{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T19:40:09Z","timestamp":1743968409111,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642321283"},{"type":"electronic","value":"9783642321290"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32129-0_40","type":"book-chapter","created":{"date-parts":[[2012,8,10]],"date-time":"2012-08-10T11:41:24Z","timestamp":1344598884000},"page":"395-406","source":"Crossref","is-referenced-by-count":1,"title":["DDoS Detection with Daubechies"],"prefix":"10.1007","author":[{"given":"Gagandeep","family":"Kaur","sequence":"first","affiliation":[]},{"given":"Vikas","family":"Saxena","sequence":"additional","affiliation":[]},{"given":"J. P.","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"40_CR1","unstructured":"CERT.: Overview of Dos and DDoS attacks, http:\/\/www.us-cert.gov\/cas\/tips\/ST04-015.html"},{"key":"40_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2009\/837601","volume":"2009","author":"W. Lu","year":"2009","unstructured":"Lu, W., Ghorbani, A.A.: Network Anomaly Detection Based on Wavelet Analysis. EURASIP Journal on Advances in Signal Processing\u00a02009, 1\u201317 (2009)","journal-title":"EURASIP Journal on Advances in Signal Processing"},{"key":"40_CR3","doi-asserted-by":"crossref","unstructured":"Alarcon-Aquino, V., Barria, J.A.: Anomaly Detection in Communication networks using wavelets. In: IEE Proceedings-Communications, pp. 355\u2013362 (2001)","DOI":"10.1049\/ip-com:20010659"},{"key":"40_CR4","doi-asserted-by":"crossref","unstructured":"Barford, P., Kline, J., Plonka, D., Ron, A.: A signal analysis of network traffic anomalies. In: ACM SIGCOMM Proceedings Internet Measurement Workshop (2002)","DOI":"10.1145\/637209.637210"},{"key":"40_CR5","unstructured":"Cheng, C.M., Kung, H.T., Tan, K.S.: Use of spectral analysis in defense against DoS attacks. In: IEEE GLOBECOM Proceedings, pp. 2143\u20132148 (2002)"},{"key":"40_CR6","doi-asserted-by":"crossref","unstructured":"Limthong, K., Kensuke, F., Watanapongse, P.: Wavelet-Based Unwanted Traffic Time Series Analysis. In: IEEE International Conference on Computer and Electrical Engineering, pp. 445\u2013449 (2008)","DOI":"10.1109\/ICCEE.2008.106"},{"key":"40_CR7","doi-asserted-by":"crossref","unstructured":"Hussain, A., Heidemann, J., Papadopoulos, C.: Identification of repeated denial of service attacks. In: Proceedings of the IEEE Infocom, pp. 1\u201315 (2006)","DOI":"10.1109\/INFOCOM.2006.126"},{"key":"40_CR8","doi-asserted-by":"crossref","unstructured":"Magnaghi, A., Hamada, T., Katsuyama, T.: A Wavelet-Based Framework for Proactive Detection of Network Misconfigurations. In: Proceedings of ACM Workshop on Network Troubleshooting (2004)","DOI":"10.1145\/1016687.1016691"},{"key":"40_CR9","doi-asserted-by":"crossref","unstructured":"He, X., Papadopoulos, C., Heidemann, J., Mitra, U., Riaz, U.: Remote detection of bottleneck links using spectral and statistical methods. In: ACM International Journal of Computer and Telecommunications Networking, pp. 279\u2013298 (2009)","DOI":"10.1016\/j.comnet.2008.10.001"},{"key":"40_CR10","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1016\/j.cose.2006.08.017","volume":"25","author":"G. Carl","year":"2006","unstructured":"Carl, G., Brooks, R.R., Rai, S.: Wavelet based denial-of-service detection. ELSEVIER Journal on Computers & Security\u00a025, 600\u2013615 (2006)","journal-title":"ELSEVIER Journal on Computers & Security"},{"key":"40_CR11","doi-asserted-by":"publisher","first-page":"3203","DOI":"10.1016\/j.comcom.2007.05.061","volume":"30","author":"M. Hamdi","year":"2007","unstructured":"Hamdi, M., Boudriga, N.: Detecting denial-of service attacks using the wavelet transform. ELSEVIER Computer Communications\u00a030, 3203\u20133213 (2007)","journal-title":"ELSEVIER Computer Communications"},{"issue":"1","key":"40_CR12","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/s11460-007-0013-z","volume":"2","author":"R. Xunyi","year":"2007","unstructured":"Xunyi, R., Ruchuan, W., Haiyan, W.: Wavelet analysis method for detection of DDoS attack on the basis of self-similarity. Frontiers of Electrical and Electronic Engineering in China\u00a02(1), 73\u201377 (2007)","journal-title":"Frontiers of Electrical and Electronic Engineering in China"},{"key":"40_CR13","doi-asserted-by":"crossref","unstructured":"Lu, W., Tavallaee, M., Ghorbani, A.A.: Detecting network anomalies using different wavelet basis functions. In: Proceedings of the Communication Networks and Services Research Conference, pp. 149\u2013156 (2008)","DOI":"10.1109\/CNSR.2008.75"},{"key":"40_CR14","unstructured":"Bartlett, G., Rey, M.D., Heidemann, J., Papadopoulos, C.: Using Low-Rate Flow Periodicities for Anomaly Detection Extended Technical Report ISI-TR-661 (2009)"},{"key":"40_CR15","doi-asserted-by":"crossref","unstructured":"Leland, W., Taqqu, M., Willinger, W., Wilson, D.: On the self-similar nature of Ethernet traffic. In: Proceedings of ACM SIGCOMM, pp. 183\u2013193 (1993)","DOI":"10.1145\/167954.166255"},{"key":"40_CR16","doi-asserted-by":"crossref","unstructured":"Li, L., Lee, G.: DDoS attack detection and wavelets. In: 12th International Conference on Computer Communications and Networks, pp. 421\u2013427 (2003)","DOI":"10.1109\/ICCCN.2003.1284203"},{"key":"40_CR17","doi-asserted-by":"crossref","unstructured":"Pacheco, J.C.R., Roman, D.T.: Distinguishing fractal noises and motions using Tsallis Wavelet entropies. In: 2010 IEEE Latin\/American Conference on Communications, pp. 1\u20135 (2010)","DOI":"10.1109\/LATINCOM.2010.5640985"},{"key":"40_CR18","doi-asserted-by":"crossref","unstructured":"Abe, S., Suzuki, N.: Itineration of the Internet over Non-equilibrium Stationary States in Tsallis. Statistics in Physical Review E\u00a067 (2003)","DOI":"10.1103\/PhysRevE.67.016106"},{"key":"40_CR19","doi-asserted-by":"crossref","unstructured":"Dainotti, A., Pescap\u00e9, A., Ventre, G.: Wavelet-based Detection of DoS Attacks. In: IEEE Conference on Global Communications, pp. 1\u20136 (2006)","DOI":"10.1109\/GLOCOM.2006.279"},{"issue":"2","key":"40_CR20","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1016\/j.physa.2005.09.060","volume":"365","author":"D.G. Perez","year":"2006","unstructured":"Perez, D.G., Zunino, L., Garavaglia, M., Rosso, O.A.: Wavelet entropy and fractional Brownian motion time series. Physica A\u00a0365(2), 282\u2013288 (2006)","journal-title":"Physica A"},{"key":"40_CR21","doi-asserted-by":"crossref","unstructured":"Karmeshu, Sharma, S.: Power Law and Tsallis Entropy: Network Traffic and Applications. In: Chaos, Nonliniearity and Complexity. STUDFUZZ, vol.