{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T13:51:43Z","timestamp":1722433903426},"reference-count":44,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2010,7,1]],"date-time":"2010-07-01T00:00:00Z","timestamp":1277942400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Network and Computer Applications"],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1016\/j.jnca.2010.01.003","type":"journal-article","created":{"date-parts":[[2010,2,9]],"date-time":"2010-02-09T15:23:02Z","timestamp":1265728982000},"page":"491-502","source":"Crossref","is-referenced-by-count":30,"title":["Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic"],"prefix":"10.1016","volume":"33","author":[{"given":"Abdun Naser","family":"Mahmood","sequence":"first","affiliation":[]},{"given":"Jiankun","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Zahir","family":"Tari","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Leckie","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jnca.2010.01.003_bib1","unstructured":"Anon. Endace network monitoring, latency measurement and application acceleration solutions. 2007 Available from; \u3008http:\/\/www.endace.com\/\u3009."},{"key":"10.1016\/j.jnca.2010.01.003_bib2","unstructured":"Bar-Yossef, Z, Kumar R, Sivakumar D. Sampling algorithms: lower bounds and applications. In: Proceedings of ACM symposium on theory of computing, 2001. p. 266\u2013275."},{"key":"10.1016\/j.jnca.2010.01.003_bib3","doi-asserted-by":"crossref","unstructured":"Chhabra P, John A, Saran H. PISA: automatic extraction of traffic signatures. In: Proceedings of Networking 2005, Berlin: Springer; 2005. p. 730\u2013742.","DOI":"10.1007\/11422778_59"},{"key":"10.1016\/j.jnca.2010.01.003_bib4","unstructured":"Chromy, J. Sequential sample selection methods. In: Proceedings of the American statistical association, survey research methods section, 1979. p. 401\u2013406."},{"issue":"4","key":"10.1016\/j.jnca.2010.01.003_bib5","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1145\/167954.166256","article-title":"Application of sampling methodologies to network traffic characterization","volume":"23","author":"Claffy","year":"1993","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"10.1016\/j.jnca.2010.01.003_bib6","unstructured":"Cochran W. Sampling techniques. New York: 1977."},{"key":"10.1016\/j.jnca.2010.01.003_bib7","doi-asserted-by":"crossref","unstructured":"Cormode G, Korn F, Muthukrishnan S, Srivastava D. Finding hierarchical heavy hitters in data streams. In: Proceedings of VLDB, 2003. p. 464\u2013475.","DOI":"10.1016\/B978-012722442-8\/50048-3"},{"key":"10.1016\/j.jnca.2010.01.003_bib8","series-title":"Proceedings of the 2004 ACM SIGMOD international conference on Management of data","article-title":"Diamond in the rough: finding hierarchical heavy hitters in multi-dimensional data","author":"Cormode","year":"2004"},{"key":"10.1016\/j.jnca.2010.01.003_bib10","doi-asserted-by":"crossref","unstructured":"Duffield N, Grossglauser M. Trajectory sampling for direct traffic observation. In: Proceedings of the conference on applications, technologies, architectures, and protocols for computer communication, New York, NY, USA: ACM Press; 2000. p. 271\u2013282.","DOI":"10.1145\/347057.347555"},{"key":"10.1016\/j.jnca.2010.01.003_bib11","doi-asserted-by":"crossref","unstructured":"Duffield N, Lund C, Thorup M. Charging from sampled network usage. In: Proceedings of the first ACM SIGCOMM workshop on internet measurement, New York, NY, USA: ACM Press; 2001. p. 245\u2013256.","DOI":"10.1145\/505231.505232"},{"issue":"3","key":"10.1016\/j.jnca.2010.01.003_bib12","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1016\/0890-5401(89)90002-3","article-title":"A general lower bound on the number of examples needed for learning","volume":"82","author":"Ehrenfeucht","year":"1989","journal-title":"Information and Computation"},{"key":"10.1016\/j.jnca.2010.01.003_bib13","unstructured":"Endace Ninja Probe Appliances. 2007. Available from; \u3008http:\/\/www.endace.com\/our-products\/ninja-appliances\/\u3009."