<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Machine Learning Detection of DDoS Attacks Based on Visualization of Recurrence Plots</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Lyudmyla Kirichenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Petro Zinchenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tamara Radivilova</string-name>
          <email>tamara.radivilova@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>ksym T</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Kharkiv National University of Radio Electronics</institution>
          ,
          <addr-line>Kharkiv, 14 ave.Nauki</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The article considers a new method of detecting DDoS attacks based on the construction of recurrence plots. Time traffic realization is transformed into a matrix consisting of 0 and 1, which characterizes the recurrence of the realization. The matrix is presented in the form of a black-and-white image. Then the residual neural network is used to classify images. This approach is used to detect the realizations of the attacked network traffic. The results showed that the proposed method has a sufficiently high accuracy of classification and can be used to detect attacks in intrusion detection systems.</p>
      </abstract>
      <kwd-group>
        <kwd>fractal time series</kwd>
        <kwd>machine learning classification</kwd>
        <kwd>recurrence plot</kwd>
        <kwd>DDoS-attack</kwd>
        <kwd>data traffic</kwd>
        <kwd>deep residual networks</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        Attack detection is the process of monitoring events occurring in a computer
system to detect signs of possible unauthorized access to the network. Time series
models play an important role in the study of system behavior models for detecting attacks
such as Distributed Denial of Service (DDoS), Detecting Account Takeover (ATO),
Data Exfiltration [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4">1-4</xref>
        ]. They are successfully used for classification and forecasting,
which are performed by methods of machine learning [
        <xref ref-type="bibr" rid="ref5 ref6 ref7">5-7</xref>
        ].
      </p>
      <p>
        Inbound traffic modeling uses flow-related data at layers 4 and 7 of the OSI
network model, which is analogous to DDoS attacks. The resulting model attacks are
superimposed on real untreated traffic to determine the key points of intrusion
warning creation [
        <xref ref-type="bibr" rid="ref8 ref9">8,9</xref>
        ].
      </p>
      <p>In recent years, machine learning methods have been used to analyze and classify
time series. One of the solutions to the problem of timely attack detection is to
develop a classifier based on machine learning, which would determine whether the
incoming traffic is under attack.</p>
      <p>
        The task of time series classification, which includes the attacked traffic detection,
is one of the most complex tasks of machine learning. Several approaches to time
series classification are known, most of which are based on calculation of statistical
characteristics of time series or calculation of different metrics between time series
[
        <xref ref-type="bibr" rid="ref10 ref11">10,11</xref>
        ].
      </p>
      <p>
        In recent years, a number of works have appeared in which the approach on the
basis of the recurrence analysis, which was originally proposed in [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] and further
developed in [
        <xref ref-type="bibr" rid="ref13 ref14">13, 14</xref>
        ], is used to classify time series by machine learning methods. With
the development of machine learning methods, the characteristics obtained from the
recurrence plots were used as characteristics for classification tasks [
        <xref ref-type="bibr" rid="ref15 ref16">15, 16</xref>
        ].
      </p>
      <p>
        The recurrence plot method is based on the repeatability of time series states
(recurrence). Recurrence properties of time series are represented in the form of a matrix
with a certain geometric structure, which can be visualized and classified by images
of recurrence plots [
        <xref ref-type="bibr" rid="ref17">17,18</xref>
        ].
      </p>
      <p>The purpose of this article is a comparative analysis of the DDoS attacks detection
with the help of machine learning methods, based on the visualization of recurrence
plots.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Time series classification using recurrence plots</title>
      <p>The recurrence plot method is based on the fact that by building a phase trajectory
based on only one variable of the system it is possible to restore the topology of the
full phase trajectory, as in the case of all system components. This approach was
proposed in [19]. The method of attractor reconstruction by one time realization
(Packard-Tackens procedure) is the basis of almost all time series analysis algorithms by
nonlinear dynamics methods:
xi  ui ,ui ,...,ui(m1)  ,
(1)
where xi is the value of the phase trajectory x at the moment i, ui is the value of
some component of the system u at the moment i, m is the embedding dimension of
the phase space,  is the time delay.</p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] a way of displaying the m -dimensional phase trajectory of a system's
states x t  in length N on a binary matrix of the size N  N in which the value of 1
corresponds to the repeating of the state at some other time i at some other time j, and
the coordinate axes of the matrix are the time axes was proposed. Such matrix
(recurrence plot) records information about recurrence behavior of the system.
