{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T20:42:28Z","timestamp":1751316148947,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031255373"},{"type":"electronic","value":"9783031255380"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-25538-0_28","type":"book-chapter","created":{"date-parts":[[2023,2,3]],"date-time":"2023-02-03T13:03:34Z","timestamp":1675429414000},"page":"529-546","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Hiatus: Unsupervised Generative Approach for\u00a0Detection of\u00a0DoS and\u00a0DDoS Attacks"],"prefix":"10.1007","author":[{"given":"Sivaanandh","family":"Muneeswaran","sequence":"first","affiliation":[]},{"given":"Vinay","family":"Sachidananda","sequence":"additional","affiliation":[]},{"given":"Rajendra","family":"Patil","sequence":"additional","affiliation":[]},{"given":"Hongyi","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Mingchang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Mohan","family":"Gurusamy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,4]]},"reference":[{"key":"28_CR1","doi-asserted-by":"publisher","unstructured":"Aamir, M., Zaidi, S.M.A.: Clustering based semi-supervised machine learning for ddos attack classification. Journal of King Saud University - Computer and Information Sciences (2019). https:\/\/doi.org\/10.1016\/j.jksuci.2019.02.003, http:\/\/www.sciencedirect.com\/science\/article\/pii\/S131915781831067X","DOI":"10.1016\/j.jksuci.2019.02.003"},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"Amma, N.G.B., Subramanian, S.: Feature correlation map based statistical approach for denial of service attacks detection. In: 2019 5th International Conference on Computing Engineering and Design (ICCED), pp. 1\u20136 (2019)","DOI":"10.1109\/ICCED46541.2019.9161080"},{"key":"28_CR3","doi-asserted-by":"publisher","unstructured":"Bhardwaj, A., Mangat, V., Vig, R., Halder, S., Conti, M.: Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions. Comput. Sci. Rev. 39 100332 (2021). https:\/\/doi.org\/10.1016\/j.cosrev.2020.100332, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1574013720304329","DOI":"10.1016\/j.cosrev.2020.100332"},{"key":"28_CR4","unstructured":"Bhaya, W., Manna, M.: A proactive ddos attack detection approach using data mining cluster analysis. J. Next Gener. Inform. Technol. 5 36\u2013 47 (D2014)"},{"key":"28_CR5","unstructured":"CAIDA: The caida ucsd \u201cddos attack 2007\u201d dataset (2007)"},{"key":"28_CR6","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/978-3-030-73280-6_31","volume-title":"Intelligent Information and Database Systems","author":"D-C Can","year":"2021","unstructured":"Can, D.-C., Le, H.-Q., Ha, Q.-T.: Detection of distributed denial of service attacks using automatic feature selection with enhancement for imbalance dataset. In: Nguyen, N.T., Chittayasothorn, S., Niyato, D., Trawi\u0144ski, B. (eds.) ACIIDS 2021. LNCS (LNAI), vol. 12672, pp. 386\u2013398. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-73280-6_31"},{"key":"28_CR7","doi-asserted-by":"publisher","unstructured":"Daneshgadeh \u00c7akmak\u00e7\u0131, S., Kemmerich, T., Ahmed, T., Baykal, N.: Online ddos attack detection using mahalanobis distance and kernel-based learning algorithm. J. Netw. Comput. Appl. 168 102756 (2020). https:\/\/doi.org\/10.1016\/j.jnca.2020.102756, http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1084804520302307","DOI":"10.1016\/j.jnca.2020.102756"},{"key":"28_CR8","doi-asserted-by":"publisher","unstructured":"Doriguzzi-Corin, R., Millar, S., Scott-Hayward, S., Martinez-del Rincon, J., Siracusa, D.: Lucid: A practical, lightweight deep learning solution for ddos attack detection. IEEE Trans. Netw. Serv. Manage. 17(2), 876\u2013889 (2020). https:\/\/doi.org\/10.1109\/tnsm.2020.2971776, http:\/\/dx.doi.org\/10.1109\/TNSM.2020.2971776","DOI":"10.1109\/tnsm.2020.2971776"},{"key":"28_CR9","doi-asserted-by":"publisher","unstructured":"Elsayed, M.S., Le-Khac, N.A., Dev, S., Jurcut, A.D.: Ddosnet: A deep-learning model for detecting network attacks. In: 2020 IEEE 21st International Symposium on \u201cA World of Wireless, Mobile and Multimedia Networks\u201d (WoWMoM), pp. 391\u2013396 (2020). https:\/\/doi.org\/10.1109\/WoWMoM49955.2020.00072","DOI":"10.1109\/WoWMoM49955.2020.00072"},{"key":"28_CR10","unstructured":"Girma, A., Wang, P.: An efficient hybrid model for detecting distributed denial of service (ddos) attacks in cloud computing using multivariate correlation and data mining clustering techniques. Issues Inform. Syst. 19(2), 12 (2018)"},{"key":"28_CR11","unstructured":"Goodfellow, I., et al.: Generative adversarial nets. In: Ghahramani, Z., Welling, M., Cortes, C., Lawrence, N., Weinberger, K. (eds.) Advances in Neural Information Processing Systems. vol. 27. Curran Associates, Inc. (2014). https:\/\/proceedings.neurips.cc\/paper\/2014\/file\/5ca3e9b122f61f8f06494c97b1afccf3-Paper.pdf"},{"key":"28_CR12","doi-asserted-by":"publisher","first-page":"64351","DOI":"10.1109\/ACCESS.2019.2917532","volume":"7","author":"Y Gu","year":"2019","unstructured":"Gu, Y., Li, K., Guo, Z., Wang, Y.: Semi-supervised k-means ddos detection method using hybrid feature selection algorithm. IEEE Access 7, 64351\u201364365 (2019)","journal-title":"IEEE