{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:41Z","timestamp":1750220921567,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,6]],"date-time":"2019-04-06T00:00:00Z","timestamp":1554508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,6]]},"DOI":"10.1145\/3325917.3325928","type":"proceedings-article","created":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T15:39:51Z","timestamp":1560353991000},"page":"92-97","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Network Traffic Anomaly Detection based on Viterbi Algorithm Using SNMP MIB Data"],"prefix":"10.1145","author":[{"given":"Sulaiman","family":"Alhaidari","sequence":"first","affiliation":[{"name":"School of Engineering and Computer Science, Oakland University, Rochester, MI, U.S.A"}]},{"given":"Ali","family":"Alharbi","sequence":"additional","affiliation":[{"name":"School of Engineering and Computer Science, Oakland University, Rochester, MI, U.S.A"}]},{"given":"Mansour","family":"Alshaikhsaleh","sequence":"additional","affiliation":[{"name":"School of Engineering and Computer Science, Oakland University, Rochester, MI, U.S.A"}]},{"given":"Mohamed","family":"Zohdy","sequence":"additional","affiliation":[{"name":"School of Engineering and Computer Science, Oakland University, Rochester, MI, U.S.A"}]},{"given":"Debatosh","family":"Debnath","sequence":"additional","affiliation":[{"name":"School of Engineering and Computer Science, Oakland University, Rochester, MI, U.S.A"}]}],"member":"320","published-online":{"date-parts":[[2019,4,6]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"International Journal of Computer Science and Information Security, 14(9), 1162.","author":"Al-Kasassbeh M.","year":"2016","unstructured":"Al-Kasassbeh , M. , Al-Naymat , G., & Al-Hawari , E. ( 2016 ). Towards Generating Realistic SNMP-MIB Dataset for Network Anomaly Detection . International Journal of Computer Science and Information Security, 14(9), 1162. Al-Kasassbeh, M., Al-Naymat, G., & Al-Hawari, E. (2016). Towards Generating Realistic SNMP-MIB Dataset for Network Anomaly Detection. International Journal of Computer Science and Information Security, 14(9), 1162."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of SAI Intelligent Systems Conference. Springer","author":"Al-Naymat Ghazi","year":"2018","unstructured":"Al-Naymat , Ghazi , Mouhammd Al-kasassbeh, and Eshraq Al-Hawari . \"Exploiting SNMP-MIB Data to Detect Network Anomalies using Machine Learning Techniques .\" Proceedings of SAI Intelligent Systems Conference. Springer , Cham , 2018 . Al-Naymat, Ghazi, Mouhammd Al-kasassbeh, and Eshraq Al-Hawari. \"Exploiting SNMP-MIB Data to Detect Network Anomalies using Machine Learning Techniques.\" Proceedings of SAI Intelligent Systems Conference. Springer, Cham, 2018."},{"key":"e_1_3_2_1_3_1","volume-title":"IAS'09","volume":"2","author":"Bao Cui-Mei","year":"2009","unstructured":"Bao , Cui-Mei . \" Intrusion detection based on one-class svm and snmp mib data.\" Information Assurance and Security, 2009 . IAS'09 . Fifth International Conference on. Vol. 2 . IEEE, 2009 . Bao, Cui-Mei. \"Intrusion detection based on one-class svm and snmp mib data.\" Information Assurance and Security, 2009. IAS'09. Fifth International Conference on. Vol. 2. IEEE, 2009."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1593254.1593309"},{"issue":"9","key":"e_1_3_2_1_5_1","first-page":"279","article-title":"A dynamic flooding attack detection system based on different classification techniques and using SNMP MIB data","volume":"2","author":"Namvarasl Sahar","year":"2014","unstructured":"Namvarasl , Sahar , and Marzieh Ahmadzadeh . \" A dynamic flooding attack detection system based on different classification techniques and using SNMP MIB data .\" International Journal of Computer Networks and Communications Security 2 . 9 ( 2014 ): 279 -- 284 . Namvarasl, Sahar, and Marzieh Ahmadzadeh. \"A dynamic flooding attack detection system based on different classification techniques and using SNMP MIB data.\" International Journal of Computer Networks and Communications Security 2.9 (2014): 279--284.","journal-title":"International Journal of Computer Networks and Communications Security"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.09.018"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2013.08.008"},{"key":"e_1_3_2_1_8_1","volume-title":"2015 IEEE 40th Conference on. IEEE","author":"Bongiovanni Wilson","year":"2015","unstructured":"Bongiovanni , Wilson , et al. \" Viterbi algorithm for detecting ddos attacks.