      </p>
      <p>Thus, recurrence is defined as a sufficient proximity of the state x j to the
state xi : recurrent are the states x j that fall into the m -dimensional neighborhood
with a radius  of the point xi .</p>
      <p>Let the point xi correspond to the point of the phase trajectory describing the
dynamic system represented by the time series x(t) in m -dimensional space at the
moment of time t  i for i = 1,…,N. Then the recurrence plot RP is an array of points
where a non-zero element with coordinates (i, j) corresponds to the case when the
distance between x j and xi is smaller  :</p>
      <p>RPi, j  ( || xi  xj ||), xi , xJ  Rm , i, j  1,...N,
where  is the size of the neighborhood of xi , xi  xj is the distance between the
points, () - the Heaviside function.</p>
      <p>
        Recurrence plots can be represented in black and white. In this case, the recurrence
of the state at the moment i at different values of time j is reproduced inside the
twodimensional square matrix with black and white dots, where black dots indicate the
presence of recurrence. Fig. 1 above shows the time realization of a sinusoid (left) and
a noisy sinusoid (right). The bottom part of Fig. 1 shows the recurrence plots
corresponding to these time realizations.
The analysis of the recurrence plots topology allows to classify observed processes: to
define homogeneous processes with independent random values; processes with
slowly changing parameters; periodic or oscillating processes corresponding to nonlinear
systems, etc. It has been shown in [
        <xref ref-type="bibr" rid="ref6">6, 20</xref>
        ] that changes in the correlation structure of
the time series cause changes in the topology of the corresponding recurrence plot.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Simulation of normal and attacked traffic realizations</title>
      <p>An experiment was carried out to detect DDoS attacks, which was based on a
recurrence plot to identify the attacked traffic. To train traffic classifier it is necessary to
build a training and test sample containing two classes of traffic. In this case, it is
advisable to use modeling to realize normal traffic, and to present the attacked traffic
as the sum of traffic and the realization of the attack.</p>
      <p>It is known that infocommunication traffic has a fractal structure (self-similarity)
and long-term dependence. A number of recent studies have shown that under the
influence of an attack, traffic changes its self-similar properties and correlation
dependencies [21-26]. Therefore, a model based on the self-similarity property was
chosen to generate traffic. In work [27] the model of fractal traffic which is generated
on the basis of fractal Brownian motion was offered.</p>
      <p>Fractal Brownian motion is the most known and simple model of fractal process,
which has the only parameter of scaling Hurst index H . The increments of fractal
Brownian motion are the Gaussian stationary process with a long-term correlation
dependence.</p>
      <p>The fractal traffic model is an exponential transformation of a series of fractal
Brownian increments</p>
      <p>Y (t)  Exp[k * X (t)] ,
(2)
where X (t) is a time series of fractal Brownian motion increments with discrete time
with given Hurst index H , k is some coefficient determining the coefficient of series
variation Y (t) , i.e. the bursts value in realization. Thus, using (2) we obtain the traffic
realization with a given degree of long-term dependence determined by the index H
and bursts determined by the coefficient k .</p>
      <p>Fig.2 shows two model traffic realization with the same Hurst value and different
coefficient values k . Both realizations have the same average value, but different
degrees of bursts: the upper realization has a maximum burst value of up to 80 and the
lower realization has a maximum value of up to 200.</p>
      <p>In order to simulate the attacks realizations, the data set described in detail in [28] was
used. This work presents the mechanism of collecting real statistical data of
SNMPMIB and their usage. There were conducted real experiments in which there were six
types of DoS-attacks and Brute Force attacks. The traffic data were collected from the
SNMP agent. The data set consists of 4998 records, where each record consists of 34
MIB variables that are classified into corresponding groups, namely: interface, IP,
