{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:10:56Z","timestamp":1767337856194,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031355066"},{"type":"electronic","value":"9783031355073"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-35507-3_54","type":"book-chapter","created":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T21:04:13Z","timestamp":1685739853000},"page":"555-564","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Machine Learning Method for\u00a0DDoS Detection and\u00a0Mitigation in\u00a0a\u00a0Multi-controller SDN Environment Using Cloud Computing"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8710-849X","authenticated-orcid":false,"given":"Ameni","family":"Chetouane","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2507-9571","authenticated-orcid":false,"given":"Kamel","family":"Karoui","sequence":"additional","affiliation":[]},{"given":"Ghayth","family":"Nemri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,3]]},"reference":[{"key":"54_CR1","doi-asserted-by":"crossref","unstructured":"Singh, S., Prakash, S.: A survey on software defined network based on architecture, issues and challenges. In: 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC), pp. 568\u2013573. IEEE (2019)","DOI":"10.1109\/ICCMC.2019.8819785"},{"key":"54_CR2","doi-asserted-by":"publisher","first-page":"132502","DOI":"10.1109\/ACCESS.2020.3009733","volume":"8","author":"KS Sahoo","year":"2020","unstructured":"Sahoo, K.S.: An evolutionary SVM model for DDoS attack detection in software defined networks. IEEE Access 8, 132502\u2013132513 (2020)","journal-title":"IEEE Access"},{"key":"54_CR3","doi-asserted-by":"crossref","unstructured":"Lin, C.-H., Li, C.-Y., Wang, K.: Setting malicious flow entries against SDN operations: attacks and countermeasures. In: 2018 IEEE Conference on Dependable and Secure Computing (DSC), pp. 1\u20138. IEEE (2018)","DOI":"10.1109\/DESEC.2018.8625101"},{"issue":"10","key":"54_CR4","doi-asserted-by":"publisher","first-page":"2358","DOI":"10.1109\/JSAC.2018.2869997","volume":"36","author":"K Kalkan","year":"2018","unstructured":"Kalkan, K., Altay, L., G\u00fcr, G., Alag\u00f6z, F.: JESS: joint entropy-based DDoS defense scheme in SDN. IEEE J. Selected Areas Commun. 36(10), 2358\u20132372 (2018)","journal-title":"IEEE J. Selected Areas Commun."},{"key":"54_CR5","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.future.2021.03.011","volume":"122","author":"Lubna Fayez Eliyan and Roberto Di Pietro","year":"2021","unstructured":"Lubna Fayez Eliyan and Roberto Di Pietro: Dos and DDoS attacks in software defined networks: a survey of existing solutions and research challenges. Future Gener. Comput. Syst. 122, 149\u2013171 (2021)","journal-title":"Future Gener. Comput. Syst."},{"key":"54_CR6","doi-asserted-by":"publisher","first-page":"2297","DOI":"10.1016\/j.procs.2020.03.282","volume":"167","author":"KB Virupakshar","year":"2020","unstructured":"Virupakshar, K.B., Asundi, M., Channal, K., Shettar, P., Patil, S., Narayan, D.G.: Distributed denial of service (DDoS) attacks detection system for openstack-based private cloud. Procedia Comput. Sci. 167, 2297\u20132307 (2020)","journal-title":"Procedia Comput. Sci."},{"key":"54_CR7","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-030-99004-6_6","volume-title":"Distributed Computing for Emerging Smart Networks","author":"A Chetouane","year":"2022","unstructured":"Chetouane, A., Karoui, K.: A survey of\u00a0machine learning methods for\u00a0DDoS threats detection against SDN. In: Jemili, I., Mosbah, M. (eds.) DiCES-N 2022. CCIS, vol. 1564, pp. 99\u2013127. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-99004-6_6"},{"key":"54_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11277-021-09071-1","volume":"125","author":"M. Revathi","year":"2021","unstructured":"Revathi, M.., Ramalingam, V.. V.., Amutha, B..: A machine learning based detection and mitigation of the DDoS attack by using SDN controller framework. Wireless Pers Commun. 125, 1\u201325 (2021). https:\/\/doi.org\/10.1007\/s11277-021-09071-1","journal-title":"Wireless Pers Commun."},{"key":"54_CR9","doi-asserted-by":"crossref","unstructured":"Khashab, F., Moubarak, J., Feghali, A., Bassil, C.: DDoS attack detection and mitigation in SDN using machine learning. In: 2021 IEEE 7th International Conference on Network Softwarization (NetSoft), pp. 395\u2013401. IEEE (2021)","DOI":"10.1109\/NetSoft51509.2021.9492558"},{"issue":"11","key":"54_CR10","doi-asserted-by":"publisher","first-page":"13166","DOI":"10.1007\/s11227-021-03782-9","volume":"77","author":"Omer Elsier Tayfour and Muhammad Nadzir Marsono","year":"2021","unstructured":"Omer Elsier Tayfour and Muhammad Nadzir Marsono: Collaborative detection and mitigation of DDoS in software-defined networks. J. Supercomput. 77(11), 13166\u201313190 (2021)","journal-title":"J. Supercomput."},{"key":"54_CR11","doi-asserted-by":"crossref","unstructured":"Rahman, O., Quraishi, M.A.G., Lung, C.-H.: DDoS attacks detection and mitigation in SDN using machine learning. In: 2019 IEEE World Congress on Services (SERVICES), vol. 2642, pp. 184\u2013189. IEEE (2019)","DOI":"10.1109\/SERVICES.2019.00051"},{"key":"54_CR12","doi-asserted-by":"crossref","unstructured":"Alzahrani, A.O., Alenazi, M.J.F.: Designing a network intrusion detection system based on machine learning for software defined networks. Future Internet 13(5), 111 (2021)","DOI":"10.3390\/fi13050111"},{"key":"54_CR13","doi-asserted-by":"crossref","unstructured":"Karan, B.V., Narayan, D.G., Hiremath, P.S.: Detection of DDoS attacks in software defined networks. In: 2018 3rd International Conference on Computational Systems and Information Technology for Sustainable Solutions (CSITSS), pp. 265\u2013270 (2018)","DOI":"10.1109\/CSITSS.2018.8768551"},{"key":"54_CR14","doi-asserted-by":"crossref","unstructured":"Aslam, M., et al.: Adaptive machine learning based distributed denial-of-services attacks detection and mitigation system for SDN-enabled IoT. Sensors 22(7), 2697 (2022)","DOI":"10.3390\/s22072697"},{"key":"54_CR15","unstructured":"Ahuja, N., Mukhopadhyay, D., Singal, G.: DDoS attack SDN dataset (2020)"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Systems Design and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-35507-3_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T21:30:10Z","timestamp":1685741410000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-35507-3_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031355066","9783031355073"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-35507-3_54","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"3 June 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Systems Design and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isda2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/isda22\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}