{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:30:55Z","timestamp":1742988655239,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030190859"},{"type":"electronic","value":"9783030190866"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-19086-6_23","type":"book-chapter","created":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T18:09:24Z","timestamp":1557598164000},"page":"204-213","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["DDoS Attack Detection Based on RBFNN in SDN"],"prefix":"10.1007","author":[{"given":"Jingmei","family":"Li","sequence":"first","affiliation":[]},{"given":"Mengqi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jiaxiang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,12]]},"reference":[{"key":"23_CR1","unstructured":"Santanna, J.J., van Rijswijk-Deij, R., Hofstede, R., et al.: Booters\u2014an analysis of DDoS-as-a-service attacks. In: IFIP\/IEEE International Symposium on Integrated Network Management, pp. 243\u2013251. IEEE (2017)"},{"issue":"4","key":"23_CR2","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/2534169.2491193","volume":"43","author":"A Dixit","year":"2017","unstructured":"Dixit, A., Hao, F., Mukherjee, S., et al.: ElastiCon; an elastic distributed SDN controller. Comput. Commun. Rev. 43(4), 7\u201312 (2017)","journal-title":"Comput. Commun. Rev."},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Cohen, R., Lewin-Eytan, L., Naor, J.S., Raz, D.: On the effect of forwarding table size on SDN network utilization. In: Proceedings of the 33rd IEEE International Conference on Computer Communications, pp.1734\u20131742 (2014)","DOI":"10.1109\/INFOCOM.2014.6848111"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Wang, X., Zhuang, L., Hu, Y., et al.: DDoS attack detection based on BPNN in software defined networks. J. Comput. Appl. (2018)","DOI":"10.1155\/2018\/9804061"},{"issue":"1","key":"23_CR5","first-page":"84","volume":"35","author":"X Fu","year":"2015","unstructured":"Fu, X., Junqing, M., Xunsong, H., et al.: DDoS attack detection based on KNN in software defined networks. J. Nanjing Univ. Posts Telecommun. (Nat. Sci. Ed.) 35(1), 84\u201388 (2015)","journal-title":"J. Nanjing Univ. Posts Telecommun. (Nat. Sci. Ed.)"},{"key":"23_CR6","first-page":"75","volume":"5","author":"Y Shu","year":"2016","unstructured":"Shu, Y., Mei, M., Huang, W., et al.: Study on DDoS attack detection based on conditional entropy in SDN environment. Wirel. Internet Technol. 5, 75\u201376 (2016)","journal-title":"Wirel. Internet Technol."},{"key":"23_CR7","first-page":"63","volume":"1","author":"Z Han","year":"2017","unstructured":"Han, Z.: An entropy-based detection of DDoS attacks in SDN. Inf. Technol. 1, 63\u201366 (2017)","journal-title":"Inf. Technol."},{"key":"23_CR8","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1016\/j.asoc.2016.07.037","volume":"48","author":"W Jia","year":"2016","unstructured":"Jia, W., Zhao, D., Ding, L.: An optimized RBF neural network algorithm based on partial least squares and genetic algorithm for classification of small sample. Appl. Soft Comput. 48, 373\u2013384 (2016)","journal-title":"Appl. Soft Comput."},{"issue":"1","key":"23_CR9","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1109\/COMST.2015.2487361","volume":"18","author":"Q Yan","year":"2016","unstructured":"Yan, Q., Yu, F.R., Gong, Q., et al.: Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: a survey, some research issues, and challenges. IEEE Commun. Surv. Tutor. 18(1), 602\u2013622 (2016)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"99","key":"23_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ACCESS.2017.2688460","volume":"PP","author":"A Sahi","year":"2017","unstructured":"Sahi, A., Lai, D., Li, Y., et al.: An efficient DDoS TCP flood attack detection and prevention system in a cloud environment. IEEE Access PP(99), 1 (2017)","journal-title":"IEEE Access"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Advanced Hybrid Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-19086-6_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T09:07:38Z","timestamp":1562749658000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-19086-6_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030190859","9783030190866"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-19086-6_23","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"12 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ADHIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Hybrid Information Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Yiyang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adhip2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/adhip2018.eai-conferences.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}