TCP and ICMP. The figure 3 shows some of the attack realizations used to model the
attacked traffic.</p>
      <p>Various model attacked traffic realizations can be obtained by summing up the traffic
and attack realizations and varying the attack level</p>
      <p>TA (t)  T (t)  A(t) *levelA ,
(3)
where T (t) is the traffic realization received in accordance with the transformation
(2), A(t) is the attack realization taken from the data set [28], A(t) is the attack level
obtained by the ratio of the average value of the attack realization to the traffic
realization:
levelA </p>
      <p>A(t) .</p>
      <p>T (t)</p>
      <p>Fig. 4 above shows the traffic and attack realization (the attack is shown in a
different color) and below the attacked traffic realization with the attack level levelA  30%
with the length of 250 values.</p>
    </sec>
    <sec id="sec-4">
      <title>Neural networks for image classification</title>
      <p>Computer vision technologies are very common. Due to the growth of computing
power and the emergence of major image bases it has become possible to use deep
neural networks. The best results in the field of image recognition are shown by the
Convolutional Neural Network [29, 30]. Their success is conditioned by the
possibility of taking into account two-dimensional image topology, as opposed to multilayer
perceptron.</p>
      <p>Deep convolution neural networks extract low, medium and high level signs
through multilayer method. It is logical to assume that if the number of layers is
increased, thus increasing the number of features, the quality of recognition will
improve. However, studies have shown that this is a problem: as the depth of the
network increases, accuracy increases first and then rapidly decreases. One of the
reasons for the decline in learning accuracy is the attenuation of the gradient.</p>
      <p>Since convolution networks are trained by the method of error back propagation,
the error on the last layer is first calculated then on the second-to-last layer and so on.
Gradients on the output layer are easily calculated and significant changes in the
neuronal weights of the output layer are obtained. For any hidden layer it is necessary to
accumulate errors of all following layers. The value of the weight gradient of a deeper
layer neuron is proportional to the value of the derivative of the activation function at
the point obtained at the direct pass. And as a consequence, the error decreases by
about 10 times every 3-4 layers, and if the network is deep enough, the layers that are
closer to the beginning are poorly trained or not at all trained.</p>
      <p>To overcome this problem, a deep residual network structure has been proposed,
the main idea of which is to use a quick-access connection instead of a conventional
serial layer connection [31, 32].</p>
      <p>Quick access connections skip one or more layers and do the identification
matching. Their outputs are added to the outputs of grouped layers. The main network block
consists of two layers with weights, not necessarily a convolution and a quick access
connection that simply transmits the input signal to the output. The connection
diagram is shown in Fig. 5.</p>
    </sec>
    <sec id="sec-5">
      <title>Experiment description and results</title>
      <p>The experiment used a residual neural network consisting of ten blocks, 3 convolution
layers and one full-connected layer. The output of the last full-connected layer is
input to the logistic function, which performs the distribution into 2 classes. Neurons in
the full-connected layer are connected with all neurons in the previous layer.
Subsample layers follow the second and third convolution layers. Nonlinearity of ReLU is
applied to the output of each convolution and full-connected layer.</p>
      <p>The first convolution layer filters the input image with a size of 249×249 pixels
and 32 cores with a size of 3×3. The second convolution level takes the output of the
first convolution layer as the input data and filters it with 64 cores of 3×3 size. This is
followed by a sub-sampling layer. Next come 5 residual blocks with convolutions of
64 cores of 3x3 size. The third convolution layer has 128 cores of 3×3 size, followed
by the sub-sampling layer. Next, there are 5 residual blocks with 128 cores of 3x3 size
convolutions. The output of the last block is transferred to the global subsample layer.
