EWMA Algorithm in Network Practice

Intrusion detection is used to monitor and capture intrusions into computer and network systems which attempt to compromise their security. Many intrusions manifest in changes in the intensity of events occuring in computer networks. Because of the ability of exponentially weighted moving average (E...

Full description

Saved in:
Bibliographic Details
Published inInternational journal of computers, communications & control Vol. 5; no. 2; p. 160
Main Authors Cisar, Petar, Bošnjak, Saša, Cisar, Sanja Maravic
Format Journal Article
LanguageEnglish
Published Oradea Agora University of Oradea 01.06.2010
Subjects
Online AccessGet full text
ISSN1841-9836
1841-9844
1841-9844
DOI10.15837/ijccc.2010.2.2471

Cover

Abstract Intrusion detection is used to monitor and capture intrusions into computer and network systems which attempt to compromise their security. Many intrusions manifest in changes in the intensity of events occuring in computer networks. Because of the ability of exponentially weighted moving average (EWMA) control charts to monitor the rate of occurrences of events based on their intensity, this technique is appropriate for implementation in control limits based algorithms. The paper also gives a review of a possible optimization method. The validation check of results will be performed on authentic network samples.
AbstractList Intrusion detection is used to monitor and capture intrusions into computer and network systems which attempt to compromise their security. Many intrusions manifest in changes in the intensity of events occuring in computer networks. Because of the ability of exponentially weighted moving average (EWMA) control charts to monitor the rate of occurrences of events based on their intensity, this technique is appropriate for implementation in control limits based algorithms. The paper also gives a review of a possible optimization method. The validation check of results will be performed on authentic network samples.
Author Bošnjak, Saša
Cisar, Petar
Cisar, Sanja Maravic
Author_xml – sequence: 1
  givenname: Petar
  surname: Cisar
  fullname: Cisar, Petar
– sequence: 2
  givenname: Saša
  surname: Bošnjak
  fullname: Bošnjak, Saša
– sequence: 3
  givenname: Sanja
  surname: Cisar
  middlename: Maravic
  fullname: Cisar, Sanja Maravic
BookMark eNo9j8tOwzAQRS1UJErpD7CKYJ1ge_zKsqrKQyqPBYilZfyAhDQJTqKqf0_aIu5mrkY6oznnaFI3tUfokuCMcAXypiittRnF44JmlElygqZEMZLmirHJfwdxhuZdV-IxQBWWfIquVu-Pi2RRfTax6L82SVEnT77fNvE7eYnG9oX1F-g0mKrz8785Q2-3q9flfbp-vntYLtapBZL3qWQQqBJSBE-tzEExYwKRkkssnfL8gwfrhPLGUIe9cE4Y4wWAI8zJgAFmCI53h7o1u62pKt3GYmPiThOsD6b6YKr3pprqvelIXR-pNjY_g-96XTZDrMdHNeVEQQ4SFPwCNSVT9Q
CitedBy_id crossref_primary_10_3390_jsan12020019
crossref_primary_10_1108_TQM_07_2024_0233
crossref_primary_10_4304_jnw_7_5_863_868
crossref_primary_10_4304_jnw_8_5_1138_1145
crossref_primary_10_3390_s18061691
crossref_primary_10_7896_j_1109
crossref_primary_10_1109_TGCN_2021_3091388
crossref_primary_10_1109_TMC_2018_2883451
ContentType Journal Article
Copyright 2010. This work is published under http://creativecommons.org/licenses/by-nc/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: 2010. This work is published under http://creativecommons.org/licenses/by-nc/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID 8FE
8FG
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
P5Z
P62
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
ADTOC
UNPAY
DOI 10.15837/ijccc.2010.2.2471
