{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:04:40Z","timestamp":1742969080979,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811591280"},{"type":"electronic","value":"9789811591297"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9129-7_5","type":"book-chapter","created":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T23:07:29Z","timestamp":1603321649000},"page":"65-78","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["High-Speed Network Attack Detection Framework Based on Optimized Feature Selection"],"prefix":"10.1007","author":[{"given":"Zhicheng","family":"Luo","sequence":"first","affiliation":[]},{"given":"Weijia","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Anmin","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Zhiyi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Linjie","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,22]]},"reference":[{"issue":"5","key":"5_CR1","doi-asserted-by":"publisher","first-page":"8372","DOI":"10.1109\/JIOT.2019.2917223","volume":"6","author":"B Kuang","year":"2019","unstructured":"Kuang, B., Fu, A., Yu, S., Yang, G., Su, M., Zhang, Y.: ESDRA: an efficient and secure distributed remote attestation scheme for IoT swarms. IEEE Internet Things J. 6(5), 8372\u20138383 (2019)","journal-title":"IEEE Internet Things J."},{"key":"5_CR2","doi-asserted-by":"publisher","first-page":"101945","DOI":"10.1016\/j.cose.2020.101945","volume":"97","author":"B Kuang","year":"2020","unstructured":"Kuang, B., Fu, A., Zhou, L., Susilo, W., Zhang, Y.: DO-RA: data-oriented runtime attestation for IoT devices. Comput. Secur. 97, 101945 (2020)","journal-title":"Comput. Secur."},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Alazab, A., Abawajy, J., Hobbs, M., Layton, R., Khraisat, A.: Crime toolkits: the productisation of cybercrime. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1626\u20131632 (2013)","DOI":"10.1109\/TrustCom.2013.273"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Claise, B.: Cisco systems netflow services export version 9. RFC 3954, RFC Editor, October 2004. http:\/\/www.rfc-editor.org\/rfc\/rfc3954.txt","DOI":"10.17487\/rfc3954"},{"issue":"6","key":"5_CR5","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1109\/TPDS.2011.262","volume":"23","author":"S Yu","year":"2011","unstructured":"Yu, S., Zhou, W., Jia, W., Guo, S., Xiang, Y., Tang, F.: Discriminating DDoS attacks from flash crowds using flow correlation coefficient. IEEE Trans. Parallel Distrib. Syst. 23(6), 1073\u20131080 (2011)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"5_CR6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2987958","author":"C Zhou","year":"2020","unstructured":"Zhou, C., Fu, A., Yu, S., Yang, W., Wang, H., Zhang, Y.: Privacy-preserving federated learning in fog computing. IEEE Internet Things J. (2020). https:\/\/doi.org\/10.1109\/JIOT.2020.2987958","journal-title":"IEEE Internet Things J."},{"key":"5_CR7","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2937484","author":"A Fu","year":"2019","unstructured":"Fu, A., Chen, Z., Mu, Y., Susilo, W., Sun, Y., Wu, J.: Cloud-based outsourcing for enabling privacy-preserving large-scale non-negative matrix factorization. IEEE Trans. Serv. Comput. (2019). https:\/\/doi.org\/10.1109\/TSC.2019.2937484","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"2","key":"5_CR8","doi-asserted-by":"publisher","first-page":"1988","DOI":"10.1109\/COMST.2018.2883147","volume":"21","author":"F Pacheco","year":"2018","unstructured":"Pacheco, F., et al.: Towards the deployment of machine learning solutions in network traffic classification: a systematic survey. IEEE Commun. Surv. Tutor. 21(2), 1988\u20132014 (2018)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"6","key":"5_CR9","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/MNET.2015.7340429","volume":"29","author":"S Yu","year":"2015","unstructured":"Yu, S., Wang, G., Zhou, W.: Modeling malicious activities in cyber space. IEEE Network 29(6), 83\u201387 (2015)","journal-title":"IEEE Network"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Rajesh, R., Ramia, K.B., Kulkarni, M.: Integration of LwIP stack over Intel (R) DPDK for high throughput packet delivery to applications. In: 2014 Fifth International Symposium on Electronic System Design, pp. 130\u2013134. IEEE (2014)","DOI":"10.1109\/ISED.2014.34"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Zhu, W., et al.: Research and implementation of high performance traffic processing based on intel DPDK. In: 2018 9th International Symposium on Parallel Architectures, Algorithms and Programming (PAAP), pp. 62\u201368. IEEE (2018)","DOI":"10.1109\/PAAP.2018.00018"},{"key":"5_CR12","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.cose.2017.05.009","volume":"70","author":"MF Umer","year":"2017","unstructured":"Umer, M.F., Sher, M., Bi, Y.: Flow-based intrusion detection: techniques and challenges. Comput. Secur. 