{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T15:30:11Z","timestamp":1744903811627,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030519919"},{"type":"electronic","value":"9783030519926"}],"license":[{"start":{"date-parts":[[2020,8,15]],"date-time":"2020-08-15T00:00:00Z","timestamp":1597449600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,15]],"date-time":"2020-08-15T00:00:00Z","timestamp":1597449600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-51992-6_17","type":"book-chapter","created":{"date-parts":[[2020,8,14]],"date-time":"2020-08-14T16:04:03Z","timestamp":1597421043000},"page":"197-214","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["DDoS Attack Prevention Protocol Through Support Vector Machine and Fuzzy Clustering Mechanism on Traffic Flow with Harmonic Homogeneity Validation Technique"],"prefix":"10.1007","author":[{"given":"Kirti","family":"Joon","sequence":"first","affiliation":[]},{"given":"Namrata","family":"Agrawal","sequence":"additional","affiliation":[]},{"given":"Hifzan","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Vikash","family":"Yadav","sequence":"additional","affiliation":[]},{"given":"Dinesh Kumar","family":"Sah","sequence":"additional","affiliation":[]},{"given":"Cornel","family":"Barna","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,15]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Debnath, S., Soni, B., Baruah, U., Sah, D.: Text-dependent speaker verification system: a review. In: 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO), pp. 1\u20137. IEEE (2015)","key":"17_CR1","DOI":"10.1109\/ISCO.2015.7282386"},{"doi-asserted-by":"crossref","unstructured":"Segura, V., Lahuerta, J.: Modeling the economic incentives of DDoS attacks: Femtocell case study. In: Economics of Information Security and Privacy, pp. 107\u2013119 (2010)","key":"17_CR2","DOI":"10.1007\/978-1-4419-6967-5_7"},{"doi-asserted-by":"crossref","unstructured":"Zhang, S., Zhang, X., Ou, X.: After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across IaaS cloud. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, pp. 317\u2013328. ACM (2014)","key":"17_CR3","DOI":"10.1145\/2590296.2590300"},{"unstructured":"Agrawal, N., Kumar, S., Sah, D., et al.: Prevention of DDoS attack through harmonic homogeneity difference mechanism on traffic flow. In: 2018 4th International Conference on Recent Advances in Information Technology (RAIT), pp. 1\u20136. IEEE (2018)","key":"17_CR4"},{"key":"17_CR5","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1016\/j.cosrev.2017.12.002","volume":"27","author":"DK Sah","year":"2018","unstructured":"Sah, D.K., Amgoth, T.: Parametric survey on cross-layer designs for wireless sensor networks. Comput. Sci. Rev. 27, 112\u2013134 (2018)","journal-title":"Comput. Sci. Rev."},{"issue":"2","key":"17_CR6","doi-asserted-by":"crossref","first-page":"235","DOI":"10.24846\/v27i2y201811","volume":"27","author":"M Arif","year":"2018","unstructured":"Arif, M., Wang, G., Balas, V.E.: Secure VANETs: trusted communication scheme between vehicles and infrastructure based on fog computing. Stud. Informatics Control 27(2), 235\u2013246 (2018)","journal-title":"Stud. Informatics Control"},{"unstructured":"Agrawal, N., Kumar, S., et al.: Centralized mechanism for device encapsulation prevention in Internet of Things. In: 2018 4th International Conference on Recent Advances in Information Technology (RAIT), pp. 1\u20135. IEEE (2018)","key":"17_CR7"},{"issue":"11","key":"17_CR8","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1109\/LCOMM.2006.060669","volume":"10","author":"Z Gao","year":"2006","unstructured":"Gao, Z., Ansari, N.: Differentiating malicious DDoS attack traffic from normal TCP flows by proactive tests. IEEE Commun. Lett. 10(11), 793\u2013795 (2006)","journal-title":"IEEE Commun. Lett."},{"key":"17_CR9","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.cosrev.2017.07.003","volume":"25","author":"S Behal","year":"2017","unstructured":"Behal, S., Kumar, K., Sachdeva, M.: Characterizing DDoS attacks and flashevents: review, research gaps and future directions. Comput. Sci. Rev. 25, 101\u2013114 (2017)","journal-title":"Comput. Sci. Rev."},{"key":"17_CR10","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.procs.2016.05.170","volume":"85","author":"S Behal","year":"2016","unstructured":"Behal, S., Kumar, K.: Trends in validation of DDoS research. Procedia Comput. Sci. 85, 7\u201315 (2016)","journal-title":"Procedia Comput. Sci."},{"issue":"7","key":"17_CR11","doi-asserted-by":"crossref","first-page":"1838","DOI":"10.1016\/j.future.2012.12.011","volume":"29","author":"W Dou","year":"2013","unstructured":"Dou, W., Chen, Q., Chen, J.: A confidence-based filtering method for DDoS attack defense in cloud environment. Future Gener. Comput. Syst. 29(7), 1838\u20131850 (2013)","journal-title":"Future Gener. Comput. Syst."