{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T04:19:24Z","timestamp":1745986764085,"version":"3.40.4"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031877742","type":"print"},{"value":"9783031877759","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87775-9_11","type":"book-chapter","created":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T16:24:34Z","timestamp":1745943874000},"page":"126-138","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["DDOS Attack Detection in\u00a0SD-IOT Networks Using CTELC"],"prefix":"10.1007","author":[{"given":"Khawla M.","family":"Al-tarawneh","sequence":"first","affiliation":[]},{"given":"Nadia","family":"Salem","sequence":"additional","affiliation":[]},{"given":"Saleh","family":"Al-Sharaeh","sequence":"additional","affiliation":[]},{"given":"Asma","family":"Salem","sequence":"additional","affiliation":[]},{"given":"Hamza","family":"Salem","sequence":"additional","affiliation":[]},{"given":"Siham","family":"Hattab","sequence":"additional","affiliation":[]},{"given":"Manuel","family":"Mazzara","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,30]]},"reference":[{"key":"11_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.106432","volume":"123","author":"J Bhayo","year":"2023","unstructured":"Bhayo, J., Shah, S.A., Hameed, S., Ahmed, A., Nasir, J., Draheim, D.: Towards a machine learning-based framework for DDOS attack detection in software-defined IoT (SD-IoT) networks. Eng. Appl. Artif. Intell. 123, 106432 (2023)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Tarawneh, A.S., Alamri, E.S., Al-Saedi, N.N., Alauthman, M., Hassanat, A.B.: CTELC: a constant-time ensemble learning classifier based on KNN for big data. IEEE Access (2023)","DOI":"10.1109\/ACCESS.2023.3307512"},{"key":"11_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103156","volume":"190","author":"Y Cui","year":"2021","unstructured":"Cui, Y., et al.: Towards DDoS detection mechanisms in software-defined networking. J. Netw. Comput. Appl. 190, 103156 (2021)","journal-title":"J. Netw. Comput. Appl."},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Agrawal, A., Singh, R., Khari, M., Vimal, S., Lim, S.: Autoencoder for design of mitigation model for DDOS attacks via M-DBNN. Wireless Communications and Mobile Computing (2022)","DOI":"10.1155\/2022\/9855022"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Kumari, P., Jain, A.K.: A comprehensive study of DDoS attacks over IoT network and their countermeasures. Comput. Secur. 103096 (2023)","DOI":"10.1016\/j.cose.2023.103096"},{"issue":"11","key":"11_CR6","doi-asserted-by":"publisher","first-page":"1227","DOI":"10.3390\/electronics10111227","volume":"10","author":"\u00d6 Tonkal","year":"2021","unstructured":"Tonkal, \u00d6., Polat, H., Ba\u015faran, E., C\u00f6mert, Z., Kocao\u011flu, R.: Machine learning approach equipped with neighbourhood component analysis for DDoS attack detection in software-defined networking. Electronics 10(11), 1227 (2021)","journal-title":"Electronics"},{"issue":"2","key":"11_CR7","first-page":"252","volume":"9","author":"M Madathi","year":"2022","unstructured":"Madathi, M., Harini, R., Monikaa, R., Gowthami, N.: Detection of DDoS attack in SDN environment using KNN algorithm. IJRAR-Int. J. Res. Anal. Rev. (IJRAR) 9(2), 252\u2013257 (2022)","journal-title":"IJRAR-Int. J. Res. Anal. Rev. (IJRAR)"},{"key":"11_CR8","doi-asserted-by":"publisher","first-page":"5039","DOI":"10.1109\/ACCESS.2019.2963077","volume":"8","author":"S Dong","year":"2019","unstructured":"Dong, S., Sarem, M.: DDoS attack detection method based on improved KNN with the degree of DDoS attack in software- defined networks. IEEE Access 8, 5039\u20135048 (2019)","journal-title":"IEEE Access"},{"key":"11_CR9","unstructured":"Raschka, S., Liu, Y.H., Mirjalili, V., Dzhulgakov, D.: Machine Learning with PyTorch and Scikit-Learn: Develop machine learning and deep learning models with Python. Packt Publishing Ltd (2022)"},{"key":"11_CR10","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1613\/jair.1.12228","volume":"70","author":"N Burkart","year":"2021","unstructured":"Burkart, N., Huber, M.F.: A survey on the explainability of supervised machine learning. J. Artif. Intell. Res. 70, 245\u2013317 (2021)","journal-title":"J. Artif. Intell. Res."