{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T04:23:35Z","timestamp":1760502215294},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030243043"},{"type":"electronic","value":"9783030243050"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24305-0_45","type":"book-chapter","created":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T12:02:51Z","timestamp":1561723371000},"page":"611-621","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Software Defined Machine Learning Based Anomaly Detection in Fog Based IoT Network"],"prefix":"10.1007","author":[{"given":"Qaisar","family":"Shafi","sequence":"first","affiliation":[]},{"given":"Saad","family":"Qaisar","sequence":"additional","affiliation":[]},{"given":"Abdul","family":"Basit","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,29]]},"reference":[{"key":"45_CR1","doi-asserted-by":"publisher","first-page":"73713","DOI":"10.1109\/ACCESS.2018.2884293","volume":"6","author":"Q Shafi","year":"2018","unstructured":"Shafi, Q., Basit, A., Qaisar, S., Koay, A., Welch, I.: Fog-assisted SDN controlled framework for enduring anomaly detection in an IoT network. IEEE Access 6, 73713\u201373723 (2018)","journal-title":"IEEE Access"},{"key":"45_CR2","doi-asserted-by":"crossref","unstructured":"Salahuddin, M.A., Al-Fuqaha, A., Guizani, M., Shuaib, K., Sallabi, F.: Softwarization of internet of things infrastructure for secure and smart healthcare.: arXiv preprint \n                      arXiv:1805.11011\n                      \n                     (2018)","DOI":"10.1109\/MC.2017.195"},{"issue":"3","key":"45_CR3","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1109\/SURV.2014.012214.00180","volume":"16","author":"BAA Nunes","year":"2014","unstructured":"Nunes, B.A.A., Mendonca, M., Nguyen, X.-N., Obraczka, K., Turletti, T.: A survey of software-defined networking: past, present, and future of programmable networks. IEEE Commun. Surv. Tutorials 16(3), 1617\u20131634 (2014)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"4","key":"45_CR4","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A-F Ala","year":"2015","unstructured":"Ala, A.-F., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutorials 17(4), 2347\u20132376 (2015)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"1","key":"45_CR5","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/JPROC.2014.2371999","volume":"103","author":"D Kreutz","year":"2015","unstructured":"Kreutz, D., Ramos, F.M.V., Verissimo, P., Rothenberg, C.E., Azodolmolky, S., Uhlig, S.: Software-defined networking: a comprehensive survey. Proc. IEEE 103(1), 14\u201376 (2015)","journal-title":"Proc. IEEE"},{"key":"45_CR6","doi-asserted-by":"crossref","unstructured":"Koay, A., Chen, A., Welch, I., Seah, W.K.G.: A new multi classifier system using entropy-based features in DDoS attack detection. In: 2018 International Conference on Information Networking (ICOIN), pp. 162\u2013167 (2018)","DOI":"10.1109\/ICOIN.2018.8343104"},{"key":"45_CR7","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1016\/j.ins.2016.02.023","volume":"348","author":"MH Bhuyan","year":"2016","unstructured":"Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: A multi-step outlier-based anomaly detection approach to network-wide traffic. Inf. Sci. 348, 243\u2013271 (2016)","journal-title":"Inf. Sci."},{"issue":"2","key":"45_CR8","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/s13369-017-2414-5","volume":"42","author":"NZ Bawany","year":"2017","unstructured":"Bawany, N.Z., Shamsi, J.A., Salah, K.: DDoS attack detection and mitigation using SDN: methods, practices, and solutions. Arab. J. Sci. Eng. 42(2), 425\u2013441 (2017)","journal-title":"Arab. J. Sci. Eng."},{"key":"45_CR9","doi-asserted-by":"crossref","unstructured":"Kamboj, P., Trivedi, M.C., Yadav, V.K., Singh, V.K.: Detection techniques of DDoS attacks: a survey. In: 2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON), pp. 675\u2013679. IEEE (2017)","DOI":"10.1109\/UPCON.2017.8251130"},{"key":"45_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.patrec.2014.07.019","volume":"51","author":"MH Bhuyan","year":"2015","unstructured":"Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection. Pattern Recogn. Lett. 51, 1\u20137 (2015)","journal-title":"Pattern Recogn. Lett."