{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:01:09Z","timestamp":1773615669602,"version":"3.50.1"},"reference-count":35,"publisher":"Allerton Press","issue":"6","license":[{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.3103\/s0146411621060067","type":"journal-article","created":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T07:05:07Z","timestamp":1642057507000},"page":"522-533","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Forecasting of Computer Network Anomalous States Based on Sequential Pattern Analysis of \u201cHistorical Data\u201d"],"prefix":"10.3103","volume":"55","author":[{"given":"O. I.","family":"Sheluhin","sequence":"first","affiliation":[]},{"given":"D. V.","family":"Kostin","sequence":"additional","affiliation":[]},{"given":"M. V.","family":"Polkovnikov","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,1,13]]},"reference":[{"key":"7382_CR1","doi-asserted-by":"publisher","unstructured":"Gu, X. and Wang, H., Online anomaly prediction for robust cluster systems, IEEE 25th Int. Conf. on Data Engineering, Shanghai, 2009, IEEE, 2009, pp. 1000\u20131011. \u00a0https:\/\/doi.org\/10.1109\/ICDE.2009.128","DOI":"10.1109\/ICDE.2009.128"},{"key":"7382_CR2","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1145\/1095809.1095821","volume":"39","author":"S. Cohen","year":"2005","unstructured":"Cohen, S., Zhang, M., Goldszmidt, J., Symons, T., Kelly, T., and Fox, A, Capturing, indexing, clustering, and retrieving system history, ACM SIGOPS Oper. Syst. Rev., 2005, vol. 39, no. 5, pp. 105\u2013118. \u00a0https:\/\/doi.org\/10.1145\/1095809.1095821","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"key":"7382_CR3","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1145\/1269899.1254894","volume":"35","author":"M. Mirza","year":"2007","unstructured":"Mirza, M., Sommers, J., Barford, P., and Zhu, X., A machine learning approach to TCP throughput prediction, ACM SIGMETRICS Perform. Eval. Rev., 2007, vol. 35, no. 1, pp.\u00a097\u2013108. \u00a0https:\/\/doi.org\/10.1145\/1269899.1254894","journal-title":"ACM SIGMETRICS Perform. Eval. Rev."},{"key":"7382_CR4","doi-asserted-by":"publisher","first-page":"549","DOI":"10.3103\/S0146411620060073","volume":"54","author":"O.I. Sheluhin","year":"2020","unstructured":"Sheluhin, O.I., Kostin, D.V., and Gorodnichev, M.G., Multiclass classification of anomalous states of computer systems by means of intellectual analysis of system journals, Autom. Control Comput. Sci., 2020, vol. 54, no. 6, pp. 549\u2013559. \u00a0https:\/\/doi.org\/10.3103\/S0146411620060073","journal-title":"Autom. Control Comput. Sci."},{"key":"7382_CR5","doi-asserted-by":"publisher","unstructured":"Sheluhin, O.I. and Ryabinin, V.S., Detection anomalies of big data in unstructured syslogs, Vopr. Kiberbezop., 2019, no. 2, pp. 36\u201341. \u00a0https:\/\/doi.org\/10.21681\/2311-3456-2019-2-36-41","DOI":"10.21681\/2311-3456-2019-2-36-41"},{"key":"7382_CR6","unstructured":"Gniady, C., Butt, A.R., and Hu, Y.C., Program counter based pattern classification in buffer caching, 6th Symp. on Operating Systems Design and Implementation, OSDI 2004, San Francisco, 2004, pp. 395\u2013408."},{"key":"7382_CR7","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1023\/A:1007652502315","volume":"42","author":"M.J. Zaki","year":"2001","unstructured":"Zaki, M.J., SPADE: An efficient algorithm for mining frequent sequences, Mach. Learn., 2001, vol. 42, pp. 31\u201360. \u00a0https:\/\/doi.org\/10.1023\/A:1007652502315","journal-title":"Mach. Learn."