{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T09:21:49Z","timestamp":1763544109279,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":14,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819615308"},{"type":"electronic","value":"9789819615315"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1531-5_9","type":"book-chapter","created":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T14:18:38Z","timestamp":1738937918000},"page":"81-92","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Lightweight Approach for Identifying DDoS Attacks Using Boosting Models and Hybrid Feature Selection"],"prefix":"10.1007","author":[{"given":"Soe Kalayar","family":"Naing","sequence":"first","affiliation":[]},{"given":"Tin Thein","family":"Thwel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,8]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Adhao, R., Pachghare, V.: Feature selection using principal component analysis and genetic algorithm. J. Discret. Math. Sci. Cryptogr., 595\u2013602 (2020)","DOI":"10.1080\/09720529.2020.1729507"},{"key":"9_CR2","doi-asserted-by":"publisher","unstructured":"Alduailij, M., Khan, Q.W., Tahir, M., Sardaraz, M., Alduailij, M., Malik, F.: Machine-learning-based DDoS attack detection using mutual information and random forest feature importance method. Symmetry 14, 1095 (2022). https:\/\/doi.org\/10.3390\/sym14061095","DOI":"10.3390\/sym14061095"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Di Mauro, M., Galatro, G., Fortino, G., et al.: Supervised feature selection techniques in network intrusion detection: a critical review. Eng. Appl. Artif. Intell. 101, 104216 (2021)","DOI":"10.1016\/j.engappai.2021.104216"},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1080\/09720529.2020.1721861","volume":"23","author":"D Kshirsagar","year":"2020","unstructured":"Kshirsagar, D., Kumar, S.: An ensemble feature reduction method for web-attack detection. J. Discret. Math. Sci. Cryptogr. 23, 283\u2013291 (2020)","journal-title":"J. Discret. Math. Sci. Cryptogr."},{"key":"9_CR5","first-page":"1","volume":"50","author":"J Li","year":"2017","unstructured":"Li, J., et al.: Feature selection: a data perspective. ACM Comput. Surv. (CSUR) 50, 1\u201345 (2017)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"9_CR6","doi-asserted-by":"publisher","unstructured":"Manjula, M., Venkatesh, R.: Cyber security threats and countermeasures using machine and deep learning approaches: a survey. J. Comput. Sci. 19, 20\u201356 (2023). https:\/\/doi.org\/10.3844\/jcssp.2023.20.56","DOI":"10.3844\/jcssp.2023.20.56"},{"key":"9_CR7","unstructured":"Kaabouch, N., Aissou, G., Khoei, T.T.: Ensemble learning methods for anomaly intrusion detection system in smart grid (2021)"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Odumuyiwa, V., Alabi, R.: DDOS detection on internet of things using unsupervised algorithms. J. Cyber Secur. Mobility, 569\u2013592 (2021)","DOI":"10.13052\/jcsm2245-1439.1034"},{"key":"9_CR9","unstructured":"Criscuolo, P.J.: Distributed Denial of Service, p. 18"},{"key":"9_CR10","doi-asserted-by":"publisher","unstructured":"Naing, S.K., Thwel, T.T.: A study of DDOS attack classification using machine learning classifiers. In: IEEE Conference on Computer Applications (ICCA), Yangon, Myanmar, 2023, pp. 108\u2013112 (2023). https:\/\/doi.org\/10.1109\/ICCA51723.2023.10182146","DOI":"10.1109\/ICCA51723.2023.10182146"},{"key":"9_CR11","doi-asserted-by":"publisher","unstructured":"Khoei, T.T., Aissou, G., Hu, W.C., Kaabouch, N.: Ensemble learning methods for anomaly intrusion detection system in smart grid, 129\u2013135 (2021). https:\/\/doi.org\/10.1109\/EIT51626.2021.9491891","DOI":"10.1109\/EIT51626.2021.9491891"},{"key":"9_CR12","doi-asserted-by":"publisher","unstructured":"Xie, Y.: Machine learning-based DDoS detection for IoT networks. Appl. Comput. Eng. 29, 99\u2013107 (2023). https:\/\/doi.org\/10.54254\/2755-2721\/29\/20230972","DOI":"10.54254\/2755-2721\/29\/20230972"},{"key":"9_CR13","unstructured":"https:\/\/builtin.com\/machine-learning\/catboost"},{"key":"9_CR14","unstructured":"https:\/\/scikit-learn.org\/stable\/auto_examples\/feature_selection\/plot_rfe_digits.html#sphx-glr-auto-examples-feature-selection-plot-rfe-digits-py"}],"container-title":["Lecture Notes in Electrical Engineering","Genetic and Evolutionary Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1531-5_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T14:18:46Z","timestamp":1738937926000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1531-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819615308","9789819615315"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1531-5_9","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"8 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICGEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Genetic and Evolutionary Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Miyazaki","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icgec2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icgec24.github.io\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}