{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T16:14:51Z","timestamp":1778170491830,"version":"3.51.4"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031337420","type":"print"},{"value":"9783031337437","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-33743-7_51","type":"book-chapter","created":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T13:02:19Z","timestamp":1685106139000},"page":"640-651","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Detection of DDoS Attacks in Software Defined Networking Using Machine Learning Models"],"prefix":"10.1007","author":[{"given":"Ahmad","family":"Hamarshe","sequence":"first","affiliation":[]},{"given":"Huthaifa I.","family":"Ashqar","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Hamarsheh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,27]]},"reference":[{"key":"51_CR1","doi-asserted-by":"crossref","unstructured":"P. Kamboj, M. C. Trivedi, V. K. Yadav, and V. K. Singh, \u201cDetection techniques of DDoS attacks: A survey,\u201d in 2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON), 2017, pp. 675\u2013679","DOI":"10.1109\/UPCON.2017.8251130"},{"key":"51_CR2","doi-asserted-by":"publisher","unstructured":"Dehkordi, A.B., Soltanaghaei, M., Boroujeni, F.Z.: The DDoS attacks detection through machine learning and statistical methods in SDNJ. Supercomput. 772020https:\/\/doi.org\/10.1007\/s11227-020-03323-w","DOI":"10.1007\/s11227-020-03323-w"},{"key":"51_CR3","doi-asserted-by":"crossref","unstructured":"Wang, L., Liu, Y.: A DDoS attack detection method based on information entropy and deep learning in SDN. In: 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), vol. 1, pp. 1084\u20131088 (2020)","DOI":"10.1109\/ITNEC48623.2020.9085007"},{"key":"51_CR4","doi-asserted-by":"crossref","unstructured":"O. Rahman, M. A. G. Quraishi, and C.-H. Lung, \u201cDDoS attacks detection and mitigation in SDN using machine learning,\u201d in 2019 IEEE world congress on services (SERVICES), 2019, vol. 2642, pp. 184\u2013189","DOI":"10.1109\/SERVICES.2019.00051"},{"key":"51_CR5","doi-asserted-by":"crossref","unstructured":"Abhiroop, T., Babu, S., Manoj, B.S.: A machine learning approach for detecting DoS attacks in SDN switches. In: 2018 Twenty Fourth National Conference on Communications (NCC), pp. 1\u20136 (2018)","DOI":"10.1109\/NCC.2018.8600196"},{"key":"51_CR6","doi-asserted-by":"publisher","first-page":"143985","DOI":"10.1109\/ACCESS.2020.3013998","volume":"8","author":"MA Aladaileh","year":"2020","unstructured":"Aladaileh, M.A., Anbar, M., Hasbullah, I.H., Chong, Y.-W., Sanjalawe, Y.K.: Detection techniques of distributed denial of service attacks on software-defined networking controller\u2013a review. IEEE Access 8, 143985\u2013143995 (2020)","journal-title":"IEEE Access"},{"issue":"106","key":"51_CR7","first-page":"59","volume":"3","author":"DT Le","year":"2020","unstructured":"Le, D.T., Dao, M.H., Nguyen, Q.L.T.: Comparison of machine learning algorithms for DDoS attack detection in SDN. \u0418\u043d\u0444op\u043ca\u0446\u0438o\u043d\u043do-y\u043fpa\u0432\u043b\u044f\u044e\u0449\u0438e c\u0438c\u0442e\u043c\u044b, 3(106), 59\u201370 (2020)","journal-title":"\u0418\u043d\u0444op\u043ca\u0446\u0438o\u043d\u043do-y\u043fpa\u0432\u043b\u044f\u044e\u0449\u0438e c\u0438c\u0442e\u043c\u044b,"},{"issue":"20","key":"51_CR8","doi-asserted-by":"publisher","first-page":"4396","DOI":"10.3390\/app9204396","volume":"9","author":"H Liu","year":"2019","unstructured":"Liu, H., Lang, B.: Machine learning and deep learning methods for intrusion detection systems: a survey. Appl. Sci. 9(20), 4396 (2019)","journal-title":"Appl. Sci."},{"key":"51_CR9","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A.H., Hakak, S., Ghorbani, A.A.: Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. In: 2019 International Carnahan Conference on Security Technology (ICCST), pp. 1\u20138 (2019)","DOI":"10.1109\/CCST.2019.8888419"},{"key":"51_CR10","doi-asserted-by":"publisher","first-page":"49794","DOI":"10.1109\/ACCESS.2022.3173319","volume":"10","author":"J Halladay","year":"2022","unstructured":"Halladay, J., et al.: Detection and characterization of DDoS attacks using time-based features. IEEE Access 10, 49794\u201349807 (2022)","journal-title":"IEEE Access"},{"issue":"5","key":"51_CR11","first-page":"2836","volume":"11","author":"AJ Altamemi","year":"2022","unstructured":"Altamemi, A.J., Abdulhassan, A., Obeis, N.T.: DDoS attack detection in software defined networking controller using machine learning techniques. Bull. Electr. Eng. Inf. 11(5), 2836\u20132844 (2022)","journal-title":"Bull. Electr. Eng. Inf."