DatabaseName ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Central
Technology Collection
ProQuest One Community College
ProQuest Central
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
ProQuest Advanced Technologies & Aerospace Database (NC LIVE)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
Unpaywall for CDI: Periodical Content
Unpaywall
DatabaseTitle Publicly Available Content Database
Advanced Technologies & Aerospace Collection
Computer Science Database
ProQuest Central Student
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
ProQuest One Academic Eastern Edition
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Central China
ProQuest Central
Advanced Technologies & Aerospace Database
ProQuest One Applied & Life Sciences
ProQuest One Academic UKI Edition
ProQuest Central Korea
ProQuest Central (New)
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList Publicly Available Content Database
Database_xml – sequence: 1
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
– sequence: 2
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1841-9844
ExternalDocumentID 10.15837/ijccc.2010.2.2471
GroupedDBID .4S
.DC
29J
2WC
5GY
8FE
8FG
AAKPC
ABUWG
ACIPV
ADBBV
AENEX
AFKRA
ALMA_UNASSIGNED_HOLDINGS
ARAPS
ARCSS
AZQEC
BCNDV
BENPR
BGLVJ
CCPQU
DWQXO
E3Z
EDO
EOJEC
GNUQQ
GROUPED_DOAJ
HCIFZ
ITG
ITH
JQ2
K7-
MK~
ML~
M~E
OBODZ
OK1
OVT
P62
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
TR2
TUS
ADTOC
UNPAY
ID FETCH-LOGICAL-c319t-743f28676fe2c79384aaf1775707d8e5b5fcd68eaa2d0e6dd6aae633d14d7f033
IEDL.DBID UNPAY
ISSN 1841-9836
1841-9844
IngestDate Tue Aug 19 18:02:50 EDT 2025
Sun Jul 13 04:35:34 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 2
Language English
License cc-by-nc
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c319t-743f28676fe2c79384aaf1775707d8e5b5fcd68eaa2d0e6dd6aae633d14d7f033
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
OpenAccessLink https://proxy.k.utb.cz/login?url=https://univagora.ro/jour/index.php/ijccc/article/download/2471/938
PQID 2518393738
PQPubID 5045567
ParticipantIDs unpaywall_primary_10_15837_ijccc_2010_2_2471
proquest_journals_2518393738
PublicationCentury 2000
PublicationDate 2010-06-01
PublicationDateYYYYMMDD 2010-06-01
PublicationDate_xml – month: 06
  year: 2010
  text: 2010-06-01
  day: 01
PublicationDecade 2010
PublicationPlace Oradea
PublicationPlace_xml – name: Oradea
PublicationTitle International journal of computers, communications & control
PublicationYear 2010
Publisher Agora University of Oradea
Publisher_xml – name: Agora University of Oradea
SSID ssj0000328075
ssib032305687
Score 1.8729978
Snippet Intrusion detection is used to monitor and capture intrusions into computer and network systems which attempt to compromise their security. Many intrusions...
SourceID unpaywall
proquest
SourceType Open Access Repository
Aggregation Database
StartPage 160
SubjectTerms Algorithms
Computer networks
Control charts
Control limits
Optimization
SummonAdditionalLinks – databaseName: ProQuest Central
  dbid: BENPR
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1bS8MwFA5zPuiLd3E6pYiPxrVpmqQPIlM2hrAyxOHeSpqLTmY3tUP89yZt6uXFPxDId3JuOed8B4AzKhXRWMdQMx1BnGkfxpwTo3iKcYwzyUtKoWFCBmN8O4kmDZDUszC2rbK2iaWhlnNh_8g7xg8zS94WsqvFK7Rbo2x1tV6hwd1qBXlZUoytgFVkmbGaYPW6l4zu6hcWIhsxu4CktNUhcmy8JtMJYMxsLbOcrIlM5taZPgshqv4vdIEwDf7EoWvLfME_P_hs9ssl9bfAhoslvW4l_G3QUPkO2Kz3NHhObXfBae9h2PW6s0dzn-LpxZvmXlJ1f3sjNyS1B8b93v3NALrdCFAYpSmgcfwaMUKJVkgYHWOYcx1QGlGfSqaiLNJCEqY4R9JXRErCuSJhKAMsqfbDcB8083muDoDnx1rb4qifEYFFTDmOsNZSYqlMPEbiFmjXd07dA39Pf8TRAuffOKSLiiIjtamFRTAtEUwtgilKLYKH_592BNar-rz952iDZvG2VMfG7RfZiZPlF1OUqMI