},{"key":"10.1016\/j.jnca.2010.01.003_bib14","doi-asserted-by":"crossref","unstructured":"Estan C, Savage S, Varghese G. Automatically inferring patterns of resource consumption in network traffic. In: Proceedings of the ACM SIGCOMM conference, 2003. p. 137\u2013148.","DOI":"10.1145\/863955.863972"},{"issue":"3","key":"10.1016\/j.jnca.2010.01.003_bib15","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1145\/859716.859719","article-title":"New directions in traffic measurement and accounting: focusing on the elephants, ignoring the mice","volume":"21","author":"Estan","year":"2003","journal-title":"ACM Transactions on Computer Systems"},{"issue":"3","key":"10.1016\/j.jnca.2010.01.003_bib16","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1109\/90.929850","article-title":"Deriving traffic demands for operational IP networks: methodology and experience","volume":"9","author":"Feldmann","year":"2001","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"10.1016\/j.jnca.2010.01.003_bib17","doi-asserted-by":"crossref","unstructured":"Gibbons P, Matias Y. New sampling-based summary statistics for improving approximate query answers. In: Proceedings of 1998 ACM SIGMOD, New York, NY, USA: ACM Press; 1998. p. 331\u2013342.","DOI":"10.1145\/276305.276334"},{"key":"10.1016\/j.jnca.2010.01.003_bib18","first-page":"272","article-title":"Enhancing network intrusion detection with integrated sampling and filtering","author":"Gonzalez","year":"2006","journal-title":"Proceedings of RAID"},{"key":"10.1016\/j.jnca.2010.01.003_bib19","doi-asserted-by":"crossref","unstructured":"Guha S, Rastogi R, Shim K. CURE: an efficient clustering algorithm for large databases. In: Proceedings of 1998 ACM SIGMOD, New York, NY, USA: ACM Press; 1998. p. 73\u201384.","DOI":"10.1145\/276305.276312"},{"key":"10.1016\/j.jnca.2010.01.003_bib20","unstructured":"Hlawka E. The theory of uniform distribution. AB Academic Publishers; 1984."},{"issue":"1","key":"10.1016\/j.jnca.2010.01.003_bib21","article-title":"A simple and efficient data processing scheme for HMM based anomaly intrusion detection","volume":"23","author":"Hu","year":"2009","journal-title":"Special Issue of Advances on Network Intrusion Detection, IEEE Network"},{"issue":"10","key":"10.1016\/j.jnca.2010.01.003_bib22","doi-asserted-by":"crossref","DOI":"10.1002\/cpe.1435","article-title":"Spam filtering for network traffic security on a multi-core environment","volume":"21","author":"Islam","year":"2009","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"10.1016\/j.jnca.2010.01.003_bib23","series-title":"A database of computer attacks for the evaluation of intrusion detection systems","author":"Kendall","year":"1999"},{"key":"10.1016\/j.jnca.2010.01.003_bib24","unstructured":"Kim M, Kang H, Hung S, Chung S, Hong J. A flow-based method for abnormal network traffic detection. In: IEEE\/IFIP network operations and management symposium, Seoul; 2004."},{"key":"10.1016\/j.jnca.2010.01.003_bib25","unstructured":"Kodialam M, Lakshman T. Detecting network intrusions via sampling: a game theoretic approach. In: Proceedings of INFOCOM 2003, twenty-second annual joint conference of the IEEE Computer and Communications Societies, 2003."},{"key":"10.1016\/j.jnca.2010.01.003_bib26","unstructured":"Kollios G, Gunopoulos D, Koudas N, Berchtold S. An efficient approximation scheme for data mining tasks. In: Proceedings of IEEE international conference on data engineering (ICDE'01), 2001. p. 453\u2013462"},{"key":"10.1016\/j.jnca.2010.01.003_bib27","series-title":"Handbook of statistics 6: sampling","author":"Krishnaiah","year":"1988"},{"key":"10.1016\/j.jnca.2010.01.003_bib28","unstructured":"MIT Lincoln Lab. DARPA intrusion detection dataset. 1998. Available from; \u3008http:\/\/www.ll.mit.edu\/IST\/ideval\/data\/1998\/1998_data_index.htm\u3009."