{"id":"https://openalex.org/W2165990062","doi":"https://doi.org/10.1109/apnoms.2011.6077031","title":"Combining density-based clustering and wavelet methods for internal systems anomaly detection","display_name":"Combining density-based clustering and wavelet methods for internal systems anomaly detection","publication_year":2011,"publication_date":"2011-09-01","ids":{"openalex":"https://openalex.org/W2165990062","doi":"https://doi.org/10.1109/apnoms.2011.6077031","mag":"2165990062"},"language":"en","primary_location":{"id":"doi:10.1109/apnoms.2011.6077031","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apnoms.2011.6077031","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 13th Asia-Pacific Network Operations and Management Symposium","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068862171","display_name":"Shun\u2010Te Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I22265921","display_name":"National Central University","ror":"https://ror.org/00944ve71","country_code":"TW","type":"education","lineage":["https://openalex.org/I22265921"]},{"id":"https://openalex.org/I92172085","display_name":"Chunghwa Telecom (Taiwan)","ror":"https://ror.org/04f786589","country_code":"TW","type":"company","lineage":["https://openalex.org/I92172085"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Shun-Te Liu","raw_affiliation_strings":["Department of Information Management, National Central University, Jhong Li, Taoyuan, Taiwan","Information & Communication Security Laboratory TL, Chunghwa Telecom Company Limited, Yangmei, Taoyuan, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Information Management, National Central University, Jhong Li, Taoyuan, Taiwan","institution_ids":["https://openalex.org/I22265921"]},{"raw_affiliation_string":"Information & Communication Security Laboratory TL, Chunghwa Telecom Company Limited, Yangmei, Taoyuan, Taiwan","institution_ids":["https://openalex.org/I92172085"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109031691","display_name":"Shiou-Jing Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I92172085","display_name":"Chunghwa Telecom (Taiwan)","ror":"https://ror.org/04f786589","country_code":"TW","type":"company","lineage":["https://openalex.org/I92172085"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Shiou-Jing Lin","raw_affiliation_strings":["Information & Communication Security Laboratory TL, Chunghwa Telecom Company Limited, Yangmei, Taoyuan, Taiwan"],"affiliations":[{"raw_affiliation_string":"Information & Communication Security Laboratory TL, Chunghwa Telecom Company Limited, Yangmei, Taoyuan, Taiwan","institution_ids":["https://openalex.org/I92172085"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100333369","display_name":"Yiming Chen","orcid":"https://orcid.org/0009-0002-8430-824X"},"institutions":[{"id":"https://openalex.org/I22265921","display_name":"National Central University","ror":"https://ror.org/00944ve71","country_code":"TW","type":"education","lineage":["https://openalex.org/I22265921"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Yi-Ming Chen","raw_affiliation_strings":["Department of Information Management, National Central University, Jhong Li, Taoyuan, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Information Management, National Central University, Jhong Li, Taoyuan, Taiwan","institution_ids":["https://openalex.org/I22265921"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5068862171"],"corresponding_institution_ids":["https://openalex.org/I22265921","https://openalex.org/I92172085"],"apc_list":null,"apc_paid":null,"fwci":0.3501,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.6610608,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.8674670457839966},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7118542194366455},{"id":"https://openalex.org/keywords/wavelet","display_name":"Wavelet","score":0.6831338405609131},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6792815327644348},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.648737370967865},{"id":"https://openalex.org/keywords/wavelet-transform","display_name":"Wavelet transform","score":0.5403734445571899},{"id":"https://openalex.org/keywords/false-positive-rate","display_name":"False positive