EWMA Algorithm in Network Practice
Intrusion detection is used to monitor and capture intrusions into computer and network systems which attempt to compromise their security. Many intrusions manifest in changes in the intensity of events occuring in computer networks. Because of the ability of exponentially weighted moving average (E...
        Saved in:
      
    
          | Published in | International journal of computers, communications & control Vol. 5; no. 2; p. 160 | 
|---|---|
| Main Authors | , , | 
| Format | Journal Article | 
| Language | English | 
| Published | 
        Oradea
          Agora University of Oradea
    
        01.06.2010
     | 
| Subjects | |
| Online Access | Get full text | 
| ISSN | 1841-9836 1841-9844 1841-9844  | 
| DOI | 10.15837/ijccc.2010.2.2471 | 
Cover
| Abstract | Intrusion detection is used to monitor and capture intrusions into computer and network systems which attempt to compromise their security. Many intrusions manifest in changes in the intensity of events occuring in computer networks. Because of the ability of exponentially weighted moving average (EWMA) control charts to monitor the rate of occurrences of events based on their intensity, this technique is appropriate for implementation in control limits based algorithms. The paper also gives a review of a possible optimization method. The validation check of results will be performed on authentic network samples. | 
    
|---|---|
| AbstractList | Intrusion detection is used to monitor and capture intrusions into computer and network systems which attempt to compromise their security. Many intrusions manifest in changes in the intensity of events occuring in computer networks. Because of the ability of exponentially weighted moving average (EWMA) control charts to monitor the rate of occurrences of events based on their intensity, this technique is appropriate for implementation in control limits based algorithms. The paper also gives a review of a possible optimization method. The validation check of results will be performed on authentic network samples. | 
    
| Author | Bošnjak, Saša Cisar, Petar Cisar, Sanja Maravic  | 
    
| Author_xml | – sequence: 1 givenname: Petar surname: Cisar fullname: Cisar, Petar – sequence: 2 givenname: Saša surname: Bošnjak fullname: Bošnjak, Saša – sequence: 3 givenname: Sanja surname: Cisar middlename: Maravic fullname: Cisar, Sanja Maravic  | 
    
| BookMark | eNo9j8tOwzAQRS1UJErpD7CKYJ1ge_zKsqrKQyqPBYilZfyAhDQJTqKqf0_aIu5mrkY6oznnaFI3tUfokuCMcAXypiittRnF44JmlElygqZEMZLmirHJfwdxhuZdV-IxQBWWfIquVu-Pi2RRfTax6L82SVEnT77fNvE7eYnG9oX1F-g0mKrz8785Q2-3q9flfbp-vntYLtapBZL3qWQQqBJSBE-tzEExYwKRkkssnfL8gwfrhPLGUIe9cE4Y4wWAI8zJgAFmCI53h7o1u62pKt3GYmPiThOsD6b6YKr3pprqvelIXR-pNjY_g-96XTZDrMdHNeVEQQ4SFPwCNSVT9Q | 
    
| CitedBy_id | crossref_primary_10_3390_jsan12020019 crossref_primary_10_1108_TQM_07_2024_0233 crossref_primary_10_4304_jnw_7_5_863_868 crossref_primary_10_4304_jnw_8_5_1138_1145 crossref_primary_10_3390_s18061691 crossref_primary_10_7896_j_1109 crossref_primary_10_1109_TGCN_2021_3091388 crossref_primary_10_1109_TMC_2018_2883451  | 
    
| ContentType | Journal Article | 
    
| Copyright | 2010. This work is published under http://creativecommons.org/licenses/by-nc/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. | 
    
| Copyright_xml | – notice: 2010. This work is published under http://creativecommons.org/licenses/by-nc/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. | 
    
| DBID | 8FE 8FG ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- P5Z P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS ADTOC UNPAY  | 
    
| DOI | 10.15837/ijccc.2010.2.2471 | 
    
| DatabaseName | ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One Community College ProQuest Central ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database ProQuest Advanced Technologies & Aerospace Database (NC LIVE) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Unpaywall for CDI: Periodical Content Unpaywall  | 
    
| DatabaseTitle | Publicly Available Content Database Advanced Technologies & Aerospace Collection Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest One Academic Eastern Edition ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Technology Collection ProQuest SciTech Collection ProQuest Central China ProQuest Central Advanced Technologies & Aerospace Database ProQuest One Applied & Life Sciences ProQuest One Academic UKI Edition ProQuest Central Korea ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New)  | 
    
| DatabaseTitleList | Publicly Available Content Database | 
    
| Database_xml | – sequence: 1 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository – sequence: 2 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Computer Science | 
    