After the sub-sampling layer, a full-connected layer of 256 neurons follows. Adam, an
adaptive learning rate optimization algorithm, was used for network learning.</p>
      <p>Two samples were generated each time for the classification: a training sample and
a test sample. Both samples contained realizations of two classes: attacked and
nonattacked traffic. The model traffic was built on the basis of exponential transformation
(2). In the case of an attack, one of a DDoS-attack realization from the data set [28]
was added to the traffic by formula (3).</p>
      <p>At the input of the classifier, recurrence plots calculated on the basis of traffic
realizations were applied. The output data were values 1 or 0: presence or absence of
DDoS-attack in time series of traffic. Fig.6 shows the recurrence plots corresponding
to the normal (top) and attacked (bottom) traffic, which are shown in Fig.4.</p>
      <p>Classification was performed for all types of DDoS attacks at once when the
following parameters were changed:
─ Hurst index for model traffic, that varied from 0.6 to 0.9;
─ the level of bursts for model traffic, i.e. the coefficient of variation, that varied
in the range from 3 to 14;</p>
      <p>─ level of attack, that was selected 20, 30 and 40%.</p>
      <p>To implement the classification methods, the Python language was used, with
libraries that implement machine learning methods. The experiments were carried out using
the free Colaboratory platform, which allows you to access powerful computing
resources, does not require any customization and is fully functional in the cloud.</p>
      <p>Numerical experiments were conducted for model traffic of different lengths and 6
variants of DDoS attacks. Below are the results for time series of 250 values, which is
enough for processing data in real time.</p>
      <p>As expected, the experiment confirmed that the probability of an attack detecting
depends significantly on the attack level. Table 1 shows the average classification
accuracy depending on the attack level, obtained for the Hurst parameter H =0.8, the
coefficient of variation   7 .</p>
      <p>The classification accuracy values depending on the variation coefficient  are
shown in Table 3. The attack level in this case is 20%, and the values of Hurst H=0.8.
It should be noted that the probability of an attack detection significantly depends on
the coefficient of traffic variation and increases with its increase. This can be
explained by the fact that high values of the variation coefficient correspond to large
bursts, that increases the heterogeneity of recurrence plots and improves image
recognition.</p>
    </sec>
    <sec id="sec-6">
      <title>Conclusion</title>
      <p>The method of detecting DDoS-attacks based on the visualization of recurrence plots
and subsequent images classification was proposed in this paper. The attacked traffic
realization was obtained by summing up the model of traffic and DDoS-attacks
realizations. Residual neural networks were used as a classifier.</p>
      <p>The results have shown that the described method has a rather high classification
accuracy even at a small level of attack. The analysis showed that the accuracy of the
attack detection depends significantly on the self-similarity of the traffic being
attacked: the less self-similar the traffic, the easier it is to detect the attack. The
probability of intrusion detection also depends on the heterogeneity of the traffic: the higher
the amount of bursts, the higher the accuracy of the attack detection.</p>
      <p>Our future research will focus on building and training a neural network to detect
different types of attacks using real-world traffic data sets.
18. Hatami, N., Gavet, Y., Debayle, J.: Classification of Time-Series Images Using Deep</p>
      <p>Convolutional Neural Networks, https://arxiv.org/abs/1710.00886 last accessed 2019/10/20
19. Takens, F., Rand, D.A., Young, L.-S.: Detecting strange attractors in turbulence.
Dynamical Systems and Turbulence: Lecture Notes in Mathematics, Springer-Verlag 898, 366–
381 (1981).
20. Kirichenko, L.O., Kobitskaya, Y., Habacheva, A.: Comparative Analysis of the
Complexity of Chaotic and Stochastic Time Series. Radioelectronics 2(31), 126-134 (2014).
21. Popa, S.M., Manea, G.M.: Using Traffic Self-Similarity for Network Anomalies
Detection. 20-th International Conference on Control Systems and Computer Science
Proceedings, pp. 639-644. IEEE (2015). doi: 10.1109/CSCS.2015.89
22. Kaur, G., Saxena, V., Gupta, J.: Detection of TCP targeted high bandwidth attacks using
self-similarity. Journal of King Saud University - Computer and Information Sciences
(2017). https://doi.org/10.1016/j.jksuci.2017.05.004
23. Deka, R., Bhattacharyya, D.: Self-similarity based DDoS attack detection using Hurst
parameter. Security and Communication Networks 9(17), 4468-4481 (2016). doi:
https://doi.org/10.1002/sec.1639
24. Kirichenko, L., Radivilova, T., Bulakh, V.: Machine Learning in Classification Time
Series with Fractal Properties. Data 4(1) 5, 1-13 (2019). doi:10.3390/data4010005
25. Kirichenko, L., Radivilova T., Bulakh V.: Binary Classification of Fractal Time Series by
Machine Learning Methods. In: Lecture Notes in Computational Intelligence and Decision
Making. ISDMCI 2019. Advances in Intelligent Systems and Computing, vol 1020.</p>
      <p>Springer, Cham 701-711 (2020). doi: https://doi.org/10.1007/978-3-030-26474-1_49.
