{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,9]],"date-time":"2024-07-09T00:53:19Z","timestamp":1720486399811},"reference-count":37,"publisher":"Elsevier BV","content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1016\/j.ins.2013.04.009","type":"journal-article","created":{"date-parts":[[2013,4,18]],"date-time":"2013-04-18T10:10:06Z","timestamp":1366279806000},"page":"403-415","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":72,"special_numbering":"C","title":["Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications"],"prefix":"10.1016","volume":"258","author":[{"given":"Wei","family":"Xiong","sequence":"first","affiliation":[]},{"given":"Hanping","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Naixue","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Laurence T.","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Wen-Chih","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Xiaofei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yanzhen","family":"Qu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ins.2013.04.009_b0005","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1140\/epjb\/e2004-00110-5","article-title":"Complex networks","volume":"38","author":"Amaral","year":"2004","journal-title":"The European Physical Journal B \u2013 Condensed Matter and Complex Systems"},{"key":"10.1016\/j.ins.2013.04.009_b0010","doi-asserted-by":"crossref","unstructured":"T. Benson, A. Anand, A. Akella, M. Zhang, Understanding data center traffic characteristics, ACM SIGCOMM Computer Communication Review 40 92\u201399.","DOI":"10.1145\/1672308.1672325"},{"key":"10.1016\/j.ins.2013.04.009_b0015","unstructured":"K. Chandra, C. You, G. Olowoyeye, C. Thompson, Non-linear time-series models of ethernet traffic, in: Submitted to INFOCOM \u201899, 1998."},{"key":"10.1016\/j.ins.2013.04.009_b0020","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1088\/0022-3727\/29\/1\/023","article-title":"Phase objects in synchrotron radiation hard X-ray imaging","volume":"29","author":"Cloetens","year":"1996","journal-title":"Journal of Physics D: Applied Physics"},{"key":"10.1016\/j.ins.2013.04.009_b0025","doi-asserted-by":"crossref","first-page":"1234","DOI":"10.1109\/TNET.2009.2039492","article-title":"DTRAB: combating against attacks on encrypted protocols through traffic-feature analysis","volume":"18","author":"Fadlullah","year":"2010","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"10.1016\/j.ins.2013.04.009_b0030","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/35.267444","article-title":"Traffic modeling for telecommunications networks","volume":"32","author":"Frost","year":"1994","journal-title":"IEEE Communications Magazine"},{"key":"10.1016\/j.ins.2013.04.009_b0035","series-title":"Synergetic Computers and Cognition: A Top-Down Approach to Neural Nets","author":"Haken","year":"2004"},{"key":"10.1016\/j.ins.2013.04.009_b0040","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.cose.2008.04.004","article-title":"A feasible intrusion detector for recognizing IIS attacks based on neural networks","volume":"27","author":"Horng","year":"2008","journal-title":"Computers & Security"},{"key":"10.1016\/j.ins.2013.04.009_b0045","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1016\/j.comnet.2008.11.005","article-title":"Profiling and identification of P2P traffic","volume":"53","author":"Hu","year":"2009","journal-title":"Computer Networks"},{"key":"10.1016\/j.ins.2013.04.009_b0050","doi-asserted-by":"crossref","unstructured":"M. Iliofotou, B. Gallagher, T. Eliassi-Rad, G. Xie, M. Faloutsos, Profiling-by-association: a resilient traffic profiling solution for the internet backbone, in: ACM CoNEXT 2010, Philadelphia, USA, 2010, pp. 1\u20135.","DOI":"10.1145\/1921168.1921171"},{"key":"10.1016\/j.ins.2013.04.009_b0055","doi-asserted-by":"crossref","unstructured":"H. Jiang, Z. Ge, S. Jin, J. Wang, Network prefix-level traffic profiling: Characterizing, modeling, and evaluation, Computer Networks 54 3327\u20133340.","DOI":"10.1016\/j.comnet.2010.06.013"},{"key":"10.1016\/j.ins.2013.04.009_b0060","doi-asserted-by":"crossref","unstructured":"T. Karagiannis, K. Papagiannaki, M. Faloutsos, BLINC: