{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T22:42:01Z","timestamp":1773873721259,"version":"3.50.1"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031516290","type":"print"},{"value":"9783031516306","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-51630-6_6","type":"book-chapter","created":{"date-parts":[[2024,2,4]],"date-time":"2024-02-04T16:02:04Z","timestamp":1707062524000},"page":"83-99","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":45,"title":["Application of\u00a0Large Language Models to\u00a0DDoS Attack Detection"],"prefix":"10.1007","author":[{"given":"Michael","family":"Guastalla","sequence":"first","affiliation":[]},{"given":"Yiyi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Arvin","family":"Hekmati","sequence":"additional","affiliation":[]},{"given":"Bhaskar","family":"Krishnamachari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,5]]},"reference":[{"issue":"2","key":"6_CR1","doi-asserted-by":"publisher","first-page":"198","DOI":"10.3390\/electronics11020198","volume":"11","author":"M Abdullahi","year":"2022","unstructured":"Abdullahi, M., et al.: Detecting cybersecurity attacks in internet of things using artificial intelligence methods: a systematic literature review. Electronics 11(2), 198 (2022)","journal-title":"Electronics"},{"key":"6_CR2","unstructured":"ANALYTICS, I.: State of IoT 2023: Number of connected IoT devices growing 16"},{"key":"6_CR3","unstructured":"Antonakakis, M., et al.: Understanding the Mirai botnet. In: 26th USENIX security symposium (USENIX Security 17), pp. 1093\u20131110 (2017)"},{"issue":"6","key":"6_CR4","doi-asserted-by":"publisher","first-page":"1126","DOI":"10.1007\/s10439-023-03171-8","volume":"51","author":"SS Biswas","year":"2023","unstructured":"Biswas, S.S.: Potential use of chat GPT in global warming. Ann. Biomed. Eng. 51(6), 1126\u20131127 (2023)","journal-title":"Ann. Biomed. Eng."},{"issue":"5","key":"6_CR5","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1007\/s10439-023-03172-7","volume":"51","author":"SS Biswas","year":"2023","unstructured":"Biswas, S.S.: Role of chat GPT in public health. Ann. Biomed. Eng. 51(5), 868\u2013869 (2023)","journal-title":"Ann. Biomed. Eng."},{"key":"6_CR6","unstructured":"Brown, T.B., et al.: Language models are few-shot learners (2020)"},{"key":"6_CR7","unstructured":"Ferrag, M.A., Ndhlovu, M., Tihanyi, N., Cordeiro, L.C., Debbah, M., Lestable, T.: Revolutionizing cyber threat detection with large language models. arXiv preprint arXiv:2306.14263 (2023)"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Hekmati, A., Grippo, E., Krishnamachari, B.: Dataset: Large-scale urban IoT activity data for DDOS attack emulation. arXiv preprint arXiv:2110.01842 (2021)","DOI":"10.1145\/3485730.3493695"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Hekmati, A., Grippo, E., Krishnamachari, B.: Neural networks for DDOS attack detection using an enhanced urban IoT dataset. In: 2022 International Conference on Computer Communications and Networks (ICCCN), pp. 1\u20138. IEEE (2022)","DOI":"10.1109\/ICCCN54977.2022.9868942"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Hekmati, A., Jethwa, N., Grippo, E., Krishnamachari, B.: Correlation-aware neural networks for DDOS attack detection in IoT systems. arXiv preprint arXiv:2302.07982 (2023)","DOI":"10.1109\/TNET.2024.3408675"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Huang, J., Chang, K.C.C.: Towards reasoning in large language models: a survey. arXiv preprint arXiv:2212.10403 (2022)","DOI":"10.18653\/v1\/2023.findings-acl.67"},{"key":"6_CR12","unstructured":"Johnson, A.: Leveraging large language models for network security, https:\/\/medium.com\/@andrew_johnson_4\/leveraging-large-language-models-for-network-security-b2027f03d522. Accessed 08 July 2023"},{"key":"6_CR13","doi-asserted-by":"publisher","unstructured":"Kurniabudi, Stiawan, D., Darmawijoyo, Bin Idris, M.Y., Bamhdi, A.M., Budiarto, R.: Cicids-2017 dataset feature analysis with information gain for anomaly detection. IEEE Access 8, 132911\u2013132921 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3009843","DOI":"10.1109\/ACCESS.2020.3009843"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Liu, N.F., et al: Lost in the middle: How language models use long contexts (2023)","DOI":"10.1162\/tacl_a_00638"},{"key":"6_CR15","unstructured":"Liu, Y., et al.: Summary of ChatGPT\/GPT-4 research and perspective towards the future of large language models. arXiv preprint arXiv:2304.01852 (2023)"},{"issue":"6","key":"6_CR16","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MSP.2005.153","volume":"3","author":"G Marin","year":"2005","unstructured":"Marin, G.: Network security basics. IEEE Secur. Priv. 3(6), 68\u201372 (2005). https:\/\/doi.org\/10.1109\/MSP.2005.153","journal-title":"IEEE Secur. Priv."