{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T07:10:51Z","timestamp":1726470651606},"reference-count":25,"publisher":"Elsevier BV","issue":"8","license":[{"start":{"date-parts":[[2011,11,1]],"date-time":"2011-11-01T00:00:00Z","timestamp":1320105600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers & Security"],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1016\/j.cose.2011.08.006","type":"journal-article","created":{"date-parts":[[2011,8,29]],"date-time":"2011-08-29T07:49:14Z","timestamp":1314604154000},"page":"692-704","source":"Crossref","is-referenced-by-count":18,"title":["Combining sketches and wavelet analysis for multi time-scale network anomaly detection"],"prefix":"10.1016","volume":"30","author":[{"given":"C.","family":"Callegari","sequence":"first","affiliation":[]},{"given":"S.","family":"Giordano","sequence":"additional","affiliation":[]},{"given":"M.","family":"Pagano","sequence":"additional","affiliation":[]},{"given":"T.","family":"Pepe","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cose.2011.08.006_bib1","series-title":"Proceedings of the 2003 Symposium on applications and the internet, SAINT \u201903","article-title":"On the self-similarity of synthetic traffic for the evaluation of intrusion detection systems","author":"Allen","year":"2003"},{"key":"10.1016\/j.cose.2011.08.006_bib2","series-title":"IMW \u201902: Proceedings of the 2nd ACM SIGCOMM Workshop on internet measurment","first-page":"71","article-title":"A signal analysis of network traffic anomalies","author":"Barford","year":"2002"},{"key":"10.1016\/j.cose.2011.08.006_bib3","series-title":"Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, IWCMC \u201910","article-title":"On the use of sketches and wavelet analysis for network anomaly detection","author":"Callegari","year":"2010"},{"issue":"8","key":"10.1016\/j.cose.2011.08.006_bib4","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1016\/j.cose.2006.08.017","article-title":"Wavelet based denial-of-service detection","volume":"25","author":"Carl","year":"2006","journal-title":"Computers and Security"},{"key":"10.1016\/j.cose.2011.08.006_bib5","unstructured":"Cheng C-M, Kung HT Tan K-S. Use of spectral analysis in defense against DoS attacks, in: Proceedings of the IEEE GLOBECOM, vol. 3, 2002, pp. 2143\u20132148."},{"year":"2004","series-title":"Cisco Systems NetFlow Services Export Version 9, RFC 3954 (Informational)","author":"Claise","key":"10.1016\/j.cose.2011.08.006_bib6"},{"issue":"1","key":"10.1016\/j.cose.2011.08.006_bib7","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.jalgor.2003.12.001","article-title":"An improved data stream summary: the count-min sketch and its applications","volume":"55","author":"Cormode","year":"2005","journal-title":"Journal of Algorithms"},{"key":"10.1016\/j.cose.2011.08.006_bib8","series-title":"Proceedings of Global Telecommunications Conference 2006. GLOBECOM \u201906","first-page":"1","article-title":"Wavelet-based detection of dos attacks","author":"Dainotti","year":"2006"},{"year":"1992","series-title":"Ten lectures on Wavelets, no. 61 in CBMS-NSF Series in Applied Mathematics","author":"Daubechies","key":"10.1016\/j.cose.2011.08.006_bib9"},{"key":"10.1016\/j.cose.2011.08.006_bib10","series-title":"LSAD \u201907: Proceedings of the 2007 workshop on Large scale attack defense","first-page":"145","article-title":"Extracting hidden anomalies using sketch and non Gaussian multiresolution statistical detection procedures","author":"Dewaele","year":"2007"},{"key":"10.1016\/j.cose.2011.08.006_bib11","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1006\/acha.2000.0342","article-title":"Multiscale analysis and data networks","volume":"10","author":"Gilbert","year":"1996","journal-title":"Applied and Computational Harmonic Analysis"},{"key":"10.1016\/j.cose.2011.08.006_bib12","doi-asserted-by":"crossref","first-page":"3203","DOI":"10.1016\/j.comcom.2007.05.061","article-title":"Detecting denial-of-service attacks using the wavelet transform","volume":"30","author":"Hamdi","year":"2007","journal-title":"Computer