{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:31:07Z","timestamp":1743129067874,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811668890"},{"type":"electronic","value":"9789811668906"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-6890-6_10","type":"book-chapter","created":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T14:02:28Z","timestamp":1646488948000},"page":"129-139","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["DDoS Detection in Software-Defined Network Using Entropy Method"],"prefix":"10.1007","author":[{"given":"Ashidha","family":"Anil","sequence":"first","affiliation":[]},{"given":"T. A.","family":"Rufzal","sequence":"additional","affiliation":[]},{"given":"Vipindev","family":"Adat Vasudevan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,6]]},"reference":[{"issue":"2\u20136","key":"10_CR1","first-page":"11","volume":"2","author":"O. N. Fundation","year":"2012","unstructured":"O. N. Fundation (2012) Software-defined networking: the new norm for networks. ONF White Pap 2(2\u20136):11","journal-title":"ONF White Pap"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Jensen M, Gruschka N, Luttenberger N (2008) The impact of flooding attacks on network-based services. In: 2008 third international conference on availability, reliability and security. IEEE, pp 509\u2013513","DOI":"10.1109\/ARES.2008.16"},{"issue":"3","key":"10_CR3","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/s11235-017-0345-9","volume":"67","author":"V Adat","year":"2018","unstructured":"Adat V, Gupta B (2018) Security in internet of things: issues, challenges, taxonomy, and architecture. Telecommun Syst 67(3):423\u2013441","journal-title":"Telecommun Syst"},{"issue":"2","key":"10_CR4","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/s13369-017-2414-5","volume":"42","author":"NZ Bawany","year":"2017","unstructured":"Bawany NZ, Shamsi JA, Salah K (2017) Ddos attack detection and mitigation using sdn: methods, practices, and solutions. Arab J Sci Eng 42(2):425\u2013441","journal-title":"Arab J Sci Eng"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Kumar S (2007) Smurf-based distributed denial of service (ddos) attack amplification in internet. In: Second international conference on internet monitoring and protection (ICIMP 2007). IEEE, p 25","DOI":"10.1109\/ICIMP.2007.42"},{"key":"10_CR6","doi-asserted-by":"publisher","first-page":"80 813","DOI":"10.1109\/ACCESS.2019.2922196","volume":"7","author":"S Dong","year":"2019","unstructured":"Dong S, Abbas K, Jain R (2019) A survey on distributed denial of service (ddos) attacks in sdn and cloud computing environments. IEEE Access 7:80 813-80\u00a0828","journal-title":"IEEE Access"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Geetha K, Sreenath N (2014) Syn flooding attack\u2013identification and analysis. In: International conference on information communication and embedded systems (ICICES2014). IEEE, pp 1\u20137","DOI":"10.1109\/ICICES.2014.7033828"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Saharan S, Gupta V (2019) Prevention and mitigation of dns based ddos attacks in sdn environment. In: 2019 11th international conference on communication systems & networks (COMSNETS). IEEE, pp 571\u2013573","DOI":"10.1109\/COMSNETS.2019.8711258"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Rudman L, Irwin B (2005) Characterization and analysis of ntp amplification based ddos attacks. In: 2015 information security for South Africa (ISSA). IEEE, pp 1\u20135","DOI":"10.1109\/ISSA.2015.7335069"},{"key":"10_CR10","unstructured":"Senn M (2009) The most basic entry for a website consists of the author name(s), page title, website title, web address, and date accessed (accessed February 3, 2014). [Online]. http:\/\/securelist.com\/"},{"issue":"2","key":"10_CR11","doi-asserted-by":"publisher","first-page":"302","DOI":"10.3390\/fi6020302","volume":"6","author":"W Braun","year":"2014","unstructured":"Braun W, Menth M (2014) Software-defined networking using openflow: protocols, applications and architectural design choices. Future Internet 6(2):302\u2013336","journal-title":"Future Internet"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Sharma S, Sahu SK, Jena SK (2015) On selection of attributes for entropy based detection of ddos. In: 2015 international conference on advances in computing, communications and informatics (ICACCI). IEEE, pp 1096\u20131100","DOI":"10.1109\/ICACCI.2015.7275756"},{"key":"10_CR13","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/j.neucom.2019.10.118","volume":"408","author":"J Cervantes","year":"2020","unstructured":"Cervantes J, Garcia-Lamont F, Rodriguez-Mazahua L, Lopez A (2020) A comprehensive survey on support vector machine classification: applications, challenges and trends. Neurocomputing 408:189\u2013215","journal-title":"Neurocomputing"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Adat V, Dahiya A, Gupta B (2018) Economic incentive based solution against distributed denial of service attacks for iot customers. In: 2018 ieee international conference on consumer electronics (ICCE). IEEE, pp 1\u20135","DOI":"10.1109\/ICCE.2018.8326280"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Adat V, Gupta B (2017) A ddos attack mitigation framework for internet of things. In: 2017 international conference on communication and signal processing (ICCSP). IEEE, pp 2036\u20132041","DOI":"10.1109\/ICCSP.2017.8286761"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Mehdi SA, Khalid J, Khayam SA (2011) Revisiting traffic anomaly detection using software defined networking. In: International workshop on recent advances in intrusion detection. Springer, pp 161\u2013180","DOI":"10.1007\/978-3-642-23644-0_9"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Xing T, Huang D, Xu L, Chung C-J, Khatkar P (2013) Snortflow: a openflow-based intrusion prevention system in cloud environment. In 2013 second GENI research and educational experiment workshop. IEEE, pp 89\u201392","DOI":"10.1109\/GREE.2013.25"},{"issue":"10","key":"10_CR18","doi-asserted-by":"publisher","first-page":"2358","DOI":"10.1109\/JSAC.2018.2869997","volume":"36","author":"K Kalkan","year":"2018","unstructured":"Kalkan K, Altay L, G\u00fcr G, Alag\u00f6z F (2018) Jess: joint entropy-based ddos defense scheme in sdn. IEEE J Sel Areas Commun 36(10):2358\u20132372","journal-title":"IEEE J Sel Areas Commun"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Zhang J, Qin Z, Ou L, Jiang P, Liu J, Liu AX (2010) An advanced entropy-based ddos detection scheme. In: 2010 international conference on information, networking and automation (ICINA), vol\u00a02. IEEE, pp V2\u201367","DOI":"10.1109\/ICINA.2010.5636786"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Mousavi SM, St-Hilaire M (2015) Early detection of ddos attacks against sdn controllers. In: 2015 international conference on computing, networking and communications (ICNC). IEEE, pp 77\u201381","DOI":"10.1109\/ICCNC.2015.7069319"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Berezi\u0144ski P, Szpyrka M, Jasiul B, Mazur M (2015) Network anomaly detection using parameterized entropy. In: IFIP international conference on computer information systems and industrial management. Springer, pp 465\u2013478","DOI":"10.1007\/978-3-662-45237-0_43"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Seventh International Conference on Mathematics and Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-6890-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T14:04:30Z","timestamp":1646489070000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-6890-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811668890","9789811668906"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-6890-6_10","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"6 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}