},{"key":"7382_CR8","doi-asserted-by":"publisher","first-page":"1424","DOI":"10.1109\/TKDE.2004.77","volume":"16","author":"J. Pei","year":"2004","unstructured":"Pei, J., Han, J., Mortazavi-Asl, B., Wang, J., Pinto, H., Chen, Q., Dayal, U., and Hsu, M.-C., Mining sequential patterns by pattern-growth: The PrefixSpan approach, IEEE Trans. Knowl. Data Eng., 2004, vol. 16, no. 11, pp. 1424\u20131440. \u00a0https:\/\/doi.org\/10.1109\/TKDE.2004.77","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"7382_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0014140","volume-title":"Mining sequential patterns: Generalizations and performance improvements, Advances in Database Technology \u2013 EDBT \u201996","author":"R. Srikant","year":"1996","unstructured":"Srikant, R. and Agrawal, R., Mining sequential patterns: Generalizations and performance improvements, Advances in Database Technology \u2013 EDBT \u201996, Apers, P., Bouzeghoub, M., and Gardarin, G., Eds., Lecture Notes in Computer Science, vol. 1057, Berlin: Springer, 1996, pp. 1\u201317. \u00a0https:\/\/doi.org\/10.1007\/BFb0014140"},{"key":"7382_CR10","doi-asserted-by":"publisher","unstructured":"Agrawal, R. and Srikant, R., Mining sequential patterns, Proc. of the Eleventh Int. Conf. on Data Engineering, Taipei, 1995, IEEE, 1995, pp. 3\u201314. \u00a0https:\/\/doi.org\/10.1109\/ICDE.1995.380415","DOI":"10.1109\/ICDE.1995.380415"},{"key":"7382_CR11","unstructured":"Aivazyan, S.A., Enyukov, I.S., and Meshalkin, L.D., Prikladnaya statistika. Issledovanie zavisimostei (Applied Statistics. Dependency Research), Moscow: Finansy i Statistika, 1985."},{"key":"7382_CR12","doi-asserted-by":"publisher","unstructured":"Abbasghorbani, S. and Tavoli, R., Survey on sequential pattern mining algorithms 2nd Int. Conf. on Knowledge-Based Engineering and Innovation (KBEI), Tehran, 2015, pp. 1153\u20131164. \u00a0https:\/\/doi.org\/10.1109\/KBEI.2015.7436211","DOI":"10.1109\/KBEI.2015.7436211"},{"key":"7382_CR13","first-page":"54","volume":"1","author":"P. Fournier-Viger","year":"2017","unstructured":"Fournier-Viger, P., Chun-Wei, J., Kiran, R.-U., Koh, Y.-S., and Thomas, R., A survey of sequential pattern mining, Data Sci. Pattern Recognit., 2017, vol. 1, no. 1, pp. 54\u201377.","journal-title":"Data Sci. Pattern Recognit."},{"key":"7382_CR14","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/3314107","volume":"13","author":"W. Gan","year":"2019","unstructured":"Gan, W., Lin, J.C.-W., Fournier-Viger, P., Chao, H.-C., and Yu, P.S., A survey of parallel sequential pattern mining, ACM Trans. Knowl. Discovery Data, 2019, vol. 13, no. 3, p. 25. \u00a0https:\/\/doi.org\/10.1145\/3314107","journal-title":"ACM Trans. Knowl. Discovery Data"},{"key":"7382_CR15","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/TKDE.2008.37","volume":"20","author":"J.-W. Huang","year":"2008","unstructured":"Huang, J.-W., Tseng, C.-Y., Ou, J.-C., and Chen, M.-S., A general model for sequential pattern mining with a progressive database, IEEE Trans. Knowl. Data Eng., 2008, vol. 20, no.\u00a09, pp. 1153\u20131167. https:\/\/doi.org\/10.1109\/TKDE.2008.37","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"7382_CR16","doi-asserted-by":"publisher","first-page":"73","DOI":"10.5121\/ijdms.2010.2205","volume":"2","author":"B.N. Keshavamurthy","year":"2010","unstructured":"Keshavamurthy, B.N., Sharma, M., and Toshniwal, D., Efficient support coupled frequent pattern mining over progressive databases, Int. J. Database Manage. Syst., 2010, vol. 2, no. 2, pp. 73\u201382. \u00a0https:\/\/doi.org\/10.5121\/ijdms.2010.2205","journal-title":"Int. J. Database Manage. Syst."