multilevel traffic classification in the dark, in: SIGCOMM\u201905, Philadelphia, Pennsylvania, USA, 2005, pp. 229\u2013240.","DOI":"10.1145\/1080091.1080119"},{"key":"10.1016\/j.ins.2013.04.009_b0065","doi-asserted-by":"crossref","first-page":"562","DOI":"10.1109\/TNET.2007.902685","article-title":"Statistical techniques for detecting traffic anomalies through packet header data","volume":"16","author":"Kim","year":"2008","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"10.1016\/j.ins.2013.04.009_b0070","doi-asserted-by":"crossref","unstructured":"A. Lakhina, M. Crovella, C. Diot, Mining anomalies using traffic feature distributions, in: SIGCOMM \u201905, 2005, pp. 217\u2013228.","DOI":"10.1145\/1080091.1080118"},{"key":"10.1016\/j.ins.2013.04.009_b0075","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1109\/3468.935046","article-title":"Training a neural-network based intrusion detector to recognize novel attacks","volume":"31","author":"Lee","year":"2001","journal-title":"IEEE Transactions on Systems Man and Cybernetics Part A"},{"key":"10.1016\/j.ins.2013.04.009_b0080","unstructured":"R. Lippmann, D. Fried, I. Graf, J. Haines, K. Kendall, D. McClung, D. Weber, S. Webster, D. Wyschogrod, R. Cunningham, Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation, in: DISCEX, 2000, pp. 12\u201326."},{"key":"10.1016\/j.ins.2013.04.009_b0085","doi-asserted-by":"crossref","first-page":"579","DOI":"10.1016\/S1389-1286(00)00139-0","article-title":"The 1999 DARPA off-line intrusion detection evaluation","volume":"34","author":"Lippmann","year":"2000","journal-title":"Computer Networks"},{"key":"10.1016\/j.ins.2013.04.009_b0090","doi-asserted-by":"crossref","first-page":"2285","DOI":"10.1109\/JSAC.2006.884027","article-title":"Impact of packet sampling on portscan detection","volume":"24","author":"Mai","year":"2006","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"10.1016\/j.ins.2013.04.009_b0095","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1109\/TNET.2008.2001468","article-title":"Spatio-temporal network anomaly detection by assessing deviations of empirical measures","volume":"17","author":"Paschalidis","year":"2009","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"10.1016\/j.ins.2013.04.009_b0100","doi-asserted-by":"crossref","first-page":"2435","DOI":"10.1016\/S1389-1286(99)00112-7","article-title":"Bro: a system for detecting network intruders in real-time","volume":"31","author":"Paxson","year":"1999","journal-title":"Computer Networks"},{"key":"10.1016\/j.ins.2013.04.009_b0105","doi-asserted-by":"crossref","first-page":"663","DOI":"10.1049\/el:20020467","article-title":"Anomaly intrusion detection method based on HMM","volume":"38","author":"Qiao","year":"2002","journal-title":"Electronics Letters"},{"key":"10.1016\/j.ins.2013.04.009_b0110","unstructured":"M. Roesch, Snort-lightweight intrusion detection for networks, in: Proc. of LISA \u201999: 13th Systems Administration Conference, 1999, pp. 229\u2013238."},{"key":"10.1016\/j.ins.2013.04.009_b0115","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1109\/TPDS.2003.1233707","article-title":"Integrated access control and intrusion detection for web servers","volume":"14","author":"Ryutov","year":"2003","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"10.1016\/j.ins.2013.04.009_b0120","unstructured":"N. Santos, K.P. Gummadi, R. Rodrigues, Towards trusted cloud computing, in: USENIX Workshop On Hot Topics in Cloud Computing (HotCloud), 2009, pp. 1\u20135."},{"key":"10.1016\/j.ins.2013.04.009_b0125","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MNET.2009.4804320","article-title":"Accurate anomaly detection through parallelism","volume":"23","author":"Shanbhag","year":"2009","journal-title":"IEEE Network"},{"key":"10.1016\/j.ins.2013.04.009_b0130","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1016\/j.eswa.2012.07.057","article-title":"Advanced probabilistic approach for network intrusion forecasting and detection","volume":"40","author":"Shin","year":"2013","journal-title":"Expert Systems with Applications"},{"key":"10.1016\/j.ins.2013.04.009_b0135","doi-asserted-by":"crossref","first-page":"3799","DOI":"10.1016\/j.ins.2007.03.025","article-title":"A hybrid machine learning approach to network anomaly detection","volume":"177","author":"Shon","year":"2007","journal-title":"Information Sciences"},{"key":"10.1016\/j.ins.2013.04.009_b0140","doi-asserted-by":"crossref","unstructured":"F. Simmross-Wattenberg, A.