{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:06:33Z","timestamp":1725541593954},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642108464"},{"type":"electronic","value":"9783642108471"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10847-1_17","type":"book-chapter","created":{"date-parts":[[2009,11,28]],"date-time":"2009-11-28T03:33:01Z","timestamp":1259379181000},"page":"132-139","source":"Crossref","is-referenced-by-count":6,"title":["Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion"],"prefix":"10.1007","author":[{"given":"Jieren","family":"Cheng","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jianping","family":"Yin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yun","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhiping","family":"Cai","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chengkun","family":"Wu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Handley, M.: DoS-resistant Internet subgroup report. Internet Architecture WG (2005)"},{"issue":"7-8","key":"17_CR2","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1016\/j.cose.2008.07.004","volume":"27","author":"G. Macia","year":"2008","unstructured":"Macia, G., Diaz, J.E., Garcia, P.: Evaluation of a low-rate DoS attack against application servers. Computers & Security\u00a027(7-8), 335\u2013354 (2008)","journal-title":"Computers & Security"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Abdelsayed, S., Glimsholt, D., Leckie, C., et al.: An efficient filter for denial-of service bandwidth attacks. In: Proceedings of the 46th IEEE GLOBECOM, pp. 1353\u20131357 (2003)","DOI":"10.1109\/GLOCOM.2003.1258459"},{"key":"17_CR4","unstructured":"Wang, H., Zhang, D., Shin, K.G.: Detecting SYN flooding attacks. In: Proceedings of IEEE INFOCOM 2002, pp. 1530\u20131539 (2002)"},{"key":"17_CR5","unstructured":"Mirkovic, J., Wang, M., Reither, P., et al.: Save: Source address validity enforcement protocol. In: Proceedings of IEEE INFOCOM 2002, pp. 1557\u20131566 (2002)"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Mining Anomalies Using Traffic Feature Distributions. In: Proceedings of ACM SIGCOMM, Philadelphia, Pennsylvania, USA (2005)","DOI":"10.1145\/1080091.1080118"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Cheng, C.M., Kung, H.T., Tan, K.S.: Use of spectral analysis in defense against DoS attacks. In: Proceedings of IEEE GLOBECOM 2002, pp. 2143\u20132148 (2002)","DOI":"10.1109\/GLOCOM.2002.1189011"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Diagnosing Network-Wide Traffic Anomalies. In: Proceedings of ACM SIGCOMM, Portland, Oregon, USA (August 2004)","DOI":"10.1145\/1015467.1015492"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Cheng, J., Yin, J., Liu, Y., et al.: Detecting Distributed Denial of Service Attack Based on Address Correlation Value. Journal of Computer Research and Development (2009)","DOI":"10.1007\/978-3-642-10847-1_17"},{"key":"17_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-02161-9","volume-title":"FAW 2009","author":"J. Cheng","year":"2009","unstructured":"Cheng, J., Yin, J., Liu, Y., et al.: DDoS attack detection Algorithm using IP Address Features. In: Deng, X., Hopcroft, J.E., Xue, J. (eds.) FAW 2009. LNCS, vol.\u00a05598. Springer, Heidelberg (2009)"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1004","DOI":"10.1007\/978-3-642-04070-2_106","volume-title":"ICIC 2009","author":"J. Cheng","year":"2009","unstructured":"Cheng, J., Yin, J., Wu, C., et al.: DDoS Attack Detection Method Based on Linear Prediction Model. In: Huang, D.-S., et al. (eds.) ICIC 2009. LNCS, vol.\u00a05754, pp. 1004\u20131013. Springer, Heidelberg (2009)"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Chen, Y., Hwang, K., Ku, W.-S.: Collaborative Detection of DDoS Attacks over Multiple Network Domains. IEEE Trans. on Parallel and Distributed Systems (2007)","DOI":"10.1109\/TPDS.2007.1111"},{"key":"17_CR13","unstructured":"Chen, F., Zhou, V., Leckie, C., et al.: Decentralized multi-dimensional alert correlation for collaborative intrusion detection. Journal of Network and Computer Applications (2009)"},{"issue":"10","key":"17_CR14","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MCOM.2002.1039860","volume":"40","author":"C. Manikopoulos","year":"2002","unstructured":"Manikopoulos, C., Papavassiliou, S.: Network intrusion and fault detection: A statistical anomaly approach. IEEE Commun. Mag.\u00a040(10), 76\u201382 (2002)","journal-title":"IEEE Commun. Mag."},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Cleveland, W.S., Devlin, S.J.: Locally Weighted Regression: An Approach to Regression Analysis by Local Fitting. Journal of the American Statistical Association (1988)","DOI":"10.1080\/01621459.1988.10478639"},{"key":"17_CR16","unstructured":"http:\/\/www.ll.mit.edu\/mission\/communications\/ist\/corpora\/ideval\/data\/index.html"}],"container-title":["Communications in Computer and Information Science","Security Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10847-1_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:35:57Z","timestamp":1606185357000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10847-1_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642108464","9783642108471"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10847-1_17","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2009]]}}}