{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:29:33Z","timestamp":1775744973302,"version":"3.50.1"},"publisher-location":"Cham","reference-count":63,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031547720","type":"print"},{"value":"9783031547737","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-54773-7_12","type":"book-chapter","created":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T00:02:47Z","timestamp":1709164967000},"page":"283-309","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["DDoSMiner: An Automated Framework for\u00a0DDoS Attack Characterization and\u00a0Vulnerability Mining"],"prefix":"10.1007","author":[{"given":"Xi","family":"Ling","sequence":"first","affiliation":[]},{"given":"Jiongchi","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Ziming","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Zhihao","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Haitao","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Binbin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,29]]},"reference":[{"issue":"4","key":"12_CR1","doi-asserted-by":"publisher","first-page":"3769","DOI":"10.1109\/COMST.2019.2934468","volume":"21","author":"N Agrawal","year":"2019","unstructured":"Agrawal, N., Tapaswi, S.: Defense mechanisms against ddos attacks in a cloud computing environment: state-of-the-art and research challenges. IEEE Commun. Surv. Tutorials 21(4), 3769\u20133795 (2019)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"12_CR2","unstructured":"Antonakakis, M., April, T., et al.: Understanding the mirai botnet. In: 26th USENIX Security Symposium (USENIX Security 17), pp. 1093\u20131110 (2017)"},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.comnet.2016.01.002","volume":"97","author":"ZA Baig","year":"2016","unstructured":"Baig, Z.A., et al.: Controlled access to cloud resources for mitigating economic denial of sustainability (edos) attacks. Comput. Netw. 97, 31\u201347 (2016)","journal-title":"Comput. Netw."},{"issue":"3","key":"12_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3182657","volume":"51","author":"R Baldoni","year":"2018","unstructured":"Baldoni, R., Coppa, E., et al.: A survey of symbolic execution techniques. ACM Comput. Surv. (CSUR) 51(3), 1\u201339 (2018)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Bhale, P., Chowdhury, D.R., Biswas, S., Nandi, S.: Optimist: Lightweight and transparent ids with optimum placement strategy to mitigate mixed-rate ddos attacks in iot networks. IEEE Internet of Things Journal (2023)","DOI":"10.1109\/JIOT.2023.3234530"},{"key":"12_CR6","unstructured":"Bock, K., et al.: Weaponizing middleboxes for $$\\{$$TCP$$\\}$$ reflected amplification. In: 30th USENIX Security Symposium (USENIX Security 21), pp. 3345\u20133361 (2021)"},{"key":"12_CR7","unstructured":"Cadar, C., Dunbar, D., Klee, D.E.: Unassisted and automatic generation of high-coverage tests for complex systems programs. In: Proceedings of Operating System Design and Implementation, pp. 209\u2013224"},{"issue":"2","key":"12_CR8","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1145\/2408776.2408795","volume":"56","author":"C Cadar","year":"2013","unstructured":"Cadar, C., Sen, K.: Symbolic execution for software testing: three decades later. Commun. ACM 56(2), 82\u201390 (2013)","journal-title":"Commun. ACM"},{"issue":"10","key":"12_CR9","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MCOM.2002.1039856","volume":"40","author":"RK Chang","year":"2002","unstructured":"Chang, R.K.: Defending against flooding-based distributed denial-of-service attacks: a tutorial. IEEE Commun. Mag. 40(10), 42\u201351 (2002)","journal-title":"IEEE Commun. Mag."},{"issue":"3","key":"12_CR10","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1145\/1961296.1950396","volume":"46","author":"V Chipounov","year":"2011","unstructured":"Chipounov, V., Kuznetsov, V., Candea, G.: S2e: a platform for in-vivo multi-path analysis of software systems. Acm Sigplan Notices 46(3), 265\u2013278 (2011)","journal-title":"Acm Sigplan Notices"},{"issue":"1","key":"12_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2110356.2110358","volume":"30","author":"V Chipounov","year":"2012","unstructured":"Chipounov, V., et al.: The s2e platform: design, implementation, and applications. ACM Trans. Comput. Syst. (TOCS) 30(1), 1\u201349 (2012)","journal-title":"ACM Trans. Comput. Syst. (TOCS)"},{"key":"12_CR12","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1016\/j.procs.2015.04.245","volume":"49","author":"RV Deshmukh","year":"2015","unstructured":"Deshmukh, R.V., Devadkar, K.K.: Understanding ddos attack & its effect in cloud environment. Proc. Comput. Sci. 49, 202\u2013210 (2015)","journal-title":"Proc. Comput. Sci."