{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:38:59Z","timestamp":1771702739170,"version":"3.50.1"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T00:00:00Z","timestamp":1683763200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T00:00:00Z","timestamp":1683763200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,11]]},"DOI":"10.1109\/isdfs58141.2023.10131880","type":"proceedings-article","created":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T17:30:36Z","timestamp":1685122236000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Network Anomaly Detection Using NetFlow and Network Automation"],"prefix":"10.1109","author":[{"given":"Anthony Ni\u00f1o S.","family":"Aquino","sequence":"first","affiliation":[{"name":"Technological Institute of the Philippines,Graduate School,Quezon City,Philippines"}]},{"given":"Alonica R.","family":"Villanueva","sequence":"additional","affiliation":[{"name":"Technological Institute of the Philippines,Graduate School,Quezon City,Philippines"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC.2018.8546856"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.23919\/ITC.2017.8064355"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SAMI54271.2022.9780690"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCS53099.2021.9660294"},{"key":"ref11","article-title":"Real-time analysis of NetFlow data for generating network traffic statistics using Apache Spark","author":"?erm\u00e1k","year":"2016","journal-title":"NOMS 2016 - 2016 IEEE\/IFIP Network Operations and Management Symposium NOMS"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI54926.2021.00270"},{"key":"ref2","article-title":"Multivariate Metrics of Normal and Anomalous Network Behaviors","author":"ye","year":"2019","journal-title":"2019 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM)"},{"key":"ref1","article-title":"Machine Learning Approaches to Network Anomaly Detection","author":"ahmed","year":"2007","journal-title":"Quebec"},{"key":"ref17","article-title":"Cyber Security Awareness and It's Impact on Employee's Behavior","author":"li","year":"2019","journal-title":"10th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS)"},{"key":"ref16","article-title":"How to Analyze Network Utilization Rate","year":"2018","journal-title":"Colasoft"},{"key":"ref19","year":"2021","journal-title":"Security Outcomes Study Volume 2"},{"key":"ref18","article-title":"Science of Network Anomalies","author":"pecha","year":"2021"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004917"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/WiCOM.2012.6478285"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2018.8343118"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCI50826.2021.9457012"},{"key":"ref20","article-title":"Understanding Denial-of-Service Attacks","year":"2009"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/NANA.2018.8648777"},{"key":"ref21","article-title":"A Gentle Introduction to SARIMA for Time Series Forecasting in Python","author":"brownlee","year":"2018"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.23919\/APNOMS50412.2020.9236983"},{"key":"ref27","article-title":"Metrics, Techniques and Tools of Anomaly Detection: A Survey","author":"wu","year":"2017"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/HORA55278.2022.9799873"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1109\/TNSM.2021.3075656","article-title":"Machine Learning for NetFlow Anomaly Detection With Human-Readable Annotations","author":"krishnam urthy","year":"2021","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT46805.2019.8947103"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2963716"},{"key":"ref4","article-title":"Gartner","author":"chuvakin","year":"2018"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/ab6793"},{"key":"ref6","article-title":"NetFlow, sFlow, and Flow Extensibility, Part 1","author":"freedman","year":"2016"},{"key":"ref5","article-title":"Cisco IOS NetFlow","year":"2009"}],"event":{"name":"2023 11th International Symposium on Digital Forensics and Security (ISDFS)","location":"Chattanooga, TN, USA","start":{"date-parts":[[2023,5,11]]},"end":{"date-parts":[[2023,5,12]]}},"container-title":["2023 11th International Symposium on Digital Forensics and Security (ISDFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10131120\/10131673\/10131880.pdf?arnumber=10131880","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T17:55:54Z","timestamp":1686592554000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10131880\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,11]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/isdfs58141.2023.10131880","relation":{},"subject":[],"published":{"date-parts":[[2023,5,11]]}}}