{"id":"https://openalex.org/W2210251978","doi":"https://doi.org/10.1109/cnsm.2015.7367366","title":"A fast algorithm for detecting anomalous changes in network traffic","display_name":"A fast algorithm for detecting anomalous changes in network traffic","publication_year":2015,"publication_date":"2015-11-01","ids":{"openalex":"https://openalex.org/W2210251978","doi":"https://doi.org/10.1109/cnsm.2015.7367366","mag":"2210251978"},"language":"en","primary_location":{"id":"doi:10.1109/cnsm.2015.7367366","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cnsm.2015.7367366","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 11th International Conference on Network and Service Management (CNSM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027057578","display_name":"Tingshan Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I72816309","display_name":"Drexel University","ror":"https://ror.org/04bdffz58","country_code":"US","type":"education","lineage":["https://openalex.org/I72816309"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Tingshan Huang","raw_affiliation_strings":["ECE Department, Drexel University, Philadelphia, PA, USA"],"affiliations":[{"raw_affiliation_string":"ECE Department, Drexel University, Philadelphia, PA, USA","institution_ids":["https://openalex.org/I72816309"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001920041","display_name":"Harish Sethu","orcid":"https://orcid.org/0000-0002-0724-0707"},"institutions":[{"id":"https://openalex.org/I72816309","display_name":"Drexel University","ror":"https://ror.org/04bdffz58","country_code":"US","type":"education","lineage":["https://openalex.org/I72816309"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Harish Sethu","raw_affiliation_strings":["ECE Department, Drexel University, Philadelphia, PA, USA"],"affiliations":[{"raw_affiliation_string":"ECE Department, Drexel University, Philadelphia, PA, USA","institution_ids":["https://openalex.org/I72816309"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007957626","display_name":"Nagarajan Kandasamy","orcid":"https://orcid.org/0000-0002-4224-6362"},"institutions":[{"id":"https://openalex.org/I72816309","display_name":"Drexel University","ror":"https://ror.org/04bdffz58","country_code":"US","type":"education","lineage":["https://openalex.org/I72816309"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nagarajan Kandasamy","raw_affiliation_strings":["ECE Department, Drexel University, Philadelphia, PA, USA"],"affiliations":[{"raw_affiliation_string":"ECE Department, Drexel University, Philadelphia, PA, USA","institution_ids":["https://openalex.org/I72816309"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5027057578"],"corresponding_institution_ids":["https://openalex.org/I72816309"],"apc_list":null,"apc_paid":null,"fwci":1.6641,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.86349483,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"251","last_page":"255"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7243589162826538},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.6529613733291626},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6230705380439758},{"id":"https://openalex.org/keywords/computational-complexity-theory","display_name":"Computational complexity theory","score":0.5977851152420044},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5900432467460632},{"id":"https://openalex.org/keywords/covariance-matrix","display_name":"Covariance matrix","score":0.5309077501296997},{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.480537474155426},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.43558475375175476},{"id":"https://openalex.org/keywords/time-complexity","display_name":"Time complexity","score":0.424991250038147},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.4223264157772064},{"id":"https://openalex.org/keywords/covariance","display_name":"Covariance","score":0.4200558662414551},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3199792504310608},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.20676419138908386},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.17464497685432434}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7243589162826538},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6529613733291626},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6230705380439758},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.5977851152420044},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5900432467460632},{"id":"https://openalex.org/C185142706","wikidata":"https://www.wikidata.org/wiki/Q1134404","display_name":"Covariance matrix","level":2,"score":0.5309077501296997},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.480537474155426},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.43558475375175476},{"id":"https://openalex.org/C311688","wikidata":"https://www.wikidata.org/wiki/Q2393193","display_name":"Time complexity","level":2,"score":0.424991250038147},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.4223264157772064},{"id":"https://openalex.org/C178650346","wikidata":"https://www.wikidata.org/wiki/Q201984","display_name":"Covariance","level":2,"score":0.4200558662414551},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3199792504310608},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.20676419138908386},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.17464497685432434},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cnsm.2015.7367366","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cnsm.2015.7367366","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 11th International Conference on Network and Service Management (CNSM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1515390491","https://openalex.org/W1963821364","https://openalex.org/W1980381208","https://openalex.org/W1981745143","https://openalex.org/W1995357300","https://openalex.org/W2007286423","https://openalex.org/W2028479713","https://openalex.org/W2049497254","https://openalex.org/W2063978311","https://openalex.org/W2068547038","https://openalex.org/W2118931532","https://openalex.org/W2128824222","https://openalex.org/W2148694408","https://openalex.org/W2152426255","https://openalex.org/W2157578436","https://openalex.org/W2164210932","https://openalex.org/W3009746682","https://openalex.org/W3145074154","https://openalex.org/W3161677312"],"related_works":["https://openalex.org/W4386482731","https://openalex.org/W2765763546","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W4390188535","https://openalex.org/W4256682929","https://openalex.org/W335511927","https://openalex.org/W2471811227","https://openalex.org/W2217591390","https://openalex.org/W961142965"],"abstract_inverted_index":{"Anomalies":[0],"in":[1,13,16,27,39,122],"communication":[2],"network":[3],"traffic":[4,21,107],"caused":[5],"by":[6,63,72],"malware":[7],"or":[8],"denial-of-service":[9],"attacks":[10],"manifest":[11],"themselves":[12],"structural":[14,55],"changes":[15,38],"the":[17,51,64,69,75,82,123],"covariance":[18,59],"matrix":[19],"of":[20,25,54,74,78,81,126],"features.":[22],"Real-time":[23],"detection":[24,53],"anomalies":[26],"high-dimensional":[28],"data":[29],"demands":[30],"a":[31,40,90,97,119],"very":[32],"efficient":[33,48],"algorithm":[34,49,88],"to":[35,96,105],"identify":[36],"these":[37],"compact":[41],"low-dimensional":[42],"representation.":[43],"This":[44],"paper":[45],"presents":[46],"an":[47],"for":[50],"rapid":[52],"differences":[56],"between":[57,68],"two":[58,76],"matrices,":[60],"as":[61],"measured":[62],"maximum":[65],"possible":[66],"angle":[67],"subspaces":[70],"specified":[71],"subsets":[73],"sets":[77],"principal":[79],"components":[80],"matrices.":[83],"We":[84],"show":[85,114],"that":[86,115],"our":[87,103,116],"achieves":[89],"significantly":[91],"lower":[92],"computational":[93,124],"complexity":[94],"compared":[95],"naive":[98],"approach.":[99],"Finally,":[100],"we":[101],"apply":[102],"results":[104],"real":[106],"traces":[108],"from":[109],"Internet":[110],"backbone":[111],"links":[112],"and":[113],"approach":[117],"offers":[118],"substantial":[120],"reduction":[121],"overhead":[125],"anomaly":[127],"detection.":[128]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
