{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T20:40:01Z","timestamp":1751229601149,"version":"3.41.0"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319741758"},{"type":"electronic","value":"9783319741765"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-74176-5_23","type":"book-chapter","created":{"date-parts":[[2018,1,12]],"date-time":"2018-01-12T10:03:55Z","timestamp":1515751435000},"page":"266-275","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Data Mining Approaches for IP Address Clustering"],"prefix":"10.1007","author":[{"given":"Madeleine Victoria","family":"Kongshavn","sequence":"first","affiliation":[]},{"given":"Anis","family":"Yazidi","sequence":"additional","affiliation":[]},{"given":"H\u00e5rek","family":"Haugerud","sequence":"additional","affiliation":[]},{"given":"Hugo","family":"Hammer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,13]]},"reference":[{"issue":"2","key":"23_CR1","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1145\/1132026.1132027","volume":"24","author":"D Moore","year":"2006","unstructured":"Moore, D., Shannon, C., Brown, D.J., Voelker, G.M., Savage, S.: Inferring internet denial-of-service activity. ACM Trans. Comput. Syst. (TOCS) 24(2), 115\u2013139 (2006)","journal-title":"ACM Trans. Comput. Syst. (TOCS)"},{"key":"23_CR2","unstructured":"Akamai: Akamai\u2019s state of the internet report q1 2016 (2016)"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Goldstein, M., Lampert, C., Reif, M., Stahl, A., Breuel, T.: Bayes optimal ddos mitigation by adaptive history-based IP filtering. In: Seventh International Conference on Networking (ICN 2008), pp. 174\u2013179. IEEE (2008)","DOI":"10.1109\/ICN.2008.64"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Peng, T., Leckie, C., Ramamohanarao, K.: Protection from distributed denial of service attacks using history-based IP filtering. In: IEEE International Conference on Communications (ICC 2003), vol. 1, pp. 482\u2013486. IEEE (2003)","DOI":"10.1109\/ICC.2003.1204223"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Goldstein, M., Reif, M., Stahl, A., Breuel, T.: Server-side prediction of source IP addresses using density estimation. In: International Conference on Availability, Reliability and Security, 2009 (ARES 2009), pp. 82\u201389. IEEE (2009)","DOI":"10.1109\/ARES.2009.113"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Qin, X., Xu, T., Wang, C.: DDoS attack detection using flow entropy and clustering technique. In: 2015 11th International Conference on Computational Intelligence and Security (CIS), pp. 412\u2013415. IEEE (2015)","DOI":"10.1109\/CIS.2015.105"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Yu, J., Li, Z., Chen, H., Chen, X.: A detection and offense mechanism to defend against application layer DDoS attacks. In: Third International Conference on Networking and Services (ICNS), p. 54. IEEE (2007)","DOI":"10.1109\/ICNS.2007.5"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Li, Z., Li, Y., Xu, L.: Anomaly intrusion detection method based on k-means clustering algorithm with particle swarm optimization. In: 2011 International Conference on Information Technology, Computer Engineering and Management Sciences (ICM), vol. 2, pp. 157\u2013161. IEEE (2011)","DOI":"10.1109\/ICM.2011.184"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Mingqiang, Z., Hui, H., Qian, W.: A graph-based clustering algorithm for anomaly intrusion detection. In: 2012 7th International Conference on Computer Science & Education (ICCSE), pp. 1311\u20131314. IEEE (2012)","DOI":"10.1109\/ICCSE.2012.6295306"},{"key":"23_CR10","unstructured":"Ranjan, R., Sahoo, G.: A new clustering approach for anomaly intrusion detection, arXiv preprint arXiv:1404.2772 (2014)"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Guan, Y., Ghorbani, A.A., Belacel, N.: Y-means: a clustering method for intrusion detection. In: Canadian Conference on Electrical and Computer Engineering (CCECE), vol. 2, pp. 1083\u20131086. IEEE (2003)","DOI":"10.1109\/CCECE.2003.1226084"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Xue-Yong, L., Guo-hong, G., Jia-xia, S.: A new intrusion detection method based on improved DBSCAN. In: 2010 WASE International Conference on Information Engineering (ICIE), vol. 2, pp. 117\u2013120. IEEE (2010)","DOI":"10.1109\/ICIE.2010.123"},{"key":"23_CR13","unstructured":"Ester, M., Kriegel, H.-P., Sander, J., Xu, X., et al.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: Kdd, vol. 96, no. 34, pp. 226\u2013231 (1996)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Industrial Networks and Intelligent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-74176-5_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T20:27:36Z","timestamp":1751228856000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-74176-5_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319741758","9783319741765"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-74176-5_23","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}