26. Bulakh, V., Kirichenko, L., Radivilova, T.: Time Series Classification Based on Fractal
Properties. 2018 IEEE Second International Conference on Data Stream Mining &amp;
Processing (DSMP) Proceedings, pp. 198-201. (2018). doi: 10.1109/DSMP.2018.8478532
27. Kirichenko, L., Radivilova, T., Alghawli, A. S.: Mathematical simulation of self-similar
network traffic with aimed parameters. Annals Computer Science Sériés 11(1), 17-22
(2013).
28. Al-kasassbeh, M., Al-Naymat, G., Al-Hawari, E.: Towards Generating Realistic
SNMPMIB Dataset for Network Anomaly Detection. International Journal of Computer Science
and Information Security (IJCSIS) 14(9), 1162-1185 (2016).
29. LeCun, Y., Bengio, Y.: Convolutional Networks for Images, Speech, and Time-Series, in Arbib,</p>
      <p>M. A. (Eds), The Handbook of Brain Theory and Neural Networks, MIT Press (1995).
30. Dan, C., Meier, U., Masci, J., Gambardella, L.M., Schmidhuber, J.: Flexible, High
Performance Convolutional Neural Networks for Image Classification. Twenty-Second
International Joint Conference on Artificial Intelligence Proceedings, 2, pp.1237–1242. (2013).
http://people.idsia.ch/~juergen/ijcai2011.pdf last accessed 2019/10/20
31. Fung, V.: An Overview of ResNet and its Variants
https://towardsdatascience.com/anoverview-of-resnet-and-its-variants-5281e2f56035 last accessed 2019/10/20
32. Gao, H., Zhuang, L., Weinberger, K. Q., Laurens, M.: Densely Connected Convolutional</p>
      <p>Networks. arXiv:1608.06993 (2016).
33. Ivanisenko, I., Kirichenko, L., Radivilova, T.: Investigation of self-similar properties of
additive data traffic. 2015 X International Scientific and Technical Conference “Computer
Sciences and Information Technologies” (CSIT) Proceedings, pp. 169–171. IEEE (2015).
doi:10.1109/STC-CSIT.2015.7325459
34. Ivanisenko, I., Kirichenko, L., Radivilova, T.: Investigation of multifractal properties of
additive data stream. 2016 IEEE First International Conference on Data Stream Mining &amp;
Processing (DSMP), pp. 305-308. (2016). doi: 10.1109/DSMP.2016.7583564</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Shipmon</surname>
            ,
            <given-names>D. T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gurevitch</surname>
            ,
            <given-names>J. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Piselli</surname>
            ,
            <given-names>P. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Edwards</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          : Time Series Anomaly Detection:
          <article-title>Detection of Anomalous Drops with Limited Features and Sparse Examples in Noisy Highly Periodic Data</article-title>
          , Google, Inc. Cambridge, MA, USA, pp.
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
          (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Zadeh</surname>
          </string-name>
          , J.:
          <article-title>Time Series Anomaly Detection in Network Traffic: A Use Case for Deep Neural Networks</article-title>
          , https://jask.ai
          <article-title>/time-series-anomaly-detection-in-network-traffic-a-use-casefor-deep-neural-networks</article-title>
          ,
          <source>last accessed</source>
          <year>2019</year>
          /02/11.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Kirichenko</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Radivilova</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Analyzes of the distributed system load with multifractal input data flows</article-title>
          .
          <source>2017 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM) Proceedings</source>
          , pp.
          <fpage>260</fpage>
          -
          <lpage>264</lpage>
          . (
          <year>2017</year>
          ). doi:
          <volume>10</volume>
          .1109/CADSM.
          <year>2017</year>
          .7916130
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Bernacki</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kołaczek</surname>
          </string-name>
          , G.:
          <article-title>Anomaly Detection in Network Traffic Using Selected Methods of Time Series Analysis</article-title>
          .
          <source>I. J. Computer Network and Information Security</source>
          <volume>9</volume>
          ,
          <fpage>10</fpage>
          -
          <lpage>18</lpage>
          (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Bulakh</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kirichenko</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Radivilova</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <article-title>Classification of Multifractal Time Series by Decision Tree Methods</article-title>
          .
