{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T03:17:29Z","timestamp":1740107849579,"version":"3.37.3"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2016,1,18]],"date-time":"2016-01-18T00:00:00Z","timestamp":1453075200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61202099"],"award-info":[{"award-number":["61202099"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1504607"],"award-info":[{"award-number":["U1504607"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1007\/s00500-015-2025-6","type":"journal-article","created":{"date-parts":[[2016,1,18]],"date-time":"2016-01-18T03:17:37Z","timestamp":1453087057000},"page":"3713-3721","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["A protocol-free detection against cloud oriented reflection DoS attacks"],"prefix":"10.1007","volume":"21","author":[{"given":"Le","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Wei","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Weidong","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yulong","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Xianglin","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,18]]},"reference":[{"key":"2025_CR1","unstructured":"CHKP (2010) Stateful inspection technology (the industry standard for enterprise class network security solutions). http:\/\/www.checkpoint.com\/products\/downloads\/Stateful _Inspection"},{"issue":"6","key":"2025_CR2","doi-asserted-by":"crossref","first-page":"835","DOI":"10.1109\/90.650143","volume":"5","author":"M Crovella","year":"1997","unstructured":"Crovella M, Bestavros A (1997) Self-similarity in world wide web traffic: Evidence and possible causes. IEEE\/ACM Trans Netw. 5(6):835\u2013846","journal-title":"IEEE\/ACM Trans Netw."},{"key":"2025_CR3","unstructured":"Drakos RN (2002) Application-level reflection attacks. http:\/\/www.lemuria.org\/security\/application-drdos.html"},{"key":"2025_CR4","doi-asserted-by":"crossref","unstructured":"Ferguson P (2000) rfc2827:network ingress filtering: defeating denial of service attacks which employ ip source address spoofing","DOI":"10.17487\/rfc2827"},{"key":"2025_CR5","doi-asserted-by":"crossref","unstructured":"Ficco M, Palmieri F (2015) Introducing fraudulent energy consumption in cloud infrastructures: a new generation of denial-of-service attacks. IEEE Syst J 99:1\u201311","DOI":"10.1109\/JSYST.2015.2414822"},{"key":"2025_CR6","doi-asserted-by":"crossref","unstructured":"Jung J, Krishnamurthy B, Rabinovich M (2002) Flash crowds and denial of service attacks: characterization and implications for cdns and web sites. In: Proc. 11th Intl Conf. World Wide Web (WWW), pp 252\u2013262","DOI":"10.1145\/511446.511485"},{"key":"2025_CR7","unstructured":"Kandula S, Katabi D, Jacob M, Berger A (2005) Botz-4-sale: surviving organized ddos attacks that mimic flash crowds. In: Proceedings of the 2nd conference on Symposium on Networked Systems Design, vol 2, pp 287\u2013300"},{"key":"2025_CR8","doi-asserted-by":"crossref","unstructured":"Liu Y, Wei W (2015) A replication-based mechanism for fault tolerance in mapreduce framework. Math Probl Eng 2015(1):1\u20137. http:\/\/www.hindawi.com\/journals\/mpe\/2015\/408921\/","DOI":"10.1155\/2015\/408921"},{"key":"2025_CR9","doi-asserted-by":"crossref","unstructured":"Oikonomou G, Mirkovic J (2009) Modeling human behavior for defense against flash-crowd attacks. In: Proc. IEEE Intl Conf. Comm","DOI":"10.1109\/ICC.2009.5199191"},{"key":"2025_CR10","doi-asserted-by":"crossref","unstructured":"Palmieri F, Ricciardi S, Fiore U (2011) Evaluating network-based dos attacks under the energy consumption perspective: new security issues in the coming green ICT area. International Conference on Broadband. Wireless Computing, Communication and Applications (BWCCA), pp 374\u2013379","DOI":"10.1109\/BWCCA.2011.66"},{"key":"2025_CR11","doi-asserted-by":"crossref","unstructured":"Palmieri F, Ficco M, Castiglione A (2014a) Adaptive stealth energy-related dos attacks against cloud data centers. In: International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp 265\u2013272","DOI":"10.1109\/IMIS.2014.33"},{"issue":"5","key":"2025_CR12","doi-asserted-by":"crossref","first-page":"1113","DOI":"10.1002\/cpe.3061","volume":"26","author":"F Palmieri","year":"2014","unstructured":"Palmieri F, Fiore U, Castiglione A (2014b) A distributed approach to network anomaly detection based on independent component analysis. Concurr Comput Pract Exp 26(5):1113\u20131129","journal-title":"Concurr Comput Pract Exp"},{"issue":"5","key":"2025_CR13","doi-asserted-by":"crossref","first-page":"1620","DOI":"10.1007\/s11227-014-1242-6","volume":"71","author":"F Palmieri","year":"2015","unstructured":"Palmieri F, Ricciardi S, Fiore U, Ficco M, Castiglione A (2015) Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures. J Supercomput 71(5):1620\u20131641","journal-title":"J Supercomput"},{"issue":"3","key":"2025_CR14","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1145\/505659.505664","volume":"31","author":"V Paxson","year":"2001","unstructured":"Paxson V (2001) An analysis of using reflectors for distributed denial-of-service attacks. ACM SIGCOMM Comput Commun Rev 31(3):38\u201347","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"issue":"3","key":"2025_CR15","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1109\/90.392383","volume":"3","author":"V Paxson","year":"1995","unstructured":"Paxson V, Floyd S (1995) Wide area traffic: the failure of poisson modeling. IEEE\/ACM Trans Netw 3(3):226\u2013244","journal-title":"IEEE\/ACM Trans Netw"},{"key":"2025_CR16","unstructured":"Rooj G (2011) Real stateful tcp packet filtering in ip filter. In: 10th USENIX Security Symposium"},{"issue":"1","key":"2025_CR17","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/TDSC.2007.12","volume":"4","author":"A Scherrer","year":"2007","unstructured":"Scherrer A, Larrieu N, Owezarski P, Borgnat P, Abry P (2007) Non-gaussian and long memory statistical characterizations for internet traffic with anomalies. IEEE Trans Dependable Secure Comput 4(1):56\u201370","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"14","key":"2025_CR18","doi-asserted-by":"crossref","first-page":"3299","DOI":"10.1016\/j.comcom.2008.05.033","volume":"31","author":"H Tsunoda","year":"2008","unstructured":"Tsunoda H, Ohta K, Yamamoto A, Ansari N, Waizumi Y, Nemoto Y (2008) Detecting drdos attacks by a simple response packet confirmation mechanism. Comput Commun 31(14):3299\u20133306","journal-title":"Comput Commun"},{"issue":"1","key":"2025_CR19","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1109\/LCOMM.2012.121912.122257","volume":"17","author":"W Wei","year":"2013","unstructured":"Wei W, Chen F, Xia Y, Jin G (2013) A rank correlation based detection against distributed reflection dos attacks. IEEE Commun Lett 17(1):173\u2013175","journal-title":"IEEE Commun Lett"},{"key":"2025_CR20","doi-asserted-by":"crossref","unstructured":"Wei W, Liu Y, Zhang Y (2014a) TRLMS: two-stage resource scheduling algorithm for cloud based live media streaming system. IEICE Trans Inf Syst 97-D(7):1731\u20131734","DOI":"10.1587\/transinf.E97.D.1731"},{"key":"2025_CR21","doi-asserted-by":"crossref","unstructured":"Wei W, Zhang Y, Liu Y (2014b) A time-efficient solution to the general resource placement problem in cloud. Math Prob Eng 2014(1):1\u201310. http:\/\/www.hindawi.com\/journals\/mpe\/2014\/760458\/","DOI":"10.1155\/2014\/760458"},{"issue":"1","key":"2025_CR22","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/TNET.2008.923716","volume":"17","author":"Y Xie","year":"2009","unstructured":"Xie Y, Yu S (2009a) A large-scale hidden semi-markov model for anomaly detection on user browsing behaviors. IEEE\/ACM Trans Netw 17(1):54\u201356","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"1","key":"2025_CR23","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1109\/TNET.2008.925628","volume":"17","author":"Y Xie","year":"2009","unstructured":"Xie Y, Yu S (2009b) Monitoring the application-layer ddos attacks for popular websites. IEEE\/ACM Trans Netw 17(1):15\u201325","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"4","key":"2025_CR24","first-page":"319","volume":"12","author":"S Yu","year":"2008","unstructured":"Yu S, Zhou W, Doss R (2008) Information theory based detection against network behavior mimicking ddos attacks. IEEE Commun Lett 12(4):319\u2013321","journal-title":"IEEE Commun Lett"},{"issue":"6","key":"2025_CR25","doi-asserted-by":"crossref","first-page":"1073","DOI":"10.1109\/TPDS.2011.262","volume":"23","author":"S Yu","year":"2013","unstructured":"Yu S, Zhou W, Jia W, Guo S, Xiang Y, Tang F (2013) Discriminating ddos attacks from flash crowds using flow correlation coffcient. IEEE Trans Parallel Distribut Syst 23(6):1073\u20131080","journal-title":"IEEE Trans Parallel Distribut Syst"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-015-2025-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-015-2025-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-015-2025-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-015-2025-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T15:43:28Z","timestamp":1567525408000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-015-2025-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,18]]},"references-count":25,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2017,7]]}},"alternative-id":["2025"],"URL":"https:\/\/doi.org\/10.1007\/s00500-015-2025-6","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2016,1,18]]}}}