{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,23]],"date-time":"2025-02-23T21:40:16Z","timestamp":1740346816925,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540219378"},{"type":"electronic","value":"9783540246749"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24674-9_29","type":"book-chapter","created":{"date-parts":[[2010,8,5]],"date-time":"2010-08-05T01:36:21Z","timestamp":1280972181000},"page":"276-281","source":"Crossref","is-referenced-by-count":6,"title":["Feature Selection for Robust Detection of Distributed Denial-of-Service Attacks Using Genetic Algorithms"],"prefix":"10.1007","author":[{"given":"Gavrilis","family":"Dimitris","sequence":"first","affiliation":[]},{"given":"Tsoulos","family":"Ioannis","sequence":"additional","affiliation":[]},{"given":"Dermatas","family":"Evangelos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1016\/S1389-1286(00)00141-9","volume":"34","author":"P. Mell","year":"2000","unstructured":"Mell, P., Marks, D., McLarnon: A denial-of-Service. Computer Networks\u00a034, 641 (2000)","journal-title":"Computer Networks"},{"key":"29_CR2","unstructured":"Ditrich, S.: Analyzing Distributed Denial of Service Tools: The Shaft Case. In: Proc of the 14th Systems Administration Conference-LISA 2000, New Orleans, USA, pp. 329\u2013339 (2000)"},{"key":"29_CR3","first-page":"943","volume-title":"Advances in Neural Information Processing Systems 10","author":"J. Ryan","year":"1998","unstructured":"Ryan, J., Lin, M.J., Miikkulainen, R.: Intrusion Detection with Neural Networks. In: Jordan, M., et al. (eds.) Advances in Neural Information Processing Systems 10, pp. 943\u2013949. MIT Press, Cambridge (1998)"},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"Mukkamala, S., Janoski, G., Sung, A.: Intrusion Detection using Neural Networks and Support Vector Machines. In: Proc. IJCNN, vol.\u00a02, pp. 1702\u20131707 (2002)","DOI":"10.1109\/IJCNN.2002.1007774"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Bonifacio, J., Casian, A.: Neural Networks Applied in Intrusion Detection Systems. In: Proc. Word Congress on Computational Intelligence - WCCI, Anchorage, USA, pp. 205\u2013210 (1998)","DOI":"10.1109\/IJCNN.1998.682263"},{"key":"29_CR6","unstructured":"Helmer, G., Wong, J., Honavar, V., Miller, L.: Feature Selection Using a Genetic Algorithm for Intrusion Detection. In: Proceedings of the Genetic and Evolutionary Computation Conference, vol.\u00a02, p. 1781 (1999)"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Chen, Y.W.: Study on the prevention of SYN flooding by using traffic policing. In: IEEE Symposium on Network Operations and Management, pp. 593\u2013604 (2000)","DOI":"10.1109\/NOMS.2000.830416"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Schuba, C., Krsul, I., Kuhn, M., Spafford, E., Sundaram, A., Zamboni, D.: Analysis of a denial-of-service attack on TCP. In: Proc. IEEE Computer Society Symposium on Research in Security and Privacy, USA, pp. 208\u2013223 (1997)","DOI":"10.1109\/SECPRI.1997.601338"},{"key":"29_CR9","first-page":"596","volume":"34","author":"R. Lippmann","year":"2000","unstructured":"Lippmann, R., Cunnigham, R.: Improving intrusion detection performance using Keyword selection and neural networks. Computer Networks\u00a034, 596\u2013603 (2000)","journal-title":"Computer Networks"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Lau, F., Rubin, S., Smith, M., Trajkovic, L.: Distributed denail-of-service attacks. In: Proc. IEEE Inter. Conference on Systems, Man and Cybernetics, vol.\u00a03, pp. 2275\u20132280 (2000)","DOI":"10.1109\/ICSMC.2000.886455"},{"key":"29_CR11","doi-asserted-by":"crossref","unstructured":"Cabrera, J., Ravichandran, B., Mehra, R.: Statistical Traffic Modeling for network intrusion detection. In: IEEE Inter. Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, pp. 466\u2013473 (2000)","DOI":"10.1109\/MASCOT.2000.876573"},{"key":"29_CR12","unstructured":"Bivens, A., Palagiri, C., Smith, R., Szymanski, B., Embrechts, M.: Network-Based Intrusion Detection using Neural Networks. In: Artificial Neural Networks In Engineering, St. Louis, Missouri, November 10-13 (2002)"},{"key":"29_CR13","unstructured":"Narayanaswamy, K., Ross, T., Spinney, B., Paquette, M., Wright, C.: System and process for defending against denial of service attacks on network nodes. Patent WO0219661, Top Layer Networks Inc., USA (2002)"},{"key":"29_CR14","first-page":"38","volume-title":"Practical methods of optimization","author":"R. Fletcher","year":"1980","unstructured":"Fletcher, R.: Practical methods of optimization, pp. 38\u201345. John Wiley & Sons, Chichester (1980)"},{"key":"29_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1162\/evco.1993.1.1.1","volume":"1","author":"T. Back","year":"1993","unstructured":"Back, T., Schwefel, H.: An overview of evolutionary algorithms for parameter optimization. Evolutionary Computation\u00a01, 1\u201323 (1993)","journal-title":"Evolutionary Computation"},{"key":"29_CR16","volume-title":"Genetic algorithms in Search, Optimization and Machine Learning","author":"D. Goldberg","year":"1989","unstructured":"Goldberg, D.: Genetic algorithms in Search, Optimization and Machine Learning. Addison- Wesley, Reading (1989)"},{"key":"29_CR17","unstructured":"Branch, J., Bivens, A., Chan, C., Lee, T., Szymanski, B.: Denial of Service Intrusion Detection Using Time-Dependent Finite Automata, http:\/\/www.cs.rpi.edu\/~brancj\/research.htm"},{"key":"29_CR18","unstructured":"Cox, D., McClanahan, K.: Method for Blocking Denial of Service and Address spoofing attacks on a private network. Patent WO9948303, Cisco Tech Ind, USA (1999)"},{"key":"29_CR19","unstructured":"Belissent, J.: Method and apparatus for preventing a denial of service (DOS) attack by selectively throttling TCP\/IP requests. Patent WO0201834, Sun Microsystems Inc, USA (2002)"},{"key":"29_CR20","unstructured":"Maher, R., Bennett, V.: Method for preventing denial of service attacks. Patent WO0203084, Netrake Corp, USA (2002)"},{"key":"29_CR21","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/S0167-4048(99)90051-2","volume":"18","author":"W. Scwartau","year":"1999","unstructured":"Scwartau, W.: Surviving denial-of-service. Computers & Security\u00a018, 124\u2013133 (1999)","journal-title":"Computers & Security"}],"container-title":["Lecture Notes in Computer Science","Methods and Applications of Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24674-9_29.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,23]],"date-time":"2025-02-23T21:06:24Z","timestamp":1740344784000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24674-9_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540219378","9783540246749"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24674-9_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}