{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T17:13:12Z","timestamp":1773162792703,"version":"3.50.1"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada (NSERC) [NSERC Strategic Partnership]","doi-asserted-by":"publisher","award":["STPGP\u2014521537"],"award-info":[{"award-number":["STPGP\u2014521537"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ericsson Canada"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1109\/tnsm.2021.3100308","type":"journal-article","created":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T21:40:28Z","timestamp":1627335628000},"page":"686-705","source":"Crossref","is-referenced-by-count":33,"title":["Multi-Perspective Content Delivery Networks Security Framework Using Optimized Unsupervised Anomaly Detection"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9383-1097","authenticated-orcid":false,"given":"Li","family":"Yang","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Western University, London, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1476-164X","authenticated-orcid":false,"given":"Abdallah","family":"Moubayed","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Western University, London, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2887-0350","authenticated-orcid":false,"given":"Abdallah","family":"Shami","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Western University, London, ON, Canada"}]},{"given":"Parisa","family":"Heidari","sequence":"additional","affiliation":[{"name":"Internet of Things, Ericsson Montreal, Saint Laurent, QC, Canada"}]},{"given":"Amine","family":"Boukhtouta","sequence":"additional","affiliation":[{"name":"Research Security, Ericsson Montreal, Saint Laurent, QC, Canada"}]},{"given":"Adel","family":"Larabi","sequence":"additional","affiliation":[{"name":"The One Network, Ericsson Montreal, Saint Laurent, QC, Canada"}]},{"given":"Richard","family":"Brunner","sequence":"additional","affiliation":[{"name":"The One Network, Ericsson Montreal, Saint Laurent, QC, Canada"}]},{"given":"Stere","family":"Preda","sequence":"additional","affiliation":[{"name":"Research Security, Ericsson Montreal, Saint Laurent, QC, Canada"}]},{"given":"Daniel","family":"Migault","sequence":"additional","affiliation":[{"name":"Research Security, Ericsson Montreal, Saint Laurent, QC, Canada"}]}],"member":"263","reference":[{"key":"ref39","article-title":"The diamond model of intrusion analysis","author":"caltagirone","year":"2013"},{"key":"ref38","first-page":"611","article-title":"Intrusion detection system using anomaly technique in wireless sensor network","author":"pandey","year":"2017","journal-title":"Proc IEEE Int Conf Comput Commun Autom (ICCCA)"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2012.14"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800324"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2019.8885784"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE47787.2020.9255697"},{"key":"ref37","first-page":"568","article-title":"Abnormal-node detection based on spatio-temporal and multivariate-attribute correlation in wireless sensor networks","author":"berjab","year":"2016","journal-title":"Proc IEEE 16th Int Conf Depend Auton Secure Comput 16th Int Conf Pervasive Intell Comput 4th Int Conf Big Data Intell Comput Cyber Sci Technol Congr (DASC\/PiCom\/DataCom\/CyberSciTech)"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2016.11"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ITC.2014.6932930"},{"key":"ref34","author":"pinto","year":"2013","journal-title":"Defending Networks with Incomplete Information A Machine Learning Approach"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.01.020"},{"key":"ref27","first-page":"2426","article-title":"Enhancing cache robustness for content-centric networking","author":"xie","year":"2012","journal-title":"Proc IEEE InfoCom"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647679"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524379"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-2767-8_9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3405656.3418716"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2018.5069"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354215"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013892"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.11.025"},{"key":"ref26","year":"2020","journal-title":"Vulnerability Note VU# 335217 Content Delivery Networks Handle HTTP Headers in Different and Unexpected Ways"},{"key":"ref25","first-page":"1","article-title":"Financial services attack economy","volume":"5","author":"shuster","year":"2019","journal-title":"Akamai Technology"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.07.061"},{"key":"ref51","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"J Mach Learn Res"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2015.060601"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2015.2402516"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-8335-3_30"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2017.9102"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/IITSI.2010.74"},{"key":"ref54","article-title":"Scalable and incremental learning of Gaussian mixture models","author":"pinto","year":"2017"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2019.8685636"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1080\/08923647.2020.1696140"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC.2017.8488375"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s40708-016-0042-6"},{"key":"ref40","article-title":"MTH-IDS: A multi-tiered hybrid intrusion detection system for Internet of Vehicles","author":"yang","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"key":"ref12","author":"honeycutt","year":"2020","journal-title":"Soliciting human-in-the-loop user feedback for interactive machine learning reduces user trust and impressions of model accuracy"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6363885"},{"key":"ref14","article-title":"A targeted denial of service attack on data caching networks","author":"gouge","year":"2015"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3405656.3418708"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04444-1_23"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3380613"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.07.034"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/HotWeb.2016.11"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1842733.1842736"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-95729-6_20"},{"key":"ref6","first-page":"1","article-title":"DROP-FAST: Defending against DDoS attacks using cloud technology","author":"aliyev","year":"2013","journal-title":"Proc Int Conf Security Manage"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.11.019"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1177\/1548512916664032"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICASERT.2019.8934572"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3014929"},{"key":"ref9","author":"sun","year":"2016","journal-title":"Detecting anomalous user behavior using an extended isolation forest algorithm An enterprise case study"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-020-01776-3"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.105992"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647714"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.0001.2100012"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.07.019"},{"key":"ref41","article-title":"Discriminators for use in flow-based classification","author":"z","year":"2005"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ASMC.2017.7969205"},{"key":"ref43","first-page":"9","article-title":"Automotive damper defect detection using novelty detection methods","author":"zehelein","year":"2019","journal-title":"Proc ASME Dyn Syst Control Conf"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/9732399\/09496691.pdf?arnumber=9496691","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T20:31:03Z","timestamp":1653337863000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9496691\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3]]},"references-count":59,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2021.3100308","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3]]}}}