{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T01:22:15Z","timestamp":1743038535070,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319525686"},{"type":"electronic","value":"9783319525693"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-52569-3_4","type":"book-chapter","created":{"date-parts":[[2017,1,17]],"date-time":"2017-01-17T20:06:24Z","timestamp":1484683584000},"page":"39-49","source":"Crossref","is-referenced-by-count":0,"title":["Security Visualization: Detecting Denial of Service"],"prefix":"10.1007","author":[{"given":"Glen","family":"Hawthorne","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ying","family":"He","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Leandros","family":"Maglaras","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Helge","family":"Janicke","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,1,19]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Bartholemy, A., Chen, W.: An examination of distributed denial of service attacks. In: 2015 IEEE International Conference on Electro\/Information Technology (EIT), pp. 274\u2013279. IEEE (2015)","DOI":"10.1109\/EIT.2015.7293352"},{"issue":"4","key":"4_CR2","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MC.2000.839316","volume":"33","author":"L Garber","year":"2000","unstructured":"Garber, L.: Denial-of-service attacks rip the Internet. Computer 33(4), 12\u201317 (2000)","journal-title":"Computer"},{"issue":"8","key":"4_CR3","doi-asserted-by":"crossref","first-page":"1218","DOI":"10.3844\/jcssp.2011.1218.1223","volume":"7","author":"K Wan Mohd Ghazali","year":"2011","unstructured":"Wan Mohd Ghazali, K., Hassan, R.: Flooding distributed denial of service attacks-a review. J. Comput. Sci. 7(8), 1218\u20131223 (2011)","journal-title":"J. Comput. Sci."},{"key":"4_CR4","unstructured":"Lemon, J.: Resisting SYN flood DoS attacks with a SYN cache. In: BSDCon, vol. 2002, pp. 89\u201397 (2002)"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Yatagai, T., Isohara, T., Sasase, I.: Detection of HTTP-GET flood attack based on analysis of page access behavior. In: IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, PacRim 2007, pp. 232\u2013235. IEEE (2007)","DOI":"10.1109\/PACRIM.2007.4313218"},{"key":"4_CR6","unstructured":"Kenney, M.: Ping of death. Insecure.org (1996)"},{"key":"4_CR7","unstructured":"Logstalgia (2015). http:\/\/logstalgia.io\/ . Accessed 31 Oct 2015"},{"key":"4_CR8","unstructured":"Nginx: Logging AND monitoring (2015). https:\/\/www.nginx.com\/resources\/admin-guide\/logging-and-monitoring\/ . Accessed 31 Oct 2015"},{"key":"4_CR9","unstructured":"Webalizer: The Webalizer (2014). http:\/\/www.webalizer.org\/ . Accessed 30 Oct 2015"},{"key":"4_CR10","unstructured":"Imperva: Why Incapsula? (2015). https:\/\/www.incapsula.com\/ddos\/why-incapsula\/ . Accessed 13 Nov 2015"},{"key":"4_CR11","unstructured":"The Apache Software Foundation: Log files (2015). https:\/\/httpd.apache.org\/docs\/trunk\/logs.html#page-header . Accessed 30 Oct 2015"},{"key":"4_CR12","unstructured":"Netcraft: January 2015 web server survey (2015). http:\/\/news.netcraft.com\/archives\/2015\/01\/15\/ january-2015-web-server-survey.html . Accessed 20 Oct 2015"},{"key":"4_CR13","unstructured":"SolveDNS statistics (2015). http:\/\/www.solvedns.com\/statistics\/ . Accessed 27 Oct 2015"},{"key":"4_CR14","unstructured":"World Wide Web Consortium: Logging control In W3C httpd (1995). http:\/\/www.w3.org\/Daemon\/User\/Config\/Logging.html#common-logfile-format . Accessed 30 Oct 2015"},{"key":"4_CR15","unstructured":"World Wide Web Consortium: Extended log file format (2015). http:\/\/www.w3.org\/TR\/WD-logfile.html . Accessed 31 Oct 2015"},{"key":"4_CR16","unstructured":"Ogbuji, U.: Working with web server logs (2009). IBM. http:\/\/www.ibm.com\/developerworks\/library\/wa-apachelogs\/ . Accessed 01 Nov 2015"},{"issue":"7","key":"4_CR17","doi-asserted-by":"crossref","first-page":"983","DOI":"10.1177\/0002764213479370","volume":"57","author":"M Sauter","year":"2013","unstructured":"Sauter, M.: LOIC will tear us apart the impact of tool design and media portrayals in the success of activist DDOS attacks. Am. Behav. Sci. 57(7), 983\u20131007 (2013)","journal-title":"Am. Behav. Sci."