{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,4,18]],"date-time":"2023-04-18T13:18:18Z","timestamp":1681823898682},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2011,7,5]],"date-time":"2011-07-05T00:00:00Z","timestamp":1309824000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1007\/s11227-011-0644-y","type":"journal-article","created":{"date-parts":[[2011,7,4]],"date-time":"2011-07-04T19:21:17Z","timestamp":1309807277000},"page":"274-294","source":"Crossref","is-referenced-by-count":10,"title":["An anomaly-based detection in ubiquitous network using the equilibrium state of the catastrophe theory"],"prefix":"10.1007","volume":"64","author":[{"given":"Wei","family":"Xiong","sequence":"first","affiliation":[]},{"given":"Naixue","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Laurence T.","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jong Hyuk","family":"Park","sequence":"additional","affiliation":[]},{"given":"Hanping","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Qian","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,7,5]]},"reference":[{"key":"644_CR1","first-page":"229","volume-title":"Proc of LISA \u201999: 13th systems administration conference","author":"M Roesch","year":"1999","unstructured":"Roesch M (1999) Snort\u2013lightweight intrusion detection for networks. In: Proc of LISA \u201999: 13th systems administration conference, pp\u00a0229\u2013238"},{"issue":"23","key":"644_CR2","doi-asserted-by":"crossref","first-page":"2435","DOI":"10.1016\/S1389-1286(99)00112-7","volume":"31","author":"V Paxson","year":"1999","unstructured":"Paxson V (1999) Bro: a system for detecting network intruders in real-time. Comput Netw 31(23):2435\u20132463","journal-title":"Comput Netw"},{"issue":"8","key":"644_CR3","doi-asserted-by":"crossref","first-page":"687","DOI":"10.1016\/j.cose.2004.05.007","volume":"23","author":"R Beghdad","year":"2004","unstructured":"Beghdad R (2004) Modelling and solving the intrusion detection problem in computer networks. Comput Secur 23(8):687\u2013696","journal-title":"Comput Secur"},{"issue":"3-4","key":"644_CR4","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.cose.2008.04.004","volume":"27","author":"S Horng","year":"2008","unstructured":"Horng S, Fan P, Chou Y et al (2008) A feasible intrusion detector for recognizing IIS attacks based on neural networks. Comput Secur 27(3-4):84\u2013100","journal-title":"Comput Secur"},{"key":"644_CR5","volume-title":"Proc of the DARPA information survivability conference and exposition","author":"R Lippmann","year":"2000","unstructured":"Lippmann R, Fried D, Graf I et al (2000) Evaluating intrusion detection systems: the 1998 DARPA off-lineintrusion detection evaluation. In: Proc of the DARPA information survivability conference and exposition. IEEE Computer Society Press, Los Alamitos,"},{"issue":"4","key":"644_CR6","doi-asserted-by":"crossref","first-page":"579","DOI":"10.1016\/S1389-1286(00)00139-0","volume":"34","author":"R Lippmann","year":"2000","unstructured":"Lippmann R, Haines J, Fried D et al (2000) The 1999 DARPA off-line intrusion detection evaluation. Comput Netw 34(4):579\u2013595","journal-title":"Comput Netw"},{"key":"644_CR7","unstructured":"Mahoney M, Chan P (2001) PHAD: packet header anomaly detection for identifying hostile network traffic. Florida Institute of Technology technical report CS-2001-04"},{"key":"644_CR8","first-page":"24","volume-title":"Proceedings of the 1st SIAM international conference on data mining","author":"D Barbara","year":"2001","unstructured":"Barbara D, Wu N, Jajodia S (2001) Detecting novel network intrusions using Bayes estimators. In: Proceedings of the 1st SIAM international conference on data mining, Chicago, pp 24\u201329"},{"key":"644_CR9","first-page":"97","volume-title":"USENIX security symposium","author":"V Yegneswaran","year":"2005","unstructured":"Yegneswaran V, Giffin