{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:26:10Z","timestamp":1729610770096,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/cns.2013.6682763","type":"proceedings-article","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T19:48:17Z","timestamp":1387309697000},"page":"478-482","source":"Crossref","is-referenced-by-count":0,"title":["Aggregated representations and metrics for scalable flow analysis"],"prefix":"10.1109","author":[{"given":"Jerome","family":"Francois","sequence":"first","affiliation":[]},{"given":"Radu","family":"State","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Engel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2009.5403018"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2010.032210.00054"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5061947"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2004.1437839"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15512-3_15"},{"journal-title":"Peakflow SP Traffic Anomaly Detection","year":"0","key":"34"},{"key":"16","article-title":"Efficient Multidimensional Aggregation for Large Scale Monitoring","author":"dolberg","year":"2012","journal-title":"Large Installation System Administration Conference (LISA)"},{"key":"13","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-01645-5_4","article-title":"Portscan detection with sampled netflow","author":"paredes-oliva","year":"2009","journal-title":"International Workshop on Traffic Monitoring and Analysis (TMA)"},{"key":"14","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-28534-9_11","article-title":"Towards efficient flow sampling technique for anomaly detection","author":"bartos","year":"2012","journal-title":"International Conference on Traffic Monitoring and Analysis (TMA)"},{"journal-title":"Security in Computing","year":"1997","author":"pfleeger","key":"11"},{"journal-title":"Intrusion Detection with Snort","year":"2003","author":"koziol","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.877139"},{"key":"20","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1007\/978-3-540-87403-4_20","article-title":"Advanced network finger-printing","author":"abdelnur","year":"2008","journal-title":"Recent Advances in Intrusion Detection"},{"key":"22","first-page":"139","article-title":"Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection","author":"gu","year":"2008","journal-title":"USENIX Security Symposium"},{"key":"23","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-20757-0_1","article-title":"Bottrack: Tracking botnets using netflow and pagerank","author":"franc?ois","year":"2011","journal-title":"IFIP Networking 2011"},{"key":"24","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-20757-0_3","article-title":"Machine learning approach for IP-flow record anomaly detection","author":"wagner","year":"2011","journal-title":"IFIP Networking 2011"},{"journal-title":"International Conference on Network and System Security (NSS)","article-title":"Danak:Finding the odd!","year":"2011","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934975"},{"key":"27","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1007\/978-3-540-45235-5_83","article-title":"Characteristics of denial of service attacks on internet using AGURI","volume":"2662","author":"kaizaki","year":"2003","journal-title":"Information Networking"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1518"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/321479.321481"},{"journal-title":"A New Approach to China","year":"0","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.96"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2012.6211943"},{"journal-title":"Worldwide Infrastructure Security Report (2011 Report)","year":"2012","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb00917.x"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2005.35"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194894"},{"key":"32","doi-asserted-by":"crossref","DOI":"10.1007\/b95439","article-title":"Support Vector Machines: Theory and Applications","volume":"177","author":"wang","year":"2005","journal-title":"Studies in Fuzziness and Soft Computing"},{"key":"5","article-title":"Information-theoretic measures for anomaly detection","author":"lee","year":"2001","journal-title":"Symposium on Security and Privacy"},{"key":"31","article-title":"On the estimation of the entropy rate of finite Markov chains","author":"ciuperca","year":"2005","journal-title":"International Symposium on Applied Stochastic Models and Data Analysis (ASMDA)"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3954"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452539"},{"key":"8","article-title":"Mining anomalies using traffic feature distributions","author":"lakhina","year":"0","journal-title":"Conference on Applications Technologies Architectures and Protocols for Computer Communications (SIGCOMM) 2005"}],"event":{"name":"2013 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2013,10,14]]},"location":"National Harbor, MD, USA","end":{"date-parts":[[2013,10,16]]}},"container-title":["2013 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6675898\/6682673\/06682763.pdf?arnumber=6682763","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T10:34:51Z","timestamp":1602671691000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6682763"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/cns.2013.6682763","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}