{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:12:57Z","timestamp":1743030777001,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811972416"},{"type":"electronic","value":"9789811972423"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-19-7242-3_16","type":"book-chapter","created":{"date-parts":[[2022,10,8]],"date-time":"2022-10-08T23:02:22Z","timestamp":1665270142000},"page":"247-263","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Detection and\u00a0Defense Against DDoS Attack on\u00a0SDN Controller Based on\u00a0Feature Selection"],"prefix":"10.1007","author":[{"given":"Yan","family":"Xu","sequence":"first","affiliation":[]},{"given":"Yongming","family":"Liu","sequence":"additional","affiliation":[]},{"given":"JinXing","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,9]]},"reference":[{"issue":"2","key":"16_CR1","doi-asserted-by":"publisher","first-page":"1255","DOI":"10.1109\/COMST.2015.2501026","volume":"18","author":"FA Lopes","year":"2015","unstructured":"Lopes, F.A., Santos, M., Fidalgo, R.: A software engineering perspective on SDN programmability. IEEE Commun. Surv. Tutorials 18(2), 1255\u20131272 (2015)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"16_CR2","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1109\/COMST.2021.3050297","volume":"23","author":"DE Sarmiento","year":"2021","unstructured":"Sarmiento, D.E., Lebre, A., Nussbaum, L.: Decentralized SDN control plane for a distributed cloud-edge infrastructure: a survey. IEEE Commun. Surv. Tutorials 23, 256\u2013281 (2021)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"1","key":"16_CR3","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1109\/COMST.2019.2935453","volume":"22","author":"T Das","year":"2019","unstructured":"Das, T., Sridharan, V., Gurusamy, M.: A survey on controller placement in SDN. IEEE Commun. Surv. Tutorials 22(1), 472\u2013503 (2019)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"16_CR4","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.future.2020.09.006","volume":"115","author":"O Yurekten","year":"2021","unstructured":"Yurekten, O., Demirci, M.: SDN-based cyber defense: a survey. Futur. Gener. Comput. Syst. 115, 126\u2013149 (2021)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"1","key":"16_CR5","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1109\/COMST.2015.2487361","volume":"18","author":"Q Yan","year":"2015","unstructured":"Yan, Q., Yu, F.R., Gong, Q.: Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: a survey, some research issues, and challenges. IEEE Commun. Surv. Tutorials 18(1), 602\u2013622 (2015)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"2","key":"16_CR6","first-page":"3","volume":"11","author":"A Abhishta","year":"2020","unstructured":"Abhishta, A., Heeswijk, W., Junger, M.: Why would we get attacked? An analysis of attacker\u2019s aims behind DDoS attacks. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 11(2), 3\u201322 (2020)","journal-title":"J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl."},{"doi-asserted-by":"crossref","unstructured":"SaiSindhuTheja, R., Shyam, G.K.: An efficient metaheuristic algorithm based feature selection and recurrent neural network for DoS attack detection in cloud computing environment. Appl. Soft Comput. 100, 106997 (2021)","key":"16_CR7","DOI":"10.1016\/j.asoc.2020.106997"},{"doi-asserted-by":"crossref","unstructured":"Xu, Y., Liu, Y.: DDoS attack detection under SDN context. In: IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, San Francisco, pp. 1\u20139. IEEE (2016)","key":"16_CR8","DOI":"10.1109\/INFOCOM.2016.7524500"},{"issue":"4","key":"16_CR9","doi-asserted-by":"publisher","first-page":"1545","DOI":"10.1109\/TNSM.2018.2861741","volume":"15","author":"P Kumar","year":"2018","unstructured":"Kumar, P., Tripathi, M., Nehra, A.: SAFETY: early detection and mitigation of TCP SYN flood utilizing entropy in SDN. IEEE Trans. Netw. Serv. Manag. 15(4), 1545\u20131559 (2018)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"doi-asserted-by":"crossref","unstructured":"Shin, S., Yegneswaran, V., Porras, P.: Avant-guard: scalable and vigilant switch flow management in software-defined networks. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, Berlin, pp. 413\u2013424. ACM (2013)","key":"16_CR10","DOI":"10.1145\/2508859.2516684"},{"key":"16_CR11","doi-asserted-by":"publisher","first-page":"70651","DOI":"10.1109\/ACCESS.2020.2986217","volume":"8","author":"S Sarvari","year":"2020","unstructured":"Sarvari, S., Sani, N.F.M., Hanapi, Z.M.: An efficient anomaly intrusion detection method with feature selection and evolutionary neural network. IEEE Access 8, 70651\u201370663 (2020)","journal-title":"IEEE Access"},{"issue":"2","key":"16_CR12","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown, N., Anderson, T., Balakrishnan, H.: OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 38(2), 69\u201374 (2008)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"10","key":"16_CR13","doi-asserted-by":"publisher","first-page":"15541","DOI":"10.1007\/s11042-021-10616-6","volume":"80","author":"S Rawas","year":"2021","unstructured":"Rawas, S.: Energy, network, and application-aware virtual machine placement model in SDN-enabled large scale cloud data centers. Multimed. Tools Appl. 80(10), 15541\u201315562 (2021). https:\/\/doi.org\/10.1007\/s11042-021-10616-6","journal-title":"Multimed. Tools Appl."