{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T12:52:59Z","timestamp":1771678379189,"version":"3.50.1"},"reference-count":40,"publisher":"Oxford University Press (OUP)","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Logic Jnl IGPL"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1093\/jigpal\/jzw051","type":"journal-article","created":{"date-parts":[[2016,8,10]],"date-time":"2016-08-10T00:52:36Z","timestamp":1470790356000},"page":"944-956","source":"Crossref","is-referenced-by-count":7,"title":["Proposal and comparison of network anomaly detection based on long-memory statistical models"],"prefix":"10.1093","volume":"24","author":[{"given":"Tomasz","family":"Andrysiak","sequence":"first","affiliation":[]},{"given":"\u0141ukasz","family":"Saganowski","sequence":"additional","affiliation":[]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2016,8,9]]},"reference":[{"key":"2016120907301199000_24.6.944.1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-0262.2004.00501.x"},{"key":"2016120907301199000_24.6.944.2","first-page":"545","article-title":"Network traffic prediction and anomaly detection based on ARFIMA model","volume-title":"Advances in Intelligent Systems and Computing","volume":"229","author":"Andrysiak","year":"2014"},{"key":"2016120907301199000_24.6.944.3","doi-asserted-by":"publisher","DOI":"10.1080\/07474938.2012.690675"},{"key":"2016120907301199000_24.6.944.4","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-4076(95)01749-6"},{"key":"2016120907301199000_24.6.944.5","doi-asserted-by":"crossref","first-page":"1577","DOI":"10.1016\/j.jedc.2009.02.009","article-title":"Modelling long memory and structural breaks in conditional variances: an adaptive FIGARCH approach","volume":"33","author":"Baillie,","year":"2009","journal-title":"Journal of Economic Dynamics and Control"},{"key":"2016120907301199000_24.6.944.6","unstructured":"Beran J. A. . Statistics for Long-Memory Processes. Chapman and Hall, 1994."},{"key":"2016120907301199000_24.6.944.7","unstructured":"Benchmark Data, http:\/\/www.takakura.com\/\/Kyoto_data\/, 2010."},{"key":"2016120907301199000_24.6.944.8","unstructured":"Box G. E. and Jenkins M. G. . Time series analysis forecasting and control, 2nd ed. Holden-Day, 1976."},{"key":"2016120907301199000_24.6.944.9","doi-asserted-by":"crossref","unstructured":"Brockwell P. and Davis R. . Introduction to Time Series and Forecasting. Springer, 2002.","DOI":"10.1007\/b97391"},{"key":"2016120907301199000_24.6.944.10","doi-asserted-by":"publisher","DOI":"10.1093\/jigpal\/jzu038"},{"key":"2016120907301199000_24.6.944.11","doi-asserted-by":"crossref","unstructured":"Choras M. and Kozik R. . Network event correlation and semantic reasoning for federated networks protection system. In Computer Information Systems Analysis and Technologies, Communications in Computer and Information Science CCIS, Chaki N. , eds, pp. 48\u201354. Springer, 2011.","DOI":"10.1007\/978-3-642-27245-5_8"},{"key":"2016120907301199000_24.6.944.12","doi-asserted-by":"crossref","unstructured":"Celenk M. , Conley T. , Graham J. and Willis J. . Anomaly prediction in network traffic using adaptive wiener filtering and ARMA modeling. In SMC IEEE International Conference on Systems, Man and Cybernetics, 3548\u20133553, 2008.","DOI":"10.1109\/ICSMC.2008.4811848"},{"key":"2016120907301199000_24.6.944.13","unstructured":"CAIDA benchmark dataset, http:\/\/www.caida.org\/data\/overview\/, 2009."},{"key":"2016120907301199000_24.6.944.14","unstructured":"Dainotti A. , Pescape A. and Ventre G. . Wavelet-based Detection of DoS Attacks, IEEE GLOBECOM - No. 2006. San Francisco, CA, USA, 2006."},{"key":"2016120907301199000_24.6.944.15","unstructured":"Defense Advanced Research Projects Agency DARPA Intrusion Detection Evaluation Data Set: http:\/\/www.ll.mit.edu\/mission\/communications\/ist\/corpora\/ideval\/data\/index.html."},{"key":"2016120907301199000_24.6.944.16","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1016\/j.asoc.2015.07.029","article-title":"An uncertainty-managing batch relevance-based approach to network anomaly detection","volume":"36","author":"D\u2019angelo,","year":"2015","journal-title":"Applied Soft Computing Journal"},{"key":"2016120907301199000_24.6.944.17","doi-asserted-by":"crossref","unstructured":"Esposito M. , Mazzariello C. , Oliviero F. , Romano S. P. and Sansone C. . Real time detection of novel attacks by means of data mining techniques. ICEIS, 120\u2013127, 2005.","DOI":"10.5220\/0002536601200127"},{"key":"2016120907301199000_24.6.944.18","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9892.1983.tb00371.x"},{"key":"2016120907301199000_24.6.944.19","doi-asserted-by":"publisher","DOI":"10.1080\/07474930600972467"},{"key":"2016120907301199000_24.6.944.20","unstructured":"Ghysels E. , Santa-Clara P. and Valkanov R. . The MIDAS Touch: Mixed Data Sampling Regression Models. Discussion paper UNC and UCLA, 2004."