},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Doshi, R., Apthorpe, N., Feamster, N.: Machine learning ddos detection for consumer internet of things devices. In: 2018 IEEE Security and Privacy Workshops (SPW), pp. 29\u201335. IEEE (2018)","DOI":"10.1109\/SPW.2018.00013"},{"key":"12_CR14","unstructured":"Fayaz, S.K., Tobioka, Y., et al.: Bohatei: Flexible and elastic $$\\{$$DDoS$$\\}$$ defense. In: 24th USENIX Security Symposium (USENIX Security 15), pp. 817\u2013832 (2015)"},{"issue":"2","key":"12_CR15","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1145\/2602204.2602219","volume":"44","author":"N Feamster","year":"2014","unstructured":"Feamster, N., et al.: The road to sdn: an intellectual history of programmable networks. ACM SIGCOMM Comput. Commun. Rev. 44(2), 87\u201398 (2014)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"12","key":"12_CR16","doi-asserted-by":"publisher","first-page":"11407","DOI":"10.1002\/int.23048","volume":"37","author":"A Gaurav","year":"2022","unstructured":"Gaurav, A., Gupta, B.B., Alhalabi, W., Visvizi, A., Asiri, Y.: A comprehensive survey on ddos attacks on various intelligent systems and it\u2019s defense techniques. Int. J. Intell. Syst. 37(12), 11407\u201311431 (2022)","journal-title":"Int. J. Intell. Syst."},{"key":"12_CR17","unstructured":"Granberg, N.: Evaluating the effectiveness of free rule sets for snort (2022)"},{"issue":"4","key":"12_CR18","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/65.598458","volume":"11","author":"B Guha","year":"1997","unstructured":"Guha, B., Mukherjee, B.: Network security via reverse engineering of tcp code: vulnerability analysis and proposed solutions. IEEE Netw. 11(4), 40\u201348 (1997)","journal-title":"IEEE Netw."},{"issue":"3","key":"12_CR19","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1109\/TNSM.2016.2598420","volume":"13","author":"JG Herrera","year":"2016","unstructured":"Herrera, J.G., Botero, J.F.: Resource allocation in nfv: a comprehensive survey. IEEE Trans. Netw. Serv. Manage. 13(3), 518\u2013532 (2016)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Hong, S., Xu, L., et al.: Poisoning network visibility in software-defined networks: New attacks and countermeasures. In: Network and Distributed System Security Symposium (2015). https:\/\/api.semanticscholar.org\/CorpusID:12312831","DOI":"10.14722\/ndss.2015.23283"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Jin, C., Wang, H., Shin, K.G.: Hop-count filtering: an effective defense against spoofed ddos traffic. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 30\u201341 (2003)","DOI":"10.1145\/948109.948116"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Joseph, D.A., et al.: A policy-aware switching layer for data centers. In: Proceedings of the ACM SIGCOMM 2008 Conference On Data Communication, pp. 51\u201362 (2008)","DOI":"10.1145\/1402958.1402966"},{"issue":"3","key":"12_CR23","doi-asserted-by":"publisher","first-page":"1520","DOI":"10.1109\/SURV.2014.022714.00160","volume":"16","author":"R Kaur","year":"2014","unstructured":"Kaur, R., Singh, M.: A survey on zero-day polymorphic worm detection techniques. IEEE Commun. Surv. Tutorials 16(3), 1520\u20131549 (2014)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"1","key":"12_CR24","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1109\/JSAC.2003.818807","volume":"22","author":"AD Keromytis","year":"2004","unstructured":"Keromytis, A.D., et al.: Sos: an architecture for mitigating ddos attacks. IEEE J. Sel. Areas Commun. 22(1), 176\u2013188 (2004)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"12_CR25","unstructured":"Krupp, J., Grishchenko, I., Rossow, C.: $$\\{$$AmpFuzz$$\\}$$: Fuzzing for amplification $$\\{$$DDoS$$\\}$$ vulnerabilities. In: 31st USENIX Security Symposium (USENIX Security 22), pp. 1043\u20131060 (2022)"},{"key":"12_CR26","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.cosrev.2018.02.002","volume":"28","author":"M Lalou","year":"2018","unstructured":"Lalou, M., Tahraoui, M.A., Kheddouci, H.: The critical node detection problem in networks: a survey. Comput. Sci. Rev. 28, 92\u2013117 (2018)","journal-title":"Comput. Sci. Rev."