},{"key":"10.1016\/j.jnca.2010.01.003_bib29","series-title":"Handbook on information and communication security","first-page":"381","article-title":"Network traffic analysis and SCADA security","author":"Mahmood","year":"2009"},{"key":"10.1016\/j.jnca.2010.01.003_bib30","series-title":"Networking","article-title":"Echidna: efficient clustering of hierarchical data for network traffic analysis","author":"Mahmood","year":"2006"},{"issue":"6","key":"10.1016\/j.jnca.2010.01.003_bib31","doi-asserted-by":"crossref","first-page":"752","DOI":"10.1109\/TKDE.2007.190725","article-title":"An efficient clustering scheme to exploit hierarchical data in network traffic analysis","volume":"20","author":"Mahmood","year":"2008","journal-title":"Knowledge and Data Engineering, IEEE Transactions on"},{"key":"10.1016\/j.jnca.2010.01.003_bib32","doi-asserted-by":"crossref","unstructured":"Mahoney M, Chan P. An analysis of the 1999 DARPA\/Lincoln laboratory evaluation data for network anomaly detection. In: Proceedings of RAID, Springer; 2003. p. 220\u2013237.","DOI":"10.1007\/978-3-540-45248-5_13"},{"key":"10.1016\/j.jnca.2010.01.003_bib33","series-title":"Randomized algorithms","author":"Motwani","year":"1995"},{"key":"10.1016\/j.jnca.2010.01.003_bib34","unstructured":"Ng R, Han J. Efficient and effective clustering methods for spatial data mining. In: Proceedings of VLDB, 1994. p. 144\u201355."},{"key":"10.1016\/j.jnca.2010.01.003_bib35","doi-asserted-by":"crossref","unstructured":"Palmer C, Faloutsos C. Density biased sampling: an improved method for data mining and clustering. In: Proceedings of 2000 ACM SIGMOD, New York, NY, USA: ACM Press; 2000. p. 82\u201392.","DOI":"10.1145\/335191.335384"},{"key":"10.1016\/j.jnca.2010.01.003_bib36","first-page":"3176","article-title":"RFC 3176: InMon Corporation\u2019s sFlow: a method for monitoring traffic in switched and routed networks","author":"Phaal","year":"2001","journal-title":"Internet Engineering Task Force RFC"},{"key":"10.1016\/j.jnca.2010.01.003_bib37","doi-asserted-by":"crossref","unstructured":"Queiroz C, Mahmood AN, Hu J, Tari Z, Yu X. Building a SCADA Security Testbed. In: Proceedings of the third international conference on Network & System Security (NSS09), Gold Coast, Australia: 2008.","DOI":"10.1109\/NSS.2009.82"},{"key":"10.1016\/j.jnca.2010.01.003_bib38","series-title":"Information retrieval","author":"Rijsbergen","year":"1979"},{"key":"10.1016\/j.jnca.2010.01.003_bib39","series-title":"Sampling","author":"Thompson","year":"1992"},{"key":"10.1016\/j.jnca.2010.01.003_bib40","series-title":"Adaptive sampling","author":"Thompson","year":"1996"},{"key":"10.1016\/j.jnca.2010.01.003_bib41","unstructured":"World Health Organization. Sequential sampling. 2006."},{"key":"10.1016\/j.jnca.2010.01.003_bib45","doi-asserted-by":"crossref","unstructured":"Xin, D., Han, J., Yan, X., Cheng, H. On compressing frequent patterns. Data and Knowledge Engineering 2007; 60(1):5\u201329","DOI":"10.1016\/j.datak.2006.01.006"},{"key":"10.1016\/j.jnca.2010.01.003_bib42","doi-asserted-by":"crossref","unstructured":"Xu K, Zhang Z, Bhattacharyya S. Profiling internet backbone traffic: behavior models and applications. In: Proceedings of the 2005 conference on applications, technologies, architectures, and protocols for computer communications, New York, NY, USA: ACM Press; 2005a. p. 169\u2013180","DOI":"10.1145\/1080091.1080112"},{"key":"10.1016\/j.jnca.2010.01.003_bib43","unstructured":"Xu K, Zhang Z, Bhattacharyya S. Reducing unwanted traffic in a backbone network. In: Proceedings of steps to reducing unwanted traffic on the internet workshop (SRUTI), 2005b. p. 9\u201315"},{"issue":"6","key":"10.1016\/j.jnca.2010.01.003_bib44","doi-asserted-by":"crossref","first-page":"1219","DOI":"10.1016\/j.jnca.2009.05.004","article-title":"A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference","volume":"32","author":"Xuan Dau","year":"2009","journal-title":"Journal of Network and Computer Applications"}],"container-title":["Journal of Network and Computer Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1084804510000196?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1084804510000196?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,25]],"date-time":"2019-05-25T21:27:00Z","timestamp":1558819620000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1084804510000196"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7]]},"references-count":44,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,7]]}},"alternative-id":["S1084804510000196"],"URL":"https:\/\/doi.org\/10.1016\/j.jnca.2010.01.003","relation":{},"ISSN":["1084-8045"],"issn-type":[{"value":"1084-8045","type":"print"}],"subject":[],"published":{"date-parts":[[2010,7]]}}}