{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:17:10Z","timestamp":1743016630883,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319644189"},{"type":"electronic","value":"9783319644196"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64419-6_50","type":"book-chapter","created":{"date-parts":[[2017,8,15]],"date-time":"2017-08-15T22:42:00Z","timestamp":1502836920000},"page":"392-400","source":"Crossref","is-referenced-by-count":4,"title":["Statistical Approach to Trace the Source of\u00a0Attack Based on the Variability in Data Flows"],"prefix":"10.1007","author":[{"given":"T.","family":"Subburaj","sequence":"first","affiliation":[]},{"given":"K.","family":"Suthendran","sequence":"additional","affiliation":[]},{"given":"S.","family":"Arumugam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,17]]},"reference":[{"key":"50_CR1","first-page":"123","volume":"39","author":"T Peng","year":"2007","unstructured":"Peng, T., Leckie, C., Ramamohanarao, K.: Survey of network based defense mechanism countering the DoS and DDoS problems. Comput. J. ACM Comput. Surv. 39, 123\u2013128 (2007)","journal-title":"Comput. J. ACM Comput. Surv."},{"key":"50_CR2","first-page":"537","volume":"4","author":"HV Nguyen","year":"2010","unstructured":"Nguyen, H.V., Choi, Y.: Proactive detection of DDoS attacks utilizing k-NN classifier in an anti DDoS framework. Int. J. Electr. Comput. Syst. Eng. 4, 537\u2013542 (2010)","journal-title":"Int. J. Electr. Comput. Syst. Eng."},{"key":"50_CR3","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1002\/j.1538-7305.1948.tb00917.x","volume":"27","author":"CE Shanon","year":"1948","unstructured":"Shanon, C.E.: A mathematical theory of communication. Bell Syst. Techn. J. 27, 623\u2013656 (1948)","journal-title":"Bell Syst. Techn. J."},{"key":"50_CR4","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1016\/j.comnet.2004.08.014","volume":"48","author":"D Gavrilis","year":"2005","unstructured":"Gavrilis, D., Dermatas, E.: Real-time detection of distributed denial-of-service attacks using RBF networks and statistical features. Comput. Netw. 48, 235\u2013245 (2005)","journal-title":"Comput. Netw."},{"key":"50_CR5","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1504\/IJAHUC.2011.038998","volume":"7","author":"YC Wu","year":"2011","unstructured":"Wu, Y.C., Tseng, H.R., Yang, W., Jan, R.H.: DDoS detection and trace back with decision tree and grey relational analysis. Int. J. Ad-Hoc Ubiquit. Computing. 7, 121\u2013136 (2011)","journal-title":"Int. J. Ad-Hoc Ubiquit. Computing."},{"unstructured":"Karimazad, R., Faraahi, A.: An anomaly based method for DDoS attacks detection using RBF neural networks. In: Proceedings of the International Conference on Network and Electronics Engineering, vol. 11, pp. 44\u201348 (2011)","key":"50_CR6"},{"key":"50_CR7","first-page":"257","volume":"14","author":"N Jeyanthi","year":"2012","unstructured":"Jeyanthi, N., Iyengar, N.C.S.N.: An entropy based approach to detect and disinuish DDoS aatacks from ash crowds in VoIP networks. Int. J. Netw. Secur. 14, 257\u2013269 (2012)","journal-title":"Int. J. Netw. Secur."},{"doi-asserted-by":"crossref","unstructured":"Thomas, R., Mark, B., Johnson, T., Croall, J.: NetBouncer: Client-legitimacy-based high performance filtering. In: Proceedings of the 3rd DARPA Information Survivability Conference and Exposition, p. 111. IEEE Explore (2003)","key":"50_CR8","DOI":"10.1109\/DISCEX.2003.1194939"},{"doi-asserted-by":"crossref","unstructured":"Limwiwatkul, L., Rungsawang, A.: Distributed denial of service detection using TCP\/IP header and traffic measurement analysis. In: Proceedings of the IEEE International Symposium Communications and Information Technology, pp. 605\u2013610. IEEE Explore (2004)","key":"50_CR9","DOI":"10.1109\/ISCIT.2004.1412917"},{"key":"50_CR10","first-page":"69","volume":"38","author":"G Zhang","year":"2006","unstructured":"Zhang, G., Parashar, M.: Cooperative defense against DDoS attacks. J. Res. Pract. Inf. Technol. 38, 69\u201384 (2006)","journal-title":"J. Res. Pract. Inf. Technol."},{"doi-asserted-by":"crossref","unstructured":"Wang, J., Phan, R.C.W., Whitely, J.N., Parish, D.J.: Augmented attack tree modeling of distributed denial of services and tree based attack detection method. In: Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 1009\u20131014. IEEE Explore (2010)","key":"50_CR11","DOI":"10.1109\/CIT.2010.185"},{"unstructured":"Hwang, K., Dave, P., Tanachaiwiwat, S.: NetShield: Protocol anomaly detection with data-mining against DDoS attacks. In: Proceedings of the 6th International Symposium on Recent Advances in Intrusion Detection, pp. 1\u201320 (2003)","key":"50_CR12"},{"key":"50_CR13","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1007\/s11235-004-5581-0","volume":"28","author":"L Li","year":"2005","unstructured":"Li, L., Lee, G.: DDoS attack detection and wavelets. Telecommun. Syst. 28, 435\u2013451 (2005)","journal-title":"Telecommun. Syst."