},{"doi-asserted-by":"crossref","unstructured":"Medved, J., Varga, R., Tkacik, A.: OpenDaylight: towards a model-driven SDN controller architecture. In: Proceeding of IEEE International Symposium on a World of Wireless. Mobile and Multimedia Networks, Sydney, pp. 1\u20136. IEEE (2014)","key":"16_CR14","DOI":"10.1109\/WoWMoM.2014.6918985"},{"unstructured":"Floodligh[EB\/OL]. http:\/\/www.projectfloodlight.org\/. Accessed 4 Oct 2021","key":"16_CR15"},{"issue":"18","key":"16_CR16","doi-asserted-by":"publisher","first-page":"6386","DOI":"10.1002\/sec.1759","volume":"9","author":"N Dayal","year":"2016","unstructured":"Dayal, N., Maity, P., Srivastava, S.: Research trends in security and DDoS in SDN. Secur. Commun. Netw. 9(18), 6386\u20136411 (2016)","journal-title":"Secur. Commun. Netw."},{"issue":"6","key":"16_CR17","doi-asserted-by":"publisher","first-page":"4519","DOI":"10.1007\/s10462-019-09800-w","volume":"53","author":"E Hancer","year":"2020","unstructured":"Hancer, E., Xue, B., Zhang, M.: A survey on feature selection approaches for clustering. Artif. Intell. Rev. 53(6), 4519\u20134545 (2020). https:\/\/doi.org\/10.1007\/s10462-019-09800-w","journal-title":"Artif. Intell. Rev."},{"key":"16_CR18","doi-asserted-by":"publisher","first-page":"26766","DOI":"10.1109\/ACCESS.2021.3056407","volume":"9","author":"P Agrawal","year":"2021","unstructured":"Agrawal, P., Abutarboush, H.F., Ganesh, T.: Metaheuristic algorithms on feature selection: a survey of one decade of research (2009\u20132019). IEEE Access 9, 26766\u201326791 (2021)","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Qin, J., Zhang, X., Li, P.: Anomaly detection based on feature correlation and influence degree in SDN. In: 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber. Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics), Rhodes Island, pp. 186\u2013192. IEEE (2020)","key":"16_CR19","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData-Cybermatics50389.2020.00046"},{"doi-asserted-by":"crossref","unstructured":"Wei, G., Zhao, J., Feng, Y.: A novel hybrid feature selection method based on dynamic feature importance. Appl. Soft Comput. 93, 106337 (2020)","key":"16_CR20","DOI":"10.1016\/j.asoc.2020.106337"},{"issue":"4","key":"16_CR21","doi-asserted-by":"publisher","first-page":"48","DOI":"10.4018\/IJeC.2020100104","volume":"16","author":"G Kavitha","year":"2020","unstructured":"Kavitha, G., Elango, N.M.: An approach to feature selection in intrusion detection systems using machine learning algorithms. Int. J. e-Collaboration (IJeC) 16(4), 48\u201358 (2020)","journal-title":"Int. J. e-Collaboration (IJeC)"},{"issue":"3","key":"16_CR22","first-page":"1747","volume":"51","author":"L Jiang","year":"2019","unstructured":"Jiang, L., Kong, G., Li, C.: Wrapper framework for test-cost-sensitive feature selection. IEEE Trans. Syst. Man Cybern.: Syst. 51(3), 1747\u20131756 (2019)","journal-title":"IEEE Trans. Syst. Man Cybern.: Syst."},{"doi-asserted-by":"crossref","unstructured":"Wang, M., Lu, Y., Qin, J.: A dynamic MLP-based DDoS attack detection method using feature selection and feedback. Comput. Secur. 88, 101645 (2020)","key":"16_CR23","DOI":"10.1016\/j.cose.2019.101645"},{"doi-asserted-by":"crossref","unstructured":"Kasongo, S.M., Sun, Y.: A deep learning method with wrapper based feature extraction for wireless intrusion detection system. Comput. Secur. 92, 101752 (2020)","key":"16_CR24","DOI":"10.1016\/j.cose.2020.101752"},{"doi-asserted-by":"crossref","unstructured":"Sebbar, A., Karim, Z., Baadi, Y.: Using advanced detection and prevention technique to mitigate threats in SDN architecture. In: 2019 15th International Wireless Communications and Mobile Computing Conference (IWCMC), Morocco, pp. 90\u201395. IEEE (2019)","key":"16_CR25","DOI":"10.1109\/IWCMC.2019.8766552"},{"unstructured":"Kim, Y., Lau, W.C., Chuah, M.C.: PacketScore: statistics-based overload control against distributed denial-of-service attacks. In: IEEE INFOCOM 2004, Toronto, pp. 2594\u20132604. IEEE (2004)","key":"16_CR26"},{"unstructured":"NSL-KDD Data Set[EB\/OL]. http:\/\/nsl.cs.unb.ca\/NSL-KDD. Accessed 23 June 2021","key":"16_CR27"},{"unstructured":"Mininet. http:\/\/mininet.org\/. Accessed 20 Oct 2021","key":"16_CR28"},{"key":"16_CR29","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-981-15-9129-7_1","volume-title":"Security and Privacy in Digital Economy","author":"Y Xu","year":"2020","unstructured":"Xu, Y., Ma, J., Zhong, S.: Detection and defense against DDoS attack on SDN controller based on spatiotemporal feature. In: Yu, S., Mueller, P., Qian, J. (eds.) SPDE 2020. CCIS, vol. 1268, pp. 3\u201318. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-9129-7_1"}],"container-title":["Communications in Computer and Information Science","Security and Privacy in Social Networks and Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-19-7242-3_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,8]],"date-time":"2022-10-08T23:04:16Z","timestamp":1665270256000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-19-7242-3_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811972416","9789811972423"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-19-7242-3_16","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"9 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SocialSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security and Privacy in Social Networks and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"socialsec2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/socialsec2022.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"103","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}