rate","score":0.5301523804664612},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5197600722312927},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.414377361536026},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4073352515697479},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3815422058105469},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.10394707322120667}],"concepts":[{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.8674670457839966},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7118542194366455},{"id":"https://openalex.org/C47432892","wikidata":"https://www.wikidata.org/wiki/Q831390","display_name":"Wavelet","level":2,"score":0.6831338405609131},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6792815327644348},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.648737370967865},{"id":"https://openalex.org/C196216189","wikidata":"https://www.wikidata.org/wiki/Q2867","display_name":"Wavelet transform","level":3,"score":0.5403734445571899},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.5301523804664612},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5197600722312927},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.414377361536026},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4073352515697479},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3815422058105469},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.10394707322120667},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/apnoms.2011.6077031","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apnoms.2011.6077031","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 13th Asia-Pacific Network Operations and Management Symposium","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321040","display_name":"National Science Council","ror":"https://ror.org/02kv4zf79"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1968439359","https://openalex.org/W1970602212","https://openalex.org/W1971353559","https://openalex.org/W1994373811","https://openalex.org/W1996623555","https://openalex.org/W2001767007","https://openalex.org/W2004889321","https://openalex.org/W2034139177","https://openalex.org/W2080798382","https://openalex.org/W2101371243","https://openalex.org/W2122646361","https://openalex.org/W2126751256","https://openalex.org/W2137009118","https://openalex.org/W2140190241","https://openalex.org/W2148934434","https://openalex.org/W2160642098","https://openalex.org/W2164463086","https://openalex.org/W2498821183","https://openalex.org/W4245906277","https://openalex.org/W4298352105","https://openalex.org/W4299435087"],"related_works":["https://openalex.org/W2388464034","https://openalex.org/W2533125852","https://openalex.org/W2140460949","https://openalex.org/W2105580438","https://openalex.org/W2057435755","https://openalex.org/W2018782216","https://openalex.org/W2949620858","https://openalex.org/W2077021924","https://openalex.org/W2938728536","https://openalex.org/W2062826214"],"abstract_inverted_index":{"Internal":[0],"information":[1],"systems":[2,71],"play":[3],"an":[4],"important":[5],"role":[6],"in":[7,91,103],"keeping":[8],"the":[9,26,45,130,143,159,164],"enterprises":[10],"running":[11],"well.":[12],"To":[13,43],"detect":[14,119],"system":[15,23,120,139],"anomalies,":[16],"previous":[17],"research":[18],"achieved":[19],"good":[20],"results":[21,28,148],"with":[22],"symptoms;":[24],"however,":[25],"presented":[27],"are":[29],"primarily":[30],"performed":[31],"on":[32,100,157],"a":[33,39,108,112,154],"relatively":[34],"small":[35],"scale":[36],"and":[37,62,87,115,134,163],"within":[38],"short":[40],"time":[41],"period.":[42],"understand":[44,94],"system's":[46],"long-term":[47,97],"profiles,":[48],"we":[49,106],"collected":[50],"four":[51],"common":[52],"symptom":[53],"data":[54,90],"including":[55],"CPU":[56],"usage,":[57],"memory":[58],"loading,":[59],"disk":[60],"I/O,":[61,105],"network":[63,104,171],"I/O":[64],"from":[65,84],"more":[66],"than":[67],"100":[68],"online":[69],"internal":[70],"that":[72,150],"includes":[73],"300":[74],"servers":[75,83,86,127],"for":[76],"9":[77],"months.":[78],"We":[79,122],"randomly":[80],"selected":[81],"50":[82],"these":[85],"analyze":[88],"their":[89],"order":[92],"to":[93,118,128,141,168],"each":[95],"symptom's":[96],"features.":[98],"Based":[99],"our":[101,151],"findings":[102],"propose":[107],"new":[109],"approach":[110,152],"combining":[111],"density-based":[113],"clustering":[114],"wavelet":[116],"methods":[117],"anomalies.":[121],"also":[123],"select":[124],"44":[125],"other":[126],"evaluate":[129,142],"false":[131,160],"positive":[132,161],"rate":[133,162,166],"simulate":[135],"three":[136],"types":[137],"of":[138],"anomalies":[140],"detection":[144,165,173],"rate.":[145],"The":[146],"experiment":[147],"show":[149],"has":[153],"great":[155],"improvement":[156],"both":[158],"compared":[167],"another":[169],"wavelet-based":[170],"anomaly":[172],"approach.":[174]},"counts_by_year":[{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