},{"key":"4_CR18","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/978-3-319-11933-5_44","volume-title":"Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014","author":"PS Kenkre","year":"2015","unstructured":"Kenkre, P.S., Pai, A., Colaco, L.: Real time intrusion detection and prevention system. In: Satapathy, S.C., Biswal, B.N., Udgata, S.K., Mandal, J.K. (eds.) Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014. AISC, vol. 327, pp. 405\u2013411. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-11933-5_44"},{"issue":"2","key":"4_CR19","doi-asserted-by":"crossref","first-page":"681","DOI":"10.1109\/59.867159","volume":"15","author":"B Qiu","year":"2000","unstructured":"Qiu, B., Gooi, H.B.: Web-based SCADA display systems (WSDS) for access via Internet. IEEE Trans. Power Syst. 15(2), 681\u2013686 (2000)","journal-title":"IEEE Trans. Power Syst."},{"key":"4_CR20","unstructured":"Leou, R.-C., Chang, Y.-C., Teng, J.-H.: A web-based power quality monitoring system. In: Power Engineering Society Summer Meeting, vol. 3. IEEE (2001)"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Maglaras, L.A., Jiang, J.: Intrusion detection in SCADA systems using machine learning techniques. In: Science and Information Conference (SAI). IEEE (2014)","DOI":"10.1109\/SAI.2014.6918252"},{"issue":"1","key":"4_CR22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40537-015-0013-4","volume":"2","author":"R Zuech","year":"2015","unstructured":"Zuech, R., Khoshgoftaar, T.M., Wald, R.: Intrusion detection and big heterogeneous data: a survey. J. Big Data 2(1), 1\u201341 (2015)","journal-title":"J. Big Data"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Maglaras, L.A., Jiang, J., Cruz, T.J.: Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems. J. Inf. Secur. Appl., 4 May 2016. ISSN 2214-2126","DOI":"10.1016\/j.jisa.2016.04.002"},{"issue":"4","key":"4_CR24","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1016\/j.cose.2012.02.009","volume":"31","author":"A Nicholson","year":"2012","unstructured":"Nicholson, A., Webber, S., Dyer, S., Patel, T., Janicke, H.: SCADA security in the light of cyber-warfare. Comput. Secur. 31(4), 418\u2013436 (2012)","journal-title":"Comput. Secur."},{"key":"4_CR25","volume-title":"Designing with the Mind in Mind: Simple Guide to Understanding User Interface Design Guidelines","author":"J Johnson","year":"2013","unstructured":"Johnson, J.: Designing with the Mind in Mind: Simple Guide to Understanding User Interface Design Guidelines. Elsevier, Amsterdam (2013)"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Syromiatnikov, A., Weyns, D.: A journey through the land of model-view-design patterns. In: 2014 IEEE\/IFIP Conference on Software Architecture (WICSA), pp. 21\u201330, IEEE, April 2014","DOI":"10.1109\/WICSA.2014.13"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Industrial Networks and Intelligent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-52569-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T13:42:03Z","timestamp":1568727723000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-52569-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319525686","9783319525693"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-52569-3_4","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017]]}}}