{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T07:47:03Z","timestamp":1743752823226,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,9]],"date-time":"2017-11-09T00:00:00Z","timestamp":1510185600000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1539920"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["644960"],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,11,9]]},"DOI":"10.1145\/3005745.3005748","type":"proceedings-article","created":{"date-parts":[[2016,11,2]],"date-time":"2016-11-02T12:22:17Z","timestamp":1478089337000},"page":"106-112","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["Network Monitoring as a Streaming Analytics Problem"],"prefix":"10.1145","author":[{"given":"Arpit","family":"Gupta","sequence":"first","affiliation":[{"name":"Princeton University"}]},{"given":"R\u00fcdiger","family":"Birkner","sequence":"additional","affiliation":[{"name":"ETH Z\u00fcrich"}]},{"given":"Marco","family":"Canini","sequence":"additional","affiliation":[{"name":"KAUST"}]},{"given":"Nick","family":"Feamster","sequence":"additional","affiliation":[{"name":"Princeton University"}]},{"given":"Chris","family":"Mac-Stoker","sequence":"additional","affiliation":[{"name":"NIKSUN, Inc."}]},{"given":"Walter","family":"Willinger","sequence":"additional","affiliation":[{"name":"NIKSUN, Inc."}]}],"member":"320","published-online":{"date-parts":[[2016,11,9]]},"reference":[{"key":"e_1_3_2_1_1_2","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872855"},{"key":"e_1_3_2_1_2_2","unstructured":"Apache Spark. http:\/\/spark.apache.org\/. Apache Spark. http:\/\/spark.apache.org\/."},{"key":"e_1_3_2_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2742797"},{"key":"e_1_3_2_1_4_2","volume-title":"June","author":"Black D.","year":"2005","unstructured":"D. Black , K. McCloghrie , and J. Schoenwaelder . Uniform Resource Identifier (URI) Scheme for the Simple Network Management Protocol (SNMP). RFC 4088 (Proposed Standard) , June 2005 . D. Black, K. McCloghrie, and J. Schoenwaelder. Uniform Resource Identifier (URI) Scheme for the Simple Network Management Protocol (SNMP). RFC 4088 (Proposed Standard), June 2005."},{"key":"e_1_3_2_1_5_2","first-page":"379","volume-title":"Proceedings of the 21st USENIX Conference on Security Symposium","author":"Borders K.","unstructured":"K. Borders , J. Springer , and M. Burnside . Chimera: A Declarative Language for Streaming Network Traffic Analysis . In Proceedings of the 21st USENIX Conference on Security Symposium , pages 365\u2013 379 . USENIX, 2012. K. Borders, J. Springer, and M. Burnside. Chimera: A Declarative Language for Streaming Network Traffic Analysis. In Proceedings of the 21st USENIX Conference on Security Symposium, pages 365\u2013379. USENIX, 2012."},{"key":"e_1_3_2_1_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"e_1_3_2_1_7_2","volume-title":"ArsTechnica","author":"Bright P.","year":"2013","unstructured":"P. Bright . Spamhaus DDoS grows to Internet-threatening Size . ArsTechnica , March 2013 . P. Bright. Spamhaus DDoS grows to Internet-threatening Size. ArsTechnica, March 2013."},{"key":"e_1_3_2_1_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2012.01.005"},{"key":"e_1_3_2_1_9_2","first-page":"215","author":"Carney D.","year":"2002","unstructured":"D. Carney , U. Çetintemel, M. Cherniack , C. Convey , S. Lee , G. Seidman , M. Stonebraker , N. Tatbul , and S. Zdonik . Monitoring Streams: A New Class of Data Management Applications. In VLDB, pages 215 \u2013 226 , 2002 . D. Carney, U. Çetintemel, M. Cherniack, C. Convey, S. Lee, G. Seidman, M. Stonebraker, N. Tatbul, and S. Zdonik. Monitoring Streams: A New Class of Data Management Applications. In VLDB, pages 215\u2013226, 2002.","journal-title":"In VLDB, pages"},{"key":"e_1_3_2_1_10_2","doi-asserted-by":"crossref","unstructured":"B. Claise. Cisco Systems NetFlow Services Export Version 9. RFC 3954 (Informational) October 2004. B. Claise. Cisco Systems NetFlow Services Export Version 9. RFC 3954 (Informational) October 2004.","DOI":"10.17487\/rfc3954"},{"key":"e_1_3_2_1_11_2","volume-title":"Specification of the ip flow information export (ipfix) protocol for the exchange of ip traffic flow information. Technical report","author":"Claise B.","year":"2008","unstructured":"B. Claise . Specification of the ip flow information export (ipfix) protocol for the exchange of ip traffic flow information. Technical report , 2008 . B. Claise. Specification of the ip flow information export (ipfix) protocol for the exchange of ip traffic flow information. Technical report, 2008."},{"key":"e_1_3_2_1_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/1366102.1366106"},{"key":"e_1_3_2_1_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872838"},{"key":"e_1_3_2_1_14_2","unstructured":"Five Year Traffic Growth at DE-CIX. https:\/\/www.de-cix.net\/about\/statistics\/. Five Year Traffic Growth at DE-CIX. https:\/\/www.de-cix.net\/about\/statistics\/."},{"key":"e_1_3_2_1_15_2","unstructured":"Deepfield Defender. http:\/\/deepfield.com\/products\/deepfield-defender\/. Deepfield Defender. http:\/\/deepfield.com\/products\/deepfield-defender\/."},{"key":"e_1_3_2_1_16_2","unstructured":"Google Cloud DataFlow. https:\/\/cloud.google.com\/dataflow\/. Google Cloud DataFlow. https:\/\/cloud.google.com\/dataflow\/."