\u00a0206, pp. 162\u2013178. Springer (2006)","DOI":"10.1007\/3-540-31757-0_5"},{"key":"40_CR22","doi-asserted-by":"publisher","first-page":"1111","DOI":"10.1109\/18.650984","volume":"44","author":"P. Abry","year":"1998","unstructured":"Abry, P., Veitch, D.: Wavelet analysis of long-range dependent trafic. IEEE Transactions on Information Theory\u00a044, 1111\u20131124 (1998)","journal-title":"IEEE Transactions on Information Theory"},{"key":"40_CR23","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1016\/j.comnet.2004.11.017","volume":"48","author":"S. Stoev","year":"2005","unstructured":"Stoev, S., Taqqu, M.S., Park, C., Marron, J.S.: On the Wavelet Spectrum Diagnostic for Hurst Parameter Estimation in the analysis of Internet Trafic. ACM Journal on Computer Networks\u00a048, 423\u2013445 (2005)","journal-title":"ACM Journal on Computer Networks"},{"issue":"3","key":"40_CR24","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1111\/1467-9892.00090","volume":"19","author":"P. Abry","year":"1998","unstructured":"Abry, P., Veitch, D., Flandrin, P.: Long-Range Dependence: Revisiting Aggregation with Wavelets. Journal of Time Series Analysis\u00a019(3), 253\u2013266 (1998)","journal-title":"Journal of Time Series Analysis"},{"key":"40_CR25","first-page":"239","volume-title":"Beyond Shannon: Characterizing Internet Traffic with Generalized Entropy Metrics","author":"B. Tellenbach","year":"2009","unstructured":"Tellenbach, B., Burkhart, M., Sornette, D., Maillart, T.: Beyond Shannon: Characterizing Internet Traffic with Generalized Entropy Metrics, pp. 239\u2013248. Springer, Berlin (2009)"},{"issue":"2","key":"40_CR26","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/TDSC.2008.73","volume":"6","author":"J. Mirkovic","year":"2009","unstructured":"Mirkovic, J., Hussain, A., Fahmy, S., Reiher, P., Thomas, R.: Accurately Measuring Denial of Service in Simulation and Testbed Experiments. IEEE Transactions on Dependable & Secure Computing\u00a06(2), 81\u201395 (2009)","journal-title":"IEEE Transactions on Dependable & Secure Computing"},{"key":"40_CR27","doi-asserted-by":"crossref","unstructured":"Moore, D., Shannon, C., Brown, J.: Code-Red: A case study on the spread and victims of an Internet worm. In: Proceedings of Internet Measurement Workshop (2002)","DOI":"10.1145\/637241.637244"},{"key":"40_CR28","unstructured":"The Internet Traffic Archives, http:\/\/ita.ee.lbl.gov\/html\/traces.html"},{"key":"40_CR29","doi-asserted-by":"crossref","unstructured":"Labovitz, C., Johnson, S.I., McPherson, D., Oberheide, J., Jahanian, F.: Internet inter-domain traffic. In: Proceedings of ACM SIGCOMM, vol.\u00a040, pp. 75\u201386 (2010)","DOI":"10.1145\/1851275.1851194"},{"key":"40_CR30","doi-asserted-by":"crossref","unstructured":"Peng, T., Leckie, C., Ramamohanrao, K.: Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems. ACM Computing Surveys\u00a039(1) (2007)","DOI":"10.1145\/1216370.1216373"},{"key":"40_CR31","doi-asserted-by":"crossref","unstructured":"Roghan, M., Veitch, D., Abry, P.: Real-time estimation of the parameters of long-range dependence. IEEE\/ACM Transactions on Networking, 467\u2013478 (2000)","DOI":"10.1109\/90.865075"},{"key":"40_CR32","doi-asserted-by":"crossref","unstructured":"Kuzmanovic, A., Knightly, E.: Low-Rate TCP-Targeted Denial of Service (The Shrew vs. the Mice and Elephants). In: ACM SIGCOMM Proceedings, pp. 75\u201386 (2003)","DOI":"10.1145\/863955.863966"}],"container-title":["Communications in Computer and Information Science","Contemporary Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32129-0_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T19:26:40Z","timestamp":1743967600000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32129-0_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642321283","9783642321290"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32129-0_40","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}