{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:39:27Z","timestamp":1729640367376,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/cit.2016.98","type":"proceedings-article","created":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T00:13:47Z","timestamp":1489450427000},"page":"234-240","source":"Crossref","is-referenced-by-count":12,"title":["Hurst Parameter Based Anomaly Detection for Intrusion Detection System"],"prefix":"10.1109","author":[{"given":"Song Jin","family":"Yu","sequence":"first","affiliation":[]},{"given":"Pauline","family":"Koh","sequence":"additional","affiliation":[]},{"given":"Hyukmin","family":"Kwon","sequence":"additional","affiliation":[]},{"given":"Dong Seong","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Huy Kang","family":"Kim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/205447.205464"},{"key":"ref11","first-page":"35","article-title":"Study on the self-similarity of p2p traffic behavior based on fractal method","volume":"33","author":"li","year":"2010","journal-title":"Journal of Beijing University of Posts and Telecommunications"},{"year":"2016","key":"ref12","article-title":"Microsoft. Well-known security identifiers in windows operating systems"},{"journal-title":"DARPA Intrusion Detection Evaluation","article-title":"MIT Lincoln Laboratory","year":"2016","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/90.392383"},{"article-title":"Mirai iot botnet description and ddos attack mitigation","year":"0","author":"dobbins","key":"ref15"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1049\/ip-com:20010063","article-title":"online error detection through observation of traffic self-similarity","volume":"148","author":"schleifer","year":"2001","journal-title":"Communications IEE Proceedings-"},{"article-title":"Tenable nessus vulnerability scanner","year":"0","author":"nessus","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-5316(97)00016-3"},{"key":"ref4","first-page":"267","article-title":"Intrusion detection methodology for scada system environment based on traffic self-similarity property","volume":"22","author":"koh","year":"2012","journal-title":"Journal of the Korea Institute of Information Security and Cryptology"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2006.873828"},{"journal-title":"The 3rd Internationalconference on Internet","article-title":"Self-similarity based bot detection system in mmorpg","year":"2011","author":"kwon","key":"ref6"},{"key":"ref5","first-page":"3683","article-title":"Self-similarity based lightweight intrusion detection method","volume":"14","author":"kwon","year":"2011","journal-title":"International Information Institute (Tokyo) Information"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2016.23436","article-title":"You are a game bot!: uncovering game bots in mmorpgs via self-similarity in the wild","author":"lee","year":"2016","journal-title":"The Network and Distributed System Security Symposium (NDSS)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20042-7_36"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/90.650143"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCE.2007.4382163"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/NBiS.2013.43"}],"event":{"name":"2016 IEEE International Conference on Computer and Information Technology (CIT)","start":{"date-parts":[[2016,12,8]]},"location":"Nadi, Fiji","end":{"date-parts":[[2016,12,10]]}},"container-title":["2016 IEEE International Conference on Computer and Information Technology (CIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7875313\/7876293\/07876343.pdf?arnumber=7876343","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T13:53:24Z","timestamp":1568901204000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7876343\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/cit.2016.98","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}