{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:16:36Z","timestamp":1750220196777,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,21]],"date-time":"2022-09-21T00:00:00Z","timestamp":1663718400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,21]]},"DOI":"10.1145\/3557738.3557849","type":"proceedings-article","created":{"date-parts":[[2022,11,21]],"date-time":"2022-11-21T23:55:50Z","timestamp":1669074950000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Malicious traffic analysis using Markov chain"],"prefix":"10.1145","author":[{"given":"Ryandy","family":"Djap","sequence":"first","affiliation":[{"name":"Swiss German University, Indonesia"}]},{"given":"Charles","family":"Lim","sequence":"additional","affiliation":[{"name":"Swiss German University, Indonesia"}]},{"given":"Kalpin Erlangga","family":"Silaen","sequence":"additional","affiliation":[{"name":"Swiss German University, Indonesia"}]}],"member":"320","published-online":{"date-parts":[[2022,11,21]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3372202"},{"key":"e_1_3_2_2_2_1","volume-title":"HMMPayl: An intrusion detection system based on Hidden Markov Models. computers & security 30, 4","author":"Ariu Davide","year":"2011","unstructured":"Davide Ariu , Roberto Tronci , and Giorgio Giacinto . 2011. HMMPayl: An intrusion detection system based on Hidden Markov Models. computers & security 30, 4 ( 2011 ), 221\u2013241. https:\/\/doi.org\/10.1016\/j.cose.2010.12.004 10.1016\/j.cose.2010.12.004 Davide Ariu, Roberto Tronci, and Giorgio Giacinto. 2011. HMMPayl: An intrusion detection system based on Hidden Markov Models. computers & security 30, 4 (2011), 221\u2013241. https:\/\/doi.org\/10.1016\/j.cose.2010.12.004"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/11856214_8"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34883-9_22"},{"key":"e_1_3_2_2_5_1","volume-title":"XB-Pot: Revealing Honeypot-based Attacker\u2019s Behaviors. In 2021 9th International Conference on Information and Communication Technology (ICoICT). IEEE, 550\u2013555","author":"Djap Ryandy","year":"2021","unstructured":"Ryandy Djap , Charles Lim , Kalpin\u00a0Erlangga Silaen , and Andi Yusuf . 2021 . XB-Pot: Revealing Honeypot-based Attacker\u2019s Behaviors. In 2021 9th International Conference on Information and Communication Technology (ICoICT). IEEE, 550\u2013555 . https:\/\/doi.org\/10.1109\/ICoICT52021.2021.9527422 10.1109\/ICoICT52021.2021.9527422 Ryandy Djap, Charles Lim, Kalpin\u00a0Erlangga Silaen, and Andi Yusuf. 2021. XB-Pot: Revealing Honeypot-based Attacker\u2019s Behaviors. In 2021 9th International Conference on Information and Communication Technology (ICoICT). IEEE, 550\u2013555. https:\/\/doi.org\/10.1109\/ICoICT52021.2021.9527422"},{"volume-title":"Markov chains","author":"Douc Randal","key":"e_1_3_2_2_6_1","unstructured":"Randal Douc , Eric Moulines , Pierre Priouret , and Philippe Soulier . 2018. Markov chains . Springer . https:\/\/doi.org\/10.1007\/978-3-319-97704-1 10.1007\/978-3-319-97704-1 Randal Douc, Eric Moulines, Pierre Priouret, and Philippe Soulier. 2018. Markov chains. Springer. https:\/\/doi.org\/10.1007\/978-3-319-97704-1"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.42.271"},{"key":"e_1_3_2_2_8_1","volume-title":"Including COVID-19 Scam Statistics. Retrieved","author":"FBI.","year":"2022","unstructured":"FBI. 2021. FBI Releases the Internet Crime Complaint Center 2020 Internet Crime Report , Including COVID-19 Scam Statistics. Retrieved May 6, 2022 from https:\/\/www.fbi.gov\/news\/press-releases\/press-releases\/fbi-releases-the-internet-crime-complaint-center-2020-internet-crime-report-including-covid-19-scam-statistics FBI. 2021. FBI Releases the Internet Crime Complaint Center 2020 Internet Crime Report, Including COVID-19 Scam Statistics. Retrieved May 6, 2022 from https:\/\/www.fbi.gov\/news\/press-releases\/press-releases\/fbi-releases-the-internet-crime-complaint-center-2020-internet-crime-report-including-covid-19-scam-statistics"},{"volume-title":"unknown-threat-detection. Retrieved","year":"2022","key":"e_1_3_2_2_9_1","unstructured":"Flowmon. 2022. unknown-threat-detection. Retrieved May 6, 2022 from https:\/\/www.flowmon.com\/en\/solutions\/security-operations\/unknown-threat-detection Flowmon. 2022. unknown-threat-detection. Retrieved May 6, 2022 from https:\/\/www.flowmon.com\/en\/solutions\/security-operations\/unknown-threat-detection"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40031-020-00497-y"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1177\/1748301818791503"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICETA.2015.7558466"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.5121\/ijcses.2012.3402"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1177\/0278364912461539"},{"key":"e_1_3_2_2_15_1","unstructured":"Karen Kent and Murugiah\u00a0P Souppaya. 2006. SP 800-92 Guide to computer security log management. https:\/\/dl.acm.org\/doi\/pdf\/10.5555\/2206303  Karen Kent and Murugiah\u00a0P Souppaya. 