\" Local Computer Networks (LCN) , 2015 IEEE 40th Conference on. IEEE , 2015 . Bongiovanni, Wilson, et al. \"Viterbi algorithm for detecting ddos attacks.\" Local Computer Networks (LCN), 2015 IEEE 40th Conference on. IEEE, 2015."},{"key":"e_1_3_2_1_9_1","first-page":"257","volume-title":"proceedings of the","author":"Rabiner L.R.","year":"1989","unstructured":"Rabiner , L.R. ( 1989 ) ' A tutorial on hidden Markov models and selected applications in speech recognition ', In proceedings of the IEEE , 77(2), pp. 257 -- 286 . Rabiner, L.R. (1989) 'A tutorial on hidden Markov models and selected applications in speech recognition', In proceedings of the IEEE, 77(2), pp. 257--286."},{"issue":"5","key":"e_1_3_2_1_10_1","first-page":"12300","article-title":"Detecting Distributed Denial of Service Attacks Using Hidden Markov Models","volume":"15","author":"Sulaiman Alhaidari Ali Alharbi","year":"2018","unstructured":"Sulaiman Alhaidari , Ali Alharbi and Mohamed Zohdy . \" Detecting Distributed Denial of Service Attacks Using Hidden Markov Models .\" International Journal of Computer Science Issues (IJCSI) 15 . 5 ( 2018 ): 12300 . Sulaiman Alhaidari, Ali Alharbi and Mohamed Zohdy. \"Detecting Distributed Denial of Service Attacks Using Hidden Markov Models.\" International Journal of Computer Science Issues (IJCSI) 15.5 (2018): 12300.","journal-title":"International Journal of Computer Science Issues (IJCSI)"},{"issue":"3","key":"e_1_3_2_1_11_1","first-page":"175","article-title":"feature pruning method for hidden markov model-based anomaly detection: a comparison of performance","volume":"4","author":"Alhaidari Sulaiman","year":"2018","unstructured":"Alhaidari , Sulaiman , and Zohdy , Mohamed . \" feature pruning method for hidden markov model-based anomaly detection: a comparison of performance .\" Jordanian Journal of Computers and Information Technology (JJCIT) 4 . 3 ( 2018 ): 175 -- 184 . Alhaidari, Sulaiman, and Zohdy, Mohamed. \" feature pruning method for hidden markov model-based anomaly detection: a comparison of performance.\" Jordanian Journal of Computers and Information Technology (JJCIT) 4.3 (2018): 175--184.","journal-title":"Jordanian Journal of Computers and Information Technology (JJCIT)"},{"key":"e_1_3_2_1_12_1","article-title":"Denial-of-Service, Probing, User to Root (U2R) & Remote to User (R2L) Attack Detection using Hidden Markov Models","author":"Alharbi A.","year":"2018","unstructured":"Alharbi , A. , Alhaidari , S., Zohdy , M. \" Denial-of-Service, Probing, User to Root (U2R) & Remote to User (R2L) Attack Detection using Hidden Markov Models \" International Journal of Computer and Information Technology ( 2018 ). Alharbi, A., Alhaidari, S., Zohdy, M.\"Denial-of-Service, Probing, User to Root (U2R) & Remote to User (R2L) Attack Detection using Hidden Markov Models\" International Journal of Computer and Information Technology (2018).","journal-title":"International Journal of Computer and Information Technology ("},{"issue":"6","key":"e_1_3_2_1_13_1","article-title":"Sybil Attacks and Defenses in Internet of Things and Mobile Social Networks","volume":"15","author":"Alharbi Ali","year":"2018","unstructured":"Alharbi , Ali , et al. \" Sybil Attacks and Defenses in Internet of Things and Mobile Social Networks .\" International Journal of Computer Science Issues (IJCSI) 15 . 6 ( 2018 ). Alharbi, Ali, et al. \"Sybil Attacks and Defenses in Internet of Things and Mobile Social Networks.\" International Journal of Computer Science Issues (IJCSI) 15.6 (2018).","journal-title":"International Journal of Computer Science Issues (IJCSI)"}],"event":{"name":"ICISDM 2019: 2019 The 3rd International Conference on Information System and Data Mining","sponsor":["University of Houston"],"location":"Houston TX USA","acronym":"ICISDM 2019"},"container-title":["Proceedings of the 2019 3rd International Conference on Information System and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3325917.3325928","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3325917.3325928","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:08Z","timestamp":1750204388000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3325917.3325928"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,6]]},"references-count":13,"alternative-id":["10.1145\/3325917.3325928","10.1145\/3325917"],"URL":"https:\/\/doi.org\/10.1145\/3325917.3325928","relation":{},"subject":[],"published":{"date-parts":[[2019,4,6]]},"assertion":[{"value":"2019-04-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}