{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:22:08Z","timestamp":1765887728631,"version":"3.41.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319231259"},{"type":"electronic","value":"9783319231266"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23126-6_25","type":"book-chapter","created":{"date-parts":[[2015,8,12]],"date-time":"2015-08-12T13:20:51Z","timestamp":1439385651000},"page":"274-285","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Data Mining Approach for Detection of DDoS Attacks Utilizing SSL\/TLS Protocol"],"prefix":"10.1007","author":[{"given":"Mikhail","family":"Zolotukhin","sequence":"first","affiliation":[]},{"given":"Timo","family":"H\u00e4m\u00e4l\u00e4inen","sequence":"additional","affiliation":[]},{"given":"Tero","family":"Kokkonen","sequence":"additional","affiliation":[]},{"given":"Antti","family":"Niemel\u00e4","sequence":"additional","affiliation":[]},{"given":"Jarmo","family":"Siltanen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,13]]},"reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Durcekova, V., Schwartz, L., Shahmehri, N.: Sophisticated denial of service attacks aimed at application layer. In: ELEKTRO, pp. 55\u201360 (2012)","DOI":"10.1109\/ELEKTRO.2012.6225571"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Gu, Q., Liu, P.: Denial of Service Attacks. Handbook of Computer Networks: Distributed Networks, Network Planning, Control, Management, and New Trends and Applications, vol. 3. John Wiley & Sons (2008)","DOI":"10.1002\/9781118256107.ch29"},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"Peng, T., Leckie, K.R.M.C.: Protection from distributed denial of service attacks using history-based IP filtering. In: Proc. of IEEE International Conference on Communications, vol. 1, pp. 482\u2013486 (2003)","DOI":"10.1109\/ICC.2003.1204223"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Limwiwatkul, L., Rungsawangr, A.: Distributed denial of service detection using TCP\/IP header and traffic measurement analysis. In: Proc. of IEEE International Symposium on Communications and Information Technology, vol. 1, pp. 605\u2013610 (2004)","DOI":"10.1109\/ISCIT.2004.1412917"},{"issue":"4","key":"25_CR5","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1109\/TDSC.2005.50","volume":"2","author":"J Yuan","year":"2005","unstructured":"Yuan, J., Mills, K.: Monitoring the macroscopic effect of DDoS flooding attacks. IEEE Tran. Dependable and Secure Computing 2(4), 324\u2013335 (2005)","journal-title":"IEEE Tran. Dependable and Secure Computing"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Chen, R., Wei, J.-Y., Yu, H.: An improved grey self-organizing map based dos detection. In: Proc. of IEEE Conference on Cybernetics and Intelligent Systems, pp. 497\u2013502 (2008)","DOI":"10.1109\/ICCIS.2008.4670765"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Ke-Xin, Y., Jian-Qi, Z.: A novel DoS detection mechanism. In: Proc. of International Conference on Mechatronic Science, Electric Engineering and Computer (MEC), pp. 296\u2013298 (2011)","DOI":"10.1109\/MEC.2011.6025459"},{"issue":"1","key":"25_CR8","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/TNET.2008.925628","volume":"17","author":"Y Xie","year":"2008","unstructured":"Xie, Y., Yu, S.-Z.: Monitoring the Application-Layer DDoS Attacks for Popular Websites. IEEE\/ACM Transactions on Networking 17(1), 15\u201325 (2008)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, J., Qin, Z., Ou, L., Jiang, P., Liu, J., Liu, A.: An advanced entropy-based DDOS detection scheme. In: Proc. of International Conference on Information Networking and Automation (ICINA), vol. 2, pp. 67\u201371 (2010)","DOI":"10.1109\/ICINA.2010.5636786"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Aiello, M., Cambiaso, E., Mongelli, M., Papaleo, G.: An on-line intrusion detection approach to identify low-rate DoS attacks. In: Proc. of International Carnahan Conference on Security Technology (ICCST), pp. 1\u20136 (2014)","DOI":"10.1109\/CCST.2014.6987039"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Xu, C., Zhao, G., Xie, G., Yu, S.: Detection on application layer DDoS using random walk