| EISSN | 1841-9844 | 
    
| ExternalDocumentID | 10.15837/ijccc.2010.2.2471 | 
    
| GroupedDBID | .4S .DC 29J 2WC 5GY 8FE 8FG AAKPC ABUWG ACIPV ADBBV AENEX AFKRA ALMA_UNASSIGNED_HOLDINGS ARAPS ARCSS AZQEC BCNDV BENPR BGLVJ CCPQU DWQXO E3Z EDO EOJEC GNUQQ GROUPED_DOAJ HCIFZ ITG ITH JQ2 K7- MK~ ML~ M~E OBODZ OK1 OVT P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS TR2 TUS ADTOC UNPAY  | 
    
| ID | FETCH-LOGICAL-c319t-743f28676fe2c79384aaf1775707d8e5b5fcd68eaa2d0e6dd6aae633d14d7f033 | 
    
| IEDL.DBID | UNPAY | 
    
| ISSN | 1841-9836 1841-9844  | 
    
| IngestDate | Tue Aug 19 18:02:50 EDT 2025 Sun Jul 13 04:35:34 EDT 2025  | 
    
| IsDoiOpenAccess | true | 
    
| IsOpenAccess | true | 
    
| IsPeerReviewed | true | 
    
| IsScholarly | true | 
    
| Issue | 2 | 
    
| Language | English | 
    
| License | cc-by-nc | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-c319t-743f28676fe2c79384aaf1775707d8e5b5fcd68eaa2d0e6dd6aae633d14d7f033 | 
    
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14  | 
    
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://univagora.ro/jour/index.php/ijccc/article/download/2471/938 | 
    
| PQID | 2518393738 | 
    
| PQPubID | 5045567 | 
    
| ParticipantIDs | unpaywall_primary_10_15837_ijccc_2010_2_2471 proquest_journals_2518393738  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2010-06-01 | 
    
| PublicationDateYYYYMMDD | 2010-06-01 | 
    
| PublicationDate_xml | – month: 06 year: 2010 text: 2010-06-01 day: 01  | 
    
| PublicationDecade | 2010 | 
    
| PublicationPlace | Oradea | 
    
| PublicationPlace_xml | – name: Oradea | 
    
| PublicationTitle | International journal of computers, communications & control | 
    
| PublicationYear | 2010 | 
    
| Publisher | Agora University of Oradea | 
    
| Publisher_xml | – name: Agora University of Oradea | 
    
| SSID | ssj0000328075 ssib032305687  | 
    
| Score | 1.8729978 | 
    
| Snippet | Intrusion detection is used to monitor and capture intrusions into computer and network systems which attempt to compromise their security. Many intrusions... | 
    
| SourceID | unpaywall proquest  | 
    
| SourceType | Open Access Repository Aggregation Database  | 
    
| StartPage | 160 | 
    
| SubjectTerms | Algorithms Computer networks Control charts Control limits Optimization  | 
    
| SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1bS8MwFA5zPuiLd3E6pYiPxrVpmqQPIlM2hrAyxOHeSpqLTmY3tUP89yZt6uXFPxDId3JuOed8B4AzKhXRWMdQMx1BnGkfxpwTo3iKcYwzyUtKoWFCBmN8O4kmDZDUszC2rbK2iaWhlnNh_8g7xg8zS94WsqvFK7Rbo2x1tV6hwd1qBXlZUoytgFVkmbGaYPW6l4zu6hcWIhsxu4CktNUhcmy8JtMJYMxsLbOcrIlM5taZPgshqv4vdIEwDf7EoWvLfME_P_hs9ssl9bfAhoslvW4l_G3QUPkO2Kz3NHhObXfBae9h2PW6s0dzn-LpxZvmXlJ1f3sjNyS1B8b93v3NALrdCFAYpSmgcfwaMUKJVkgYHWOYcx1QGlGfSqaiLNJCEqY4R9JXRErCuSJhKAMsqfbDcB8083muDoDnx1rb4qifEYFFTDmOsNZSYqlMPEbiFmjXd07dA39Pf8TRAuffOKSLiiIjtamFRTAtEUwtgilKLYKH_592BNar-rz952iDZvG2VMfG7RfZiZPlF1OUqMI priority: 102 providerName: ProQuest  | 
    
| Title | EWMA Algorithm in Network Practice | 
    
| URI | https://www.proquest.com/docview/2518393738 https://univagora.ro/jour/index.php/ijccc/article/download/2471/938  | 
    
| UnpaywallVersion | publishedVersion | 
    
| Volume | 5 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 1841-9844 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000328075 issn: 1841-9844 databaseCode: DOA dateStart: 20060101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 1841-9844 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000328075 issn: 1841-9844 databaseCode: M~E dateStart: 20060101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 1841-9844 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000328075 issn: 1841-9844 databaseCode: BENPR dateStart: 20060301 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest  | 
    
