.2044046","volume":"18","author":"A Finamore","year":"2010","unstructured":"Finamore, A., Mellia, M., Meo, M., Rossi, D.: KISS: stochastic packet inspection classifier for UDP traffic. IEEE\/ACM Trans. Netw. (TON) 18(5), 1505\u20131515 (2010)","journal-title":"IEEE\/ACM Trans. Netw. (TON)"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Juvonen, A., Sipola, T.: Adaptive framework for network traffic classification using dimensionality reduction and clustering. In: 2012 4th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), pp. 274\u2013279. IEEE (2012)","DOI":"10.1109\/ICUMT.2012.6459678"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Kim, H., Claffy, K.C., Fomenkov, M., Barman, D., Faloutsos, M., Lee, K.: Internet traffic classification demystified: myths, caveats, and the best practices. In: Proceedings of the 2008 ACM CoNEXT Conference, p. 11. ACM (2008)","DOI":"10.1145\/1544012.1544023"},{"key":"11_CR5","unstructured":"Alazab, M., Venkatraman, S., Watters, P., Alazab, M.: Zero-day malware detection based on supervised learning algorithms of API call signatures. In: Proceedings of the Ninth Australasian Data Mining Conference, vol. 121, pp. 171\u2013182. Australian Computer Society, Inc. (2011)"},{"issue":"14","key":"11_CR6","doi-asserted-by":"publisher","first-page":"2476","DOI":"10.1016\/j.comnet.2009.05.003","volume":"53","author":"A Este","year":"2009","unstructured":"Este, A., Gringoli, F., Salgarelli, L.: Support vector machines for TCP traffic classification. Comput. Netw. 53(14), 2476\u20132490 (2009)","journal-title":"Comput. Netw."},{"key":"11_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/978-3-642-20305-3_13","volume-title":"Traffic Monitoring and Analysis","author":"A Finamore","year":"2011","unstructured":"Finamore, A., Mellia, M., Meo, M.: Mining unclassified traffic using automatic clustering techniques. In: Domingo-Pascual, J., Shavitt, Y., Uhlig, S. (eds.) TMA 2011. LNCS, vol. 6613, pp. 150\u2013163. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-20305-3_13"},{"issue":"2\u20133","key":"11_CR8","first-page":"81","volume":"7","author":"A Criminisi","year":"2012","unstructured":"Criminisi, A., Shotton, J., Konukoglu, E., et al.: Decision forests: a unified framework for classification, regression, density estimation, manifold learning and semi-supervised learning. Found. Trends Comput. Graph. Vis. 7(2\u20133), 81\u2013227 (2012)","journal-title":"Found. Trends Comput. Graph. Vis."},{"key":"11_CR9","series-title":"Springer Series in Statistics","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/978-0-387-84858-7_14","volume-title":"The Elements of Statistical Learning","author":"T Hastie","year":"2009","unstructured":"Hastie, T., Tibshirani, R., Friedman, J.: Unsupervised learning. In: Hastie, T., Tibshirani, R., Friedman, J. (eds.) The Elements of Statistical Learning. Springer Series in Statistics, pp. 485\u2013585. Springer, New York (2009). \nhttps:\/\/doi.org\/10.1007\/978-0-387-84858-7_14"},{"issue":"4","key":"11_CR10","doi-asserted-by":"publisher","first-page":"1257","DOI":"10.1109\/TNET.2014.2320577","volume":"23","author":"J Zhang","year":"2015","unstructured":"Zhang, J., Chen, X., Xiang, Y., Zhou, W., Wu, J.: Robust network traffic classification. IEEE\/ACM Trans. Netw. (TON) 23(4), 1257\u20131270 (2015)","journal-title":"IEEE\/ACM Trans. Netw. (TON)"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Miao, Y., Ruan, Z., Pan, L., Zhang, J., Xiang, Y., Wang, Y.: Comprehensive analysis of network traffic data. In: 2016 IEEE International Conference on Computer and Information Technology (CIT), pp. 423\u2013430. IEEE (2016)","DOI":"10.1109\/CIT.2016.22"},{"issue":"1","key":"11_CR12","first-page":"95","volume":"14","author":"Y Han","year":"2017","unstructured":"Han, Y., Chan, J., Alpcan, T., Leckie, C.: Using virtual machine allocation policies to defend against co-resident attacks in cloud computing. IEEE Trans. Dependable Secure Comput. 