70, 238\u2013254 (2017)","journal-title":"Comput. Secur."},{"key":"5_CR13","unstructured":"Bartos, K., Sofka, M., Franc, V.: Optimized invariant representation of network traffic for detecting unseen malware variants. In: 25th {USENIX} Security Symposium ({USENIX} Security 2016), pp. 807\u2013822 (2016)"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Sacramento, L., et al.: FlowHacker: detecting unknown network attacks in big traffic data using network flows. In: Trust Security and Privacy in Computing and Communications, pp. 567\u2013572 (2018)","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00086"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Mirsky, Y., et al.: Kitsune: an ensemble of autoencoders for online network intrusion detection. In: Network and Distributed System Security Symposium (2018)","DOI":"10.14722\/ndss.2018.23204"},{"issue":"1","key":"5_CR16","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1109\/TKDE.2014.2320725","volume":"27","author":"S Yu","year":"2014","unstructured":"Yu, S., Gu, G., Barnawi, A., Guo, S., Stojmenovic, I.: Malware propagation in large-scale networks. IEEE Trans. Knowl. Data Eng. 27(1), 170\u2013179 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"5_CR17","unstructured":"Khandelwal, A., Agarwal, R., Stoica, I.: Confluo: distributed monitoring and diagnosis stack for high-speed networks. In: 16th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 2019), pp. 421\u2013436 (2019)"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Liu, L., et al.: No way to evade: detecting multi-path routing attacks for NIDS. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp. 1\u20136. IEEE (2019)","DOI":"10.1109\/GLOBECOM38437.2019.9013952"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Erlacher, F., Dressler, F.: On high-speed flow-based intrusion detection using snort-compatible signatures. IEEE Trans. Dependable Secure Comput. (2020)","DOI":"10.1109\/TDSC.2020.2973992"},{"key":"5_CR20","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-981-13-7150-9_36","volume-title":"Computing and Network Sustainability","author":"V Jyothsna","year":"2019","unstructured":"Jyothsna, V., Mukesh, D., Sreedhar, A.N.: A flow-based network intrusion detection system for high-speed networks using meta-heuristic scale. In: Peng, S.-L., Dey, N., Bundele, M. (eds.) Computing and Network Sustainability. LNNS, vol. 75, pp. 337\u2013347. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-13-7150-9_36"},{"key":"5_CR21","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1016\/j.future.2018.09.051","volume":"93","author":"E Viegas","year":"2019","unstructured":"Viegas, E., et al.: Bigflow: real-time and reliable anomaly-based intrusion detection for high-speed networks. Future Gener. Comput. Syst. 93, 473\u2013485 (2019)","journal-title":"Future Gener. Comput. Syst."},{"key":"5_CR22","unstructured":"https:\/\/www.unsw.adfa.edu.au\/unsw-canberra-cyber\/cybersecurity\/ADFA-NB15-Datasets (2015)"}],"container-title":["Communications in Computer and Information Science","Security and Privacy in Digital Economy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9129-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T02:22:41Z","timestamp":1619317361000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-15-9129-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811591280","9789811591297"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9129-7_5","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPDE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Digital Economy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Quzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spde2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/spde2020.csp.escience.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"132","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}