{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:44:28Z","timestamp":1742913868046,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030953836"},{"type":"electronic","value":"9783030953843"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-95384-3_37","type":"book-chapter","created":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T08:20:55Z","timestamp":1645518055000},"page":"597-611","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Edge DDoS Attack Detection Method Based on\u00a0Software Defined Networks"],"prefix":"10.1007","author":[{"given":"Gangsheng","family":"Ren","sequence":"first","affiliation":[]},{"given":"Yang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Shukui","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Long","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,23]]},"reference":[{"issue":"7","key":"37_CR1","doi-asserted-by":"publisher","first-page":"1838","DOI":"10.1109\/TIFS.2018.2805600","volume":"13","author":"J Zheng","year":"2018","unstructured":"Zheng, J., Li, Q., Gu, G., Cao, J., David, K., Wu, J.: Realtime DDoS defense using COTS SDN switches via adaptive correlation analysis. IEEE Trans. Inf. Forensics Secur. 13(7), 1838\u20131853 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"37_CR2","doi-asserted-by":"publisher","first-page":"161908","DOI":"10.1109\/ACCESS.2020.3021435","volume":"8","author":"L Tan","year":"2020","unstructured":"Tan, L., Pan, Y., Wu, J., Zhou, J., Jiang, H., Deng, Y.: A new framework for DDoS attack detection and defense in SDN environment. IEEE Access 8, 161908\u2013161919 (2020)","journal-title":"IEEE Access"},{"key":"37_CR3","doi-asserted-by":"publisher","first-page":"80813","DOI":"10.1109\/ACCESS.2019.2922196","volume":"7","author":"S Dong","year":"2019","unstructured":"Dong, S., Abbas, K., Jain, R.: A survey on distributed denial of service (DDoS) attacks in SDN and cloud computing environments. IEEE Access 7, 80813\u201380828 (2019)","journal-title":"IEEE Access"},{"issue":"1","key":"37_CR4","first-page":"69","volume":"56","author":"W Shi","year":"2019","unstructured":"Shi, W., Zhang, X., Wang, Y., Zhang, Q.: Edge computing: state-of-the-art and future directions. J. Comput. Res. Dev. 56(1), 69\u201389 (2019)","journal-title":"J. Comput. Res. Dev."},{"issue":"8","key":"37_CR5","doi-asserted-by":"publisher","first-page":"1608","DOI":"10.1109\/JPROC.2019.2918437","volume":"107","author":"Y Xiao","year":"2019","unstructured":"Xiao, Y., Jia, Y., Liu, C., Cheng, X., Lv, W.: Edge computing security: state of the art and challenges. Proc. IEEE 107(8), 1608\u20131631 (2019)","journal-title":"Proc. IEEE"},{"doi-asserted-by":"crossref","unstructured":"Li, H., Wang, L.: Online orchestration of cooperative defense against DDoS attacks for 5G MEC. In: IEEE Wireless Communications and Networking Conference (WCNC), pp. 1\u20136 (2018)","key":"37_CR6","DOI":"10.1109\/WCNC.2018.8377309"},{"key":"37_CR7","first-page":"62","volume":"26","author":"C Zhang","year":"2015","unstructured":"Zhang, C., Cui, Y., Tang, H., Wu, J.: State-of-the-art survey on software-defined networking (SDN). J. Softw. 26, 62\u201381 (2015)","journal-title":"J. Softw."},{"doi-asserted-by":"crossref","unstructured":"Bhunia, S., Gurusamy, M.: Dynamic attack detection and mitigation in IoT using SDN. In: International Telecommunication Networks and Applications Conference (ITNAC), pp. 1\u20136 (2017)","key":"37_CR8","DOI":"10.1109\/ATNAC.2017.8215418"},{"doi-asserted-by":"crossref","unstructured":"Mousavi, S., St-Hilaire, M.: Early detection of DDoS attacks against SDN controllers. In: International Conference on Computing, Networking and Communications (ICNC), pp. 77\u201381 (2015)","key":"37_CR9","DOI":"10.1109\/ICCNC.2015.7069319"},{"unstructured":"Zhuo, C., Fu, J., Cheng, Y., Xin, G., Liu, W., Peng, J.: Xgboost classifier for DDoS attack detection and analysis in SDN-based cloud. In: IEEE International Conference on Big Data and Smart Computing (BigComp), pp. 251\u2013256 (2018)","key":"37_CR10"},{"key":"37_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-37352-8_1","volume-title":"Cyberspace Safety and Security","author":"Y Yang","year":"2019","unstructured":"Yang, Y., Wang, J., Zhai, B., Liu, J.: IoT-based DDoS attack detection and mitigation using the edge of SDN. In: Vaidya, J., Zhang, X., Li, J. (eds.) CSS 2019. LNCS, vol. 11983, pp. 3\u201317. