{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T17:26:56Z","timestamp":1763141216067},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242701"},{"type":"electronic","value":"9783030242718"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24271-8_51","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T23:19:24Z","timestamp":1563405564000},"page":"576-585","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Web Application-Layer DDoS Attack Detection Based on Generalized Jaccard Similarity and Information Entropy"],"prefix":"10.1007","author":[{"given":"Bo","family":"Li","sequence":"first","affiliation":[]},{"given":"Minghui","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Li","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Ye","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Guifeng","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"issue":"10","key":"51_CR1","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.comcom.2017.03.010","volume":"107","author":"G Somani","year":"2017","unstructured":"Somani, G., Gaur, M.S., Sanghi, D., Conti, M., Buyya, R.: DDoS attacks in cloud computing: issues, taxonomy, and future directions. Comput. Commun. 107(10), 30\u201348 (2017)","journal-title":"Comput. Commun."},{"key":"51_CR2","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.comnet.2016.03.022","volume":"109","author":"G Somani","year":"2016","unstructured":"Somani, G., Gaur, M.S., Sanghi, D., Conti, M.: DDoS attacks in cloud computing: collateral damage to non-targets. Comput. Netw. 109, 157\u2013171 (2016)","journal-title":"Comput. Netw."},{"issue":"2","key":"51_CR3","doi-asserted-by":"crossref","first-page":"297","DOI":"10.32604\/cmc.2018.03808","volume":"57","author":"CF Cheang","year":"2018","unstructured":"Cheang, C.F., Wang, Y.Q., Cai, Z.P., Xu, G.: Multi-VMs intrusion detection for cloud security using Dempster-Shafer Theory. CMC: Comput. Mater. Continua 57(2), 297\u2013306 (2018)","journal-title":"CMC: Comput. Mater. Continua"},{"issue":"3","key":"51_CR4","doi-asserted-by":"crossref","first-page":"589","DOI":"10.32604\/cmc.2018.03820","volume":"57","author":"J Xu","year":"2018","unstructured":"Xu, J., Jiang, Z.H., Wang, A.D., Wang, C., Zhou, F.C.: Dynamic proofs of retrievability based on partitioning-based square root oblivious RAM. CMC: Comput. Mater. Continua 57(3), 589\u2013602 (2018)","journal-title":"CMC: Comput. Mater. Continua"},{"key":"51_CR5","unstructured":"Network Infrastructure Security Report. https:\/\/www.netscout.com\/report\/"},{"key":"51_CR6","unstructured":"Lemon, J.: Resisting SYN flood DDoS attacks with a SYM cache. In: Proceedings of the BSD Conference, pp. 89\u201398. ACM (2002)"},{"key":"51_CR7","unstructured":"Tupakula, U.K., Harajan, V.V.: Counteracting DDoS attacks in multiple ISP domain using routing arbiter architecture. In: Proceedings of the 11th IEEE International Conference on Networks, pp. 155\u2013460. IEEE (2003)"},{"key":"51_CR8","unstructured":"Limwiwatkul, L., Rungsawangr, A.: Distributed denial of service detection using TCP\/IP header and traffic measurement analysis. In: International Symposium on Communications and Information Technology, vol. 1, pp. 605\u2013610. IEEE (2004)"},{"key":"51_CR9","unstructured":"Wang, H., Zhang, D., Shin, K.: Detecting SYN flooding attacks. In: Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, pp. 1530\u20131539. IEEE (2002)"},{"issue":"2","key":"51_CR10","first-page":"250","volume":"15","author":"D-Q Li","year":"2004","unstructured":"Li, D.-Q., Su, P.-R., Feng, D.G.: Notes on packet marking for IP traceback. J. Softw. 15(2), 250\u2013258 (2004)","journal-title":"J. Softw."},{"issue":"3","key":"51_CR11","first-page":"338","volume":"33","author":"L Zhou","year":"2015","unstructured":"Zhou, L., Yu, X., Wei, Z.: Optimized detection algorithm for network intrusion based on the glowworm swarm algorithm. J. Jilin Univ. (Inf. Sci. Ed.) 33(3), 338\u2013343 (2015)","journal-title":"J. Jilin Univ. (Inf. Sci. Ed.)"},{"issue":"8","key":"51_CR12","first-page":"190","volume":"18","author":"H Zheng","year":"2009","unstructured":"Zheng, H., Wu, Z.: User\u2019s abnormal behavior detection model. Comput. Syst. Appl. 18(8), 190\u2013192 (2009)","journal-title":"Comput. Syst. Appl."}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24271-8_51","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T10:27:09Z","timestamp":1695032829000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24271-8_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242701","9783030242718"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24271-8_51","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}