{"id":"https://openalex.org/W2755547341","doi":"https://doi.org/10.1109/icccn.2017.8038520","title":"A New Approach to Online, Multivariate Network Traffic Analysis","display_name":"A New Approach to Online, Multivariate Network Traffic Analysis","publication_year":2017,"publication_date":"2017-07-01","ids":{"openalex":"https://openalex.org/W2755547341","doi":"https://doi.org/10.1109/icccn.2017.8038520","mag":"2755547341"},"language":"en","primary_location":{"id":"doi:10.1109/icccn.2017.8038520","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn.2017.8038520","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 26th International Conference on Computer Communication and Networks (ICCCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101877231","display_name":"Jinoh Kim","orcid":"https://orcid.org/0000-0002-9835-1866"},"institutions":[{"id":"https://openalex.org/I206651237","display_name":"Texas A&M University \u2013 Commerce","ror":"https://ror.org/01red3556","country_code":"US","type":"education","lineage":["https://openalex.org/I206651237"]},{"id":"https://openalex.org/I148283060","display_name":"Lawrence Berkeley National Laboratory","ror":"https://ror.org/02jbv0t02","country_code":"US","type":"facility","lineage":["https://openalex.org/I1330989302","https://openalex.org/I148283060","https://openalex.org/I39565521"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jinoh Kim","raw_affiliation_strings":["Lawrence Berkeley National Laboratory, Berkeley, CA","Texas A&M University, Commerce, TX"],"affiliations":[{"raw_affiliation_string":"Lawrence Berkeley National Laboratory, Berkeley, CA","institution_ids":["https://openalex.org/I148283060"]},{"raw_affiliation_string":"Texas A&M University, Commerce, TX","institution_ids":["https://openalex.org/I206651237"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068293431","display_name":"Alex Sim","orcid":"https://orcid.org/0000-0002-6295-1982"},"institutions":[{"id":"https://openalex.org/I148283060","display_name":"Lawrence Berkeley National Laboratory","ror":"https://ror.org/02jbv0t02","country_code":"US","type":"facility","lineage":["https://openalex.org/I1330989302","https://openalex.org/I148283060","https://openalex.org/I39565521"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alex Sim","raw_affiliation_strings":["Lawrence Berkeley National Laboratory, Berkeley, CA"],"affiliations":[{"raw_affiliation_string":"Lawrence Berkeley National Laboratory, Berkeley, CA","institution_ids":["https://openalex.org/I148283060"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101877231"],"corresponding_institution_ids":["https://openalex.org/I148283060","https://openalex.org/I206651237"],"apc_list":null,"apc_paid":null,"fwci":0.4144,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.66325734,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"34","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12205","display_name":"Time Series Analysis and Forecasting","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7779779434204102},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6507856845855713},{"id":"https://openalex.org/keywords/multivariate-statistics","display_name":"Multivariate statistics","score":0.6210113167762756},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.6084597706794739},{"id":"https://openalex.org/keywords/traffic-analysis","display_name":"Traffic analysis","score":0.6047946810722351},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5810700058937073},{"id":"https://openalex.org/keywords/traffic-generation-model","display_name":"Traffic generation model","score":0.5216279625892639},{"id":"https://openalex.org/keywords/outlier","display_name":"Outlier","score":0.5097541213035583},{"id":"https://openalex.org/keywords/network-traffic-simulation","display_name":"Network traffic simulation","score":0.415671169757843},{"id":"https://openalex.org/keywords/multivariate-analysis","display_name":"Multivariate analysis","score":0.41079485416412354},{"id":"https://openalex.org/keywords/network-traffic-control","display_name":"Network traffic control","score":0.2555997967720032},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.25290897488594055},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.24562183022499084},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2418489158153534},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.18770766258239746}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7779779434204102},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6507856845855713},{"id":"https://openalex.org/C161584116","wikidata":"https://www.wikidata.org/wiki/Q1952580","display_name":"Multivariate statistics","level":2,"score":0.6210113167762756},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6084597706794739},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.6047946810722351},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5810700058937073},{"id":"https://openalex.org/C176715033","wikidata":"https://www.wikidata.org/wiki/Q2080768","display_name":"Traffic generation