{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:23:22Z","timestamp":1765887802092},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319415604"},{"type":"electronic","value":"9783319415611"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-41561-1_15","type":"book-chapter","created":{"date-parts":[[2016,6,26]],"date-time":"2016-06-26T21:11:44Z","timestamp":1466975504000},"page":"197-211","source":"Crossref","is-referenced-by-count":11,"title":["DDoS Attacks Detection in Cloud Computing Using Data Mining Techniques"],"prefix":"10.1007","author":[{"given":"Konstantin","family":"Borisenko","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andrey","family":"Smirnov","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Evgenia","family":"Novikova","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andrey","family":"Shorov","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,6,28]]},"reference":[{"key":"15_CR1","unstructured":"Amazon Web Services, Inc.: Amazon Web Services (AWS) - Cloud Computing Services. https:\/\/aws.amazon.com"},{"key":"15_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-319-24315-3_18","volume-title":"Information and Communication Technology","author":"Y Bekeneva","year":"2015","unstructured":"Bekeneva, Y., Borisenko, K., Shorov, A., Kotenko, I.: Investigation of DDoS attacks by hybrid simulation. In: Khalil, I., Neuhold, E., Tjoa, A.M., Xu, L.D., You, I. (eds.) ICT-EurAsia 2015 and CONFENIS 2015. LNCS, vol. 9357, pp. 179\u2013189. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-24315-3_18"},{"key":"15_CR3","first-page":"17","volume":"68","author":"S Choudhary","year":"2013","unstructured":"Choudhary, S., Srinivasan, B.: Usage of netflow in security and monitoring of computer networks. Int. J. Comput. Appl. 68, 17\u201324 (2013)","journal-title":"Int. J. Comput. Appl."},{"key":"15_CR4","unstructured":"Cloudsecurityalliance.org.: Top Threats: Cloud Security Alliance. https:\/\/cloudsecurityalliance.org\/research\/top-threats"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Delimitrou, C., Kozyrakis, C.: Security implications of data mining in cloud scheduling. IEEE Comput. Archit. Lett. 1-1 (2015)","DOI":"10.1109\/LCA.2015.2461215"},{"key":"15_CR6","unstructured":"Docs.openstack.org.: OpenStack Docs: Scenario: Legacy with Open vSwitch. http:\/\/docs.openstack.org\/networking-guide\/scenario_legacy_ovs.html"},{"key":"15_CR7","doi-asserted-by":"crossref","first-page":"1838","DOI":"10.1016\/j.future.2012.12.011","volume":"29","author":"W Dou","year":"2013","unstructured":"Dou, W., Chen, Q., Chen, J.: A confidence-based filtering method for DDoS attack defense in cloud environment. Future Gener. Comput. Syst. 29, 1838\u20131850 (2013)","journal-title":"Future Gener. Comput. Syst."},{"key":"15_CR8","unstructured":"Editor, L.: Cyberattacks and Distributed Denial of Service (DDoS) threats on financial firms produce big pay offs - Beyond Bandwidth. http:\/\/blog.level3.com\/finance\/cyberattacks-and-distributed-denial-of-service-ddos-threats-on-financial-firms-produce-big-pay-offs\/"},{"key":"15_CR9","unstructured":"Garreta, R., Moncecchi, G.: Learning scikit-learn"},{"key":"15_CR10","unstructured":"Haag, P.: Watch your flows with NfSen and NFDUMP. 50th RIPE Meeting (2005)"},{"key":"15_CR11","unstructured":"Hall, D.: Ansible configuration management"},{"key":"15_CR12","unstructured":"Justin, P.: Virtual switching in an era of advanced edges. In: 2nd Workshop on Data Center\u2013Converged and Virtual Ethernet Switching (2010)"},{"key":"15_CR13","unstructured":"Kaspersky DDoS Protection: Kaspersky Lab. http:\/\/media.kaspersky.com\/kaspersky-ddos-protection-data-sheet.pdf"},{"key":"15_CR14","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/MIC.2011.44","volume":"15","author":"D Miloji\u010di\u0107","year":"2011","unstructured":"Miloji\u010di\u0107, D., Llorente, I., Montero, R.: OpenNebula: a cloud management tool. IEEE Internet Comput. 15, 11\u201314 (2011)","journal-title":"IEEE Internet Comput."},{"key":"15_CR15","unstructured":"Munz, G., Li, S., Carle, G.: Traffic anomaly detection using K-means clustering. In: GI\/ITG Workshop MMBnet (2007)"},{"key":"15_CR16","unstructured":"Salesforce.com: What is Cloud Computing? - Salesforce UK. http:\/\/www.salesforce.com\/uk\/cloudcomputing\/#where"},{"key":"15_CR17","unstructured":"Secucloud Web-Site: Secucloud. https:\/\/secucloud.com\/en\/company\/about-us"},{"key":"15_CR18","first-page":"38","volume":"55","author":"O Sefraoui","year":"2012","unstructured":"Sefraoui, O., Aissaoui, M., Eleuldj, M.: OpenStack: toward an open-source solution for cloud computing. Int. J. Comput. Appl. 55, 38\u201342 (2012)","journal-title":"Int. J. Comput. Appl."},{"key":"15_CR19","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1109\/MC.2011.250","volume":"44","author":"S Vaughan-Nichols","year":"2011","unstructured":"Vaughan-Nichols, S.: OpenFlow: the next generation of the network? Computer 44, 13\u201315 (2011)","journal-title":"Computer"},{"key":"15_CR20","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MITP.2009.89","volume":"12","author":"K Vieira","year":"2010","unstructured":"Vieira, K., Schulter, A., Westphall, C., Westphall, C.: Intrusion detection for grid and cloud computing. IT Prof. 12, 38\u201343 (2010)","journal-title":"IT Prof."},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Zolotukhin, M., Hamalainen, T., Kokkonen, T., et al.: Data mining approach for detection of DDoS attacks utilizing SSL\/TLS protocol. In: 15th International Conference, NEW2AN 2015, pp. 274\u2013285. St. Petersburg, Russia (2015)","DOI":"10.1007\/978-3-319-23126-6_25"}],"container-title":["Lecture Notes in Computer Science","Advances in Data Mining. Applications and Theoretical Aspects"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-41561-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,10]],"date-time":"2019-09-10T02:59:17Z","timestamp":1568084357000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-41561-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319415604","9783319415611"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-41561-1_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}