},{"key":"7382_CR17","doi-asserted-by":"publisher","first-page":"29","DOI":"10.5121\/ijdms.2012.4403","volume":"4","author":"K.M.V.M. Kumar","year":"2012","unstructured":"Kumar, K.M.V.M., Srinivas, P.V.S., and Rao, C.R., Sequential pattern mining with multiple minimum supports in progressive databases publication, Int. J. Database Manage. Syst., 2012, vol. 4, no. 4, pp. 29\u201341. https:\/\/doi.org\/10.5121\/ijdms.2012.4403","journal-title":"Int. J. Database Manage. Syst."},{"key":"7382_CR18","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1007\/s11280-015-0367-8","volume":"19","author":"A. Gellert","year":"2016","unstructured":"Gellert, A. and Florea, A., Web prefetching through efficient prediction by partial matching, World Wide Web, 2016, vol. 19, pp. 921\u2013932. \u00a0https:\/\/doi.org\/10.1007\/s11280-015-0367-8","journal-title":"World Wide Web"},{"key":"7382_CR19","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1613\/jair.1491","volume":"22","author":"R. Begleiter","year":"2004","unstructured":"Begleiter, R. and El-Yaniv, R., and Yona., G., On prediction using variable order Markov models, J. Artif. Intell. Res., 2004, vol. 22, pp. 385\u2013421. https:\/\/doi.org\/10.1613\/jair.1491","journal-title":"J. Artif. Intell. Res."},{"key":"7382_CR20","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1145\/235160.235164","volume":"16","author":"V.N. Padmanabhan","year":"1998","unstructured":"Padmanabhan, V.N. and Mogul, J.C., Using prefetching to improve world wide web latency, ACM SIGCOMM Comput. Commun., 1998, vol. 16, no. 3, pp. 22\u201336. \u00a0https:\/\/doi.org\/10.1145\/235160.235164","journal-title":"ACM SIGCOMM Comput. Commun."},{"key":"7382_CR21","doi-asserted-by":"crossref","unstructured":"Pitkow, J. and Pirolli, P., Mining longest repeating subsequence to predict world wide web surfing, Proc. of the 2nd Conf. on USENIX Symp. on Internet Technologies and Systems, Boulder, Colo., 1999, Berkeley, Calif.: USENIX Association, 1999, vol. 2.","DOI":"10.1023\/A:1019288403823"},{"key":"7382_CR22","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/BF01000408","volume":"15","author":"P. Laird","year":"1994","unstructured":"Laird, P. and Saul, R., Discrete sequence prediction and its applications, Mach. Learn., 1994, vol. 15, no. 1, pp.\u00a043\u201368. \u00a0https:\/\/doi.org\/10.1007\/BF01000408","journal-title":"Mach. Learn."},{"key":"7382_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-53917-6_16","volume-title":"Compact prediction tree: A lossless model for accurate sequence prediction, Advanced Data Mining and Applications. ADMA 2013","author":"T. Gueniche","year":"2013","unstructured":"Gueniche, T., Fournier-Viger, P., and Tseng, V.S., Compact prediction tree: A lossless model for accurate sequence prediction, Advanced Data Mining and Applications. ADMA 2013, Motoda, H., Wu, Z., Cao, L., Zaiane, O., Yao, M., and Wang, W., Eds., Lecture Notes in Computer Science, vol. 8347, Berlin: Springer, 2013, pp. 177\u2013188. \u00a0https:\/\/doi.org\/10.1007\/978-3-642-53917-6_16"},{"key":"7382_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18032-8_49","volume-title":"CPT+: Decreasing the time\/space complexity of the compact prediction tree, Advances in Knowledge Discovery and Data Mining. PAKDD 2015","author":"T. Gueniche","year":"2015","unstructured":"Gueniche, T., Fournier-Viger, P., Raman, R., and Tseng, V.S., CPT+: Decreasing the time\/space complexity of the compact prediction