2006. SP 800-92 Guide to computer security log management. https:\/\/dl.acm.org\/doi\/pdf\/10.5555\/2206303"},{"key":"e_1_3_2_2_16_1","volume-title":"Research on Association Analysis Technology of Network Attack Trace Based on Web Log. In International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. Springer, 33\u201343","author":"Li Shiyu","year":"2020","unstructured":"Shiyu Li and Baojiang Cui . 2020 . Research on Association Analysis Technology of Network Attack Trace Based on Web Log. In International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. Springer, 33\u201343 . https:\/\/doi.org\/10.1007\/978-3-030-50399-4_4 10.1007\/978-3-030-50399-4_4 Shiyu Li and Baojiang Cui. 2020. Research on Association Analysis Technology of Network Attack Trace Based on Web Log. In International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. Springer, 33\u201343. https:\/\/doi.org\/10.1007\/978-3-030-50399-4_4"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICGCE.2013.6823553"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/952532.952601"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-015-0644-x"},{"key":"e_1_3_2_2_20_1","volume-title":"Proceedings of the International Conference on Engineering and Information Technology for Sustainable Industry (Tangerang, Indonesia) (ICONETSI). Association for Computing Machinery","author":"Lim Charles","year":"2020","unstructured":"Ryandy, Charles Lim , and Kalpin\u00a0Erlangga Silaen . 2020 . XT-Pot: EXposing Threat Category of Honeypot-Based Attacks . In Proceedings of the International Conference on Engineering and Information Technology for Sustainable Industry (Tangerang, Indonesia) (ICONETSI). Association for Computing Machinery , New York, NY, USA, Article 31, 6\u00a0pages. https:\/\/doi.org\/10.1145\/3429789.3429868 10.1145\/3429789.3429868 Ryandy, Charles Lim, and Kalpin\u00a0Erlangga Silaen. 2020. XT-Pot: EXposing Threat Category of Honeypot-Based Attacks. In Proceedings of the International Conference on Engineering and Information Technology for Sustainable Industry (Tangerang, Indonesia) (ICONETSI). Association for Computing Machinery, New York, NY, USA, Article 31, 6\u00a0pages. https:\/\/doi.org\/10.1145\/3429789.3429868"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"#cr-split#-e_1_3_2_2_22_1.1","doi-asserted-by":"crossref","unstructured":"Karen Scarfone and Paul Hoffman. 2009. Guidelines on Firewalls and Firewall Policy. (2009). https:\/\/doi.org\/10.6028\/NIST.SP.800-41r1 10.6028\/NIST.SP.800-41r1","DOI":"10.6028\/NIST.SP.800-41r1"},{"key":"#cr-split#-e_1_3_2_2_22_1.2","doi-asserted-by":"crossref","unstructured":"Karen Scarfone and Paul Hoffman. 2009. Guidelines on Firewalls and Firewall Policy. (2009). https:\/\/doi.org\/10.6028\/NIST.SP.800-41r1","DOI":"10.6028\/NIST.SP.800-41r1"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"crossref","unstructured":"Karen\u00a0A Scarfone and Peter\u00a0M Mell. 2007. SP 800-94. guide to intrusion detection and prevention systems (idps). https:\/\/dl.acm.org\/doi\/pdf\/10.5555\/2206304  Karen\u00a0A Scarfone and Peter\u00a0M Mell. 2007. SP 800-94. guide to intrusion detection and prevention systems (idps). https:\/\/dl.acm.org\/doi\/pdf\/10.5555\/2206304","DOI":"10.6028\/NIST.SP.800-94"},{"key":"e_1_3_2_2_24_1","volume-title":"IETF2007","author":"Shirey Robert","year":"2007","unstructured":"Robert Shirey . 2007 . RFC 4949\u2013Internet Security Glossary . IETF2007 (2007). Robert Shirey. 2007. RFC 4949\u2013Internet Security Glossary. IETF2007 (2007)."},{"key":"e_1_3_2_2_25_1","unstructured":"Joanne\u00a0R Treurniet and JH Lefebvre. 2003. A finite state machine model of TCP connections in the transport layer. Defence R & D Canada-Ottawa.  Joanne\u00a0R Treurniet and JH Lefebvre. 2003. A finite state machine model of TCP connections in the transport layer. Defence R & D Canada-Ottawa."},{"key":"e_1_3_2_2_26_1","volume-title":"COVID-19 News: FBI Reports 300Cybercrimes. Retrieved","author":"Walter Jenna","year":"2022","unstructured":"Jenna Walter . 2020. COVID-19 News: FBI Reports 300Cybercrimes. Retrieved May 6, 2022 from https:\/\/www.imcgrupo.com\/covid-19-news-fbi-reports-300-increase-in-reported-cybercrimes\/ Jenna Walter. 2020. COVID-19 News: FBI Reports 300Cybercrimes. Retrieved May 6, 2022 from https:\/\/www.imcgrupo.com\/covid-19-news-fbi-reports-300-increase-in-reported-cybercrimes\/"}],"event":{"name":"ICONETSI '22: International Conference on Engineering and Information Technology for Sustainable Industry","acronym":"ICONETSI '22","location":"Alam Sutera, Tangerang Indonesia"},"container-title":["Proceedings of the International Conference on Engineering and Information Technology for Sustainable Industry"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3557738.3557849","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3557738.3557849","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:39Z","timestamp":1750186959000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3557738.3557849"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,21]]},"references-count":27,"alternative-id":["10.1145\/3557738.3557849","10.1145\/3557738"],"URL":"https:\/\/doi.org\/10.1145\/3557738.3557849","relation":{},"subject":[],"published":{"date-parts":[[2022,9,21]]}}}