J, Barford P et al (2005) An architecture for generating semantics-aware signatures. In: USENIX security symposium, Baltimore, MD, USA, 2005, pp 97\u2013112"},{"issue":"3","key":"644_CR10","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1109\/TNET.2008.2001468","volume":"17","author":"I Paschalidis","year":"2009","unstructured":"Paschalidis I, Smaragdakis G (2009) Spatio-temporal network anomaly detection by assessing deviations of empirical measures. IEEE\/ACM Trans Netw 17(3):685\u2013697","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"13","key":"644_CR11","doi-asserted-by":"crossref","first-page":"663","DOI":"10.1049\/el:20020467","volume":"38","author":"Y Qiao","year":"2002","unstructured":"Qiao Y, Xin X, Bin Y et al (2002) Anomaly intrusion detection method based on HMM. Electron Lett 38(13):663\u2013664","journal-title":"Electron Lett"},{"key":"644_CR12","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1145\/1080091.1080118","volume-title":"SIGCOMM \u201905","author":"A Lakhina","year":"2005","unstructured":"Lakhina A, Crovella M, Diot C (2005) Mining anomalies using traffic feature distributions. In: SIGCOMM \u201905, New York, NY, USA. ACM Press, New York, pp 217\u2013228"},{"issue":"4","key":"644_CR13","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1109\/3468.935046","volume":"31","author":"S Lee","year":"2001","unstructured":"Lee S, Heinbuch D (2001) Training a neural-network based intrusion detector to recognize novel attacks. IEEE Trans Syst Man Cybern, Part A, Syst Hum 31(4):294\u2013299","journal-title":"IEEE Trans Syst Man Cybern, Part A, Syst Hum"},{"issue":"12","key":"644_CR14","doi-asserted-by":"crossref","first-page":"1034","DOI":"10.1109\/LCOMM.2007.070761","volume":"11","author":"A Ziviani","year":"2007","unstructured":"Ziviani A, Gomes A, Monsores M et al (2007) Network anomaly detection using nonextensive entropy. IEEE Commun Lett 11(12):1034\u20131036","journal-title":"IEEE Commun Lett"},{"issue":"1","key":"644_CR15","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/TNET.2008.923716","volume":"17","author":"Y Xie","year":"2009","unstructured":"Xie Y, Yu S (2009) A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors. IEEE\/ACM Trans Netw 17(1):54\u201365","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"12","key":"644_CR16","doi-asserted-by":"crossref","first-page":"2285","DOI":"10.1109\/JSAC.2006.884027","volume":"24","author":"J Mai","year":"2006","unstructured":"Mai J, Sridharan A, Chuah C et al (2006) Impact of packet sampling on portscan detection. IEEE J Sel Areas Commun 24(12):2285\u20132298","journal-title":"IEEE J Sel Areas Commun"},{"issue":"3","key":"644_CR17","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1109\/TNET.2008.2001468","volume":"17","author":"I Paschalidis","year":"2009","unstructured":"Paschalidis I, Smaragdakis G (2009) Spatio-temporal network anomaly detection by assessing deviations of empirical measures. IEEE\/ACM Trans Netw 17(3):685\u2013697","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"9","key":"644_CR18","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1109\/TPDS.2003.1233707","volume":"14","author":"T Ryutov","year":"2003","unstructured":"Ryutov T, Neuman C, Dongho K et al (2003) Integrated access control and intrusion detection for web servers. IEEE Trans Parallel Distrib Syst 14(9):841\u2013850","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"18","key":"644_CR19","doi-asserted-by":"crossref","first-page":"3799","DOI":"10.1016\/j.ins.2007.03.025","volume":"177","author":"T Shon","year":"2007","unstructured":"Shon T, Moon, J (2007) A hybrid machine learning approach to network anomaly detection. Inf Sci 177(18):3799\u20133821","journal-title":"Inf Sci"},{"key":"644_CR20","doi-asserted-by":"crossref","first-page":"1181","DOI":"10.1063\/1.873927","volume":"7","author":"G Wang","year":"2000","unstructured":"Wang G, Antar