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-37352-8_1"},{"key":"37_CR12","doi-asserted-by":"publisher","first-page":"6386","DOI":"10.1002\/sec.1759","volume":"9","author":"N Dayal","year":"2016","unstructured":"Dayal, N., Maity, P., Srivastava, S., Khondoker, R.: Research trends in security and DDoS in SDN. Secur. Commun. Netw. 9, 6386\u20136411 (2016)","journal-title":"Secur. Commun. Netw."},{"issue":"10","key":"37_CR13","doi-asserted-by":"publisher","first-page":"2358","DOI":"10.1109\/JSAC.2018.2869997","volume":"36","author":"K Kalkan","year":"2018","unstructured":"Kalkan, K., Altay, L., G\u00fcr, G., Alag\u00f6z, F.: Joint entropy-based DDoS defense scheme in SDN. IEEE J. Sel. Areas Commun. 36(10), 2358\u20132372 (2018)","journal-title":"IEEE J. Sel. Areas Commun."},{"doi-asserted-by":"crossref","unstructured":"Doshi, R., Apthorpe, N., Feamster, N.: Machine learning DDoS detection for consumer internet of things devices. In: IEEE Security and Privacy Workshops (SPW), pp. 29\u201335 (2018)","key":"37_CR14","DOI":"10.1109\/SPW.2018.00013"},{"key":"37_CR15","doi-asserted-by":"publisher","first-page":"5039","DOI":"10.1109\/ACCESS.2019.2963077","volume":"8","author":"S Dong","year":"2020","unstructured":"Dong, S., Sarem, M.: DDoS attack detection method based on improved KNN with the degree of DDoS attack in software-defined networks. IEEE Access 8, 5039\u20135048 (2020)","journal-title":"IEEE Access"},{"key":"37_CR16","doi-asserted-by":"publisher","first-page":"132502","DOI":"10.1109\/ACCESS.2020.3009733","volume":"8","author":"KS Sahoo","year":"2020","unstructured":"Sahoo, K.S., Tripathy, B.K.: An evolutionary SVM model for DDoS attack detection in software defined networks. IEEE Access 8, 132502\u2013132513 (2020)","journal-title":"IEEE Access"},{"issue":"2","key":"37_CR17","first-page":"381","volume":"39","author":"L Yao","year":"2017","unstructured":"Yao, L., Dong, P., Zhang, H.: Distributed denial of service attack detection based on object character in software defined network. J. Electron. Inf. Technol. 39(2), 381\u2013388 (2017)","journal-title":"J. Electron. Inf. Technol."},{"issue":"3","key":"37_CR18","first-page":"753","volume":"40","author":"X Liu","year":"2020","unstructured":"Liu, X., Liu, P., Xu, H., Zhu, X.: Software defined internet of things based DDoS attack detection method. J. Comput. Appl. 40(3), 753\u2013759 (2020)","journal-title":"J. Comput. Appl."},{"doi-asserted-by":"crossref","unstructured":"Chen, T., Guestrin, C.: Xgboost: a scalable tree boosting system. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785\u2013794 (2016)","key":"37_CR19","DOI":"10.1145\/2939672.2939785"},{"issue":"4","key":"37_CR20","first-page":"1201","volume":"29","author":"Y Ma","year":"2012","unstructured":"Ma, Y., Wen, X.: Research progress of genetic algorithm. Appl. Res. Comput. 29(4), 1201\u20131206 (2012)","journal-title":"Appl. Res. Comput."}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-95384-3_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T08:25:17Z","timestamp":1645518317000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-95384-3_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030953836","9783030953843"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-95384-3_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"23 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ica3pp2021\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"403","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"145","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.12","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.27","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}