{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T23:53:57Z","timestamp":1772063637696,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642040696","type":"print"},{"value":"9783642040702","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04070-2_106","type":"book-chapter","created":{"date-parts":[[2009,9,14]],"date-time":"2009-09-14T18:47:18Z","timestamp":1252954038000},"page":"1004-1013","source":"Crossref","is-referenced-by-count":11,"title":["DDoS Attack Detection Method Based on Linear Prediction Model"],"prefix":"10.1007","author":[{"given":"Jieren","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Jianping","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Chengkun","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Boyun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yun","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"106_CR1","unstructured":"Handley, M.: DoS-resistant Internet Subgroup Report. Internet Architecture WG. Tech. Rep. (2005), http:\/\/www.communications.net\/object\/download\/1543\/doc\/mjh-dos-summary.pdf"},{"issue":"4","key":"106_CR2","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1109\/TNET.2006.880180","volume":"14","author":"A. Kuzmanovic","year":"2006","unstructured":"Kuzmanovic, A., Knightly, E.W.: Low-rate TCP-targeted Denial of Service Attacks and Counter Strategies. IEEE-Acm Transactions on Networking\u00a014(4), 683\u2013696 (2006)","journal-title":"IEEE-Acm Transactions on Networking"},{"issue":"4","key":"106_CR3","doi-asserted-by":"publisher","first-page":"1013","DOI":"10.1016\/j.comnet.2006.07.002","volume":"51","author":"G. Macia-Fernandez","year":"2007","unstructured":"Macia-Fernandez, G., Diaz-Verdejo, J.E., Garcia-Teodoro, P.: Evaluation of a Low-rate DoS Attack against Iterative Servers. Computer Networks\u00a051(4), 1013\u20131030 (2007)","journal-title":"Computer Networks"},{"issue":"7-8","key":"106_CR4","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1016\/j.cose.2008.07.004","volume":"27","author":"G. Macia-Fernandez","year":"2008","unstructured":"Macia-Fernandez, G., Diaz-Verdejo, J.E., Garcia-Teodoro, P.: Evaluation of a Low-rate DoS Attack against Application Servers. Computers & Security\u00a027(7-8), 335\u2013354 (2008)","journal-title":"Computers & Security"},{"issue":"1","key":"106_CR5","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/LCOMM.2009.081555","volume":"13","author":"V.A. Kumar","year":"2009","unstructured":"Kumar, V.A., Jayalekshmy, P.S., Patra, G.K., et al.: On Remote Exploitation of TCP Sender for Low-Rate Flooding Denial-of-Service Attack. IEEE Communications Letters\u00a013(1), 46\u201348 (2009)","journal-title":"IEEE Communications Letters"},{"key":"106_CR6","unstructured":"Cheng, C.M., Kung, H.T., Tan, K.S.: Use of Spectral Analysis in Defense against DoS Attacks. In: Proceedings of IEEE GLOBECOM, pp. 2143\u20132148 (2002)"},{"issue":"10","key":"106_CR7","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MCOM.2002.1039860","volume":"40","author":"C. Manikopoulos","year":"2002","unstructured":"Manikopoulos, C., Papavassiliou, S.: Network Intrusion and Fault Detection: A Statistical Anomaly Approach. IEEE Commun. Mag., 76\u201382 (2002)","journal-title":"IEEE Communications Magazine"},{"issue":"4","key":"106_CR8","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1145\/1030194.1015492","volume":"34","author":"Anukool Lakhina","year":"2004","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Diagnosing Network-Wide Traffic Anomalies. In: Proceedings of ACM SIGCOMM, Portland, Oregon, USA (2004)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"106_CR9","doi-asserted-by":"crossref","unstructured":"Sanguk, N., Gihyun, J., Kyunghee, C., et al.: Compiling Network Traffic into Rules Using Soft Computing Methods for the Detection of Flooding Attacks. Applied Soft Computing, 1200\u20131210 (2008)","DOI":"10.1016\/j.asoc.2007.02.016"},{"key":"106_CR10","doi-asserted-by":"crossref","unstructured":"Keunsoo, L., Juhyun, K., Ki, H.K., et al.: DDoS Attack Detection Method Using Cluster Analysis. Expert Systems with Applications, 1659\u20131665 (2008)","DOI":"10.1016\/j.eswa.2007.01.040"},{"key":"106_CR11","doi-asserted-by":"crossref","unstructured":"Abdelsayed, S., Glimsholt, D., Leckie, C., et al.: An efficient Filter for Denial-of Service Bandwidth Attacks. In: Proceedings of the 46th IEEE GLOBECOM, pp. 1353\u20131357 (2003)","DOI":"10.1109\/GLOCOM.2003.1258459"},{"issue":"4","key":"106_CR12","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1145\/1090191.1080118","volume":"35","author":"Anukool Lakhina","year":"2005","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Mining Anomalies Using Traffic Feature Distributions. In: Proceedings of ACM SIGCOMM, Philadelphia, Pennsylvania, USA (2005)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"106_CR13","first-page":"771","volume-title":"Lecture Notes in Computer Science","author":"Tao Peng","year":"2004","unstructured":"Peng, T., Leckie, C., Kotagiri, R.: Proactively Detecting Distributed Denial of Service Attacks Using Source Ip Address Monitoring. In: Proceedings of the Third International IFIP-TC6 Networking Conference, pp. 771\u2013782 (2004)"},{"key":"106_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-02161-9","volume-title":"Proceedings of FAW 2009","author":"J. Cheng","year":"2009","unstructured":"Cheng, J., Yin, J.P., Liu, Y., et al.: DDoS Attack Detection Algorithm Using IP Address Features. In: Proceedings of FAW 2009. LNCS. Springer, Heidelberg (2009)"},{"key":"106_CR15","unstructured":"http:\/\/www.ll.mit.edu\/mission\/communications\/ist\/corpora\/ideval\/data\/index.html"},{"key":"106_CR16","volume-title":"System Identification: Theory for the User","author":"L. Ljung","year":"1999","unstructured":"Ljung, L.: System Identification: Theory for the User. Prentice-Hal PTR, Upper Saddle River (1999)"}],"container-title":["Lecture Notes in Computer Science","Emerging Intelligent Computing Technology and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04070-2_106.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T04:21:01Z","timestamp":1739334061000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04070-2_106"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642040696","9783642040702"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04070-2_106","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}