model. In: Proc. of IEEE International Conference on Communications (ICC), pp. 707\u2013712 (2014)","DOI":"10.1109\/ICC.2014.6883402"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Chwalinski, P., Belavkin, R., Cheng, X.: Detection of application layer DDoS Attacks with clustering and bayes factors. In: Proc. of IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 156\u2013161 (2013)","DOI":"10.1109\/SMC.2013.34"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: The transport layer security (TLS) protocol. IETF RFC 4346 (2006)","DOI":"10.17487\/rfc4347"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Gollmann, D.: Computer Security, 2nd edn. Wiley (2006)","DOI":"10.1002\/wics.106"},{"issue":"6","key":"25_CR15","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1002\/qre.539","volume":"19","author":"N Ye","year":"2003","unstructured":"Ye, N., Borror, C.M., Parmar, D.: Scalable Chi-Squae Distance versus Conventional Statistical Distance for Process Monotoring with Uncorrelated Data Variables. Quality and Reliability Engineering International 19(6), 505\u2013515 (2003)","journal-title":"Quality and Reliability Engineering International"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Muraleedharan, N., Parmar, A., Kumar, M.: A flow based anomaly detection system using chi-square technique. In: Proc. of the 2nd IEEE International Advance Computing Conference (IACC), pp. 285\u2013289 (2010)","DOI":"10.1109\/IADCC.2010.5422996"},{"key":"25_CR17","unstructured":"Corona, I., Giacinto, G.: Detection of server-side web attacks. In: Proc of JMLR: Workshop on Applications of Pattern Analysis, pp. 160\u2013166 (2010)"},{"key":"25_CR18","volume-title":"Applied Multivariate Statistical Analysis","author":"R Johnson","year":"1998","unstructured":"Johnson, R., Wichern, D.: Applied Multivariate Statistical Analysis. Prentice-Hall, Upper Saddle River (1998)"},{"issue":"3","key":"25_CR19","first-page":"2701","volume":"5","author":"C Saranya","year":"2013","unstructured":"Saranya, C., Manikandan, G.: A Study on Normalization Techniques for Privacy Preserving Data Mining. International Journal of Engineering and Technology (IJET) 5(3), 2701\u20132704 (2013)","journal-title":"International Journal of Engineering and Technology (IJET)"},{"key":"25_CR20","unstructured":"Ester, M., Kriegel, H., J\u00f6rg, S., Xu, X.: A density-based algorithm for discovering clusters in large spatial databases with noise, pp. 226\u2013231. AAAI Press (1996)"},{"key":"25_CR21","doi-asserted-by":"crossref","unstructured":"Kim, J.: The anomaly detection by using DBSCAN clustering with multiple parameters. In: Proc. of the ICISA, pp. 1\u20135 (2011)","DOI":"10.1109\/ICISA.2011.5772437"},{"key":"25_CR22","doi-asserted-by":"crossref","unstructured":"Smiti, A.: DBSCAN-GM: an improved clustering method based on gaussian means and DBSCAN techniques. In: Proc. of the IEEE 16th International Conference on Intelligent Engineering Systems (INES), pp. 573\u2013578 (2012)","DOI":"10.1109\/INES.2012.6249802"},{"key":"25_CR23","unstructured":"Jyvsectec-rgce - homepage. http:\/\/www.jyvsectec.fi\/en\/rgce\/"},{"key":"25_CR24","doi-asserted-by":"crossref","unstructured":"Zolotukhin, M., H\u00e4m\u00e4l\u00e4inen, T., Kokkonen, T., Siltanen, J.: Analysis, of http requests for anomaly detection of web attacks. In: Proc. of the 12th IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. 406\u2013411 (2014)","DOI":"10.1109\/DASC.2014.79"},{"key":"25_CR25","unstructured":"WireShark Wiki, Libpcap File Format. http:\/\/wiki.wireshark.org\/Development\/LibpcapFileFormat\/"}],"container-title":["Lecture Notes in Computer Science","Internet of Things, Smart Spaces, and Next Generation Networks and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23126-6_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T23:50:40Z","timestamp":1748562640000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-23126-6_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319231259","9783319231266"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23126-6_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"13 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}