G, Devynck P (2000) The Hurst exponent and long-time correlation. Phys Plasmas 7:1181","journal-title":"Phys Plasmas"},{"issue":"7","key":"644_CR21","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/35.601746","volume":"35","author":"A Adas","year":"1997","unstructured":"Adas A (1997) Traffic models in broadband networks. IEEE Commun Mag 35(7):82\u201389","journal-title":"IEEE Commun Mag"},{"issue":"2","key":"644_CR22","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1140\/epjb\/e2004-00110-5","volume":"38","author":"L Amaral","year":"2004","unstructured":"Amaral L, Ottino J (2004) Complex networks. Eur Phys J B, Condens Matter Complex Syst 38(2):147\u2013162","journal-title":"Eur Phys J B, Condens Matter Complex Syst"},{"issue":"8","key":"644_CR23","first-page":"15","volume":"4","author":"X Wei","year":"2007","unstructured":"Wei X, Han-ping H, Yue Y (2007) Anomaly detection of network traffic based on autocorrelation principle. J Commun Comput 4(8):15\u201319","journal-title":"J Commun Comput"},{"issue":"2","key":"644_CR24","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"13","author":"D Denning","year":"1987","unstructured":"Denning D (1987) An intrusion-detection model. IEEE Trans Softw Eng 13(2):222\u2013232","journal-title":"IEEE Trans Softw Eng"},{"issue":"3","key":"644_CR25","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1145\/322510.322526","volume":"2","author":"T Lane","year":"1999","unstructured":"Lane T, Brodley C (1999) Temporal sequence learning and data reduction for anomaly detection. ACM Trans Inf Syst Secur 2(3):295\u2013331","journal-title":"ACM Trans Inf Syst Secur"},{"key":"644_CR26","first-page":"51","volume-title":"USENIX workshop on intrusion detection and network monitoring","author":"A Ghosh","year":"1999","unstructured":"Ghosh A, Schwartzbard A, Schatz M (1999) Learning program behavior profiles for intrusion detection. In: USENIX workshop on intrusion detection and network monitoring, Santa Clara, CA, pp 51\u201362"},{"issue":"10","key":"644_CR27","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1145\/262793.262811","volume":"40","author":"S Forrest","year":"1997","unstructured":"Forrest S, Hofmeyr S, Somayjia A (1997) Commun ACM, Comput Immunol 40(10):88\u201396","journal-title":"Commun ACM, Comput Immunol"},{"key":"644_CR28","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1145\/345910.345958","volume-title":"Proc MobiCom","author":"Y Zhang","year":"2000","unstructured":"Zhang Y, Lee W (2000) Intrusion detection in wireless ad-hoc networks. In: Proc MobiCom. ACM Press, New York, pp 275\u2013283"},{"key":"644_CR29","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1145\/637201.637210","volume-title":"Proc of the ACM SIGCOMM workshop on internet measurement","author":"P Barford","year":"2002","unstructured":"Barford P, Kline J, Plonka D et al (2002) A signal analysis of network traffic anomalies. In: Proc of the ACM SIGCOMM workshop on internet measurement, Marseille, France. ACM Press, New York, pp 71\u201382"},{"issue":"1","key":"644_CR30","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1109\/18.904521","volume":"47","author":"I Paschalidis","year":"2001","unstructured":"Paschalidis I, Vassilaras S (2001) On the estimation of buffer overflow probabilities from measurements. IEEE Trans Inf Theory 47(1):178\u2013191","journal-title":"IEEE Trans Inf Theory"},{"issue":"1","key":"644_CR31","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1145\/384268.378778","volume":"29","author":"I Paschalidis","year":"2001","unstructured":"Paschalidis I, Vassilaras S (2001) Model-based estimation of buffer overflow probabilities from measurements. ACM SIGMETRICS Perform Eval Rev 29(1):154\u2013163","journal-title":"ACM SIGMETRICS Perform Eval Rev"},{"key":"644_CR32","first-page":"144","volume":"IV","author":"S Rawat","year":"2005","unstructured":"Rawat S, Gulati V, Pujari A (2005) A fast