},{"issue":"8","key":"12_CR27","doi-asserted-by":"publisher","first-page":"1090","DOI":"10.1109\/5.533956","volume":"84","author":"D Lee","year":"1996","unstructured":"Lee, D., Yannakakis, M.: Principles and methods of testing finite state machines-a survey. Proc. IEEE 84(8), 1090\u20131123 (1996)","journal-title":"Proc. IEEE"},{"key":"12_CR28","unstructured":"Liu, Z., et al.: Jaqen: A $$\\{$$High-Performance$$\\}$$$$\\{$$Switch-Native$$\\}$$ approach for detecting and mitigating volumetric $$\\{$$DDoS$$\\}$$ attacks with programmable switches. In: 30th USENIX Security Symposium (USENIX Security 21), pp. 3829\u20133846 (2021)"},{"issue":"4","key":"12_CR29","doi-asserted-by":"publisher","first-page":"1948","DOI":"10.1109\/TNET.2018.2854795","volume":"26","author":"Z Liu","year":"2018","unstructured":"Liu, Z., Jin, H., Hu, Y.C., Bailey, M.: Practical proactive ddos-attack mitigation via endpoint-driven in-network traffic control. IEEE\/ACM Trans. Network. 26(4), 1948\u20131961 (2018)","journal-title":"IEEE\/ACM Trans. Network."},{"issue":"6","key":"12_CR30","first-page":"2767","volume":"18","author":"Y Mirsky","year":"2020","unstructured":"Mirsky, Y., Guri, M.: Ddos attacks on 9-1-1 emergency services. IEEE Trans. Dependable Secure Comput. 18(6), 2767\u20132786 (2020)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"2","key":"12_CR31","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MNET.2008.4476069","volume":"22","author":"AT Mizrak","year":"2008","unstructured":"Mizrak, A.T., Savage, S., Marzullo, K.: Detecting compromised routers via packet forwarding behavior. IEEE Netw. 22(2), 34\u201339 (2008)","journal-title":"IEEE Netw."},{"issue":"2","key":"12_CR32","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1145\/1132026.1132027","volume":"24","author":"D Moore","year":"2006","unstructured":"Moore, D., Shannon, C., Brown, D.J., Voelker, G.M., Savage, S.: Inferring internet denial-of-service activity. ACM Trans. Comput. Syst. (TOCS) 24(2), 115\u2013139 (2006)","journal-title":"ACM Trans. Comput. Syst. (TOCS)"},{"issue":"4","key":"12_CR33","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1109\/TETC.2016.2606384","volume":"5","author":"A Mosenia","year":"2016","unstructured":"Mosenia, A., Jha, N.K.: A comprehensive study of security of internet-of-things. IEEE Trans. Emerg. Top. Comput. 5(4), 586\u2013602 (2016)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"issue":"13","key":"12_CR34","doi-asserted-by":"publisher","first-page":"14866","DOI":"10.1007\/s11227-022-04453-z","volume":"78","author":"J Nayak","year":"2022","unstructured":"Nayak, J., Meher, S.K., Souri, A., Naik, B., Vimal, S.: Extreme learning machine and bayesian optimization-driven intelligent framework for iomt cyber-attack detection. J. Supercomput. 78(13), 14866\u201314891 (2022)","journal-title":"J. Supercomput."},{"issue":"7","key":"12_CR35","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/S1353-4858(08)70086-2","volume":"2008","author":"J Nazario","year":"2008","unstructured":"Nazario, J.: Ddos attack evolution. Netw. Secur. 2008(7), 7\u201310 (2008)","journal-title":"Netw. Secur."},{"key":"12_CR36","unstructured":"O\u2019Leary, M., O\u2019Leary, M.: Snort. Cyber Operations: Building, Defending, and Attacking Modern Computer Networks, pp. 605\u2013641 (2015)"},{"key":"12_CR37","doi-asserted-by":"publisher","first-page":"1790","DOI":"10.1109\/TIFS.2019.2950121","volume":"15","author":"A Praseed","year":"2019","unstructured":"Praseed, A., Thilagam, P.S.: Multiplexed asymmetric attacks: Next-generation ddos on http\/2 servers. IEEE Trans. Inf. Forensics Secur. 