{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T10:00:15Z","timestamp":1743156015740,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030671006"},{"type":"electronic","value":"9783030671013"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-67101-3_4","type":"book-chapter","created":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T01:18:24Z","timestamp":1610500704000},"page":"44-54","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Statistical Properties and Modelling of DDoS Attacks"],"prefix":"10.1007","author":[{"given":"Pheeha","family":"Machaka","sequence":"first","affiliation":[]},{"given":"Antoine","family":"Bagula","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,13]]},"reference":[{"issue":"11","key":"4_CR1","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MCOM.2011.6069710","volume":"49","author":"A Gluhak","year":"2011","unstructured":"Gluhak, A., et al.: A survey on facilities for experimental internet of things research. Commun. Mag. IEEE 49(11), 58\u201367 (2011)","journal-title":"Commun. Mag. IEEE"},{"issue":"2","key":"4_CR2","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J Mirkovic","year":"2004","unstructured":"Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput. Commun. Rev. 34(2), 39\u201353 (2004)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"4_CR3","unstructured":"Forrester Consulting. \u201cThe trends and Changing Landscape of DDoS Threats and Protection\u201d (2009)"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Bhattacharyya, D.K., Kalita, J.K.: DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance (2016)","DOI":"10.1201\/b20614"},{"key":"4_CR5","unstructured":"Kupreev, O., Badovskaya, E., Gutnikov, A.: Kaspersky Report: DDoS attacks in Q2 2020 (2020)"},{"issue":"5","key":"4_CR6","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1016\/j.comnet.2003.10.003","volume":"44","author":"C Douligeris","year":"2004","unstructured":"Douligeris, C., Mitrokotsa, A.: DDoS attacks and defense mechanisms: classification and state-of-the-art. Comput. Netw. 44(5), 643\u2013666 (2004)","journal-title":"Comput. Netw."},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Bhuyan, M.H., et al.: Detecting distributed denial of service attacks: methods, tools and future directions. Comput. J. 57, bxt031 (2013)","DOI":"10.1093\/comjnl\/bxt031"},{"issue":"3","key":"4_CR8","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1109\/TDSC.2005.35","volume":"2","author":"J Mirkovic","year":"2005","unstructured":"Mirkovic, J., Reiher, P.: D-WARD: a source-end defense against flooding denial-of-service attacks. IEEE Trans. Dependable Secure Comput. 2(3), 216\u2013232 (2005)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Network traffic anomaly detection techniques and systems. In: Network Traffic Anomaly Detection and Prevention (2017)","DOI":"10.1007\/978-3-319-65188-0"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Ahmed, E., et al.: Use of ip addresses for high rate flooding attack detection. In: IFIP International Information Security Conference (2010)","DOI":"10.1007\/978-3-642-15257-3_12"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Barford, P., Plonka, D.: Characteristics of network traffic flow anomalies. In: Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement (2001)","DOI":"10.1145\/505202.505211"},{"key":"4_CR12","unstructured":"Feinstein, L. et al.: Statistical approaches to DDoS attack detection and response. In: Proceedings DARPA Information Survivability Conference and Exposition (2003)"},{"issue":"4","key":"4_CR13","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1145\/1090191.1080118","volume":"35","author":"A Lakhina","year":"2005","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Mining anomalies using traffic feature distributions. ACM SIGCOMM Comput. Commun. Rev. 35(4), 217\u2013228 (2005)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"4_CR14","unstructured":"Wagner, A., Plattner, B.: Entropy based worm and anomaly detection in fast IP networks. In: 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05) (2005)"},{"key":"4_CR15","unstructured":"Peng, T., Leckie, C., Ramamohanarao, K.: Protection from distributed denial of service attacks using history-based IP filtering. In: IEEE International Conference On Communications, ICC 2003 (2003)"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Le, Q., Zhanikeev, M., Tanaka, Y.: Methods of distinguishing flash crowds from spoofed DoS attacks. In: 2007 Next Generation Internet Networks (2007)","DOI":"10.1109\/NGI.2007.371212"},{"key":"4_CR17","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.cose.2013.11.005","volume":"40","author":"S Bhatia","year":"2014","unstructured":"Bhatia, S., et al.: A framework for generating realistic traffic for distributed denial-of-service attacks and flash events. Comput. Secur. 40, 95\u2013107 (2014)","journal-title":"Comput. Secur."},{"issue":"1","key":"4_CR18","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/JSTSP.2012.2233713","volume":"7","author":"AG Tartakovsky","year":"2013","unstructured":"Tartakovsky, A.G., Polunchenko, A.S., Sokolov, G.: Efficient computer network anomaly detection by changepoint detection methods. IEEE J. Select. Topics Signal Process. 7(1), 4\u201311 (2013)","journal-title":"IEEE J. Select. Topics Signal Process."},{"key":"4_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.patrec.2014.07.019","volume":"51","author":"MH Bhuyan","year":"2015","unstructured":"Bhuyan, M.H., Bhattacharyya, D., Kalita, J.K.: An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection. Pattern Recog. Lett. 51, 1\u20137 (2015)","journal-title":"Pattern Recog. Lett."},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Erhan, D., Anar\u0131m, E.: Statistical properties of DDoS attacks. In: 2019 6th International Conference on Control, Decision and Information Technologies (CoDIT) (2019)","DOI":"10.1109\/CoDIT.2019.8820574"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Li, K. et al.: Effective DDoS attacks detection using generalized entropy metric. In: International Conference on Algorithms and Architectures for Parallel Processing (2009)","DOI":"10.1007\/978-3-642-03095-6_27"},{"key":"4_CR22","unstructured":"Machaka, P., Nelwamondo, F.: Data mining techniques for distributed denial of service attacks detection in the internet of things: a research survey. In: Data Mining Trends and Applications in Criminal Science and Investigations (2016)"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Page, E.: Continuous inspection schemes. In: Biometrika, pp. 100\u2013115 (1954)","DOI":"10.1093\/biomet\/41.1-2.100"},{"issue":"3","key":"4_CR24","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1080\/00401706.1959.10489860","volume":"1","author":"S Roberts","year":"1959","unstructured":"Roberts, S.: Control chart tests based on geometric moving averages. Technometrics 1(3), 239\u2013250 (1959)","journal-title":"Technometrics"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Machaka, P., Bagula, A., Nelwamondo, F.: Using exponentially weighted moving average algorithm to defend against DDoS attacks. In: 2016 Pattern Recognition Association of South Africa and Robotics and Mechatronics International Conference (PRASA-RobMech) (2016)","DOI":"10.1109\/RoboMech.2016.7813157"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Machaka, P., et al.: Using the cumulative sum algorithm against distributed denial of service attacks in internet of things. In: International Conference on Context-Aware Systems and Applications (2015)","DOI":"10.1007\/978-3-319-29236-6_7"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Context-Aware Systems and Applications, and Nature of Computation and Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-67101-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T12:55:01Z","timestamp":1619268901000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-67101-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030671006","9783030671013"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-67101-3_4","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"13 January 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCASA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Context-Aware Systems and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thai Nguyen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccasa2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iccasa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"68","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to COVID 19 pandemic the conference was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}