},{"key":"e_1_3_2_1_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32584-7_25"},{"key":"e_1_3_2_1_18_2","volume-title":"Proceedings of Hot-ICE'11","author":"Jose L.","year":"2011","unstructured":"L. Jose , M. Yu , and J. Rexford . Online measurement of large traffic aggregates on commodity switches . In Proceedings of Hot-ICE'11 . USENIX, 2011 . L. Jose, M. Yu, and J. Rexford. Online measurement of large traffic aggregates on commodity switches. In Proceedings of Hot-ICE'11. USENIX, 2011."},{"key":"e_1_3_2_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301325"},{"key":"e_1_3_2_1_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/2834050.2834098"},{"key":"e_1_3_2_1_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"e_1_3_2_1_22_2","volume-title":"Conference on Innovative Data Systems Research (CIDR)","author":"Motwani R.","year":"2003","unstructured":"R. Motwani , J. Widom , A. Arasu , B. Babcock , S. Babu , M. Datar , G. Manku , C. Olston , J. Rosenstein , and R. Varma . Query Processing, Resource Management, and Approximation in a Data Stream Management System . In Conference on Innovative Data Systems Research (CIDR) , January 2003 . R. Motwani, J. Widom, A. Arasu, B. Babcock, S. Babu, M. Datar, G. Manku, C. Olston, J. Rosenstein, and R. Varma. Query Processing, Resource Management, and Approximation in a Data Stream Management System. In Conference on Innovative Data Systems Research (CIDR), January 2003."},{"key":"e_1_3_2_1_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3005745.3005775"},{"key":"e_1_3_2_1_24_2","unstructured":"OpenSOC. http:\/\/opensoc.github.io\/. OpenSOC. http:\/\/opensoc.github.io\/."},{"key":"e_1_3_2_1_25_2","unstructured":"OpenSOC Scalability. https:\/\/goo.gl\/CX2jWr. OpenSOC Scalability. https:\/\/goo.gl\/CX2jWr."},{"key":"e_1_3_2_1_26_2","volume-title":"InMon corporation's sFlow. RFC3176 (September","author":"Phaal P.","year":"2001","unstructured":"P. Phaal , S. Panchen , and N. McKee . InMon corporation's sFlow. RFC3176 (September 2001 ), 2001. P. Phaal, S. Panchen, and N. McKee. InMon corporation's sFlow. RFC3176 (September 2001), 2001."},{"key":"e_1_3_2_1_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2610521"},{"key":"e_1_3_2_1_28_2","unstructured":"Ryu SDN Framework. http:\/\/osrg.github.io\/ryu\/. Ryu SDN Framework. http:\/\/osrg.github.io\/ryu\/."},{"key":"e_1_3_2_1_29_2","unstructured":"Apache Storm. http:\/\/storm.apache.org\/. Apache Storm. http:\/\/storm.apache.org\/."},{"key":"e_1_3_2_1_30_2","first-page":"594","volume-title":"VLDB","volume":"96","author":"Sullivan M.","year":"1996","unstructured":"M. Sullivan . Tribeca : A Stream Database Manager for Network Traffic Analysis . In VLDB , volume 96 , page 594 , 1996 . M. Sullivan. Tribeca: A Stream Database Manager for Network Traffic Analysis. In VLDB, volume 96, page 594, 1996."},{"key":"e_1_3_2_1_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-009-0269-0"},{"key":"e_1_3_2_1_32_2","unstructured":"Tigon. http:\/\/tigon.io\/. Tigon. http:\/\/tigon.io\/."},{"key":"e_1_3_2_1_33_2","unstructured":"UDP-Based Distributed Reflective Denial of Service Attacks. https:\/\/www.us-cert.gov\/ncas\/alerts\/TA14-017A. UDP-Based Distributed Reflective Denial of Service Attacks. https:\/\/www.us-cert.gov\/ncas\/alerts\/TA14-017A."},{"key":"e_1_3_2_1_34_2","volume-title":"OSDI","author":"Viswanathan R.","year":"2016","unstructured":"R. Viswanathan , G. Ananthanarayanan , and A. Akella . Clarinet: WAN-Aware Optimization for Analytics Queries . In OSDI , 2016 . To appear. R. Viswanathan, G. Ananthanarayanan, and A. Akella. Clarinet: WAN-Aware Optimization for Analytics Queries. In OSDI, 2016. To appear."},{"key":"e_1_3_2_1_35_2","first-page":"42","volume-title":"Software Defined Traffic Measurement with OpenSketch. In 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13)","author":"Yu M.","year":"2013","unstructured":"M. Yu , L. Jose , and R. Miao . Software Defined Traffic Measurement with OpenSketch. In 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13) , pages 29\u2013 42 , 2013 . M. Yu, L. Jose, and R. Miao. Software Defined Traffic Measurement with OpenSketch. In 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13), pages 29\u201342, 2013."},{"key":"e_1_3_2_1_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282392"}],"event":{"name":"HotNets-XV: The 15th ACM Workshop on Hot Topics in Networks","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Atlanta GA USA","acronym":"HotNets-XV"},"container-title":["Proceedings of the 15th ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3005745.3005748","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3005745.3005748","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T13:32:31Z","timestamp":1673357551000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3005745.3005748"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,9]]},"references-count":36,"alternative-id":["10.1145\/3005745.3005748","10.1145\/3005745"],"URL":"https:\/\/doi.org\/10.1145\/3005745.3005748","relation":{},"subject":[],"published":{"date-parts":[[2016,11,9]]},"assertion":[{"value":"2016-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}