{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:37:18Z","timestamp":1759963038436,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031109881"},{"type":"electronic","value":"9783031109898"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-10989-8_13","type":"book-chapter","created":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T22:30:36Z","timestamp":1658183436000},"page":"153-164","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Detection DDoS of\u00a0Attacks Based on\u00a0Federated Learning with\u00a0Digital Twin Network"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0263-1327","authenticated-orcid":false,"given":"Dingling","family":"Su","sequence":"first","affiliation":[]},{"given":"Zehui","family":"Qu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,19]]},"reference":[{"issue":"12","key":"13_CR1","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MC.2019.2942803","volume":"52","author":"R Saracco","year":"2019","unstructured":"Saracco, R.: Digital twins: bridging physical space and cyberspace. Computer 52(12), 58\u201364 (2019). https:\/\/doi.org\/10.1109\/MC.2019.2942803","journal-title":"Computer"},{"key":"13_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2020.105942","volume":"184","author":"C Pylianidis","year":"2021","unstructured":"Pylianidis, C., Osinga, S., Athanasiadis, I.N.: Introducing digital twins to agriculture. Comput. Electron. Agric. 184, 105942 (2021)","journal-title":"Comput. Electron. Agric."},{"key":"13_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.rcim.2019.101837","volume":"61","author":"Y Lu","year":"2020","unstructured":"Lu, Y., Liu, C., Wang, K.I.K., Huang, H., Xu, X.: Digital Twin-driven smart manufacturing: connotation, reference model, applications and research issues. Robot. Comput. Integr. Manuf. 61, 101837 (2020)","journal-title":"Robot. Comput. Integr. Manuf."},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Jinhui, W.: The current main distributed denial of service and defence methods. In: 2019 12th International Conference on Intelligent Computation Technology and Automation (ICICTA), pp. 351\u2013355 (2019)","DOI":"10.1109\/ICICTA49267.2019.00081"},{"issue":"12","key":"13_CR5","doi-asserted-by":"publisher","first-page":"155014771774146","DOI":"10.1177\/1550147717741463","volume":"13","author":"T Mahjabin","year":"2017","unstructured":"Mahjabin, T., Xiao, Y., Sun, G., Jiang, W.: A survey of distributed denial-of-service attack, prevention, and mitigation techniques. Int. J. Distrib. Sens. Netw. 13(12), 1550147717741463 (2017)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"13_CR6","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1016\/j.comnet.2015.02.026","volume":"81","author":"B Wang","year":"2015","unstructured":"Wang, B., Zheng, Y., Lou, W., Hou, Y.T.: DDoS attack protection in the era of cloud computing and software-defined networking. Comput. Netw. 81, 308\u2013319 (2015)","journal-title":"Comput. Netw."},{"issue":"4","key":"13_CR7","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MCOM.2015.7081075","volume":"53","author":"Q Yan","year":"2015","unstructured":"Yan, Q., Yu, F.R.: Distributed denial of service attacks in software-defined networking with cloud computing. IEEE Commun. Mag. 53(4), 52\u201359 (2015)","journal-title":"IEEE Commun. Mag."},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Prakash, A., Priyadarshini, R.: An intelligent software defined network controller for preventing distributed denial of service attack, pp. 585\u2013589 (2018)","DOI":"10.1109\/ICICCT.2018.8473340"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Rashid, A., Siddique, M.J., Ahmed, S.M.: Machine and deep learning based comparative analysis using hybrid approaches for intrusion detection system, pp. 1\u20139 (2020)","DOI":"10.1109\/ICACS47775.2020.9055946"},{"key":"13_CR10","unstructured":"Li, T., Sahu, A.K., Zaheer, M., Sanjabi, M., Talwalkar, A., Smith, V.: Federated optimization in heterogeneous networks (2018)"},{"key":"13_CR11","unstructured":"Yu, C., Kai, H.: Collaborative change detection of DDoS attacks on community and ISP networks (2006)"},{"issue":"4","key":"13_CR12","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1109\/TDSC.2005.50","volume":"2","author":"J Yuan","year":"2005","unstructured":"Yuan, J., Mills, K.: Monitoring the macroscopic effect of DDoS flooding attacks. IEEE Trans. Depend. Sec. Comput. 2(4), 324\u2013335 (2005)","journal-title":"IEEE Trans. Depend. Sec. Comput."},{"key":"13_CR13","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/978-81-322-2550-8_41","volume-title":"Emerging Research in Computing, Information, Communication and Applications","author":"KJ Singh","year":"2015","unstructured":"Singh, K.J., De, T.: An approach of DDOS attack detection using classifiers. In: Shetty, N.R., Prasad, N.H., Nalini, N. (eds.) Emerging Research in Computing, Information, Communication and Applications, pp. 429\u2013437. Springer, New Delhi (2015). https:\/\/doi.org\/10.1007\/978-81-322-2550-8_41"},{"key":"13_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/6241921","volume":"2018","author":"H Biao","year":"2018","unstructured":"Biao, H., Xiangrui, Y., Zhigang, S., Jinfeng, H., Jinshu, S.: OverWatch: a cross-plane DDoS attack defense framework with collaborative intelligence in SDN. Secur. Commun. Netw. 2018, 1\u201315 (2018)","journal-title":"Secur. Commun. Netw."