{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T15:36:50Z","timestamp":1767713810401,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":14,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811381379"},{"type":"electronic","value":"9789811381386"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-8138-6_17","type":"book-chapter","created":{"date-parts":[[2019,5,10]],"date-time":"2019-05-10T08:47:49Z","timestamp":1557478069000},"page":"205-216","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["DDoS Attacks Detection Using Machine Learning Algorithms"],"prefix":"10.1007","author":[{"given":"Qian","family":"Li","sequence":"first","affiliation":[]},{"given":"Linhai","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jinyao","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,11]]},"reference":[{"key":"17_CR1","unstructured":"Douligeris, C., Mitrokotsa, A.: DDoS attacks and defense mechanisms: a classification. In: IEEE International Symposium on Signal Processing and Information Technology, pp. 190\u2013193. IEEE (2003)"},{"key":"17_CR2","unstructured":"Study: Attack on KrebsOnSecurity Cost IoT Device Owners $323\u00a0K. \n                    https:\/\/krebsonsecurity.com\/2018\/05\/study-attack-on-krebsonsecurity-cost-iot-device-owners-323k\/"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Tao, Y., Yu, S.: DDoS attack detection at local area networks using information theoretical metrics. In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 233\u2013240. IEEE (2013)","DOI":"10.1109\/TrustCom.2013.32"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Mousavi, S.M., Sthilaire, M.: Early detection of DDoS attacks against SDN controllers. In: International Conference on Computing, Networking and Communications, pp. 77\u201381. IEEE (2015)","DOI":"10.1109\/ICCNC.2015.7069319"},{"issue":"1","key":"17_CR5","first-page":"73","volume":"2","author":"XY Ren","year":"2006","unstructured":"Ren, X.Y., Wang, R.C., Wang, H.Y.: Wavelet analysis method for detection of DDoS attack based on self-similar. J. Commun. 2(1), 73\u201377 (2006)","journal-title":"J. Commun."},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Dong, P., Du, X., Zhang, H., et al.: A detection method for a novel DDoS attack against SDN controllers by vast new low-traffic flows. In: IEEE International Conference on Communications, pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/ICC.2016.7510992"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Bilge, L., Balzarotti, D., Robertson, W., et al.: Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis. In: Computer Security Applications Conference, pp. 129\u2013138. ACM (2012)","DOI":"10.1145\/2420950.2420969"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Zhang, G., Jiang, S., Wei, G., et al.: A prediction-based detection algorithm against distributed denial-of-service attacks. In: International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC 2009, Leipzig, Germany, June, pp. 106\u2013110. DBLP (2009)","DOI":"10.1145\/1582379.1582403"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Kumar, S.: Smurf-based distributed denial of service (DDoS) attack amplification in internet. In: International Conference on Internet Monitoring and Protection, p. 25. IEEE Computer Society (2007)","DOI":"10.1109\/ICIMP.2007.42"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Kumar, S., Azad, M., Gomez, O., et al.: Can Microsoft?s Service Pack2 (SP2) security software prevent SMURF attacks?. In: Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services, p. 89. IEEE (2006)","DOI":"10.1109\/AICT-ICIW.2006.60"},{"issue":"5","key":"17_CR11","doi-asserted-by":"publisher","first-page":"1801","DOI":"10.3837\/tiis.2014.05.017","volume":"8","author":"SJ Kim","year":"2014","unstructured":"Kim, S.J., Lee, S., Bae, B.: HAS-analyzer: detecting HTTP-based C&C based on the analysis of HTTP activity sets. KSII Trans. Internet Inf. Syst. 8(5), 1801\u20131816 (2014)","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"17_CR12","unstructured":"Jacob, G., Hund, R., Kruegel, C., et al.: JACKSTRAWS: picking command and control connections from BOT traffic. In: Usenix Conference on Security, p. 29. USENIX Association (2011)"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Tegeler, F., Fu, X., Vigna, G., et al.: BotFinder: finding bots in network traffic without deep packet inspection. In: Co-Next, pp. 349\u2013360 (2012)","DOI":"10.1145\/2413176.2413217"},{"key":"17_CR14","unstructured":"KDD Cup Data. \n                    http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup-99.html"}],"container-title":["Communications in Computer and Information Science","Digital TV and Multimedia Communication"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-8138-6_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T00:44:26Z","timestamp":1558399466000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-8138-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811381379","9789811381386"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-8138-6_17","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IFTC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Forum on Digital TV and Wireless Multimedia Communications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iftc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.siga.com.cn\/iftc2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}