},{"issue":"4","key":"6_CR17","doi-asserted-by":"publisher","first-page":"1580","DOI":"10.1111\/coin.12293","volume":"36","author":"A Mubarakali","year":"2020","unstructured":"Mubarakali, A., Srinivasan, K., Mukhalid, R., Jaganathan, S.C.B., Marina, N.: Security challenges in internet of things: Distributed denial of service attack detection using support vector machine-based expert systems. Comput. Intell. 36(4), 1580\u20131592 (2020)","journal-title":"Comput. Intell."},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Pal, S.K., Mitra, S.: Multilayer perceptron, fuzzy sets, classifiaction (1992)","DOI":"10.1109\/72.159058"},{"issue":"5","key":"6_CR19","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1109\/72.159058","volume":"3","author":"S Pal","year":"1992","unstructured":"Pal, S., Mitra, S.: Multilayer perceptron, fuzzy sets, and classification. IEEE Trans. Neural Netw. 3(5), 683\u2013697 (1992). https:\/\/doi.org\/10.1109\/72.159058","journal-title":"IEEE Trans. Neural Netw."},{"key":"6_CR20","first-page":"108","volume":"1","author":"I Sharafaldin","year":"2018","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1, 108\u2013116 (2018)","journal-title":"ICISSp"},{"key":"6_CR21","doi-asserted-by":"publisher","first-page":"222310","DOI":"10.1109\/ACCESS.2020.3041951","volume":"8","author":"K Shaukat","year":"2020","unstructured":"Shaukat, K., Luo, S., Varadharajan, V., Hameed, I.A., Xu, M.: A survey on machine learning techniques for cyber security in the last decade. IEEE Access 8, 222310\u2013222354 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3041951","journal-title":"IEEE Access"},{"key":"6_CR22","doi-asserted-by":"publisher","unstructured":"Sinanovi\u0107, H., Mrdovic, S.: Analysis of Mirai malicious software. In: 2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), pp. 1\u20135 (2017). https:\/\/doi.org\/10.23919\/SOFTCOM.2017.8115504","DOI":"10.23919\/SOFTCOM.2017.8115504"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Surameery, N.M.S., Shakor, M.Y.: Use chat gpt to solve programming bugs. International Journal of Information Technology & Computer Engineering (IJITC) ISSN: 2455\u20135290 3(01), 17\u201322 (2023)","DOI":"10.55529\/ijitc.31.17.22"},{"key":"6_CR24","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/978-3-642-22540-6_42","volume-title":"Advances in Network Security and Applications","author":"M Suresh","year":"2011","unstructured":"Suresh, M., Anitha, R.: Evaluating machine learning algorithms for detecting DDoS attacks. In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds.) CNSA 2011. CCIS, vol. 196, pp. 441\u2013452. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22540-6_42"},{"issue":"8","key":"6_CR25","doi-asserted-by":"publisher","first-page":"4117","DOI":"10.3390\/s23084117","volume":"23","author":"U Tariq","year":"2023","unstructured":"Tariq, U., Ahmed, I., Ali, K.B., Shaukat, K.: A critical cybersecurity analysis and future research directions for the internet of things: a comprehensive review. Sensors 23(8), 4117 (2023)","journal-title":"Sensors"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Vishwakarma, R., Jain, A.K.: A survey of DDOS attacking techniques and defence mechanisms in the IoT network. Telecommun. Syst. 73(1), 3\u201325 (2020)","DOI":"10.1007\/s11235-019-00599-z"},{"key":"6_CR27","unstructured":"Yu, D., et al.: Differentially private fine-tuning of language models. arXiv preprint arXiv:2110.06500 (2021)"},{"key":"6_CR28","unstructured":"Zhao, W.X., et al.: A survey of large language models. arXiv preprint arXiv:2303.18223 (2023)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Cyber-Physical Systems and Smart Vehicles"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-51630-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,10]],"date-time":"2024-11-10T02:44:02Z","timestamp":1731206642000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-51630-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031516290","9783031516306"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-51630-6_6","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"5 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SmartSP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Cyber-Physical Systems and Smart Vehicles","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chicago, IL","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"smartsp2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/smartsp.eai-conferences.org\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,67","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,22","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}