{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:57:28Z","timestamp":1725551848280},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540305101"},{"type":"electronic","value":"9783540322771"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11590354_7","type":"book-chapter","created":{"date-parts":[[2005,11,15]],"date-time":"2005-11-15T11:20:28Z","timestamp":1132053628000},"page":"59-70","source":"Crossref","is-referenced-by-count":3,"title":["SVM Approach with CTNT to Detect DDoS Attacks in Grid Computing"],"prefix":"10.1007","author":[{"given":"Jungtaek","family":"Seo","sequence":"first","affiliation":[]},{"given":"Cheolho","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Taeshik","family":"Shon","sequence":"additional","affiliation":[]},{"given":"Jongsub","family":"Moon","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"7_CR1","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MC.2000.839316","volume":"33","author":"L. Garber","year":"2000","unstructured":"Garber, L.: Denial-of-Service Attacks Rip the Internet. IEEE Computer\u00a033(4), 12\u201317 (2000)","journal-title":"IEEE Computer"},{"key":"7_CR2","unstructured":"Houle, J.K., Weaver, M.G.: Trends in Denial of Service Attack Technology, CERT Coordination Center (2001)"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Moore, D., Voelker, G.M., Savage, S.: Inferring Internet Denial-of-Service Activity. In: Proceedings of the 10th USENIX Symposium, pp. 9\u201322 (2001)","DOI":"10.21236\/ADA400003"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/978-3-540-30208-7_45","volume-title":"Grid and Cooperative Computing - GCC 2004","author":"Y. Xiang","year":"2004","unstructured":"Xiang, Y., Zhou, W.: Protect Grid from DDoS Attacks. In: Jin, H., Pan, Y., Xiao, N., Sun, J. (eds.) GCC 2004. LNCS, vol.\u00a03251, pp. 309\u2013316. Springer, Heidelberg (2004)"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Gil, T.M., Poletto, M.: MULTOPS: a data-structure for bandwidth attack detection. In: Proceedings of the 10th USENIX Security Symposium, pp. 23\u201338 (2001)","DOI":"10.21236\/ADA401819"},{"key":"7_CR6","unstructured":"Kulkarni, A.B., Bush, S.F., Evans, S.C.: Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics. Technical report 2001CRD176, GE Research and Development Center (2001)"},{"issue":"1","key":"7_CR7","first-page":"1530","volume":"21","author":"H. Wang","year":"2002","unstructured":"Wang, H., Zhang, D., Shin, K.G.: Detecting SYN Flooding Attacks. Proceedings of IEEE INFOCOM \u2013 The Conference on Computer Communications\u00a021(1), 1530\u20131539 (2002)","journal-title":"Proceedings of IEEE INFOCOM \u2013 The Conference on Computer Communications"},{"key":"7_CR8","unstructured":"Lee, C., Noh, S., Choi, K., Jung, G.: Characterizing DDoS Attacks with Traffic Rate Analysis. In: Proceedings of the IADIS e-Society, vol.\u00a01, pp. 81\u201388 (2003)"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1007\/978-3-540-45080-1_38","volume-title":"Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2003","author":"S. Noh","year":"2003","unstructured":"Noh, S., Lee, C., Choi, K., Jung, K.: Detecting Distributed Denial of Service (DDoS) Attacks through Inductive Learning. In: Liu, J., Cheung, Y.-m., Yin, H. (eds.) IDEAL 2003. LNCS, vol.\u00a02690, pp. 286\u2013295. Springer, Heidelberg (2003)"},{"key":"7_CR10","unstructured":"Burges. C.: LA Tutorial on Support Vector Machines for Patter Recognition. Data Mining and Knowledge Discovery, Boston (588)"},{"key":"7_CR11","unstructured":"Cristianini, N., Shawe-Taylor, J.: An Introduction to Support Vector Machines, Cambridge University (2000)"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/978-3-540-30207-0_49","volume-title":"Grid and Cooperative Computing - GCC 2004 Workshops","author":"J. Seo","year":"2004","unstructured":"Seo, J., Lee, C., Moon, J.: Defending DDoS Attacks using Network Traffic Analysis and Probabilistic Packet Drop. In: Jin, H., Pan, Y., Xiao, N., Sun, J. (eds.) GCC 2004. LNCS, vol.\u00a03252, pp. 390\u2013397. Springer, Heidelberg (2004)"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/11428862_27","volume-title":"Computational Science \u2013 ICCS 2005","author":"K. Hwang","year":"2005","unstructured":"Hwang, K., Kwok, Y., Song, S.: GridSec: Trusted Grid Computing with Security Binding and Self \u2013defense Against Network Worms and DDoS attacks. In: Sunderam, V.S., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds.) ICCS 2005. LNCS, vol.\u00a03516, pp. 187\u2013195. Springer, Heidelberg (2005)"},{"key":"7_CR14","doi-asserted-by":"crossref","first-page":"506","DOI":"10.1007\/978-1-4757-2606-0","volume-title":"An Introduction to Kolmogorov Complexity and Its Applications","author":"M. Li","year":"1997","unstructured":"Li, M., Vitanyi, P.: An Introduction to Kolmogorov Complexity and Its Applications, pp. 506\u2013509. Springer, Heidelberg (1997); Section 7.6"},{"key":"7_CR15","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/65.298159","volume":"8","author":"V. Paxson","year":"1994","unstructured":"Paxson, V.: Growth Trends in Wide-Area TCP Connections. IEEE Network\u00a08, 8\u201317 (1994)","journal-title":"IEEE Network"},{"key":"7_CR16","unstructured":"Standard Performance Evaluation Corporation. SPECweb99 Benchmark, available on-line: \n                    \n                      http:\/\/www.spec.org\/osg\/web99"},{"key":"7_CR17","unstructured":"Ruping, S.: mySVM \u2013 a Support Vector Machine, University of Dortmund (2004)"},{"key":"7_CR18","unstructured":"Holder, L.: ML v2.0: Machine Learning Program Evaluator. available on-line: \n                    \n                      http:\/\/www-cse.uta.edu\/~holder\/ftp\/ml2.0.tar.gz"},{"key":"7_CR19","unstructured":"Lawrence Berkeley National Labs Network Research Group. Libpcap"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Packet Storm. Tribe Flood Network 2000 (TFN2K) DDoS tool, available on-line: \n                    \n                      http:\/\/packetstormsecurity.org\/distributed\/TFN2k_Analysis-1.3.txt","DOI":"10.1016\/S1353-4858(00)02001-8"}],"container-title":["Lecture Notes in Computer Science","Grid and Cooperative Computing - GCC 2005"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11590354_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T18:13:24Z","timestamp":1558289604000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11590354_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540305101","9783540322771"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/11590354_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}