},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Zou, X., Hu, Y., Tian, Z., Shen, K.: Logistic regression model optimization and case analysis. In: 2019 IEEE 7th International Conference on Computer Science and Network Technology (ICCSNT), pp. 135\u2013139. IEEE (2019)","DOI":"10.1109\/ICCSNT47585.2019.8962457"},{"key":"11_CR12","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/j.neucom.2019.10.118","volume":"408","author":"J Cervantes","year":"2020","unstructured":"Cervantes, J., Garcia-Lamont, F., Rodr\u00edguez-Mazahua, L., Lopez, A.: A comprehensive survey on support vector machine classification: applications, challenges and trends. Neurocomputing 408, 189\u2013215 (2020)","journal-title":"Neurocomputing"},{"key":"11_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ecoinf.2022.101678","volume":"69","author":"A Khan","year":"2022","unstructured":"Khan, A., Vibhute, A.D., Mali, S., Patil, C.H.: A systematic review on hyperspectral imaging technology with a machine and deep learning methodology for agricultural applications. Eco. Inform. 69, 101678 (2022)","journal-title":"Eco. Inform."},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Krstini\u0107, D., Braovi\u0107, M., \u0160eri\u0107, L., Bo\u017ei\u0107-\u0160tuli\u0107, D.: Multi-label classifier performance evaluation with confusion matrix. Comput. Sci. Inf. Technol. 1 (2020)","DOI":"10.5121\/csit.2020.100801"},{"issue":"4","key":"11_CR15","doi-asserted-by":"publisher","first-page":"1862","DOI":"10.1109\/TCCN.2022.3186331","volume":"8","author":"MS El Sayed","year":"2022","unstructured":"El Sayed, M.S., Le-Khac, N.A., Azer, M.A., Jurcut, A.D.: A flow-based anomaly detection approach with feature selection method against DDoS attacks in SDNs. IEEE Trans. Cogn. Commun. Netw. 8(4), 1862\u20131880 (2022)","journal-title":"IEEE Trans. Cogn. Commun. Netw."},{"key":"11_CR16","unstructured":"Anon. Software-defined networking: The new norm for networks (2012a). https:\/\/www.opennetworking.org\/images\/stories\/downloads\/sdn-resources\/whitepapers\/wp-sdn-newnorm.pdf"},{"key":"11_CR17","doi-asserted-by":"publisher","unstructured":"Huseyin, P., Onur, P., Aydin, C.: Detecting DDoS attacks in software-defined networks through feature selection methods and machine learning models. Sustainability 12(3), 1035 (2020). https:\/\/doi.org\/10.3390\/SU12031035","DOI":"10.3390\/SU12031035"},{"issue":"13","key":"11_CR18","doi-asserted-by":"publisher","first-page":"6176","DOI":"10.3390\/SU12031035","volume":"23","author":"Z Liu","year":"2023","unstructured":"Liu, Z., Wang, Y., Feng, F., Liu, Y., Li, Z., Shan, Y.: A DDoS detection method based on feature engineering and machine learning in software-defined networks. Sensors 23(13), 6176 (2023). https:\/\/doi.org\/10.3390\/SU12031035","journal-title":"Sensors"},{"key":"11_CR19","first-page":"17632","volume":"1","author":"N Ahuja","year":"2020","unstructured":"Ahuja, N., Singal, G., Mukhopadhyay, D.: DDOS attack SDN dataset. Mendeley Data 1, 17632 (2020)","journal-title":"Mendeley Data"},{"issue":"1","key":"11_CR20","doi-asserted-by":"publisher","first-page":"10","DOI":"10.30564\/jcsr.v4i1.3852","volume":"4","author":"VO Nyangaresi","year":"2022","unstructured":"Nyangaresi, V.O., El-Omari, N., Nyakina, J.N.: Efficient feature selection and ML algorithm for accurate diagnostics. J. Comput. Sci. Res. 4(1), 10\u201319 (2022)","journal-title":"J. Comput. Sci. Res."},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Song, Q., Ge, H., Caverlee, J., Hu, X.: Tensor completion algorithms in big data analytics. arXiv, vol. 13, no. 1, (2017)","DOI":"10.1145\/3278607"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87775-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T16:24:43Z","timestamp":1745943883000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87775-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031877742","9783031877759"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87775-9_11","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"value":"2367-4512","type":"print"},{"value":"2367-4520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"30 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"39","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}