{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T23:53:59Z","timestamp":1772063639252,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540255840","type":"print"},{"value":"9783540319795","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31979-5_17","type":"book-chapter","created":{"date-parts":[[2010,6,30]],"date-time":"2010-06-30T12:42:55Z","timestamp":1277901775000},"page":"192-203","source":"Crossref","is-referenced-by-count":31,"title":["Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks"],"prefix":"10.1007","author":[{"given":"Rasool","family":"Jalili","sequence":"first","affiliation":[]},{"given":"Fatemeh","family":"Imani-Mehr","sequence":"additional","affiliation":[]},{"given":"Morteza","family":"Amini","sequence":"additional","affiliation":[]},{"given":"Hamid Reza","family":"Shahriari","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Amini, M., Jalili, R.: Network-Based Intrusion Detection Using Unsupervised Adaptive Resonance Theory (ART). In: Proceedings of the 4th Conference on Engineering of Intelligent Systems (EIS 2004), Madeira, Portugal (2004)"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Gil, T.M., Poletter, M.: Multops: a data-structure for bandwidth attack detection. In: Proceedings of USENIX Security Symposium 2001 (2001)","DOI":"10.21236\/ADA401819"},{"key":"17_CR3","unstructured":"Kaizaki, R., Cho, K., Nakamura, O.: Detection Denial of Service Attacks Using AGURI. In: International Conference Telecommunications, Beijing China (June 2002)"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Peng, T., Leckie, C., Kotagiri, R.: Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring. In: Proceedings of the Third International IFIP-TC6 Networking Conference (Networking 2004), Athens, Greece (2004)","DOI":"10.1007\/978-3-540-24693-0_63"},{"key":"17_CR5","unstructured":"Bazek, R., Kim, H., Rozovskii, B., Tartakovsky, A.: A novel approach to detection of enial-of-service attacks via adaptive sequential and batch-sequential change-point methods. In: IEEE Systems, Man and Cybernetics Information Assurance Workshop (June 2001)"},{"key":"17_CR6","unstructured":"Noh, S., Lee, C., Jung, G., Choi, K.: Using Inductive Learning for the Detection of Distributed Denial of Service Attacks. In: International Conference on Advances in Infrastructure for Electronic Business, Education, Science, Medicine and Mobile Technologies on the Internet (2003)"},{"key":"17_CR7","volume-title":"Computers & Security","author":"L. Ming Li","year":"2004","unstructured":"Ming Li, L.: An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition. In: Computers & Security, vol.\u00a023(7). Elsevier, Amsterdam (2004), ISSN 0167-4048"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Hussain, A., Heidemann, J., Papadopoulos, C.: A Framework for Classifying Denial of Service Attacks. In: Proceedings of the ACM SIGCOMM Conference, Karlsruhe, Germany, August 2003, pp. 99\u2013110 (2003)","DOI":"10.1145\/863955.863968"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Feinstein, L., Schnackenberg, D., Balupari, R., Kindred, D.: Statistical Approaches to DDoS Attack Detection and Response. In: DARPA Information Survivability Conference and Exposition (2003)","DOI":"10.1109\/DISCEX.2003.1194894"},{"key":"17_CR10","unstructured":"Jin, S., Yeung, D.S.: A Covariance Analysis Model for DDoS Attack Detection. IEEE Communications Society (2004)"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1007\/978-3-540-25978-7_95","volume-title":"Information Networking. Networking Technologies for Broadband and Mobile Networks","author":"K. Mihui","year":"2004","unstructured":"Mihui, K., Hyunjung, N., Kijoon, C., Hyochan, B., Jungchan, N.: A Combined Data Mining Approach for DDoS Attack Detection. In: Kahng, H.-K., Goto, S. (eds.) ICOIN 2004. LNCS, vol.\u00a03090, pp. 943\u2013950. Springer, Heidelberg (2004)"},{"key":"17_CR12","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1007\/978-3-540-24674-9_29","volume-title":"Methods and Applications of Artificial Intelligence","author":"D. Gavrilis","year":"2004","unstructured":"Gavrilis, D., Tsoulos, I., Dermatas, E.: Feature selection for robust detection of distributed Denial-of-Service attacks using genetic algorithm. In: Vouros, G.A., Panayiotopoulos, T. (eds.) SETN 2004. LNCS (LNAI), vol.\u00a03025, pp. 276\u2013281. Springer, Heidelberg (2004)"},{"key":"17_CR13","unstructured":"Cannady, J.: Artificial Neural Networks for Misuse Detection. In: Proceedings of National Information Systems Security Conference (1998)"},{"key":"17_CR14","unstructured":"Rhodes, B.C., Mahaffey, J.A., Cannady, J.D.: Multiple Self-Organizing Maps for Intrusion Detection. In: Proceedings of 23rd National Information Systems Security Conference (2000)"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31979-5_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,2]],"date-time":"2021-05-02T23:44:27Z","timestamp":1619999067000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31979-5_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540255840","9783540319795"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31979-5_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}