{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:30:57Z","timestamp":1742913057089,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642550317"},{"type":"electronic","value":"9783642550324"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-55032-4_49","type":"book-chapter","created":{"date-parts":[[2014,3,25]],"date-time":"2014-03-25T02:15:38Z","timestamp":1395713738000},"page":"482-491","source":"Crossref","is-referenced-by-count":0,"title":["Aggregation of Network Protocol Data Near Its Source"],"prefix":"10.1007","author":[{"given":"Marcel","family":"Fourn\u00e9","sequence":"first","affiliation":[]},{"given":"Kevin","family":"Stegemann","sequence":"additional","affiliation":[]},{"given":"Dominique","family":"Petersen","sequence":"additional","affiliation":[]},{"given":"Norbert","family":"Pohlmann","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"49_CR1","unstructured":"Ahmad, R., Ghani, M., Haris, S.H.C., Waleed, G.M.: Anomaly detection of ip header threats (2012)"},{"key":"49_CR2","unstructured":"Bykova, M., Shawn Ostermann, B.T.: Detecting network intrusions via a statistical analysis of network packet characteristics (2001)"},{"key":"49_CR3","unstructured":"Deri, L., Maselli, G., Suin, S.: Design and implementation of an anomaly detection system: An empirical approach (2003)"},{"key":"49_CR4","doi-asserted-by":"crossref","unstructured":"Rossow, C., Dietrich, C.J., Bos, H., Cavallaro, L., van Steen, M., Freiling, F.C., Pohlmann, N.: Sandnet: Network traffic analysis of malicious software. In: Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp. 78\u201388. ACM (2011)","DOI":"10.1145\/1978672.1978682"},{"key":"49_CR5","doi-asserted-by":"crossref","unstructured":"Politopoulos, P.I., Markatos, E.P., Ioannidis, S.: Evaluation of compression of remote network monitoring data streams. In: IEEE Network Operations and Management Symposium Workshops, NOMS Workshops 2008, pp. 109\u2013115. IEEE (2008)","DOI":"10.1109\/NOMSW.2007.20"},{"key":"49_CR6","doi-asserted-by":"crossref","unstructured":"Palmieri, F., Fiore, U., Castiglione, A.: A distributed approach to network anomaly detection based on independent component analysis. Concurrency and Computation: Practice and Experience, n\/a\u2013n\/a (2013)","DOI":"10.1002\/cpe.3061"},{"key":"49_CR7","doi-asserted-by":"crossref","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Characterization of network-wide anomalies in traffic flows. In: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement, pp. 201\u2013206. ACM (2004)","DOI":"10.1145\/1028788.1028813"},{"key":"49_CR8","unstructured":"Bilge, L., Kirda, E., Kruegel, C., Balduzzi, M.: Exposure: Finding malicious domains using passive dns analysis. In: Proceedings of NDSS (2011)"},{"key":"49_CR9","doi-asserted-by":"crossref","unstructured":"Bilge, L., Balzarotti, D., Robertson, W., Kirda, E., Kruegel, C.: Disclosure: Detecting botnet command and control servers through large-scale netflow analysis. In: Proceedings of the 28th Annual Computer Security Applications Conference, pp. 129\u2013138. ACM (2012)","DOI":"10.1145\/2420950.2420969"},{"key":"49_CR10","unstructured":"Tegeler, F., Fu, X., Vigna, G., Kr\u00fcgel, C.: Finding bots in network traffic without deep packet inspection. In: The 8th ACM International Conference on Emerging Networking EXperiments and Technologies (CoNEXT 2012), Nice, France (December 2012)"},{"key":"49_CR11","doi-asserted-by":"crossref","unstructured":"Claise, E.B.: Cisco systems netflow services export version 9 (2004)","DOI":"10.17487\/rfc3954"},{"key":"49_CR12","unstructured":"Abt, S., Wener, S., Baier, H.: Performance evaluation of classification and feature selection algorithms for netflow-based protocol recognition. In: INFORMATIK 2013, pp. 2184\u20132197. Gesellschaft f\u00fcr Informatik (2013)"},{"key":"49_CR13","unstructured":"Network Working Group, Trammell, B.: Bidirectional Flow Export Using IP Flow Information Export (IPFIX), \n \n http:\/\/www.ietf.org\/rfc\/rfc5103.txt"},{"key":"49_CR14","unstructured":"Petersen, D., Himmelsbach, K., Bastke, S., Pohlmann, N.: Measuring and warning (2008)"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-55032-4_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T08:43:39Z","timestamp":1558860219000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-55032-4_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642550317","9783642550324"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-55032-4_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}