{"id":"https://openalex.org/W1483251242","doi":"https://doi.org/10.1109/ccis.2014.7175727","title":"Real-time anomaly traffic monitoring based on dynamic k-NN cumulative-distance abnormal detection algorithm","display_name":"Real-time anomaly traffic monitoring based on dynamic k-NN cumulative-distance abnormal detection algorithm","publication_year":2014,"publication_date":"2014-11-01","ids":{"openalex":"https://openalex.org/W1483251242","doi":"https://doi.org/10.1109/ccis.2014.7175727","mag":"1483251242"},"language":"en","primary_location":{"id":"doi:10.1109/ccis.2014.7175727","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccis.2014.7175727","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE 3rd International Conference on Cloud Computing and Intelligence Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044855132","display_name":"Ruoning Song","orcid":"https://orcid.org/0000-0003-2091-796X"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ruoning Song","raw_affiliation_strings":["Beijing Key Laboratory of Network System Architecture and Convergence, Beijing University of Posts and Telecommunications, Beijing, China","Beijing Key Laboratory of Network System Architecture and Convergence, Beijing University of Posts and Telecommunications,China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Network System Architecture and Convergence, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"Beijing Key Laboratory of Network System Architecture and Convergence, Beijing University of Posts and Telecommunications,China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100453096","display_name":"Fang Liu","orcid":"https://orcid.org/0000-0002-9635-5900"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fang Liu","raw_affiliation_strings":["Beijing Key Laboratory of Network System Architecture and Convergence, Beijing University of Posts and Telecommunications, Beijing, China","Beijing Key Laboratory of Network System Architecture and Convergence, Beijing University of Posts and Telecommunications,China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Network System Architecture and Convergence, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"Beijing Key Laboratory of Network System Architecture and Convergence, Beijing University of Posts and Telecommunications,China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5044855132"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":0.3448,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.61723495,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"187","last_page":"192"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.8299791812896729},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7106788754463196},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.6686335206031799},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.5706136226654053},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4531843364238739},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4061073362827301},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07605791091918945}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.8299791812896729},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7106788754463196},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.6686335206031799},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.5706136226654053},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4531843364238739},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4061073362827301},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07605791091918945},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccis.2014.7175727","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccis.2014.7175727","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE 3rd International Conference on Cloud Computing and Intelligence Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W2091639747","https://openalex.org/W2094829602","https://openalex.org/W2109249054","https://openalex.org/W2121511513","https://openalex.org/W2172130105","https://openalex.org/W4246524285"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2912112202","https://openalex.org/W2667207928","https://openalex.org/W4377864969","https://openalex.org/W2972971679"],"abstract_inverted_index":{"In":[0,63],"recent":[1],"years,":[2],"the":[3,13,47,84,89],"scale":[4],"of":[5,12,16,39,49,88],"mobile":[6,30],"Internet":[7],"is":[8,59,110],"rapidly":[9],"increasing":[10],"because":[11],"explosive":[14],"growing":[15],"smartphone":[17],"users":[18],"and":[19,24,86],"applications.":[20],"The":[21],"traffic":[22,54],"analysis":[23],"anomaly":[25,43,70,116],"detection":[26,71,79,117],"become":[27],"critical":[28],"for":[29,41,114],"operators.":[31],"Up":[32],"to":[33],"now,":[34],"there":[35],"are":[36],"a":[37,68,94,111],"number":[38],"studies":[40],"detecting":[42,50],"network":[44],"traffic.":[45],"However,":[46],"way":[48],"anomalies":[51],"on":[52,74],"massive":[53],"data":[55],"in":[56,119],"real-time":[57,69,115],"manner":[58],"not":[60],"well":[61],"studied.":[62],"this":[64],"paper,":[65],"we":[66],"propose":[67],"method":[72,90],"based":[73],"dynamic":[75],"k-NN":[76],"cumulative-distance":[77],"abnormal":[78],"algorithm.":[80],"We":[81],"also":[82],"present":[83],"design":[85],"implementation":[87],"by":[91,103],"leveraging":[92],"Strom,":[93],"distributed":[95],"steam":[96],"computing":[97],"technology.":[98],"Experimental":[99],"results":[100],"from":[101],"evaluation":[102],"real-world":[104],"dataset":[105],"show":[106],"that":[107],"our":[108],"system":[109],"promised":[112],"solution":[113,118],"high-speed":[120],"network.":[121]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
