{"id":"https://openalex.org/W2097079069","doi":"https://doi.org/10.1109/wowmom.2010.5534933","title":"Autonomic diagnosis of anomalous network traffic","display_name":"Autonomic diagnosis of anomalous network traffic","publication_year":2010,"publication_date":"2010-06-01","ids":{"openalex":"https://openalex.org/W2097079069","doi":"https://doi.org/10.1109/wowmom.2010.5534933","mag":"2097079069"},"language":"en","primary_location":{"id":"doi:10.1109/wowmom.2010.5534933","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wowmom.2010.5534933","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://eprints.lancs.ac.uk/id/eprint/34654/1/AOC2010.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021412159","display_name":"Angelos K. Marnerides","orcid":"https://orcid.org/0000-0002-7996-6216"},"institutions":[{"id":"https://openalex.org/I67415387","display_name":"Lancaster University","ror":"https://ror.org/04f2nsd36","country_code":"GB","type":"education","lineage":["https://openalex.org/I67415387"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Angelos K. Marnerides","raw_affiliation_strings":["Computing Department, Infolab21 Lancaster University, Lancaster, UK","Computing Dept., Infolab21, Lancaster University, Lancaster, UK"],"affiliations":[{"raw_affiliation_string":"Computing Department, Infolab21 Lancaster University, Lancaster, UK","institution_ids":["https://openalex.org/I67415387"]},{"raw_affiliation_string":"Computing Dept., Infolab21, Lancaster University, Lancaster, UK","institution_ids":["https://openalex.org/I67415387"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030962937","display_name":"David Hutchison","orcid":"https://orcid.org/0000-0001-6052-0559"},"institutions":[{"id":"https://openalex.org/I67415387","display_name":"Lancaster University","ror":"https://ror.org/04f2nsd36","country_code":"GB","type":"education","lineage":["https://openalex.org/I67415387"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"David Hutchison","raw_affiliation_strings":["Computing Department, Infolab21 Lancaster University, Lancaster, UK","Computing Dept., Infolab21, Lancaster University, Lancaster, UK"],"affiliations":[{"raw_affiliation_string":"Computing Department, Infolab21 Lancaster University, Lancaster, UK","institution_ids":["https://openalex.org/I67415387"]},{"raw_affiliation_string":"Computing Dept., Infolab21, Lancaster University, Lancaster, UK","institution_ids":["https://openalex.org/I67415387"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021350142","display_name":"Dimitrios P. Pezaros","orcid":"https://orcid.org/0000-0003-0939-378X"},"institutions":[{"id":"https://openalex.org/I7882870","display_name":"University of Glasgow","ror":"https://ror.org/00vtgdb53","country_code":"GB","type":"education","lineage":["https://openalex.org/I7882870"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Dimitrios P. Pezaros","raw_affiliation_strings":["Department of Computing Science, University of Glasgow, Glasgow, UK","Department of Computing Science University of Glasgow, Glasgow, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computing Science, University of Glasgow, Glasgow, UK","institution_ids":["https://openalex.org/I7882870"]},{"raw_affiliation_string":"Department of Computing Science University of Glasgow, Glasgow, UK","institution_ids":["https://openalex.org/I7882870"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5021412159"],"corresponding_institution_ids":["https://openalex.org/I67415387"],"apc_list":null,"apc_paid":null,"fwci":0.7451,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.74940751,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"115","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6877643465995789},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5863023996353149},{"id":"https://openalex.org/keywords/autonomic-computing","display_name":"Autonomic computing","score":0.5630928874015808},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.446646511554718},{"id":"https://openalex.org/keywords/bayesian-network","display_name":"Bayesian network","score":0.4450737237930298},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.4212418794631958},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3814515471458435},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3714748024940491},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3252270519733429},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.1021898090839386}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6877643465995789},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5863023996353149},{"id":"https://openalex.org/C558632462","wikidata":"https://www.wikidata.org/wiki/Q788172","display_name":"Autonomic computing","level":3,"score":0.5630928874015808},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.446646511554718},{"id":"https://openalex.org/C33724603","wikidata":"https://www.wikidata.org/wiki/Q812540","display_name":"Bayesian