model","level":2,"score":0.5216279625892639},{"id":"https://openalex.org/C79337645","wikidata":"https://www.wikidata.org/wiki/Q779824","display_name":"Outlier","level":2,"score":0.5097541213035583},{"id":"https://openalex.org/C94168897","wikidata":"https://www.wikidata.org/wiki/Q574324","display_name":"Network traffic simulation","level":4,"score":0.415671169757843},{"id":"https://openalex.org/C38180746","wikidata":"https://www.wikidata.org/wiki/Q1952580","display_name":"Multivariate analysis","level":2,"score":0.41079485416412354},{"id":"https://openalex.org/C201100257","wikidata":"https://www.wikidata.org/wiki/Q393287","display_name":"Network traffic control","level":3,"score":0.2555997967720032},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.25290897488594055},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.24562183022499084},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2418489158153534},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.18770766258239746},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccn.2017.8038520","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn.2017.8038520","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 26th International Conference on Computer Communication and Networks (ICCCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W86112289","https://openalex.org/W132371169","https://openalex.org/W139562302","https://openalex.org/W576589918","https://openalex.org/W1555576437","https://openalex.org/W1858168446","https://openalex.org/W1998244781","https://openalex.org/W1999880153","https://openalex.org/W2004110412","https://openalex.org/W2009172320","https://openalex.org/W2021850646","https://openalex.org/W2026453187","https://openalex.org/W2040333627","https://openalex.org/W2069980026","https://openalex.org/W2095733742","https://openalex.org/W2097364154","https://openalex.org/W2099940443","https://openalex.org/W2100369465","https://openalex.org/W2102481563","https://openalex.org/W2117689707","https://openalex.org/W2123297508","https://openalex.org/W2123964197","https://openalex.org/W2125216345","https://openalex.org/W2128869116","https://openalex.org/W2150517569","https://openalex.org/W2163336863","https://openalex.org/W2169636627","https://openalex.org/W2170936641","https://openalex.org/W2172478671","https://openalex.org/W2295428206","https://openalex.org/W2487095677","https://openalex.org/W2597863454","https://openalex.org/W2599146636","https://openalex.org/W2951649716","https://openalex.org/W3004804023","https://openalex.org/W4231916799","https://openalex.org/W4234667859","https://openalex.org/W4254407475","https://openalex.org/W6616579695","https://openalex.org/W6633114986","https://openalex.org/W6639080731","https://openalex.org/W6685425271","https://openalex.org/W6735624342"],"related_works":["https://openalex.org/W2499612753","https://openalex.org/W3111802945","https://openalex.org/W125799710","https://openalex.org/W1525888863","https://openalex.org/W3128550596","https://openalex.org/W200432520","https://openalex.org/W2117899817","https://openalex.org/W2373582378","https://openalex.org/W2069435190","https://openalex.org/W2360514690"],"abstract_inverted_index":{"Network":[0],"traffic":[1,43,65,92,116,123,154],"analysis":[2,63,124,155],"has":[3,18],"long":[4],"been":[5,19],"a":[6,22,47,80,85,113,135,164],"core":[7],"element":[8],"for":[9,21,151],"effective":[10],"network":[11,72,91,105],"operations":[12],"and":[13,118,128,159,194],"management.":[14],"While":[15],"online":[16,57],"monitoring":[17,58],"studied":[20],"while,":[23],"it":[24],"is":[25,38,59,168],"still":[26],"intensively":[27],"challenging":[28],"due":[29],"to":[30,44,55,60,67,134,170,191,196],"several":[31],"reasons.":[32],"One":[33],"of":[34,42,50,64,89,103,115,174,185],"the":[35,39,90,94,100,104,119,157,172,175,183,186],"primary":[36],"challenges":[37,158],"heavy":[40],"volume":[41],"analyze":[45],"within":[46],"finite":[48],"amount":[49],"time.":[51],"Another":[52],"important":[53],"challenge":[54],"enable":[56],"support":[61],"multivariate":[62,95,153],"variables":[66],"help":[68],"administrators":[69],"identify":[70],"unexpected":[71],"events":[73],"intuitively.":[74],"To":[75],"this":[76,98,141],"end,":[77],"we":[78,143],"propose":[79],"new":[81,187],"approach":[82],"that":[83,167],"offers":[84],"high-":[86],"level":[87],"summary":[88],"with":[93,148,156,189],"analysis.":[96],"With":[97],"approach,":[99],"current":[101],"state":[102],"will":[106,181],"display":[107],"an":[108],"abstract":[109],"pattern":[110,137],"compiled":[111],"from":[112],"set":[114],"variables,":[117],"detection":[120,127],"problems":[121],"in":[122],"(e.g.,":[125],"change":[126],"anomaly":[129],"detection)":[130],"can":[131],"be":[132],"reduced":[133],"straightforward":[136],"identification":[138],"problem.":[139],"In":[140],"paper,":[142],"introduce":[144],"our":[145],"preliminary":[146],"work":[147],"clustered":[149,176],"patterns":[150],"online,":[152],"limitations.":[160],"We":[161,180],"then":[162],"present":[163],"grid-based":[165],"model":[166,188],"designed":[169],"overcome":[171],"limitations":[173],"pattern-":[177],"based":[178],"technique.":[179],"discuss":[182],"potential":[184],"respect":[190],"streaming-based":[192],"computation":[193],"robustness":[195],"outliers.":[197]},"counts_by_year":[{"year":2019,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
