{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:52:50Z","timestamp":1726037570709},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811399411"},{"type":"electronic","value":"9789811399428"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-9942-8_35","type":"book-chapter","created":{"date-parts":[[2019,7,18]],"date-time":"2019-07-18T07:03:25Z","timestamp":1563433405000},"page":"369-378","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["DDoS Attack Detection and Clustering of Attacked and Non-attacked VMs Using SOM in Cloud Network"],"prefix":"10.1007","author":[{"given":"Nitesh","family":"Bharot","sequence":"first","affiliation":[]},{"given":"Veenadhari","family":"Suraparaju","sequence":"additional","affiliation":[]},{"given":"Sanjeev","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,19]]},"reference":[{"issue":"2","key":"35_CR1","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1080\/17517575.2012.683812","volume":"8","author":"L Zhang","year":"2014","unstructured":"Zhang, L., et al.: Cloud manufacturing: a new manufacturing paradigm. Enterp. Inf. Syst. 8(2), 167\u2013187 (2014)","journal-title":"Enterp. Inf. Syst."},{"issue":"2","key":"35_CR2","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1080\/17517575.2013.839055","volume":"9","author":"L Ren","year":"2015","unstructured":"Ren, L., Zhang, L., Tao, F., Zhao, C., Chai, X., Zhao, X.: Cloud manufacturing: from concept to practice. Enterp. Inf. Syst. 9(2), 186\u2013209 (2015)","journal-title":"Enterp. Inf. Syst."},{"issue":"6","key":"35_CR3","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1080\/0951192X.2014.902105","volume":"30","author":"L Ren","year":"2017","unstructured":"Ren, L., Zhang, L., Wang, L., Tao, F., Chai, X.: Cloud manufacturing: key characteristics and applications. Int. J. Comput. Integr. Manuf. 30(6), 501\u2013515 (2017)","journal-title":"Int. J. Comput. Integr. Manuf."},{"key":"35_CR4","doi-asserted-by":"crossref","unstructured":"Puthal, D., Sahoo, B.P.S., Mishra, S., Swain, S.: Cloud computing features, issues, and challenges: a big picture. In: 2015 International Conference on Computational Intelligence and Networks (CINE), pp. 116\u2013123. IEEE (2015)","DOI":"10.1109\/CINE.2015.31"},{"key":"35_CR5","doi-asserted-by":"publisher","first-page":"1007","DOI":"10.1016\/j.ijepes.2014.08.020","volume":"64","author":"A Sheikhi","year":"2015","unstructured":"Sheikhi, A., Rayati, M., Bahrami, S., Ranjbar, A.M., Sattari, S.: A cloud computing framework on demand side management game in smart energy hubs. Int. J. Electr. Power Energy Syst. 64, 1007\u20131016 (2015)","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"35_CR6","doi-asserted-by":"publisher","first-page":"304","DOI":"10.4018\/978-1-5225-0130-5.ch015","volume-title":"Handbook of Research on Managerial Strategies for Achieving Optimal Performance in Industrial Processes","author":"Sourav Banerjee","year":"2016","unstructured":"Banerjee, S., Paul, R., Biswas, U.: Cloud computing: a wave in service supply chain. In: Handbook of Research on Managerial Strategies for Achieving Optimal Performance in Industrial Processes, pp. 304\u2013324 (2016)"},{"key":"35_CR7","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.ins.2013.04.028","volume":"258","author":"L Wei","year":"2014","unstructured":"Wei, L., et al.: Security and privacy for storage and computation in cloud computing. Inf. Sci. 258, 371\u2013386 (2014)","journal-title":"Inf. Sci."},{"issue":"5","key":"35_CR8","doi-asserted-by":"publisher","first-page":"1206","DOI":"10.1109\/TPDS.2014.2318320","volume":"26","author":"J Li","year":"2015","unstructured":"Li, J., Li, Y.K., Chen, X., Lee, P.P., Lou, W.: A hybrid cloud approach for secure authorized deduplication. IEEE Trans. Parallel Distrib. Syst. 26(5), 1206\u20131216 (2015)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"35_CR9","unstructured":"Islam, T., Manivannan, D., Zeadally, S.: A classification and characterization of security threats in cloud computing. Int. J. Next-Gener. Comput. 7(1) (2016)"},{"issue":"1","key":"35_CR10","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MCC.2017.14","volume":"4","author":"G Somani","year":"2017","unstructured":"Somani, G., Gaur, M.S., Sanghi, D., Conti, M., Rajarajan, M., Buyya, R.: Combating DDoS attacks in the cloud: requirements, trends, and future directions. IEEE Cloud Comput. 4(1), 22\u201332 (2017)","journal-title":"IEEE Cloud Comput."},{"issue":"4","key":"35_CR11","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MCOM.2015.7081075","volume":"53","author":"Q Yan","year":"2015","unstructured":"Yan, Q., Yu, F.R.: Distributed denial of service attacks in software-defined networking with cloud computing. IEEE Commun. Mag. 53(4), 52\u201359 (2015)","journal-title":"IEEE Commun. Mag."},{"key":"35_CR12","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.jnca.2016.01.001","volume":"67","author":"O Osanaiye","year":"2016","unstructured":"Osanaiye, O., Choo, K.K.R., Dlodlo, M.: Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework. J. Netw. Comput. Appl. 67, 147\u2013165 (2016)","journal-title":"J. Netw. Comput. Appl."},{"issue":"C","key":"35_CR13","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.comcom.2017.03.010","volume":"107","author":"G Somani","year":"2017","unstructured":"Somani, G., Gaur, M.S., Sanghi, D., Conti, M., Buyya, R.: DDoS attacks in cloud computing. Comput. Commun. 107(C), 30\u201348 (2017)","journal-title":"Comput. Commun."