{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:47:16Z","timestamp":1743083236171,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030587925"},{"type":"electronic","value":"9783030587932"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58793-2_25","type":"book-chapter","created":{"date-parts":[[2020,8,30]],"date-time":"2020-08-30T23:04:02Z","timestamp":1598828642000},"page":"303-316","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Towards a Framework for Improving Experiments on DoS Attacks"],"prefix":"10.1007","author":[{"given":"Marta","family":"Catillo","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Antonio","family":"Pecchia","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Umberto","family":"Villano","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,8,31]]},"reference":[{"unstructured":"Aaron, T., Bing, M.: Tcpreplay tool (2012). https:\/\/tcpreplay.appneta.com","key":"25_CR1"},{"doi-asserted-by":"crossref","unstructured":"Ahmim, A., Maglaras, L.A., Ferrag, M.A., Derdour, M., Janicke, H.: A novel hierarchical intrusion detection system based on decision tree and rules-based models. In: International Conference on Distributed Computing in Sensor Systems, pp. 228\u2013233. IEEE (2019)","key":"25_CR2","DOI":"10.1109\/DCOSS.2019.00059"},{"issue":"4","key":"25_CR3","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/1851275.1851192","volume":"40","author":"M Alizadeh","year":"2010","unstructured":"Alizadeh, M., et al.: Data center TCP (DCTCP). ACM SIGCOMM Comput. Commun. Rev. 40(4), 63\u201374 (2010)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"25_CR4","doi-asserted-by":"publisher","first-page":"349","DOI":"10.3233\/JHS-190620","volume":"25","author":"M Catillo","year":"2019","unstructured":"Catillo, M., Rak, M., Villano, U.: Discovery of DoS attacks by the ZED-IDS anomaly detector. J. High Speed Netw. 25, 349\u2013365 (2019)","journal-title":"J. High Speed Netw."},{"issue":"5","key":"25_CR5","doi-asserted-by":"publisher","first-page":"856","DOI":"10.1109\/TDSC.2017.2714164","volume":"16","author":"D Cotroneo","year":"2019","unstructured":"Cotroneo, D., Paudice, A., Pecchia, A.: Empirical analysis and validation of security alerts filtering techniques. IEEE Trans. Dependable Secure Comput. 16(5), 856\u2013870 (2019)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"unstructured":"Harris, G.: Development\/libpcapfileformat, March 2011. https:\/\/wiki.wireshark.org\/Development\/LibpcapFileFormat\/","key":"25_CR6"},{"key":"25_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/11663812_13","volume-title":"Recent Advances in Intrusion Detection","author":"S-S Hong","year":"2006","unstructured":"Hong, S.-S., Wu, S.F.: On interactive internet traffic replay. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, pp. 247\u2013264. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11663812_13"},{"key":"25_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/978-3-030-36987-3_27","volume-title":"Distributed Computing and Internet Technology","author":"D Kshirsagar","year":"2020","unstructured":"Kshirsagar, D., Kumar, S.: Identifying reduced features based on IG-Threshold for DoS attack detection using PART. In: Hung, D.V., D\u2019Souza, M. (eds.) ICDCIT 2020. LNCS, vol. 11969, pp. 411\u2013419. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-36987-3_27"},{"key":"25_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2019\/1574749","volume":"2019","author":"FS de Lima Filho","year":"2019","unstructured":"de Lima Filho, F.S., Silveira, F.A.F., de Medeiros Brito J\u00fanior, A., Vargas-Solar, G., Silveira, L.F.: Smart detection: an online approach for DoS\/DDoS attack detection using machine learning. Secur. Comm. Netw. 2019, 1\u201315 (2019)","journal-title":"Secur. Comm. Netw."},{"issue":"20","key":"25_CR10","doi-asserted-by":"publisher","first-page":"4396","DOI":"10.3390\/app9204396","volume":"9","author":"H Liu","year":"2019","unstructured":"Liu, H., Lang, B.: Machine learning and deep learning methods for intrusion detection systems: a survey. Appl. Sci. 9(20), 4396 (2019)","journal-title":"Appl. Sci."},{"issue":"2","key":"25_CR11","first-page":"216","volume":"7","author":"G Mantas","year":"2015","unstructured":"Mantas, G., Stakhanova, N., Gonzalez, H., Jazi, H., Ghorbani, A.: Application-layer denial of service attacks: taxonomy and survey. Int. J. Inf. Comput. Secur. 7(2), 216\u2013239 (2015)","journal-title":"Int. J. Inf. Comput. Secur."},{"doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: Military Communications and Information Systems Conference, pp. 1\u20136. IEEE (2015)","key":"25_CR12","DOI":"10.1109\/MilCIS.2015.7348942"},{"doi-asserted-by":"crossref","unstructured":"Purwanto, Y., Kuspriyanto, H., Rahardjo, B.: Traffic anomaly detection in DDos flooding attack. In: International Conference on Telecommunication Systems Services and Applications, pp. 1\u20136 (2014)","key":"25_CR13","DOI":"10.1109\/TSSA.2014.7065953"},{"doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani., A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: International Conference on Information Systems Security and Privacy, pp. 108\u2013116. SciTePress (2018)","key":"25_CR14","DOI":"10.5220\/0006639801080116"},{"issue":"3","key":"25_CR15","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.cose.2011.12.012","volume":"31","author":"A Shiravi","year":"2012","unstructured":"Shiravi, A., Shiravi, H., Tavallaee, M., Ghorbani, A.: Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 31(3), 357\u2013374 (2012)","journal-title":"Comput. Secur."},{"unstructured":"Siam, Y.: Tcpreplay tool (2013). https:\/\/tcpreplay.appneta.com\/wiki\/tcpliveplay-man.html","key":"25_CR16"},{"doi-asserted-by":"crossref","unstructured":"Sikora, M., Gerlich, T., Malina, L.: On detection and mitigation of slow rate denial of service attacks. In: 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, pp. 1\u20135 (2019)","key":"25_CR17","DOI":"10.1109\/ICUMT48472.2019.8970844"},{"issue":"4","key":"25_CR18","doi-asserted-by":"publisher","first-page":"2046","DOI":"10.1109\/SURV.2013.031413.00127","volume":"15","author":"ST Zargar","year":"2013","unstructured":"Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun. Surv. Tutor. 15(4), 2046\u20132069 (2013)","journal-title":"IEEE Commun. Surv. Tutor."}],"container-title":["Communications in Computer and Information Science","Quality of Information and Communications Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58793-2_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T08:38:13Z","timestamp":1619253493000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58793-2_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030587925","9783030587932"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58793-2_25","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"31 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"QUATIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Quality of Information and Communications Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Faro","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"quatic2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2020.quatic.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"81","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}