15, 1790\u20131800 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"12_CR38","doi-asserted-by":"crossref","unstructured":"Rossow, C.: Amplification hell: Revisiting network protocols for ddos abuse. In: 2014 Network and Distributed System Security Symposium (2014)","DOI":"10.14722\/ndss.2014.23233"},{"key":"12_CR39","doi-asserted-by":"crossref","unstructured":"Santanna, J.J., van Rijswijk-Deij, R., et al.: Booters-an analysis of ddos-as-a-service attacks. In: 2015 IFIP\/IEEE International Symposium on Integrated Network Management (IM), pp. 243\u2013251. IEEE (2015)","DOI":"10.1109\/INM.2015.7140298"},{"key":"12_CR40","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A.H., Hakak, S., Ghorbani, A.A.: Developing realistic distributed denial of service (ddos) attack dataset and taxonomy. In: 2019 International Carnahan Conference on Security Technology (ICCST), pp. 1\u20138. IEEE (2019)","DOI":"10.1109\/CCST.2019.8888419"},{"key":"12_CR41","doi-asserted-by":"crossref","unstructured":"Shiravi, A., Shiravi, H., Tavallaee, M., Ghorbani, A.A.: Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 31(3), 357\u2013374 (2012)","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"12_CR42","doi-asserted-by":"crossref","unstructured":"Shoshitaishvili, Y., Wang, R., et al.: Sok:(state of) the art of war: offensive techniques in binary analysis. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 138\u2013157. IEEE (2016)","DOI":"10.1109\/SP.2016.17"},{"key":"12_CR43","doi-asserted-by":"crossref","unstructured":"Song, H., Liu, J., Yang, J., Lei, X., Xue, G.: Two types of novel dos attacks against cdns based on http\/2 flow control mechanism. In: European Symposium on Research in Computer Security, pp. 467\u2013487. Springer (2022)","DOI":"10.1007\/978-3-031-17140-6_23"},{"key":"12_CR44","doi-asserted-by":"crossref","unstructured":"Song, Z., Zhao, Z., Zhang, F., et al.: I2RNN: An incremental and interpretable recurrent neural network for encrypted traffic classification. IEEE Transactions on Dependable and Secure Computing (2023)","DOI":"10.1109\/TDSC.2023.3245411"},{"key":"12_CR45","unstructured":"Specht, S., Lee, R.: Taxonomies of distributed denial of service networks, attacks, tools and countermeasures. CEL2003-03, Princeton University, Princeton, NJ, USA (2003)"},{"key":"12_CR46","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1007\/978-3-642-24037-9_57","volume-title":"Advances in Parallel Distributed Computing: First International Conference on Parallel, Distributed Computing Technologies and Applications, PDCTA 2011, Tirunelveli, India, September 23-25, 2011. Proceedings","author":"A Srivastava","year":"2011","unstructured":"Srivastava, A., Gupta, B.B., Tyagi, A., Sharma, A., Mishra, A.: A recent survey on ddos attacks and defense mechanisms. In: Nagamalai, D., Renault, E., Dhanuskodi, M. (eds.) Advances in Parallel Distributed Computing: First International Conference on Parallel, Distributed Computing Technologies and Applications, PDCTA 2011, Tirunelveli, India, September 23-25, 2011. Proceedings, pp. 570\u2013580. Springer Berlin Heidelberg, Berlin, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-24037-9_57"},{"key":"12_CR47","doi-asserted-by":"crossref","unstructured":"Stephens, N., Grosen, J., et al.: Driller: Augmenting fuzzing through selective symbolic execution. In: NDSS. vol. 16, pp. 1\u201316 (2016)","DOI":"10.14722\/ndss.2016.23368"},{"issue":"9","key":"12_CR48","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1109\/TPDS.2003.1233709","volume":"14","author":"M Sung","year":"2003","unstructured":"Sung, M., Xu, J.: Ip traceback-based intelligent packet filtering: a novel technique for defending against internet ddos attacks. IEEE Trans. Parallel Distrib. Syst. 14(9), 861\u2013872 (2003)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"12_CR49","doi-asserted-by":"crossref","unstructured":"Thing, V.L., Sloman, M., Dulay, N.: Non-intrusive ip traceback for ddos attacks. In: Proceedings of the 2nd ACM Symposium On Information, Computer and Communications Security, pp. 371\u2013373 (2007)","DOI":"10.1145\/1229285.1229331"},{"key":"12_CR50","doi-asserted-by":"crossref","unstructured":"Wagner, D., Kopp, D., et al.: United we stand: Collaborative detection and mitigation of amplification ddos attacks at scale. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 970\u2013987 (2021)","DOI":"10.1145\/3460120.3485385"},{"key":"12_CR51","doi-asserted-by":"crossref","unstructured":"Wang, Z., Zhu, S.: Symtcp: Eluding stateful deep packet inspection with automated discrepancy discovery. In: Network and Distributed System Security Symposium (NDSS) (2020)","DOI":"10.14722\/ndss.2020.24083"},{"key":"12_CR52","unstructured":"Xing, J., Wu, W., Chen, A.: Ripple: A programmable, decentralized $$\\{$$Link-Flooding$$\\}$$ defense against adaptive adversaries. In: 30th USENIX Security Symposium (USENIX Security 21), pp. 3865\u20133881 (2021)"},{"issue":"10","key":"12_CR53","doi-asserted-by":"publisher","first-page":"1853","DOI":"10.1109\/JSAC.2006.877138","volume":"24","author":"A Yaar","year":"2006","unstructured":"Yaar, A., Perrig, A., Song, D.: Stackpi: new packet marking and filtering mechanisms for ddos and ip spoofing defense. IEEE J. Sel. Areas Commun. 