},{"key":"35_CR14","first-page":"240","volume":"41","author":"A Poornima","year":"2016","unstructured":"Poornima, A., Maheshwari, D.: A study on denial of service attacks in cluster based web servers. World Sci. News 41, 240 (2016)","journal-title":"World Sci. News"},{"issue":"4","key":"35_CR15","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1093\/comjnl\/bxt031","volume":"57","author":"MH Bhuyan","year":"2013","unstructured":"Bhuyan, M.H., Kashyap, H.J., Bhattacharyya, D.K., Kalita, J.K.: Detecting distributed denial of service attacks: methods, tools and future directions. Comput. J. 57(4), 537\u2013556 (2013)","journal-title":"Comput. J."},{"key":"35_CR16","unstructured":"Todorova, M.S., Todorova, S.T.: DDoS Attack detection in SDN-based VANET architectures (2016)"},{"key":"35_CR17","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.jnca.2017.02.001","volume":"84","author":"MB Mollah","year":"2017","unstructured":"Mollah, M.B., Azad, M.A.K., Vasilakos, A.: Security and privacy challenges in mobile cloud computing: Survey and way ahead. J. Netw. Comput. Appl. 84, 38\u201354 (2017)","journal-title":"J. Netw. Comput. Appl."},{"key":"35_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.csi.2017.03.005","volume":"54","author":"Yong Yu","year":"2017","unstructured":"Yu, Y., Miyaji, A., Au, M.H., Susilo, W.: Cloud computing security and privacy: standards and regulations (2017)","journal-title":"Computer Standards & Interfaces"},{"key":"35_CR19","doi-asserted-by":"publisher","first-page":"959","DOI":"10.1007\/s13369-017-2844-0","volume":"43","author":"N Bharot","year":"2018","unstructured":"Bharot, N., Verma, P., Sharma, S., Suraparaju, V.: Distributed denial-of-service attack detection and mitigation using feature selection and intensive care request processing unit. Arab J. Sci. Eng. 43, 959\u2013967 (2018)","journal-title":"Arab J. Sci. Eng."},{"issue":"38","key":"35_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17485\/ijst\/2016\/v9i38\/98811","volume":"9","author":"N Bharot","year":"2016","unstructured":"Bharot, N., Verma, P., Suraparaju, V., Gupta, S.: Mitigating distributed denial of service attack in cloud computing environment using threshold based technique. Indian J. Sci. Technol. 9(38), 1\u20137 (2016)","journal-title":"Indian J. Sci. Technol."},{"issue":"3","key":"35_CR21","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1109\/TIFS.2015.2505680","volume":"11","author":"Y Han","year":"2016","unstructured":"Han, Y., Alpcan, T., Chan, J., Leckie, C., Rubinstein, B.I.: A game theoretical approach to defend against co-resident attacks in cloud computing: preventing co-residence using semi-supervised learning. IEEE Trans. Inf. Forensics Secur. 11(3), 556\u2013570 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"35_CR22","doi-asserted-by":"crossref","unstructured":"Jabir, R.M., Khanji, S.I.R., Ahmad, L.A., Alfandi, O., Said, H.: Analysis of cloud computing attacks and countermeasures. In: 2016 18th International Conference on Advanced Communication Technology (ICACT), pp. 117\u2013123. IEEE (2016)","DOI":"10.1109\/ICACT.2016.7423295"},{"key":"35_CR23","doi-asserted-by":"crossref","unstructured":"Chen, K.Y., Junuthula, A.R., Siddhrau, I.K., Xu, Y., Chao, H.J.: SDNShield: towards more comprehensive defense against DDoS attacks on SDN control plane. In: 2016 IEEE Conference on Communications and Network Security (CNS), pp. 28\u201336 (2016)","DOI":"10.1109\/CNS.2016.7860467"},{"key":"35_CR24","doi-asserted-by":"crossref","unstructured":"Prasad, K.M., Reddy, A.M., Rao, K.V.: BARTD: bio-inspired anomaly based real time detection of under rated App-DDoS attack on web. J. King Saud Univ. \u2013 Comput. Inf. Sci. (2017)","DOI":"10.1016\/j.jksuci.2017.07.004"},{"issue":"2","key":"35_CR25","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1016\/j.camwa.2011.08.020","volume":"63","author":"SM Lee","year":"2012","unstructured":"Lee, S.M., Kim, D.S., Lee, J.H., Park, J.S.: Detection of DDoS attacks using optimized traffic matrix. Comput. Math Appl. 63(2), 501\u2013510 (2012)","journal-title":"Comput. Math Appl."},{"issue":"9","key":"35_CR26","doi-asserted-by":"publisher","first-page":"1464","DOI":"10.1109\/5.58325","volume":"78","author":"T Kohonen","year":"1990","unstructured":"Kohonen, T.: The self-organizing map. Proc. IEEE 78(9), 1464\u20131480 (1990)","journal-title":"Proc. IEEE"},{"key":"35_CR27","doi-asserted-by":"crossref","unstructured":"Prasad, K.M., Reddy, A.R.M., Rao, K.V.: BARTD: Bio-inspired anomaly based real time detection of under rated App-DDoS attack on web. J. King Saud Univ.-Comput. Inf. Sci. (2017)","DOI":"10.1016\/j.jksuci.2017.07.004"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Data Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-9942-8_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,18]],"date-time":"2019-07-18T07:14:58Z","timestamp":1563434098000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-9942-8_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811399411","9789811399428"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-9942-8_35","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"19 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICACDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Computing and Data Sciences","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ghazibad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 April 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 April 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icacds0a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/icacds.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"621","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"112","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"-","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}