{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:18:27Z","timestamp":1730200707252,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/bigdata.2016.7840901","type":"proceedings-article","created":{"date-parts":[[2017,2,7]],"date-time":"2017-02-07T16:46:59Z","timestamp":1486486019000},"page":"2590-2599","source":"Crossref","is-referenced-by-count":8,"title":["Hobbits: Hadoop and Hive based Internet traffic analysis"],"prefix":"10.1109","author":[{"given":"Abdeltawab M.","family":"Hendawi","sequence":"first","affiliation":[]},{"given":"Fatemah","family":"Alali","sequence":"additional","affiliation":[]},{"given":"Xiaoyu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yunfei","family":"Guan","sequence":"additional","affiliation":[]},{"given":"Tianshu","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Nada","family":"Basit","sequence":"additional","affiliation":[]},{"given":"John A.","family":"Stankovic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2523616.2523633"},{"year":"0","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20305-3_5"},{"year":"0","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2427036.2427038"},{"key":"ref11","article-title":"Exploring Netfow data using hadoop","author":"zhou","year":"2014","journal-title":"In Proceedings of the Second ASE international conference on Big Data Science and Computing Academy of Science and Engineering (ASE) USA &#x00A9; ASE 2014"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2831347.2831351"},{"year":"0","key":"ref13","article-title":"RIPE-NCC, Hadoop-pcap library"},{"year":"0","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14778\/1687553.1687609"},{"key":"ref16","article-title":"The architecture of coralreef: an internet traffic monitoring software suite","author":"keys","year":"2001","journal-title":"Proc PAM2001 Workshop on Passive and Active Measurements)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CITS.2014.6878955"},{"year":"0","key":"ref18","article-title":"Large-scale tcp packet flow analysis for common protocols using apache hadoop"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2079327.2079334"},{"key":"ref28","first-page":"1199","article-title":"RCFile: A fast and space-efficient data placement structure in MapReduce-based warehouse systems","author":"he","year":"2011","journal-title":"ICDE"},{"year":"0","key":"ref4","article-title":"Netflow"},{"key":"ref27","first-page":"229","article-title":"Snort: Lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"LISA"},{"year":"0","key":"ref3","article-title":"sflow"},{"article-title":"TSharkDump and Analyze Network Traffic","year":"0","author":"gerald","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2595630"},{"year":"0","key":"ref5","article-title":"Caida anonymized Internet traces"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945450"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2541468.2541473"},{"year":"0","key":"ref9","article-title":"Apache Hadoop"},{"first-page":"2013","article-title":"Cisco visual networking index: Forecast and methodology","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849281"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2013.88"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IWSSIP.2008.4604369"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2358831"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.and.EUC.2013.252"},{"key":"ref26","article-title":"A scalable architecture for network traffic monitoring and analysis using free open source software","volume":"2009","author":"olatunde","year":"2009","journal-title":"Int'l J of Communications Network and System Sciences"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504750"}],"event":{"name":"2016 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2016,12,5]]},"location":"Washington DC,USA","end":{"date-parts":[[2016,12,8]]}},"container-title":["2016 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7818133\/7840573\/07840901.pdf?arnumber=7840901","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,13]],"date-time":"2017-12-13T15:48:26Z","timestamp":1513180106000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7840901\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2016.7840901","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}