{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:59:49Z","timestamp":1729616389052,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/apnoms.2017.8094143","type":"proceedings-article","created":{"date-parts":[[2017,11,2]],"date-time":"2017-11-02T22:16:37Z","timestamp":1509660997000},"page":"243-246","source":"Crossref","is-referenced-by-count":3,"title":["Suspicious traffic detection based on edge gateway sampling method"],"prefix":"10.1109","author":[{"given":"Sinh-Ngoc","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Jintae","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Kyungbaek","family":"Kim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"399","article-title":"Improving network anomaly detection via selective flow-based sampling","author":"georgios","year":"2008","journal-title":"IET communications 2 3"},{"year":"2007","author":"ryoichi","journal-title":"Applications and the Internet Workshops 2007 SAINT Workshops 2007 International Symposium on Jan","article-title":"A study on detecting network anomalies using sampled flow statistics","key":"ref3"},{"key":"ref10","first-page":"498","article-title":"Efficient anomaly detection using adaptive monitoring in SDN","author":"garg","year":"2015","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) 5 6"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/JSAC.2006.884027"},{"key":"ref5","first-page":"122","article-title":"Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments","author":"kostas","year":"2014","journal-title":"Computer Networks 62"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.comnet.2016.05.019","article-title":"Suspicious traffic sampling for intrusion detection in software-defined networks","volume":"109","author":"taejin","year":"2016","journal-title":"Computer Networks"},{"key":"ref7","first-page":"81","article-title":"Improved Snort intrusion detection system using modified pattern matching technique","author":"chintan c","year":"2013","journal-title":"International Journal of Emerging Technology and Advanced Engineerings (IJETAE) 3 7"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/ICNP.2012.6459946"},{"year":"2013","author":"ying","journal-title":"Proceedings of the Ninth ACM Conference on Emerging Networking Experiments and Technologies ACM","article-title":"An adaptive flow counting method for anomaly detection in SDN","key":"ref9"},{"year":"2011","author":"prasanta","journal-title":"The Computer Journal","article-title":"A survey of outlier detection methods in network anomaly identification","key":"ref1"}],"event":{"name":"2017 19th Asia-Pacific Network Operations and Management Symposium (APNOMS)","start":{"date-parts":[[2017,9,27]]},"location":"Seoul","end":{"date-parts":[[2017,9,29]]}},"container-title":["2017 19th Asia-Pacific Network Operations and Management Symposium (APNOMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8082389\/8094028\/08094143.pdf?arnumber=8094143","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T10:21:27Z","timestamp":1570270887000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8094143\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/apnoms.2017.8094143","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}