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3PT8IwFH4ROOhF_BlRJIvx6NjYuq47IgGJCYQYiXpauv5QFAfBodG_3nYrRr0Zbzs0Xfu1b_3e-t73AE5DLrBEMrIlkYGNEunaEaVYGZ4gFKGE01xSaDDE_TG6vA1u16CzyoVZppNXeq9m31zMHA2nk6sGaqkIZ_LIGHMMog7XYvIzyh1PfV-dyCclqOBAEfIyVMbDUftOu1oEteyI5IUCzTNCJnUmUK5Z0WUR4OU1dUc_iOb6Mp3T9zc6nX47c3pV4KvRFqEmT81lljTZxy8hx39OZws2DSe12kWbbVgT6Q5UV_UeLGP-u3DSvRm0rfZUvWmSPTxbk9QaFlHk1sgkW-3BuNe97vRtU2PBZsr4MlsRCOkRHGIpPKZslSBKZSsMg9ANORFBEkjGMRGUetwVmHNMqcC-z1uIh9L1_X0op7NUHIDlRlLqS1Y3wQyxKKQoQFJyjrhQvA5HNaivoI2NobzEil4RrcnnkxqcfcEdzwupjVi7KHqh4hysWC9U7MUaosO_NT-CjeLeX_8_qUM5WyzFsaITWdKAEuldNKBy3h2Orhq5U94wW-gTh9DNdg | 
    
| linkProvider | Unpaywall | 
    
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3JTsMwELUQHODCjlgKRAhuhKaOYzuHChUoKtBWFWpFb8bxwqKSFmiF-Dm-DTtxWC7c-IFIeTOeebMDsE-kwhrp2NdURz5KdODHnGPz8BTlCCWSZyuFWm3c6KHLftSfAh_FLIxtqyxsYmao5VDYHHnZ-GFql7eF9Hj07NurUba6WpzQ4O60gqxmK8bcYMeVen8zIdxr9eLMyPsAwvN697ThuysDvjDqN_aNC9WQYoK1gsJoK0Wc6wohEQmIpCpKIi0kpopzKAOFpcScKxyGsoIk0YFNiBoXMINCFJvgb-ak3u5cFxodQsvQHQHKfEMI3fZfE1lV_Jja2mk2yROZSLH88CiEyPvN4BFEpPKL985O0hF_f-ODwQ8XeL4I5h139Wq5si2BKZUug4XiLoTnzMQK2KvftGpebXBn8BvfP3kPqdfOu829jhvKWgW9f0FpDUynw1StAy-ItbbF2CDBAomYcBQhraVEUhn-h-MNUCr-mbkH9cq-xb8BDr9wYKN8JQezoYxFkGUIMosgg8wiuPn313bBbKPbarLmRftqC8zlvQE2x1IC0-OXido2lGOc7Di5euD2v1XpE69i5mg | 
    
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV07T8MwED6VMsBCeYpCQRFiJI8mjuOMVdWqQmrVgYoyRY4fUChpVRIQ_HrsxkHAhtgyWI792Rd_F999B3AZcYElkrEtiQxtlErPjinFyvAEoQilnK4lhYYjPJig62k4rUG3yoUpstkrvVezd1YLV8PprlUDtVSEO3tkjLkGUZdrMfkF5a6vvq9uHJAN2MShIuR12JyMxp077WoR1LZjsi4UaJ4RMqkzoXLNyi7LAC_f0R39IJpbRbak7290Pv925vQbwKvRlqEmT06Rpw77-CXk-M_p7MKO4aRWp2yzBzWR7UOjqvdgGfM_gIve7bBjdebqTbP84dmaZdaojCK3xibZ6hAm_d5Nd2CbGgs2U8aX24pASJ_gCEvhM2WrBFEq21EURl7EiQjTUDKOiaDU557AnGNKBQ4C3kY8kl4QHEE9W2TiGCwvllJfsnopZojFEUUhkpJzxIXidThuQquCNjGG8pIoekW0Jl9AmnD1BXeyLKU2Eu2i6IVK1mAleqESP9EQnfyt-Slsl_f--v9JC-r5qhBnik7k6bnZLp-kxsoB | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=EWMA+Algorithm+in+Network+Practice&rft.jtitle=International+journal+of+computers%2C+communications+%26+control&rft.au=Cisar%2C+Petar&rft.au=Bo%C5%A1njak%2C+Sa%C5%A1a&rft.au=Cisar%2C+Sanja+Maravic&rft.date=2010-06-01&rft.pub=Agora+University+of+Oradea&rft.issn=1841-9836&rft.eissn=1841-9844&rft.volume=5&rft.issue=2&rft.spage=160&rft_id=info:doi/10.15837%2Fijccc.2010.2.2471 | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1841-9836&client=summon | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1841-9836&client=summon | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1841-9836&client=summon |