Access"},{"key":"28_CR13","doi-asserted-by":"crossref","unstructured":"Gu, Y., Wang, Y., Yang, Z., Xiong, F., Gao, Y.: Multiple-features-based semisupervised clustering ddos detection method. Math. Prob. Eng. 2017 (2017)","DOI":"10.1155\/2017\/5202836"},{"key":"28_CR14","doi-asserted-by":"publisher","unstructured":"G\u00f6rmez, Y., Aydin, Z., Karademir, R., Gungor, V.: A deep learning approach with bayesian optimization and ensemble classifiers for detecting denial of service attacks. Int. J. Commun. Syst. 33(6), e4401 (2020). https:\/\/doi.org\/10.1002\/dac.4401","DOI":"10.1002\/dac.4401"},{"key":"28_CR15","doi-asserted-by":"publisher","first-page":"53972","DOI":"10.1109\/ACCESS.2020.2976908","volume":"8","author":"S Haider","year":"2020","unstructured":"Haider, S., et al.: A deep cnn ensemble framework for efficient ddos attack detection in software defined networks. IEEE Access 8, 53972\u201353983 (2020)","journal-title":"IEEE Access"},{"key":"28_CR16","doi-asserted-by":"crossref","unstructured":"He, Z., Zhang, T., Lee, R.B.: Machine learning based ddos attack detection from source side in cloud. In: 2017 IEEE CSCloud, pp. 114\u2013120 (2017)","DOI":"10.1109\/CSCloud.2017.58"},{"issue":"10","key":"28_CR17","doi-asserted-by":"publisher","first-page":"3193","DOI":"10.1007\/s10489-018-1141-2","volume":"48","author":"M Idhammad","year":"2018","unstructured":"Idhammad, M., Afdel, K., Belouch, M.: Semi-supervised machine learning approach for ddos detection. Appl. Intell. 48(10), 3193\u20133208 (2018)","journal-title":"Appl. Intell."},{"key":"28_CR18","unstructured":"Kingma, D.P., Welling, M.: Auto-encoding variational bayes. CoRR abs\/1312.6114 (2014)"},{"key":"28_CR19","doi-asserted-by":"crossref","unstructured":"Ko, I., Chambers, D., Barrett, E.: Self-supervised network traffic management for ddos mitigation within the isp domain. Future Gener. Comput. Syst. 112, 524\u2013533 (2020). http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167739X20302193","DOI":"10.1016\/j.future.2020.06.002"},{"key":"28_CR20","unstructured":"Laboratory, M.L.: 2000 darpa intrusion detection scenario specific datasets (2000)"},{"key":"28_CR21","unstructured":"Lysenko, S., Savenko, O., Bobrovnikova, K.: Ddos botnet detection technique based on the use of the semi-supervised fuzzy c-means clustering. In: ICTERI Workshops, pp. 688\u2013695 (2018)"},{"key":"28_CR22","doi-asserted-by":"publisher","unstructured":"Mhamdi, L., McLernon, D., El-moussa, F., Raza Zaidi, S.A., Ghogho, M., Tang, T.: A deep learning approach combining autoencoder with one-class svm for ddos attack detection in sdns. In: 2020 IEEE Eighth International Conference on Communications and Networking (ComNet), pp. 1\u20136 (2020). https:\/\/doi.org\/10.1109\/ComNet47917.2020.9306073","DOI":"10.1109\/ComNet47917.2020.9306073"},{"key":"28_CR23","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 military communications and information systems conference (MilCIS), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"28_CR24","doi-asserted-by":"publisher","unstructured":"Prasad, M., Tripathi, S., Dahal, K.: Unsupervised feature selection and cluster center initialization based arbitrary shaped clusters for intrusion detection. Comput. Secur. 99, 102062 (2020). https:\/\/doi.org\/10.1016\/j.cose.2020.102062, http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404820303357","DOI":"10.1016\/j.cose.2020.102062"},{"key":"28_CR25","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSP, pp. 108\u2013116 (2018)","DOI":"10.5220\/0006639801080116"},{"key":"28_CR26","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A.H., Hakak, S., Ghorbani, A.A.: Developing realistic distributed denial of service (ddos) attack dataset and taxonomy. In: 2019 International Carnahan Conference on Security Technology (2019)","DOI":"10.1109\/CCST.2019.8888419"},{"key":"28_CR27","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the kdd cup 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1\u20136. IEEE (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"28_CR28","doi-asserted-by":"crossref","unstructured":"Yao, Y., Su, L., Lu, Z.: Deepgfl: Deep feature learning via graph for attack detection on flow-based network traffic. In: MILCOM 2018\u20132018 IEEE Military Communications Conference (MILCOM), pp. 579\u2013584 (2018)","DOI":"10.1109\/MILCOM.2018.8599821"},{"key":"28_CR29","doi-asserted-by":"crossref","unstructured":"Yuan, X., Li, C., Li, X.: Deepdefense: Identifying ddos attack via deep learning. In: 2017 IEEE International Conference on Smart Computing, pp. 1\u20138 (2017)","DOI":"10.1109\/SMARTCOMP.2017.7946998"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-25538-0_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,3]],"date-time":"2023-02-03T13:15:26Z","timestamp":1675430126000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-25538-0_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031255373","9783031255380"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-25538-0_28","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"4 February 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/securecomm.eai-conferences.org\/2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy+","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"130","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}