},{"unstructured":"Sekar, V., Duffield, N., Spatscheck, O., van der Merwe, J., Zhang, H.: LADS: large-scale automated DDoS detection system. In: Proceedings of the Annual Conference on USENIX Annual Technical Conference, p. 16 (2006)","key":"50_CR14"},{"key":"50_CR15","doi-asserted-by":"crossref","first-page":"1299","DOI":"10.1016\/j.comnet.2006.09.009","volume":"51","author":"E Gelenbe","year":"2007","unstructured":"Gelenbe, E., Loukas, G.A.: Self-aware approach to denial of service defense. Comput. Netw. 51, 1299\u20131314 (2007)","journal-title":"Comput. Netw."},{"key":"50_CR16","doi-asserted-by":"crossref","first-page":"1659","DOI":"10.1016\/j.eswa.2007.01.040","volume":"34","author":"K Lee","year":"2008","unstructured":"Lee, K., Kim, J., Kwon, K.H., Han, Y., Kim, S.: DDoS attack detection method using cluster analysis. Expert Syst. Appl. 34, 1659\u20131665 (2008)","journal-title":"Expert Syst. Appl."},{"doi-asserted-by":"crossref","unstructured":"Li, M., Li, M.: A new approach for detecting DDoS attacks based on wavelet analysis. In: Proceedings of the 2nd International Congress on Image and Signal Processing, pp. 1\u20135. IEE Explore (2009)","key":"50_CR17","DOI":"10.1109\/CISP.2009.5300903"},{"key":"50_CR18","doi-asserted-by":"crossref","first-page":"945","DOI":"10.3233\/JCS-2009-0350","volume":"17","author":"A Dainotti","year":"2009","unstructured":"Dainotti, A., Pescap\u00e9, A., Ventre, G.: A cascade architecture for DoS attacks detection based on the wavelet transform. J. Comput. Secur. 17, 945\u2013968 (2009)","journal-title":"J. Comput. Secur."},{"key":"50_CR19","first-page":"497","volume":"34","author":"Z Xia","year":"2010","unstructured":"Xia, Z., Lu, S., Li, J.: Enhancing DDoS flood attack detection via intelligent fuzzy logic. Informatica. 34, 497\u2013507 (2010)","journal-title":"Informatica."},{"key":"50_CR20","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1109\/90.929847","volume":"9","author":"S Savage","year":"2001","unstructured":"Savage, S., Wetherall, D., Karlin, A.R., Anderson, T.E.: Network support for IP traceback. IEEE\/ACM Trans. Netw. 9, 226\u2013237 (2001)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"50_CR21","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1002\/sec.741","volume":"7","author":"N Lu","year":"2014","unstructured":"Lu, N., Wang, Y., Su, S., Yang, F.: A novel path-based approach for single-packet IP traceback. Secur. Commun. Netw. 7, 309\u2013321 (2014)","journal-title":"Secur. Commun. Netw."},{"unstructured":"Song, D.X., Perrig, A.: Advanced and authenticated marking schemes for IP trace-back. In: Proceedings of the IEEE INFOCOM 2001, pp. 878\u2013886. IEE Explore (2001)","key":"50_CR22"},{"key":"50_CR23","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1016\/j.eswa.2012.07.057","volume":"40","author":"S Seongjun","year":"2013","unstructured":"Seongjun, S., Lee, S., Kim, H., Kim, S.: Advanced probabilistic approach for network intrusion forecasting and detection. Expert Syst. Appl. 40, 315\u2013322 (2013)","journal-title":"Expert Syst. Appl."},{"key":"50_CR24","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1109\/TPDS.2010.97","volume":"22","author":"S Yu","year":"2011","unstructured":"Yu, S., Zhou, W., Doss, R., Jia, W.: Trace back of DDoS attacks using entropy variations. IEEE Trans. Parallel Distrib. Syst. 22, 412\u2013425 (2011)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"doi-asserted-by":"crossref","unstructured":"Oshima, S., Takuo, N., Toshinori, S.: DDoS detection technique using statistical analysis to generate quick response time. In: Proceedings of 2010 International Conference on Broadband, Wireless Computing, Communication and Applications, pp. 672\u2013677. IEEE explore (2010)","key":"50_CR25","DOI":"10.1109\/BWCCA.2010.153"},{"key":"50_CR26","first-page":"38","volume":"6","author":"A Bhandari","year":"2014","unstructured":"Bhandari, A., Sangal, A.L., Kumar, K.: Performance metrics for defense framework against distributed denial of service attacks. Int. J. Netw. Secur. 6, 38\u201347 (2014)","journal-title":"Int. J. Netw. Secur."},{"unstructured":"Gupta, B.B., Misra, M., Joshi, R.C.: An ISP level solution to combat DDoS attacks using combined statistical based approach (2012). arXiv preprint \narXiv: 1203.2400","key":"50_CR27"}],"container-title":["Lecture Notes in Computer Science","Theoretical Computer Science and Discrete Mathematics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64419-6_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T22:55:20Z","timestamp":1508885720000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64419-6_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319644189","9783319644196"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64419-6_50","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}