},{"key":"2016120907301199000_24.6.944.21","doi-asserted-by":"publisher","DOI":"10.1080\/07474930600972467"},{"key":"2016120907301199000_24.6.944.22","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9892.1980.tb00297.x"},{"key":"2016120907301199000_24.6.944.23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2307\/2347679","article-title":"Space-time modelling with long-memory dependence: assessing Irelands wind power resource (with Discussion","volume":"38","author":"Haslett","year":"1989","journal-title":"Applied Statistics"},{"key":"2016120907301199000_24.6.944.24","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/68.1.165"},{"key":"2016120907301199000_24.6.944.25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.18637\/jss.v027.i03","article-title":"Automatic time series forecasting: the forecast Package for R","volume":"27","author":"Hyndman","year":"2008","journal-title":"Journal of Statistical Software"},{"key":"2016120907301199000_24.6.944.26","unstructured":"Jackson K. . Intrusion Detection Systems (IDS). Product Survey. Los Alamos National Library, LA-UR-99-3883, 1999."},{"key":"2016120907301199000_24.6.944.27","unstructured":"Kali Linux, https:\/\/www.kali.org\/."},{"key":"2016120907301199000_24.6.944.28","first-page":"527","article-title":"Modelling HTTP requests with regular expressions for detection of cyber attacks targeted at web applications","volume-title":"Advances in Intelligent Systems and Computing","volume":"229","author":"Kozik","year":"2014"},{"key":"2016120907301199000_24.6.944.29","doi-asserted-by":"crossref","unstructured":"Kunsch H. R. . Statistical aspects of self-similar processes. In Proceedings of the First World Congress of the Bernoulli Society, pp. 67\u201374. VNU Science Press, 1987.","DOI":"10.1515\/9783112314227-005"},{"key":"2016120907301199000_24.6.944.30","doi-asserted-by":"crossref","unstructured":"Lakhina A. , Crovella M. and Diot C. H. . Characterization of network-wide anomalies in traffic flows. In Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, pp. 201\u2013206, 2004.","DOI":"10.1145\/1028788.1028813"},{"key":"2016120907301199000_24.6.944.31","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/S0304-4076(98)00038-4","article-title":"A semiparametric two-step estimator in a multivariate long memory model","volume":"90","author":"Lobato","year":"1999","journal-title":"Journal of Econometrics"},{"key":"2016120907301199000_24.6.944.32","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176324317"},{"key":"2016120907301199000_24.6.944.33","doi-asserted-by":"crossref","unstructured":"Rodriguez A. and Mozos M. . Improving network security through traffic log anomaly detection using time series analysis. Computational Intelligence in Security for Information Systems, 125\u2013133, 2010.","DOI":"10.1007\/978-3-642-16626-6_14"},{"key":"2016120907301199000_24.6.944.34","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/TDSC.2007.12","article-title":"Non-Gaussian and long memory statistical characterizations for internet traffic with anomalies","volume":"4","author":"Scherrer","year":"2007","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"2016120907301199000_24.6.944.35","doi-asserted-by":"publisher","DOI":"10.1214\/009053605000000309"},{"key":"2016120907301199000_24.6.944.36","unstructured":"SNORT - Intrusion Detection System. https:\/\/www.snort.org\/."},{"key":"2016120907301199000_24.6.944.37","first-page":"175","article-title":"An Overview of FIGARCH and related time series models","volume":"41","author":"Maryam","year":"2012","journal-title":"Austrian Journal of Statistics"},{"key":"2016120907301199000_24.6.944.38","unstructured":"Wei L. and Ghorbani A. . Network anomaly detection based on wavelet analysis. EURASIP Journal on Advances in Signal Processing, 2009."},{"key":"2016120907301199000_24.6.944.39","doi-asserted-by":"crossref","unstructured":"Yaacob A. , Tan I. , Chien S. and Tan H. . Arima based network anomaly detection. In Second International Conference on Communication Software and Networks, pp. 205\u2013209. IEEE, 2010.","DOI":"10.1109\/ICCSN.2010.55"},{"key":"2016120907301199000_24.6.944.40","unstructured":"Dingding, Zhou , Songling C. and Shi D. . Network traffic prediction based on ARFIMA model. arXiv preprint arXiv:1302.6324, 2013."}],"container-title":["Logic Journal of IGPL"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/jigpal\/article-pdf\/24\/6\/944\/8357702\/jzw051.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T16:38:34Z","timestamp":1749055114000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/jigpal\/article-lookup\/doi\/10.1093\/jigpal\/jzw051"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,9]]},"references-count":40,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2016,12,9]]},"published-print":{"date-parts":[[2016,12]]}},"alternative-id":["10.1093\/jigpal\/jzw051"],"URL":"https:\/\/doi.org\/10.1093\/jigpal\/jzw051","relation":{},"ISSN":["1367-0751","1368-9894"],"issn-type":[{"value":"1367-0751","type":"print"},{"value":"1368-9894","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,8,9]]}}}