tree, Advances in Knowledge Discovery and Data Mining. PAKDD 2015, Cao, T., Lim, E.P., Zhou, Z.H., Ho, T.B., Cheung, D., and Motoda,\u00a0H., Eds., Lecture Notes in Computer Science, vol. 9708, Cham: Springer, 2015, pp. 625\u2013636. \u00a0https:\/\/doi.org\/10.1007\/978-3-319-18032-8_49"},{"key":"7382_CR25","first-page":"115","volume":"11","author":"D.A. Molodtsov","year":"2016","unstructured":"Molodtsov, D.A., Comparison and continuation of multi-valued dependencies, Nechetkie Sist. Myagkie Vychisl., 2016, vol. 11, no. 2, pp. 115\u2013145.","journal-title":"Nechetkie Sist. Myagkie Vychisl."},{"key":"7382_CR26","doi-asserted-by":"publisher","first-page":"9","DOI":"10.36724\/2072-8735-2020-14-2-9-16","volume":"14","author":"O.I. Sheluhin","year":"2020","unstructured":"Sheluhin, O.I., Osin, A.V., and Kostin, D.V., Health monitoring of a computer network based on sequential analysis of serial pattern, T-Comm, 2020, vol. 14, no. 2, pp. 9\u201316. \u00a0https:\/\/doi.org\/10.36724\/2072-8735-2020-14-2-9-16","journal-title":"T-Comm"},{"key":"7382_CR27","doi-asserted-by":"publisher","first-page":"23","DOI":"10.36724\/2072-8735-2020-14-4-23-30","volume":"14","author":"O.I. Sheluhin","year":"2020","unstructured":"Sheluhin, O.I., Osin, A.V., and Kostin, D.V., Monitoring and diagnostics of anomalous states in a computer network based on the study of \u201chistorical data\u201d, T-Comm, 2020, vol. 14, no. 4, pp. 23\u201330. \u00a0https:\/\/doi.org\/10.36724\/2072-8735-2020-14-4-23-30","journal-title":"T-Comm"},{"key":"7382_CR28","unstructured":"PACKETBEAT (Lightweight shipper for network data). https:\/\/www.elastic.co\/beats\/packetbeat. Cited September 10, 2020."},{"key":"7382_CR29","unstructured":"METRICBEAT (Lightweight shipper for metrics). https:\/\/www.elastic.co\/beats\/metricbeat. Cited September 10, 2020."},{"key":"7382_CR30","unstructured":"FILEBEAT (Lightweight shipper for logs). https:\/\/www.elastic.co\/beats\/filebeat. Cited September 11, 2020."},{"key":"7382_CR31","unstructured":"Elastic beat to call commands in a regular interval and send the result to Logstash, Elasticsearch. https:\/\/github.com\/christiangalsterer\/execbeat."},{"key":"7382_CR32","unstructured":"CURL (Command line tool and library for transferring data with URLs). https:\/\/curl.haxx.se. Cited September 11, 2020."},{"key":"7382_CR33","unstructured":"LOGSTASH (Centralize, transform & stash your data). https:\/\/www.elastic.co\/logstash. Cited September 11, 2020."},{"key":"7382_CR34","unstructured":"Apache Kafka (A distributed streaming platform). https:\/\/kafka.apache.org. Cited September 21, 2020."},{"key":"7382_CR35","unstructured":"Apache Cassandra. http:\/\/cassandra.apache.org. Cited September 23, 2020."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621060067.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621060067","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621060067.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:03:01Z","timestamp":1773612181000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621060067"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11]]},"references-count":35,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,11]]}},"alternative-id":["7382"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621060067","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11]]},"assertion":[{"value":"14 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 March 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 January 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}