},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Roopak, M., Yun Tian, G., Chambers, J.: Deep learning models for cyber security in IoT networks, pp. 0452\u20130457 (2019)","DOI":"10.1109\/CCWC.2019.8666588"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Haider, S., Akhunzada, A., Ahmed, G., Raza, M.: Deep learning based ensemble convolutional neural network solution for distributed denial of service detection in SDNs (2019)","DOI":"10.1109\/UCET.2019.8881856"},{"issue":"4","key":"13_CR17","volume":"169","author":"AE Cil","year":"2020","unstructured":"Cil, A.E., Yildiz, K., Buldu, A.: Detection of DDoS attacks with feed forward based deep neural network model. Expert Syst. App. 169(4), 114520 (2020)","journal-title":"Expert Syst. App."},{"key":"13_CR18","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.comcom.2020.03.031","volume":"163","author":"T Srinivas","year":"2020","unstructured":"Srinivas, T., Manivannan, S.S.: Prevention of hello flood attack in IoT using combination of deep learning with improved rider optimization algorithm. Comput. Commun. 163, 162\u2013175 (2020)","journal-title":"Comput. Commun."},{"key":"13_CR19","first-page":"825","volume":"34","author":"R Priyadarshini","year":"2019","unstructured":"Priyadarshini, R., Barik, R.K.: A deep learning based intelligent framework to mitigate DDoS attack in fog environment. J. King Saud Univ. Comput. Inf. Sci. 34, 825\u2013831 (2019)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"13_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-3-319-94295-7_15","volume-title":"Cloud Computing \u2013 CLOUD 2018","author":"M Zhu","year":"2018","unstructured":"Zhu, M., Ye, K., Xu, C.-Z.: Network anomaly detection and\u00a0identification based on deep learning methods. In: Luo, M., Zhang, L.-J. (eds.) CLOUD 2018. LNCS, vol. 10967, pp. 219\u2013234. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-94295-7_15"},{"issue":"7","key":"13_CR21","first-page":"13","volume":"33","author":"L Chuanhuan","year":"2017","unstructured":"Chuanhuan, L., Zhengjunl, S., Xiaoyon, Y., Xiaolin, L., Lian, G., Weimin, W.: Real-time DDoS attack detection based on deep learning. Telecommun. Sci. 33(7), 13 (2017)","journal-title":"Telecommun. Sci."},{"key":"13_CR22","unstructured":"Mcmahan, H.B., Moore, E., Ramage, D., Hampson, S., Arcas, B.: Communication-efficient learning of deep networks from decentralized data (2016)"},{"key":"13_CR23","first-page":"374","volume":"1","author":"K Bonawitz","year":"2019","unstructured":"Bonawitz, K., et al.: Towards federated learning at scale: system design. Proc. Mach. Learn. Syst. 1, 374\u2013388 (2019)","journal-title":"Proc. Mach. Learn. Syst."},{"key":"13_CR24","unstructured":"Smith, V., Chiang, C.K., Sanjabi, M., Talwalkar, A.: Federated multi-task learning (2018)"},{"key":"13_CR25","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9, 1735\u20131740 (1997)","journal-title":"Neural Comput."},{"issue":"2","key":"13_CR26","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.jnca.2004.01.003","volume":"28","author":"S Mukkamala","year":"2005","unstructured":"Mukkamala, S., Sung, A.H., Abraham, A.: Intrusion detection using an ensemble of intelligent paradigms. J. Netw. Comput. App. 28(2), 167\u2013182 (2005)","journal-title":"J. Netw. Comput. App."},{"issue":"4","key":"13_CR27","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1145\/382912.382923","volume":"3","author":"J McHugh","year":"2000","unstructured":"McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory. ACM Trans. Inf. Syst. Secur. 3(4), 262\u2013294 (2000)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"Lippmann, R., Haines, J.W., Fried, D.J., Korba, J., Das, K.: Analysis and results of the 1999 DARPA off-line intrusion detection evaluation (2000)","DOI":"10.1007\/3-540-39945-3_11"},{"key":"13_CR29","unstructured":"Stolfo, S.J., Fan, W., Lee, W., Prodromidis, A., Chan, P.K.: Cost-based modeling for fraud and intrusion detection: results from the JAM project (2000)"},{"issue":"1","key":"13_CR30","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/s10489-013-0452-6","volume":"40","author":"C Guo","year":"2013","unstructured":"Guo, C., Zhou, Y., Ping, Y., Zhang, Z., Liu, G., Yang, Y.: A distance sum-based hybrid method for intrusion detection. Appl. Intell. 40(1), 178\u2013188 (2013). https:\/\/doi.org\/10.1007\/s10489-013-0452-6","journal-title":"Appl. Intell."},{"key":"13_CR31","first-page":"1","volume":"2","author":"DMW Powers","year":"2011","unstructured":"Powers, D.M.W.: Evaluation: From precision, recall and F-Factor to ROC, informedness, markedness and correlation. J. Mach. Learn. Technol. 2, 1\u201324 (2011)","journal-title":"J. Mach. Learn. Technol."}],"container-title":["Lecture Notes in Computer Science","Knowledge Science, Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-10989-8_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T22:41:43Z","timestamp":1658184103000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-10989-8_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031109881","9783031109898"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-10989-8_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"19 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"KSEM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Knowledge Science, Engineering and Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 August 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ksem2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ksem22.smart-conf.net\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"498","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"169","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}