{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T12:40:02Z","timestamp":1748695202334,"version":"3.41.0"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319265605"},{"type":"electronic","value":"9783319265612"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26561-2_45","type":"book-chapter","created":{"date-parts":[[2015,11,17]],"date-time":"2015-11-17T03:15:22Z","timestamp":1447730122000},"page":"376-383","source":"Crossref","is-referenced-by-count":4,"title":["Adaptive DDoS-Event Detection from Big Darknet Traffic Data"],"prefix":"10.1007","author":[{"given":"Nobuaki","family":"Furutani","sequence":"first","affiliation":[]},{"given":"Jun","family":"Kitazono","sequence":"additional","affiliation":[]},{"given":"Seiichi","family":"Ozawa","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Ban","sequence":"additional","affiliation":[]},{"given":"Junji","family":"Nakazato","sequence":"additional","affiliation":[]},{"given":"Jumpei","family":"Shimamura","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,18]]},"reference":[{"issue":"2","key":"45_CR1","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J Mirkovic","year":"2004","unstructured":"Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS defense mechanisms. SIGCOMM Comput. Commun. Rev. 34(2), 39\u201353 (2004)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"45_CR2","doi-asserted-by":"crossref","unstructured":"Wang, H., Zhang, D., Shin, K.: Detecting SYN floodingattacks. In: Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, pp. 1530\u20131539 (2002)","DOI":"10.1109\/INFCOM.2002.1019404"},{"key":"45_CR3","unstructured":"Ryba, F.J., Orlinski, M., W\u00e4hlisch, M., Rossow, C., Schmidt, T.C.: Amplification and DRDoS attack defense - a survey and new perspectives. CoRR, vol. abs\/1505.07892 (2015)"},{"key":"45_CR4","unstructured":"Bardas, A.G., Zomlot, L., Sundaramurthy, S.C., Ou, X., Rajagopalan, S.R., Eisenbarth, M.R.: Classification of UDP traffic for DDoS detection. In: The 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (2012)"},{"key":"45_CR5","unstructured":"Bailey, M., Cooke, E., Jahanian, F., Nazario, J., Watson, D., et al.: The internet motion sensor - a distributed blackhole monitoring system. In: NDSS (2005)"},{"key":"45_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1007\/978-3-642-34500-5_73","volume-title":"Neural Information Processing","author":"T Ban","year":"2012","unstructured":"Ban, T., Zhu, L., Shimamura, J., Pang, S., Inoue, D., Nakao, K.: Behavior analysis of long-term cyber attacks in the darknet. In: Huang, T., Zeng, Z., Li, C., Leung, C.S. (eds.) ICONIP 2012, Part V. LNCS, vol. 7667, pp. 620\u2013628. Springer, Heidelberg (2012)"},{"issue":"3","key":"45_CR7","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.entcs.2006.03.011","volume":"151","author":"U Harder","year":"2006","unstructured":"Harder, U., Johnson, M.W., Bradley, J.T., Knottenbelt, W.J.: Observing internet worm and virus attacks with a small network telescope. Electron. Notes Theor. Comput. Sci. 151(3), 47\u201359 (2006)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"45_CR8","doi-asserted-by":"crossref","unstructured":"Benson, K., Dainotti, A., Claffy, K., Aben, E.: Gaining insight into as-level outages through analysis of internet background radiation. In: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 447\u2013452 (2013)","DOI":"10.1109\/INFCOMW.2013.6562915"},{"key":"45_CR9","first-page":"2579","volume":"9","author":"L Maaten Van der","year":"2008","unstructured":"Van der Maaten, L., Hinton, G.: Visualizing data using t-SNE. J. Mach. Learn. Res. 9, 2579\u20132605 (2008)","journal-title":"J. Mach. Learn. Res."},{"key":"45_CR10","doi-asserted-by":"crossref","unstructured":"Furutani, N., Ban, T., Nakazato, J., Shimamura, J., Kitazono, J., Ozawa, S.: Detection of DDoS backscatter based on traffic features of darknet TCP packets. In: 2014 Ninth Asia Joint Conference on Information Security, pp. 39\u201343 (2014)","DOI":"10.1109\/AsiaJCIS.2014.23"},{"key":"45_CR11","volume-title":"Statistical Learning Theory","author":"VN Vapnik","year":"1998","unstructured":"Vapnik, V.N.: Statistical Learning Theory, vol. 1. Wiley, New York (1998)"},{"key":"45_CR12","unstructured":"Hsu, C.W., Chang, C.C., Lin, C.J.: A practical guide to support vector classification. Technical report, Department of Computer Science, National Taiwan University (2003)"},{"key":"45_CR13","unstructured":"Kohavi, R.: A study of cross-validation and bootstrap for accuracy estimation and model selection. In: International Joint Conference on Artificial Intelligence, vol. 14, issue 2 (1995)"},{"key":"45_CR14","unstructured":"Kamizono, M.: Datasets for Anti-Malware Research (MWS Datasets 2014) (2014)"},{"key":"45_CR15","unstructured":"Nakazato, J., Shimamura, J., Eto, M., Inoue, D., Nakao, K.: Backscatter analysis toward clear categorization of DoS attacks. In: The 30th Symposium on Cryptography and Information Security (2013) (in Jananese)"},{"key":"45_CR16","doi-asserted-by":"publisher","first-page":"27:1","DOI":"10.1145\/1961189.1961199","volume":"2","author":"CC Chang","year":"2011","unstructured":"Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2, 27:1\u201327:27 (2011)","journal-title":"ACM Trans. Intell. Syst. Technol."}],"container-title":["Lecture Notes in Computer Science","Neural Information Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26561-2_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T12:14:07Z","timestamp":1748693647000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26561-2_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319265605","9783319265612"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26561-2_45","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}