{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:42:49Z","timestamp":1740141769584,"version":"3.37.3"},"reference-count":23,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2014,4,1]],"date-time":"2014-04-01T00:00:00Z","timestamp":1396310400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"crossref","award":["2011-0021984"],"award-info":[{"award-number":["2011-0021984"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004085","name":"Ministry of Education, Science and Technology","doi-asserted-by":"crossref","award":["2011-0021984"],"award-info":[{"award-number":["2011-0021984"]}],"id":[{"id":"10.13039\/501100004085","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2014,4,1]]},"abstract":"<jats:p> We suggest a method of effectively detecting and classifying network traffic attacks by visualizing their IP (Internet protocol) addresses and ports and clustering the visualized ports based on their variance. The proposed approach first visualizes the IP addresses and ports of the senders and receivers into two-dimensional images. The method then analyzes the visualized images and extracts linear and\/or high brightness patterns, which represent traffic attacks. Subsequently, it groups the ports using an improved clustering algorithm, allowing an artificial neural network to learn the extracted features and to automatically detect and classify normal traffic data, DDoS attacks, DoS attacks, or Internet Worms. The experiments conducted in this work prove that our suggested clustering-based algorithm effectively detects various traffic attacks. <\/jats:p>","DOI":"10.1155\/2014\/438468","type":"journal-article","created":{"date-parts":[[2014,4,3]],"date-time":"2014-04-03T21:05:18Z","timestamp":1396559118000},"page":"438468","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["Clustering-Based Pattern Abnormality Detection in Distributed Sensor Networks"],"prefix":"10.1177","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5580-4098","authenticated-orcid":false,"given":"Seok-Woo","family":"Jang","sequence":"first","affiliation":[{"name":"Department of Digital Media, Anyang University, 708-113 Anyang 5-dong, Manan-gu, Anyang 430-714, Republic of Korea"}]},{"given":"Gye-Young","family":"Kim","sequence":"additional","affiliation":[{"name":"School of Computing, Soongsil University, 369 Sangdo-ro, Dongjak-gu, Seoul 156-743, Republic of Korea"}]},{"given":"Siwoo","family":"Byun","sequence":"additional","affiliation":[{"name":"Department of Digital Media, Anyang University, 708-113 Anyang 5-dong, Manan-gu, Anyang 430-714, Republic of Korea"}]}],"member":"179","published-online":{"date-parts":[[2014,4,3]]},"reference":[{"doi-asserted-by":"publisher","key":"B1-2014-438468","DOI":"10.1155\/2013\/205920"},{"doi-asserted-by":"publisher","key":"B2-2014-438468","DOI":"10.1155\/2013\/240230"},{"doi-asserted-by":"publisher","key":"B3-2014-438468","DOI":"10.1007\/978-94-007-2169-2_139"},{"doi-asserted-by":"publisher","key":"B4-2014-438468","DOI":"10.1155\/2013\/836056"},{"issue":"3","key":"B5-2014-438468","first-page":"107","volume":"19","author":"Jeong C. Y.","year":"2009","journal-title":"Journal of the Korean Institute of Information Security and Cryptology"},{"volume-title":"Proceedings of the IEEE 3rd International Information Assurance Workshop","author":"Yin X.","first-page":"23","key":"B6-2014-438468"},{"volume-title":"Proceedings of the ACM Workshop on Visualization and Data Mining for Computer Security (VizSEC\/DMSEC \u203204)","author":"McPherson J.","first-page":"73","key":"B7-2014-438468"},{"doi-asserted-by":"publisher","key":"B8-2014-438468","DOI":"10.1016\/j.asoc.2010.07.002"},{"doi-asserted-by":"publisher","key":"B9-2014-438468","DOI":"10.1109\/SURV.2013.031413.00127"},{"volume-title":"Proceedings of the 22nd International Conference on Computer Communications and Networks (ICCCN \u203213)","author":"Gasti P.","first-page":"1","key":"B10-2014-438468"},{"doi-asserted-by":"publisher","key":"B11-2014-438468","DOI":"10.1109\/WCL.2013.072513.130428"},{"volume-title":"Proceedings of the IEEE 20th International Conference on Web Services (ICWS \u203213)","author":"Falkenberg A.","first-page":"491","key":"B12-2014-438468"},{"doi-asserted-by":"publisher","key":"B13-2014-438468","DOI":"10.1016\/j.comnet.2011.08.015"},{"doi-asserted-by":"publisher","key":"B14-2014-438468","DOI":"10.1109\/TIFS.2011.2161288"},{"doi-asserted-by":"publisher","key":"B15-2014-438468","DOI":"10.1109\/TVLSI.2011.2160002"},{"volume-title":"Proceedings of the 7th International Conference on Computer Science and Education (ICCSE \u203212)","author":"Chen X.","first-page":"753","key":"B16-2014-438468"},{"doi-asserted-by":"publisher","key":"B17-2014-438468","DOI":"10.1109\/JSEN.2012.2224654"},{"doi-asserted-by":"publisher","key":"B18-2014-438468","DOI":"10.1016\/j.neucom.2012.01.005"},{"volume-title":"Proceedings of the IEEE Asia-Pacific Conference on Applied Electromagnetics (APACE \u203212)","author":"Ahmad A.","first-page":"92","key":"B19-2014-438468"},{"doi-asserted-by":"publisher","key":"B20-2014-438468","DOI":"10.1109\/TSP.2012.2225052"},{"doi-asserted-by":"publisher","key":"B21-2014-438468","DOI":"10.1109\/JSTARS.2013.2258327"},{"doi-asserted-by":"publisher","key":"B22-2014-438468","DOI":"10.1109\/TIT.2012.2221122"},{"volume-title":"Proceedings of the International Workshop on Content-Based Multimedia Indexing (CBMI \u203213)","author":"Ferreira L.","first-page":"1","key":"B23-2014-438468"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2014\/438468","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2014\/438468","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2014\/438468","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T13:06:13Z","timestamp":1621170373000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2014\/438468"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,1]]},"references-count":23,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,4,1]]}},"alternative-id":["10.1155\/2014\/438468"],"URL":"https:\/\/doi.org\/10.1155\/2014\/438468","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2014,4,1]]}}}