},{"key":"51_CR12","doi-asserted-by":"crossref","unstructured":"Sumadi, F.D.S., Aditya, C.S.K.: Comparative analysis of DDoS detection techniques based on machine learning in openflow network. In: 2020 3rd International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), pp. 152\u2013157 (2020)","DOI":"10.1109\/ISRITI51436.2020.9315510"},{"key":"51_CR13","doi-asserted-by":"crossref","unstructured":"Ramadhan, I., Sukarno, P., Nugroho, M.A.: Comparative analysis of K-nearest neighbor and decision tree in detecting distributed denial of service. In: 2020 8th International Conference on Information and Communication Technology (ICoICT), pp. 1\u20134 (2020)","DOI":"10.1109\/ICoICT49345.2020.9166380"},{"key":"51_CR14","doi-asserted-by":"crossref","unstructured":"Sudar, K.M., Beulah, M., Deepalakshmi, P., Nagaraj, P., Chinnasamy, P.: Detection of distributed denial of service attacks in SDN using machine learning techniques. In: 2021 international conference on Computer Communication and Informatics (ICCCI), pp. 1\u20135 (2021)","DOI":"10.1109\/ICCCI50826.2021.9402517"},{"key":"51_CR15","doi-asserted-by":"crossref","unstructured":"Firdaus, D., Munadi, R., Purwanto, Y.: DDoS attack detection in software defined network using ensemble k-means++ and random forest. In: 2020 3rd International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), pp. 164\u2013169 (2020)","DOI":"10.1109\/ISRITI51436.2020.9315521"},{"key":"51_CR16","doi-asserted-by":"crossref","unstructured":"Lakshminarasimman, S., Ruswin, S., Sundarakantham, K.: Detecting DDoS attacks using decision tree algorithm. In: 2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN), pp. 1\u20136 (2017)","DOI":"10.1109\/ICSCN.2017.8085703"},{"key":"51_CR17","doi-asserted-by":"publisher","first-page":"155859","DOI":"10.1109\/ACCESS.2020.3019330","volume":"8","author":"JA Perez-Diaz","year":"2020","unstructured":"Perez-Diaz, J.A., Valdovinos, I.A., Choo, K.-K.R., Zhu, D.: A flexible SDN-based architecture for identifying and mitigating low-rate DDoS attacks using machine learning. IEEE Access 8, 155859\u2013155872 (2020)","journal-title":"IEEE Access"},{"key":"51_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-021-00467-1","volume":"2","author":"A Makuvaza","year":"2021","unstructured":"Makuvaza, A., Jat, D.S., Gamundani, A.M.: Deep neural network (DNN) solution for real-time detection of distributed denial of service (DDoS) attacks in software defined networks (SDNs). SN Comput. Sci. 2, 1\u201310 (2021)","journal-title":"SN Comput. Sci."},{"key":"51_CR19","doi-asserted-by":"publisher","unstructured":"Suthaharan, S.: Support vector machine. In: Machine Learning Models and Algorithms for Big Data Classification. Integrated Series in Information Systems, vol 36, pp. 207\u2013235. Springer, Boston (2016). https:\/\/doi.org\/10.1007\/978-1-4899-7641-3_9","DOI":"10.1007\/978-1-4899-7641-3_9"},{"key":"51_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/978-3-642-34062-8_32","volume-title":"Information Computing and Applications","author":"Y Liu","year":"2012","unstructured":"Liu, Y., Wang, Y., Zhang, J.: New machine learning algorithm: random forest. In: Liu, B., Ma, M., Chang, J. (eds.) ICICA 2012. LNCS, vol. 7473, pp. 246\u2013252. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34062-8_32"},{"key":"51_CR21","doi-asserted-by":"crossref","unstructured":"Navada, A., Ansari, A.N., Patil, S., Sonkamble, B.A.: Overview of use of decision tree algorithms in machine learning. In: 2011 IEEE Control and System Graduate Research Colloquium, pp. 37\u201342 (2011)","DOI":"10.1109\/ICSGRC.2011.5991826"},{"key":"51_CR22","doi-asserted-by":"crossref","unstructured":"Chen T., Guestrin, C.: Xgboost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785\u2013794 (2016)","DOI":"10.1145\/2939672.2939785"},{"key":"51_CR23","unstructured":"Wasserman, L.: All of Nonparametric Statistics. Springer, New York (2006)"},{"key":"51_CR24","doi-asserted-by":"crossref","unstructured":"B\u00fchlmann, P., van de Geer, S.: Statistics for High-Dimensional Data: Methods, Theory and Applications. Springer, Heidelberg (2011)","DOI":"10.1007\/978-3-642-20192-9"},{"issue":"4","key":"51_CR25","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1016\/j.ipm.2009.03.002","volume":"45","author":"M Sokolova","year":"2009","unstructured":"Sokolova, M., Lapalme, G.: A systematic analysis of performance measures for classification tasks. Inf. Process Manage. 45(4), 427\u2013437 (2009)","journal-title":"Inf. Process Manage."}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of the 2023 International Conference on Advances in Computing Research (ACR\u201923)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-33743-7_51","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T05:14:35Z","timestamp":1729487675000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-33743-7_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031337420","9783031337437"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-33743-7_51","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"27 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Computing Research","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Orlando, FL","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 May 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 May 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acr2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iicser.org\/ACR23\/call_papers.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}