{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:50:29Z","timestamp":1743054629847,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031354663"},{"type":"electronic","value":"9783031354670"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-35467-0_39","type":"book-chapter","created":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T05:02:04Z","timestamp":1686978124000},"page":"656-678","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["5G Security Function and Its Testing Environment"],"prefix":"10.1007","author":[{"given":"Maksim","family":"Iavich","sequence":"first","affiliation":[]},{"given":"Sergiy","family":"Gnatyuk","sequence":"additional","affiliation":[]},{"given":"Giorgi","family":"Iashvili","sequence":"additional","affiliation":[]},{"given":"Roman","family":"Odarchenko","sequence":"additional","affiliation":[]},{"given":"Sergei","family":"Simonov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,18]]},"reference":[{"issue":"5","key":"39_CR1","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MCOM.2014.6815890","volume":"52","author":"A Osseiran","year":"2014","unstructured":"Osseiran, A., et al.: Scenarios for 5G mobile and wireless communications: the vision of the METIS project. IEEE Commun. Mag. 52(5), 26\u201335 (2014). https:\/\/doi.org\/10.1109\/MCOM.2014.6815890","journal-title":"IEEE Commun. Mag."},{"issue":"2","key":"39_CR2","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1109\/MCOM.2016.7402275","volume":"54","author":"H Holma","year":"2016","unstructured":"Holma, H., Toskala, A.: LTE for 5G: evolution or revolution? IEEE Commun. Mag. 54(2), 104\u2013110 (2016). https:\/\/doi.org\/10.1109\/MCOM.2016.7402275","journal-title":"IEEE Commun. Mag."},{"issue":"3","key":"39_CR3","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MCOM.2017.1600924","volume":"55","author":"M Di Felice","year":"2017","unstructured":"Di Felice, M., Piro, G., Grieco, L.A.: 5G networks: opportunities and challenges for smart cities. IEEE Commun. Mag. 55(3), 32\u201337 (2017). https:\/\/doi.org\/10.1109\/MCOM.2017.1600924","journal-title":"IEEE Commun. Mag."},{"issue":"5","key":"39_CR4","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MCOM.2017.1600935","volume":"55","author":"P Rost","year":"2017","unstructured":"Rost, P., et al.: Network slicing to enable scalability and flexibility in 5G mobile networks. IEEE Commun. Mag. 55(5), 72\u201379 (2017). https:\/\/doi.org\/10.1109\/MCOM.2017.1600935","journal-title":"IEEE Commun. Mag."},{"doi-asserted-by":"publisher","unstructured":"Qureshi, H.N., Manalastas, M., Ijaz, A., Imran, A., Liu, Y., Al Kalaa, M.O.: Communication requirements in 5G-enabled healthcare applications: review and considerations. Healthcare 10, 293 (2022). https:\/\/doi.org\/10.3390\/healthcare10020293","key":"39_CR5","DOI":"10.3390\/healthcare10020293"},{"issue":"1","key":"39_CR6","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MNET.011.2000213","volume":"35","author":"P Choudhury","year":"2021","unstructured":"Choudhury, P., Sahoo, M., Mohapatra, S.K., Das, S.K.: A comprehensive review on security threats and solutions in 5G networks. IEEE Netw. 35(1), 72\u201381 (2021). https:\/\/doi.org\/10.1109\/MNET.011.2000213","journal-title":"IEEE Netw."},{"key":"39_CR7","doi-asserted-by":"publisher","first-page":"188684","DOI":"10.1109\/ACCESS.2020.3033864","volume":"8","author":"J Qadir","year":"2020","unstructured":"Qadir, J., Ahmed, S.H., Abbas, H.: 5G security challenges and opportunities: a review. IEEE Access 8, 188684\u2013188703 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3033864","journal-title":"IEEE Access"},{"key":"39_CR8","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/978-3-030-75078-7_44","volume-title":"Advanced Information Networking and Applications","author":"R Bocu","year":"2021","unstructured":"Bocu, R., Iavich, M., Tabirca, S.: A real-time intrusion detection system for software defined 5G networks. In: Barolli, L., Woungang, I., Enokido, T. (eds.) AINA 2021. LNNS, vol. 227, pp. 436\u2013446. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-75078-7_44"},{"key":"39_CR9","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1007\/978-3-030-75075-6_47","volume-title":"Advanced Information Networking and Applications","author":"M Iavich","year":"2021","unstructured":"Iavich, M., Gnatyuk, S., Odarchenko, R., Bocu, R., Simonov, S.: The novel system of attacks detection in 5G. In: Barolli, L., Woungang, I., Enokido, T. (eds.) AINA 2021. LNNS, vol. 226, pp. 580\u2013591. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-75075-6_47"},{"doi-asserted-by":"publisher","unstructured":"Saha, T., Aaraj, N., Jha, N.K.: Machine learning assisted security analysis of 5G-network-connected systems. IEEE Trans. Emerging Topics Comput. 10(4), 2006\u20132024 (2022). https:\/\/doi.org\/10.1109\/TETC.2022.3147192","key":"39_CR10","DOI":"10.1109\/TETC.2022.3147192"},{"doi-asserted-by":"publisher","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1\u20136 (2009).https:\/\/doi.org\/10.1109\/CISDA.2009.5356528","key":"39_CR11","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"39_CR12","doi-asserted-by":"publisher","first-page":"29575","DOI":"10.1109\/ACCESS.2020.2972627","volume":"8","author":"T Su","year":"2020","unstructured":"Su, T., Sun, H., Zhu, J., Wang, S., Li, Y.: BAT: deep learning methods on network intrusion detection using NSL-KDD dataset. IEEE Access 8, 29575\u201329585 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2972627","journal-title":"IEEE Access"},{"doi-asserted-by":"publisher","unstructured":"Meena, G., Choudhary, R.R.: A review paper on IDS classification using KDD 99 and NSL KDD dataset in WEKA. In: 2017 International Conference on Computer, Communications and Electronics (Comptelix), Jaipur, India, pp. 553\u2013558 (2017). https:\/\/doi.org\/10.1109\/COMPTELIX.2017.8004032","key":"39_CR13","DOI":"10.1109\/COMPTELIX.2017.8004032"},{"issue":"1","key":"39_CR14","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.jnca.2012.09.005","volume":"36","author":"R Singh","year":"2013","unstructured":"Singh, R., Bhattacharyya, D.K.