host-based intrusion detection system using rough set theory. Trans Rough Sets IV:144\u2013161","journal-title":"Trans Rough Sets"},{"issue":"5","key":"644_CR33","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1016\/S0167-4048(02)00514-X","volume":"21","author":"Y Liao","year":"2002","unstructured":"Liao Y, Vemuri V (2002) Use of K-Nearest Neighbor classifier for intrusion detection. Comput Secur 21(5):439\u2013448","journal-title":"Comput Secur"},{"key":"644_CR34","first-page":"130","volume-title":"Proceedings of the 2001 IEEE symposium on security and privacy","author":"W Lee","year":"2001","unstructured":"Lee W, Xiang D (2001) Information-theoretic measures for anomaly detection. In: Proceedings of the 2001 IEEE symposium on security and privacy, pp 130\u2013143"},{"issue":"6","key":"644_CR35","volume":"27","author":"Y Yue","year":"2010","unstructured":"Yue Y, Han-Ping H, Wei X et al (2010) Network traffic anomaly detection method based on a feature of catastrophe theory. Chin Phys Lett 27(6):060501","journal-title":"Chin Phys Lett"},{"key":"644_CR36","first-page":"71371Q\u20138","volume-title":"Proc. SPIE","author":"J Lin","year":"2008","unstructured":"Lin J, Yang X, Long K et al (2008) Catastrophe model construction and verification for network anomaly detection. In: Proc. SPIE, p 71371Q\u20138"},{"issue":"2","key":"644_CR37","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1137\/1019036","volume":"19","author":"R Thom","year":"1977","unstructured":"Thom R (1977) Structural stability, catastrophe theory, and applied mathematics. SIAM Rev 19(2):189\u2013201","journal-title":"SIAM Rev"},{"issue":"2","key":"644_CR38","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/BF01919499","volume":"30","author":"W Jammernegg","year":"1986","unstructured":"Jammernegg W, Fischer E (1986) Economic applications and statistical analysis of the cusp catastrophe model. Math Methods Oper Res 30(2):45\u201358","journal-title":"Math Methods Oper Res"},{"issue":"3","key":"644_CR39","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1023\/A:1022376002167","volume":"2","author":"S Clair","year":"1998","unstructured":"Clair S (1998) A cusp catastrophe model for adolescent alcohol use: an empirical test. Nonlinear Dyn Psychol Life Sci 2(3):217\u2013241","journal-title":"Nonlinear Dyn Psychol Life Sci"},{"issue":"2","key":"644_CR40","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1214\/aoms\/1177700150","volume":"36","author":"W Hoeffding","year":"1965","unstructured":"Hoeffding W (1965) Asymptotically optimal tests for multinomial distributions. Ann Math Stat 36(2):369\u2013401","journal-title":"Ann Math Stat"},{"key":"644_CR41","volume-title":"Statistical distributions","author":"M Evans","year":"1993","unstructured":"Evans M, Hastings N, Peacock B et al (1993) Statistical distributions. Wiley, New York"},{"key":"644_CR42","volume-title":"Statistical models and methods for lifetime data","author":"J Lawless","year":"1982","unstructured":"Lawless J (1982) Statistical models and methods for lifetime data. Wiley, New York"},{"key":"644_CR43","volume-title":"Statistical methods for reliability data","author":"W Meeker","year":"1998","unstructured":"Meeker W, Escobar L (1998) Statistical methods for reliability data. Wiley, New York"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-011-0644-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-011-0644-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-011-0644-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T18:32:46Z","timestamp":1560364366000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-011-0644-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7,5]]},"references-count":43,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,5]]}},"alternative-id":["644"],"URL":"https:\/\/doi.org\/10.1007\/s11227-011-0644-y","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,7,5]]}}}