14(1), 95\u2013108 (2017)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"1","key":"11_CR13","doi-asserted-by":"publisher","first-page":"1833","DOI":"10.1016\/j.jpdc.2013.09.005","volume":"74","author":"S Rajasegarar","year":"2014","unstructured":"Rajasegarar, S., Leckie, C., Palaniswami, M.: Hyperspherical cluster based distributed anomaly detection in wireless sensor networks. J. Parallel Distrib. Comput. 74(1), 1833\u20131847 (2014)","journal-title":"J. Parallel Distrib. Comput."},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Ling, Z., Luo, J., Wu, K., Yu, W., Fu, X.: Torward: discovery of malicious traffic over Tor. In: 2014 Proceedings IEEE INFOCOM, pp. 1402\u20131410. IEEE (2014)","DOI":"10.1109\/INFOCOM.2014.6848074"},{"issue":"1","key":"11_CR15","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/TIFS.2015.2478741","volume":"11","author":"M Conti","year":"2016","unstructured":"Conti, M., Mancini, L.V., Spolaor, R., Verde, N.V.: Analyzing android encrypted network traffic to identify user actions. IEEE Trans. Inf. Forensics Secur. 11(1), 114\u2013125 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"11_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-20550-2_1","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"A Kharraz","year":"2015","unstructured":"Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., Kirda, E.: Cutting the gordian knot: a look under the hood of ransomware attacks. In: Almgren, M., Gulisano, V., Maggi, F. (eds.) DIMVA 2015. LNCS, vol. 9148, pp. 3\u201324. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-20550-2_1"},{"issue":"1","key":"11_CR17","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1109\/TPDS.2012.98","volume":"24","author":"J Zhang","year":"2013","unstructured":"Zhang, J., Xiang, Y., Wang, Y., Zhou, W., Xiang, Y., Guan, Y.: Network traffic classification using correlation information. IEEE Trans. Parallel Distrib. Syst. 24(1), 104\u2013117 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"2","key":"11_CR18","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1109\/TNSM.2013.022713.120250","volume":"10","author":"J Zhang","year":"2013","unstructured":"Zhang, J., Chen, C., Xiang, Y., Zhou, W., Vasilakos, A.V.: An effective network traffic classification method with unknown flow detection. IEEE Trans. Netw. Serv. Manag. 10(2), 133\u2013147 (2013)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Erman, J., Mahanti, A., Arlitt, M.: QRP05-4: internet traffic identification using machine learning. In: IEEE GLOBECOM 2006, pp. 1\u20136, November 2006","DOI":"10.1109\/GLOCOM.2006.443"},{"issue":"13","key":"11_CR20","doi-asserted-by":"publisher","first-page":"1927","DOI":"10.1002\/cpe.1603","volume":"22","author":"Y Wang","year":"2010","unstructured":"Wang, Y., Xiang, Y., Yu, S.Z.: An automatic application signature construction system for unknown traffic. Concurr. Comput.: Pract. Exp. 22(13), 1927\u20131944 (2010)","journal-title":"Concurr. Comput.: Pract. Exp."},{"key":"11_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-319-03584-0_16","volume-title":"Cyberspace Safety and Security","author":"J Zhang","year":"2013","unstructured":"Zhang, J., Chen, X., Xiang, Y., Zhou, W.: Zero-day traffic identification. In: Wang, G., Ray, I., Feng, D., Rajarajan, M. (eds.) CSS 2013. LNCS, vol. 8300, pp. 213\u2013227. Springer, Cham (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-319-03584-0_16"}],"container-title":["Communications in Computer and Information Science","Data Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-0292-3_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,13]],"date-time":"2018-04-13T14:43:31Z","timestamp":1523630611000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-0292-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811302916","9789811302923"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-0292-3_11","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}