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 16\u201324 (2013). https:\/\/doi.org\/10.1016\/j.jnca.2012.09.005","journal-title":"J. Netw. Comput. Appl."},{"doi-asserted-by":"publisher","unstructured":"Oshima, S., Nakashima, T., Sueyoshi, T.: Early DoS\/DDoS detection method using short-term statistics. In: 2010 International Conference on Complex, Intelligent and Software Intensive Systems, pp. 168\u2013173 (2010). https:\/\/doi.org\/10.1109\/CISIS.2010.53","key":"39_CR15","DOI":"10.1109\/CISIS.2010.53"},{"issue":"3","key":"39_CR16","doi-asserted-by":"publisher","first-page":"137","DOI":"10.3846\/16487788.2016.1237787","volume":"20","author":"Y Danik","year":"2016","unstructured":"Danik, Y., Hryschuk, R., Gnatyuk, S.: Synergistic effects of information and cybernetic interaction in civil aviation. Aviation 20(3), 137\u2013144 (2016)","journal-title":"Aviation"},{"key":"39_CR17","doi-asserted-by":"publisher","first-page":"40156","DOI":"10.1109\/ACCESS.2021.3062849","volume":"9","author":"G Liu","year":"2021","unstructured":"Liu, G., Chen, H., Wu, X., Wang, L.: A deep learning-based DDoS attack detection approach in software-defined networking. IEEE Access 9, 40156\u201340164 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3062849","journal-title":"IEEE Access"},{"issue":"1","key":"39_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13673-021-00263-8","volume":"11","author":"M Ahmad","year":"2021","unstructured":"Ahmad, M., Javaid, M., Malik, A.N., Imran, W.A., Khan, Z.A.: DDoS attack detection and mitigation using machine learning: a systematic review. HCIS 11(1), 1\u201324 (2021). https:\/\/doi.org\/10.1186\/s13673-021-00263-8","journal-title":"HCIS"},{"issue":"3","key":"39_CR19","doi-asserted-by":"publisher","first-page":"937","DOI":"10.3390\/s21030937","volume":"21","author":"A Zafeiropoulos","year":"2021","unstructured":"Zafeiropoulos, A., Nikaein, N., Tsolkas, D., Papaefstathiou, I.: A machine learning approach to the detection and mitigation of DDoS attacks in 5G networks. Sensors 21(3), 937\u2013961 (2021). https:\/\/doi.org\/10.3390\/s21030937","journal-title":"Sensors"},{"issue":"2","key":"39_CR20","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1007\/s10922-020-09574-7","volume":"29","author":"KMS Bhatia","year":"2021","unstructured":"Bhatia, K.M.S., Sharma, H., Kumar, M.: A machine learning-based approach for detection and mitigation of DDoS attacks in cloud computing. J. Netw. Syst. Manage. 29(2), 480\u2013511 (2021). https:\/\/doi.org\/10.1007\/s10922-020-09574-7","journal-title":"J. Netw. Syst. Manage."},{"issue":"3","key":"39_CR21","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/s11390-020-0219-1","volume":"36","author":"Y Li","year":"2021","unstructured":"Li, Y., Zheng, S., Feng, Y., Guan, C.: A review of machine learning techniques for DDoS detection and mitigation. J. Comput. Sci. Technol. 36(3), 475\u2013497 (2021). https:\/\/doi.org\/10.1007\/s11390-020-0219-1","journal-title":"J. Comput. Sci. Technol."},{"issue":"7","key":"39_CR22","doi-asserted-by":"publisher","first-page":"5639","DOI":"10.1109\/JIOT.2021.3073771","volume":"8","author":"MRK Krishnan","year":"2021","unstructured":"Krishnan, M.R.K., Chandrasekar, P.R.: A machine learning-based DDoS attack detection and mitigation system for fog-enabled 5G networks. IEEE Internet Things J. 8(7), 5639\u20135650 (2021). https:\/\/doi.org\/10.1109\/JIOT.2021.3073771","journal-title":"IEEE Internet Things J."},{"key":"39_CR23","doi-asserted-by":"publisher","first-page":"15097","DOI":"10.1109\/ACCESS.2021.3055941","volume":"9","author":"M Zhang","year":"2021","unstructured":"Zhang, M., Zhou, C., Lu, Y., Zheng, W., Qiu, S.: A novel DDoS attack detection method based on dynamic time warping and fuzzy clustering. IEEE Access 9, 15097\u201315106 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3055941","journal-title":"IEEE Access"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Information Technology for Education, Science, and Technics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-35467-0_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T05:06:36Z","timestamp":1686978396000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-35467-0_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031354663","9783031354670"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-35467-0_39","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"18 June 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ITEST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Scientific-Practical Conference \"Information Technology for Education, Science and Technics\"","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cherkasy","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ukraine","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"itest2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/itest.chdtu.edu.ua\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}