network","level":2,"score":0.4450737237930298},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.4212418794631958},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3814515471458435},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3714748024940491},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3252270519733429},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.1021898090839386},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/wowmom.2010.5534933","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wowmom.2010.5534933","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","raw_type":"proceedings-article"},{"id":"pmh:oai:eprints.lancs.ac.uk:34654","is_oa":true,"landing_page_url":null,"pdf_url":"https://eprints.lancs.ac.uk/id/eprint/34654/1/AOC2010.pdf","source":{"id":"https://openalex.org/S4306401916","display_name":"Lancaster EPrints (Lancaster University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67415387","host_organization_name":"Lancaster University","host_organization_lineage":["https://openalex.org/I67415387"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.659.2708","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.659.2708","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://eprints.lancs.ac.uk/34654/1/AOC2010.pdf","raw_type":"text"},{"id":"pmh:oai:eprints.gla.ac.uk:34547","is_oa":false,"landing_page_url":"http://eprints.gla.ac.uk/34547/","pdf_url":null,"source":{"id":"https://openalex.org/S4210235606","display_name":"ENLIGHTEN (Jurnal Bimbingan dan Konseling Islam)","issn_l":"2622-8912","issn":["2622-8912","2622-8920"],"is_oa":false,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":{"id":"pmh:oai:eprints.lancs.ac.uk:34654","is_oa":true,"landing_page_url":null,"pdf_url":"https://eprints.lancs.ac.uk/id/eprint/34654/1/AOC2010.pdf","source":{"id":"https://openalex.org/S4306401916","display_name":"Lancaster EPrints (Lancaster University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67415387","host_organization_name":"Lancaster University","host_organization_lineage":["https://openalex.org/I67415387"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6299999952316284,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2097079069.pdf"},"referenced_works_count":14,"referenced_works":["https://openalex.org/W1501706198","https://openalex.org/W1593125407","https://openalex.org/W2012095206","https://openalex.org/W2048794842","https://openalex.org/W2070597591","https://openalex.org/W2120011095","https://openalex.org/W2121511513","https://openalex.org/W2144936818","https://openalex.org/W2153517517","https://openalex.org/W2157578436","https://openalex.org/W2164210932","https://openalex.org/W2168690106","https://openalex.org/W4245318549","https://openalex.org/W6630088964"],"related_works":["https://openalex.org/W2131655578","https://openalex.org/W2248675240","https://openalex.org/W2006971450","https://openalex.org/W2181448200","https://openalex.org/W3123959791","https://openalex.org/W2358398431","https://openalex.org/W2172162363","https://openalex.org/W1578817650","https://openalex.org/W1880068926","https://openalex.org/W2074254449"],"abstract_inverted_index":{"Network":[0],"traffic":[1,75],"abnormalities":[2],"pose":[3],"one":[4],"of":[5,46,58,73,94,105],"the":[6,44,71,91,116],"greatest":[7],"threats":[8],"for":[9,99],"networked":[10],"environments.":[11],"Autonomic":[12],"communications":[13],"offer":[14],"a":[15,83],"solution:":[16],"it":[17],"should":[18],"be":[19],"possible":[20],"to":[21,30,69,120],"design":[22,45],"network":[23,37,61,122],"mechanisms":[24],"that":[25,34,52],"behave":[26],"adaptively":[27],"and":[28,82,97,110,124,133],"respond":[29],"any":[31],"anomalous":[32,74],"phenomenon":[33],"threatens":[35],"normal":[36],"behaviour.":[38],"In":[39],"this":[40],"paper":[41],"we":[42],"present":[43],"an":[47,59,66,78,106],"adaptive":[48,117],"anomaly":[49],"detection":[50],"component":[51],"has":[53],"been":[54],"built":[55],"as":[56],"part":[57,104],"autonomic":[60,79],"system.":[62],"We":[63],"have":[64],"implemented":[65],"entropy":[67],"estimator":[68],"predict":[70],"onset":[72],"behaviour":[76],"within":[77],"resilience":[80],"framework,":[81],"Supervised":[84],"Naive":[85],"Bayesian":[86],"classifier":[87],"which":[88],"synergistically":[89],"empower":[90],"core":[92],"properties":[93],"self-adaptation,":[95],"self-learning":[96],"self-protection":[98],"next":[100],"generation":[101],"networks.":[102],"Being":[103],"always-on,":[107],"automated":[108],"measurement":[109],"control":[111],"infrastructure,":[112],"such":[113],"mechanism":[114],"enforces":[115],"system":[118],"reaction":[119],"suboptimal":[121],"operation":[123],"its":[125],"subsequent":[126],"restoration,":[127],"while":[128],"requiring":[129],"minimal":[130],"static":[131],"(re)configuration":[132],"operator":[134],"intervention.":[135]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