-P.J. I, and P. Casaseca-de-la-Higuera, Anomaly detection in network traffic based on statistical inference and alpha-Stable modeling, IEEE Transactions on Dependable and Secure Computing 8 (2011) 494\u2013509.","DOI":"10.1109\/TDSC.2011.14"},{"key":"10.1016\/j.ins.2013.04.009_b0145","doi-asserted-by":"crossref","first-page":"512","DOI":"10.1109\/TNET.2010.2070845","article-title":"Parametric methods for anomaly detection in aggregate traffic","volume":"19","author":"Thatte","year":"2011","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"10.1016\/j.ins.2013.04.009_b0150","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1137\/1019036","article-title":"Structural stability, catastrophe theory, and applied mathematics","volume":"19","author":"Thom","year":"1977","journal-title":"SIAM Review"},{"key":"10.1016\/j.ins.2013.04.009_b0155","first-page":"1046","article-title":"An exploratory development on the Hurst parameter variety of network traffic abnormity signal [J]","volume":"37","author":"WANG","year":"2005","journal-title":"Journal of Harbin Institute of Technology"},{"key":"10.1016\/j.ins.2013.04.009_b0160","first-page":"15","article-title":"Anomaly detection of network traffic based on autocorrelation principle","volume":"4","author":"Wei","year":"2007","journal-title":"Journal of Communication and Computer"},{"key":"10.1016\/j.ins.2013.04.009_b0165","doi-asserted-by":"crossref","first-page":"689","DOI":"10.1016\/j.chaos.2007.01.074","article-title":"Estimating parameters of chaotic systems under noise-induced synchronization","volume":"39","author":"Wu","year":"2009","journal-title":"Chaos, Solitons & Fractals"},{"key":"10.1016\/j.ins.2013.04.009_b0170","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/TNET.2008.923716","article-title":"A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors","volume":"17","author":"Xie","year":"2009","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"10.1016\/j.ins.2013.04.009_b0175","doi-asserted-by":"crossref","unstructured":"K. Xu, F. Wang, L. Gu, Profiling-as-a-service in multi-tenant cloud computing environments, in: Singapore Palliative Care Conference Biopolis Singapore, 2012.","DOI":"10.1109\/ICDCSW.2012.88"},{"key":"10.1016\/j.ins.2013.04.009_b0180","doi-asserted-by":"crossref","first-page":"1241","DOI":"10.1109\/TNET.2007.911438","article-title":"Internet traffic behavior profiling for network security monitoring","volume":"16","author":"Xu","year":"2008","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"10.1016\/j.ins.2013.04.009_b0185","doi-asserted-by":"crossref","first-page":"1034","DOI":"10.1109\/LCOMM.2007.070761","article-title":"Network anomaly detection using nonextensive entropy","volume":"11","author":"Ziviani","year":"2007","journal-title":"IEEE Communications Letters"}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025513002971?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025513002971?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,7,12]],"date-time":"2019-07-12T16:02:56Z","timestamp":1562947376000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020025513002971"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2]]},"references-count":37,"alternative-id":["S0020025513002971"],"URL":"https:\/\/doi.org\/10.1016\/j.ins.2013.04.009","relation":{},"ISSN":["0020-0255"],"issn-type":[{"value":"0020-0255","type":"print"}],"subject":[],"published":{"date-parts":[[2014,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications","name":"articletitle","label":"Article Title"},{"value":"Information Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ins.2013.04.009","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2013 Published by Elsevier Inc.","name":"copyright","label":"Copyright"}]}}