},{"doi-asserted-by":"crossref","unstructured":"Das, T.K., Misra, S., Choudhury, S.P., Sah, D.K., Baruah, U., Laskar, R.H.: Comparison of DTW score and warping path for text dependent speaker verification system. In: 2015 International Conference on Circuit, Power and Computing Technologies (ICCPCT), pp. 1\u20134. IEEE (2015)","key":"17_CR12","DOI":"10.1109\/ICCPCT.2015.7159305"},{"key":"17_CR13","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1016\/j.procs.2012.06.065","volume":"10","author":"H Beitollahi","year":"2012","unstructured":"Beitollahi, H., Deconinck, G.: A four-steptechnique fortackling DDoS attacks. Procedia Comput. Sci. 10, 507\u2013516 (2012)","journal-title":"Procedia Comput. Sci."},{"key":"17_CR14","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.cose.2013.03.014","volume":"38","author":"T Spyridopoulos","year":"2013","unstructured":"Spyridopoulos, T., Karanikas, G., Tryfonas, T., Oikonomou, G.: A game theoretic defence framework against DoS\/DDoS cyber attacks. Comput. Secur. 38, 39\u201350 (2013)","journal-title":"Comput. Secur."},{"issue":"2","key":"17_CR15","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1016\/j.camwa.2011.08.020","volume":"63","author":"SM Lee","year":"2012","unstructured":"Lee, S.M., Kim, D.S., Lee, J.H., Park, J.S.: Detection of DDoS attacks using optimized traffic matrix. Comput. Math. Appl. 63(2), 501\u2013510 (2012)","journal-title":"Comput. Math. Appl."},{"issue":"6","key":"17_CR16","doi-asserted-by":"crossref","first-page":"782","DOI":"10.1016\/j.cose.2012.06.002","volume":"31","author":"SN Shiaeles","year":"2012","unstructured":"Shiaeles, S.N., Katos, V., Karakos, A.S., Papadopoulos, B.K.: Real time DDoS detection using fuzzy estimators. Comput. Secur. 31(6), 782\u2013790 (2012)","journal-title":"Comput. Secur."},{"issue":"3","key":"17_CR17","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273\u2013297 (1995)","journal-title":"Mach. Learn."},{"doi-asserted-by":"crossref","unstructured":"Chen, R., Chen, J., Chen, T., Hsieh, C., Chen, T., Wu, K.: Building an intrusion detection system based on support vector machine and genetic algorithm. In: International Symposium on Neural Networks, pp. 409\u2013414. Springer (2005)","key":"17_CR18","DOI":"10.1007\/11427469_66"},{"doi-asserted-by":"crossref","unstructured":"Klawonn, F., Keller, A.: Fuzzy clustering based on modified distance measures. In: International Symposium on Intelligent Data Analysis, pp. 291\u2013301. Springer (1999)","key":"17_CR19","DOI":"10.1007\/3-540-48412-4_25"},{"issue":"2","key":"17_CR20","doi-asserted-by":"crossref","first-page":"464","DOI":"10.1109\/72.991432","volume":"13","author":"C-F Lin","year":"2002","unstructured":"Lin, C.-F., Wang, S.-D.: Fuzzy support vector machines. IEEE Trans. Neural Networks 13(2), 464\u2013471 (2002)","journal-title":"IEEE Trans. Neural Networks"},{"doi-asserted-by":"crossref","unstructured":"Cervantes, J., Li, X., Yu, W.: Support vector machine classification based on fuzzy clustering for large data sets. In: Mexican International Conference on Artificial Intelligence, pp. 572\u2013582. Springer (2006)","key":"17_CR21","DOI":"10.1007\/11925231_54"},{"issue":"2","key":"17_CR22","doi-asserted-by":"crossref","first-page":"2472","DOI":"10.1016\/j.asoc.2010.10.003","volume":"11","author":"A Chaudhuri","year":"2011","unstructured":"Chaudhuri, A., De, K.: Fuzzy support vector machine for bankruptcy prediction. Appl. Soft Comput. 11(2), 2472\u20132486 (2011)","journal-title":"Appl. Soft Comput."},{"issue":"1","key":"17_CR23","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1186\/1029-242X-2012-159","volume":"2012","author":"I Roven\u0163a","year":"2012","unstructured":"Roven\u0163a, I.: A note on Schur-concave functions. J. Inequalities Appl. 2012(1), 159 (2012)","journal-title":"J. Inequalities Appl."},{"issue":"3","key":"17_CR24","doi-asserted-by":"crossref","first-page":"823","DOI":"10.1016\/j.jnca.2005.07.007","volume":"30","author":"S Chen","year":"2007","unstructured":"Chen, S., Tang, Y., Du, W.: Stateful DDoS attacks and targeted filtering. J. Netw. Comput. Appl. 30(3), 823\u2013840 (2007)","journal-title":"J. Netw. Comput. Appl."}],"container-title":["Advances in Intelligent Systems and Computing","Soft Computing Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-51992-6_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,14]],"date-time":"2020-08-14T16:10:56Z","timestamp":1597421456000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-51992-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,15]]},"ISBN":["9783030519919","9783030519926"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-51992-6_17","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,15]]},"assertion":[{"value":"15 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SOFA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop Soft Computing Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Arad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Romania","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sofa2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/sofa2018.org\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}