  priority: 102
  providerName: ProQuest
Title EWMA Algorithm in Network Practice
URI https://www.proquest.com/docview/2518393738
https://univagora.ro/jour/index.php/ijccc/article/download/2471/938
UnpaywallVersion publishedVersion
Volume 5
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 1841-9844
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000328075
  issn: 1841-9844
  databaseCode: DOA
  dateStart: 20060101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 1841-9844
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000328075
  issn: 1841-9844
  databaseCode: M~E
  dateStart: 20060101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 1841-9844
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000328075
  issn: 1841-9844
  databaseCode: BENPR
  dateStart: 20060301
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3PT8IwFH4ROOhF_BlRJIvx6NjYuq47IgGJCYQYiXpauv5QFAfBodG_3nYrRr0Zbzs0Xfu1b_3e-t73AE5DLrBEMrIlkYGNEunaEaVYGZ4gFKGE01xSaDDE_TG6vA1u16CzyoVZppNXeq9m31zMHA2nk6sGaqkIZ_LIGHMMog7XYvIzyh1PfV-dyCclqOBAEfIyVMbDUftOu1oEteyI5IUCzTNCJnUmUK5Z0WUR4OU1dUc_iOb6Mp3T9zc6nX47c3pV4KvRFqEmT81lljTZxy8hx39OZws2DSe12kWbbVgT6Q5UV_UeLGP-u3DSvRm0rfZUvWmSPTxbk9QaFlHk1sgkW-3BuNe97vRtU2PBZsr4MlsRCOkRHGIpPKZslSBKZSsMg9ANORFBEkjGMRGUetwVmHNMqcC-z1uIh9L1_X0op7NUHIDlRlLqS1Y3wQyxKKQoQFJyjrhQvA5HNaivoI2NobzEil4RrcnnkxqcfcEdzwupjVi7KHqh4hysWC9U7MUaosO_NT-CjeLeX_8_qUM5WyzFsaITWdKAEuldNKBy3h2Orhq5U94wW-gTh9DNdg
linkProvider Unpaywall
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3JTsMwELUQHODCjlgKRAhuhKaOYzuHChUoKtBWFWpFb8bxwqKSFmiF-Dm-DTtxWC7c-IFIeTOeebMDsE-kwhrp2NdURz5KdODHnGPz8BTlCCWSZyuFWm3c6KHLftSfAh_FLIxtqyxsYmao5VDYHHnZ-GFql7eF9Hj07NurUba6WpzQ4O60gqxmK8bcYMeVen8zIdxr9eLMyPsAwvN697ThuysDvjDqN_aNC9WQYoK1gsJoK0Wc6wohEQmIpCpKIi0kpopzKAOFpcScKxyGsoIk0YFNiBoXMINCFJvgb-ak3u5cFxodQsvQHQHKfEMI3fZfE1lV_Jja2mk2yROZSLH88CiEyPvN4BFEpPKL985O0hF_f-ODwQ8XeL4I5h139Wq5si2BKZUug4XiLoTnzMQK2KvftGpebXBn8BvfP3kPqdfOu829jhvKWgW9f0FpDUynw1StAy-ItbbF2CDBAomYcBQhraVEUhn-h-MNUCr-mbkH9cq-xb8BDr9wYKN8JQezoYxFkGUIMosgg8wiuPn313bBbKPbarLmRftqC8zlvQE2x1IC0-OXido2lGOc7Di5euD2v1XpE69i5mg
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV07T8MwED6VMsBCeYpCQRFiJI8mjuOMVdWqQmrVgYoyRY4fUChpVRIQ_HrsxkHAhtgyWI792Rd_F999B3AZcYElkrEtiQxtlErPjinFyvAEoQilnK4lhYYjPJig62k4rUG3yoUpstkrvVezd1YLV8PprlUDtVSEO3tkjLkGUZdrMfkF5a6vvq9uHJAN2MShIuR12JyMxp077WoR1LZjsi4UaJ4RMqkzoXLNyi7LAC_f0R39IJpbRbak7290Pv925vQbwKvRlqEmT06Rpw77-CXk-M_p7MKO4aRWp2yzBzWR7UOjqvdgGfM_gIve7bBjdebqTbP84dmaZdaojCK3xibZ6hAm_d5Nd2CbGgs2U8aX24pASJ_gCEvhM2WrBFEq21EURl7EiQjTUDKOiaDU557AnGNKBQ4C3kY8kl4QHEE9W2TiGCwvllJfsnopZojFEUUhkpJzxIXidThuQquCNjGG8pIoekW0Jl9AmnD1BXeyLKU2Eu2i6IVK1mAleqESP9EQnfyt-Slsl_f--v9JC-r5qhBnik7k6bnZLp-kxsoB
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=EWMA+Algorithm+in+Network+Practice&rft.jtitle=International+journal+of+computers%2C+communications+%26+control&rft.au=Cisar%2C+Petar&rft.au=Bo%C5%A1njak%2C+Sa%C5%A1a&rft.au=Cisar%2C+Sanja+Maravic&rft.date=2010-06-01&rft.pub=Agora+University+of+Oradea&rft.issn=1841-9836&rft.eissn=1841-9844&rft.volume=5&rft.issue=2&rft.spage=160&rft_id=info:doi/10.15837%2Fijccc.2010.2.2471
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1841-9836&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1841-9836&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1841-9836&client=summon