},{"key":"45_CR11","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1109\/COMST.2018.2847722","volume":"21","author":"P Mishra","year":"2018","unstructured":"Mishra, P., Varadharajan, V., Tupakula, U., Pilli, E.S.: A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Commun. Surv. Tutorials 21, 686\u2013728 (2018)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"1","key":"45_CR12","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/COMST.2018.2866942","volume":"21","author":"J Xie","year":"2018","unstructured":"Xie, J., et al.: A survey of machine learning techniques applied to software defined networking (SDN): research issues and challenges. IEEE Commun. Surv. Tutorials 21(1), 393\u2013430 (2018)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"45_CR13","doi-asserted-by":"crossref","unstructured":"Keti, F., Askar, S.: Emulation of software defined networks using mininet in different simulation environments. In: 2015 6th International Conference on Intelligent Systems, Modelling and Simulation, pp. 205\u2013210. IEEE (2015)","DOI":"10.1109\/ISMS.2015.46"},{"key":"45_CR14","doi-asserted-by":"crossref","unstructured":"Tantayakul, K., Dhaou, R., Paillassa, B., Panichpattanakul, W.: Experimental analysis in SDN open source environment. In: 2017 14th International Conference on Electrical Engineering\/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), pp. 334\u2013337. IEEE (2017)","DOI":"10.1109\/ECTICon.2017.8096241"},{"key":"45_CR15","first-page":"1316","volume":"7","author":"S Veena","year":"2014","unstructured":"Veena, S., Pal, C., Rustagi, R.P., Murthy, K.N.B.: A framework for implementing realistic custom network topology in Mininet. Int. J. Sci. Res. (IJSR) 7, 1316\u20131323 (2014)","journal-title":"Int. J. Sci. Res. (IJSR)"},{"key":"45_CR16","unstructured":"Kaur, K., Singh, J., Ghumman, N.S.: Mininet as software defined networking testing platform. In: International Conference on Communication, Computing & Systems (ICCCS), pp. 139\u2013142 (2014)"},{"key":"45_CR17","doi-asserted-by":"crossref","unstructured":"De Oliveira, R.L.S., Schweitzer, C.M., Shinoda, A.A., Prete, L.R.: Using mininet for emulation and prototyping software-defined networks. In: 2014 IEEE Colombian Conference on Communications and Computing (COLCOM), pp. 1\u20136. IEEE (2014)","DOI":"10.1109\/ColComCon.2014.6860404"},{"key":"45_CR18","doi-asserted-by":"crossref","unstructured":"Galluccio, L., Milardo, S., Morabito, G., Palazzo, S.: SDN-WISE: design, prototyping and experimentation of a stateful SDN solution for Wireless Sensor networks. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 513\u2013521. IEEE (2015)","DOI":"10.1109\/INFOCOM.2015.7218418"},{"key":"45_CR19","unstructured":"Dunkels, A., Gronvall, B., Voigt, T.: Contiki-a lightweight and flexible operating system for tiny networked sensors. In: 29th annual IEEE international conference on local computer networks, pp. 455\u2013462. IEEE (2004)"},{"key":"45_CR20","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"issue":"1","key":"45_CR21","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1109\/COMST.2017.2771153","volume":"20","author":"C Mouradian","year":"2018","unstructured":"Mouradian, C., Naboulsi, D., Yangui, S., Glitho, R.H., Morrow, M.J., Polakos, P.A.: A comprehensive survey on fog computing: State-of-the-art and research challenges. IEEE Commun. Surve. Tutorials 20(1), 416\u2013464 (2018)","journal-title":"IEEE Commun. Surve. Tutorials"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24305-0_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T12:29:43Z","timestamp":1561724983000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24305-0_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030243043","9783030243050"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24305-0_45","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"29 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saint Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}