Communications"},{"key":"10.1016\/j.cose.2011.08.006_bib13","series-title":"IMW \u201901: Proceedings of the 1st ACM SIGCOMM Workshop on internet measurement","first-page":"213","article-title":"A non-instrusive, wavelet-based approach to detecting network performance problems","author":"Huang","year":"2001"},{"key":"10.1016\/j.cose.2011.08.006_bib14","first-page":"309","article-title":"Wavelet-based real time detection of network traffic anomalies","volume":"6","author":"Huang","year":"2008","journal-title":"International Journal of Network Security"},{"year":"2004","series-title":"Detecting traffic anomalies at the source through aggregate analysis of packet header data","author":"Kim","key":"10.1016\/j.cose.2011.08.006_bib15"},{"key":"10.1016\/j.cose.2011.08.006_bib16","series-title":"Internet measurement Conference","first-page":"234","article-title":"Sketch-based change detection: methods, evaluation, and applications","author":"Krishnamurthy","year":"2003"},{"issue":"4","key":"10.1016\/j.cose.2011.08.006_bib17","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1145\/1090191.1080118","article-title":"Mining anomalies using traffic feature distributions","volume":"35","author":"Lakhina","year":"2005","journal-title":"SIGCOMM Computer Communication Review"},{"key":"10.1016\/j.cose.2011.08.006_bib18","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1007\/s11235-004-5581-0","article-title":"DDoS attack detection and wavelets","volume":"28","author":"Li","year":"2005","journal-title":"Telecommunication Systems"},{"key":"10.1016\/j.cose.2011.08.006_bib19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2009\/837601","article-title":"Network anomaly detection based on wavelet analysis","volume":"4","author":"Lu","year":"2009","journal-title":"EURASIP Journal of Advances in Signal Processing"},{"issue":"12","key":"10.1016\/j.cose.2011.08.006_bib20","doi-asserted-by":"crossref","first-page":"2091","DOI":"10.1109\/29.45554","article-title":"Multifrequency channel decompositions of images and wavelet models","volume":"37","author":"Mallat","year":"1989","journal-title":"IEEE Transactions on Acoustics, Speech and Signal Processing"},{"key":"10.1016\/j.cose.2011.08.006_bib21","series-title":"Proceedings of 4th International Workshop on internet performance, Simulation, monitoring and measurement, IPS-MOME","article-title":"Finding hierarchical heavy hitters with the count min sketch","author":"Pascal","year":"2006"},{"key":"10.1016\/j.cose.2011.08.006_bib22","series-title":"Intelligent computer communication and processing (ICCP), 2010 IEEE International Conference on","first-page":"313","article-title":"Combining sketch and wavelet models for anomaly detection","author":"Pukkawanna","year":"2010"},{"key":"10.1016\/j.cose.2011.08.006_bib23","series-title":"International Workshop on knowledge Discovery and data Mining","first-page":"851","article-title":"Intrusion detection method based on wavelet neural network","author":"Sun","year":"2009"},{"key":"10.1016\/j.cose.2011.08.006_bib24","series-title":"SODA \u201904: Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms","first-page":"615","article-title":"Tabulation based 4-universal hashing with applications to second moment estimation","author":"Thorup","year":"2004"},{"year":"2010","series-title":"Anomaly Detection Approaches for Communication Networks","author":"Thottan","key":"10.1016\/j.cose.2011.08.006_bib25"}],"container-title":["Computers & Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404811001064?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404811001064?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,11,30]],"date-time":"2018-11-30T06:55:31Z","timestamp":1543560931000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404811001064"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":25,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2011,11]]}},"alternative-id":["S0167404811001064"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2011.08.006","relation":{},"ISSN":["0167-4048"],"issn-type":[{"type":"print","value":"0167-4048"}],"subject":[],"published":{"date-parts":[[2011,11]]}}}