24(10), 1853\u20131863 (2006)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"1","key":"12_CR54","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1109\/COMST.2015.2487361","volume":"18","author":"Q Yan","year":"2015","unstructured":"Yan, Q., et al.: Software-defined networking (sdn) and distributed denial of service (ddos) attacks in cloud computing environments: A survey, some research issues, and challenges. IEEE Commun. Surv. Tutorials 18(1), 602\u2013622 (2015)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"12_CR55","unstructured":"Yoachimik, O., Pacheco, J.: DDoS threat report for 2023 q2 (2023). https:\/\/blog.cloudflare.com\/ddos-threat-report-2023-q2\/ Accessed 20 Sept 2023"},{"issue":"4","key":"12_CR56","doi-asserted-by":"publisher","first-page":"2046","DOI":"10.1109\/SURV.2013.031413.00127","volume":"15","author":"ST Zargar","year":"2013","unstructured":"Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against distributed denial of service (ddos) flooding attacks. IEEE Commun. Surv. Tutorials 15(4), 2046\u20132069 (2013)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"12_CR57","doi-asserted-by":"crossref","unstructured":"Zhang, M., Li, G., et al.: Poseidon: mitigating volumetric ddos attacks with programmable switches. In: the 27th Network and Distributed System Security Symposium (NDSS 2020) (2020)","DOI":"10.14722\/ndss.2020.24007"},{"key":"12_CR58","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Yuan, B., Yang, K., Zou, D., Jin, H.: Statediver: Testing deep packet inspection systems with state-discrepancy guidance. In: Proceedings of the 38th Annual Computer Security Applications Conference, pp. 756\u2013768 (2022)","DOI":"10.1145\/3564625.3564650"},{"key":"12_CR59","volume-title":"DDoS Family: A Novel Perspective for Massive Types of DDoS Attacks","author":"Z Zhao","year":"2023","unstructured":"Zhao, Z., Li, Z., et al.: DDoS Family: A Novel Perspective for Massive Types of DDoS Attacks. Comput, Secur (2023)"},{"key":"12_CR60","doi-asserted-by":"crossref","unstructured":"Zhao, Z., Li, Z., et al.: ERNN: error-resilient RNN for encrypted traffic detection towards network-induced phenomena. IEEE Transactions on Dependable and Secure Computing (2023)","DOI":"10.1109\/TDSC.2023.3242134"},{"key":"12_CR61","doi-asserted-by":"crossref","unstructured":"Zhao, Z., Liu, Z., et al.: Effective DDoS mitigation via ML-driven in-network traffic shaping. IEEE Transactions on Dependable and Secure Computing (2024)","DOI":"10.1109\/TDSC.2023.3349180"},{"key":"12_CR62","doi-asserted-by":"crossref","unstructured":"Zhao, Z., et al.: CMD: co-analyzed iot malware detection and forensics via network and hardware domains. IEEE Transactions on Mobile Computing (2023)","DOI":"10.1109\/TMC.2023.3311012"},{"key":"12_CR63","unstructured":"Zou, Y.H., Bai, J.J., et al.: $$\\{$$TCP-Fuzz$$\\}$$: Detecting memory and semantic bugs in $$\\{$$TCP$$\\}$$ stacks with fuzzing. In: 2021 USENIX Annual Technical Conference (USENIX ATC 21), pp. 489\u2013502 (2021)"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-54773-7_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,5]],"date-time":"2024-03-05T16:11:49Z","timestamp":1709655109000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-54773-7_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031547720","9783031547737"],"references-count":63,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-54773-7_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"29 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Abu Dhabi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 March 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/wp.nyu.edu\/acns2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"230","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"54","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4-6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}