          <source>Proceedings of the 14th International Conference on ICT in Education, Research and Industrial Applications. Integration, Harmonization and Knowledge Transfer. Volume I: Main Conference</source>
          <volume>2105</volume>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Radivilova</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kirichenko</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bulakh</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Detection of DDoS-attacks by mashing-lening methods based on fractal properties. Security in cervatury, the social internet space in context values and hazards 1</article-title>
          ,
          <fpage>299</fpage>
          -
          <lpage>315</lpage>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Detecting</surname>
          </string-name>
          <article-title>Anomalies with Moving Median Decomposition</article-title>
          , https://anomaly.io/anomalydetection-moving
          <string-name>
            <surname>-</surname>
          </string-name>
          median-decomposition/,
          <source>last accessed</source>
          <year>2019</year>
          /01/11.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Grubbs</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Procedures for Detecting Outlying Observations in Samples</article-title>
          .
          <source>Technometrics. Technometrics</source>
          <volume>11</volume>
          (
          <issue>1</issue>
          ),
          <fpage>1</fpage>
          -
          <lpage>21</lpage>
          (
          <year>1969</year>
          ).
          <source>doi:10.2307/1266761</source>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Gupta</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Srivastava</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sharma</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Reducing False Positive in Intrusion Detection System: A Survey</article-title>
          .
          <source>International Journal of Computer Science and Information Technologies</source>
          <volume>7</volume>
          (
          <issue>3</issue>
          ),
          <fpage>1600</fpage>
          -
          <lpage>1603</lpage>
          (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Esling</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Agon</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Time series data mining</article-title>
          .
          <source>ACM Computing Surveys</source>
          <volume>46</volume>
          (
          <issue>1</issue>
          ) (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Ben</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Feature-based time-series analysis</article-title>
          , https://arxiv.org/abs/1709.08055 last accessed
          <year>2019</year>
          /10/28.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Eckmann</surname>
            ,
            <given-names>J.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kamphorst</surname>
            ,
            <given-names>S.O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ruelle</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <article-title>Recurrence Plots of Dynamical Systems</article-title>
          .
          <source>EPL (Europhysics Letters)</source>
          <volume>4</volume>
          (
          <issue>9</issue>
          ),
          <fpage>973</fpage>
          -
          <lpage>977</lpage>
          (
          <year>1987</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Marwan</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wessel</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Meyerfeldt</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schirdewan</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kurths</surname>
          </string-name>
          , J.:
          <article-title>Recurrence-plotsbased measures of complexity and application to heart-rate-variability data</article-title>
          .
          <source>Physical Review E</source>
          <volume>66</volume>
          (
          <issue>2</issue>
          ),
          <fpage>026702</fpage>
          -1 - 02
          <lpage>6</lpage>
          (
          <year>2002</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Marwan</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Romano</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thiel</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kurths</surname>
          </string-name>
          , J.:
          <article-title>Recurrence plots for the analysis of complex system</article-title>
          .
          <source>Physics Reports</source>
          <volume>438</volume>
          (
          <issue>5-6</issue>
          ),
          <fpage>237</fpage>
          -
          <lpage>329</lpage>
          (
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Kirichenko</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Radivilova</surname>
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bulakh</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Classification of Fractal Time Series Using Recurrence Plots</article-title>
          . 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and
          <string-name>
            <surname>Technology (PIC S&amp;T) Proceedings</surname>
          </string-name>
          , pp.
          <fpage>719</fpage>
          -
          <lpage>724</lpage>
          . IEEE (
          <year>2018</year>
          ). doi:
          <volume>10</volume>
          .1109/INFOCOMMST.
          <year>2018</year>
          .8632010
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Thilo</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Spiegel</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Albayrak</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          : Time Series Classification using Compressed Recurrence Plots http://www.dailabor.de/fileadmin/Files/Publikationen/Buchdatei/Published.pdf last accessed
          <year>2019</year>
          /10/20
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Hatami</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gavet</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Debayle</surname>
          </string-name>
          , J.:
          <article-title>Bag of Recurrence Patterns Representation for TimeSeries Classification</article-title>
          , https://arxiv.org/abs/
          <year>1803</year>
          .11111v1 last accessed
          <year>2019</year>
          /10/20.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>