{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T10:23:39Z","timestamp":1778149419334,"version":"3.51.4"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"23","license":[{"start":{"date-parts":[[2022,2,3]],"date-time":"2022-02-03T00:00:00Z","timestamp":1643846400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,2,3]],"date-time":"2022-02-03T00:00:00Z","timestamp":1643846400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s00500-021-06679-0","type":"journal-article","created":{"date-parts":[[2022,2,3]],"date-time":"2022-02-03T00:04:10Z","timestamp":1643846650000},"page":"13097-13107","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":38,"title":["Malicious attack detection approach in cloud computing using machine learning techniques"],"prefix":"10.1007","volume":"26","author":[{"given":"M.","family":"Arunkumar","sequence":"first","affiliation":[]},{"given":"K.","family":"Ashok Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,3]]},"reference":[{"key":"6679_CR1","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/978-981-10-7641-1_26","volume-title":"Data Science and Big Data Analytics Lecture Notes on Data Engineering and Communications Technologies","author":"K Ashok Kumar","year":"2019","unstructured":"Ashok Kumar K, Muthu Kumar B, Veeramuthu A, Mynavathi VS (2019) Unsupervised Machine Learning for Clustering the Infected Leaves Based on the Leaf-Colors. In: Kumar Mishra Durgesh, Yang Xin-She, Unal Aynur (eds) Data Science and Big Data Analytics Lecture Notes on Data Engineering and Communications Technologies. Springer, pp 303\u2013312"},{"key":"6679_CR2","doi-asserted-by":"publisher","DOI":"10.1080\/03772063.2021.1893231","author":"K Balasamy","year":"2021","unstructured":"Balasamy K, Shamia D (2021) Feature extraction-based medical image watermarking using fuzzy-based median filter. IETE J Res. https:\/\/doi.org\/10.1080\/03772063.2021.1893231","journal-title":"IETE J Res"},{"key":"6679_CR3","doi-asserted-by":"publisher","first-page":"7167","DOI":"10.1007\/s11042-020-09981-5","volume":"80","author":"K Balasamy","year":"2021","unstructured":"Balasamy K, Suganyadevi S (2021) A fuzzy based ROI selection for encryption and watermarking in medical image using DWT and SVD. Multimed Tools Appl 80:7167\u20137186. https:\/\/doi.org\/10.1007\/s11042-020-09981-5","journal-title":"Multimed Tools Appl"},{"key":"6679_CR4","doi-asserted-by":"publisher","DOI":"10.1002\/9781119792253.ch9","author":"K Balasamy","year":"2021","unstructured":"Balasamy K, Krishnaraj N, Ramprasath J, Ramprakash P (2021) A secure framework for protecting clinical data in medical IoT environment. Smart Healthcare Syst Design: Secur Priv Asp. https:\/\/doi.org\/10.1002\/9781119792253.ch9","journal-title":"Smart Healthcare Syst Design: Secur Priv Asp"},{"key":"6679_CR5","first-page":"96","volume":"116","author":"S Behal","year":"2017","unstructured":"Behal S, Kumar K (2017) Detection of DDoS attacks and flash events using novel information theory metrics. J ComputNetw 116:96\u2013110","journal-title":"J ComputNetw"},{"issue":"1","key":"6679_CR6","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MIC.2006.5","volume":"10","author":"G Carl","year":"2006","unstructured":"Carl G, Kesidis G, Richard R, Brooks, Suresh R (2006) Denial-of-service attack-detection techniques. IEEE Internet Comput 10(1):82\u201389","journal-title":"IEEE Internet Comput"},{"key":"6679_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-016-0802-9","author":"M Emami","year":"2017","unstructured":"Emami M, Jabbarpour MR, Abolhassani B, Jung JJ, Zarrabi H (2017) Soft cooperative spectrum sensing using quantization method in the presence of smart pue attack. Mobile Netw Appl. https:\/\/doi.org\/10.1007\/s11036-016-0802-9","journal-title":"Mobile Netw Appl"},{"key":"6679_CR8","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4171","author":"MA Hatef","year":"2017","unstructured":"Hatef MA, Shaker V, Jabbarpour MR, Jung J, Zarrabi H (2017) HIDCC: a hybrid intrusion detection approach in cloud computing. Concurrency Computat Pract Exper. https:\/\/doi.org\/10.1002\/cpe.4171","journal-title":"Concurrency Computat Pract Exper"},{"key":"6679_CR9","unstructured":"Jabbarpour MR, Jalooli A, Marefat A, Noor RM (2015) A taxonomy-based comparison of vehicle cloud architectures. In: The 3rd International Conference on Information and Computer Networks (ICICN 2015), Florence, Italy, 2015"},{"issue":"3","key":"6679_CR10","doi-asserted-by":"publisher","first-page":"668","DOI":"10.1109\/TC.2013.2295612","volume":"64","author":"A Jarray","year":"2013","unstructured":"Jarray A, Karmouch A (2013) Cost-efficient mapping for fault-tolerant virtual networks. IEEE Trans Comput 64(3):668\u2013681","journal-title":"IEEE Trans Comput"},{"issue":"4","key":"6679_CR11","doi-asserted-by":"publisher","first-page":"135","DOI":"10.22161\/ijaers.84.16","volume":"8","author":"P Jayasri","year":"2021","unstructured":"Jayasri P, Atchaya A, SanfeeyaParveen M, Ramprasath J (2021) Intrusion detection system in software defined networks using machine learning approach. Int J Adv Eng Res Sci 8(4):135\u2013142","journal-title":"Int J Adv Eng Res Sci"},{"key":"6679_CR12","doi-asserted-by":"crossref","unstructured":"Krishnaraj N, Kumar RB, Rajeshwar D, Kumar TS (2020) Implementation of energy aware modified distance vector routing protocol for energy efficiency in wireless sensor networks, In: IEEE International Conference on Inventive Computation Technologies, 201\u2013204, 2020","DOI":"10.1109\/ICICT48043.2020.9112532"},{"issue":"1","key":"6679_CR13","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s11277-019-06562-0","volume":"109","author":"N Krishnaraj","year":"2019","unstructured":"Krishnaraj N, Smys S (2019) A multihoming ACO-MDV routing for maximum power efficiency in an IoT environment. Wireless Pers Commun 109(1):243\u2013256","journal-title":"Wireless Pers Commun"},{"key":"6679_CR14","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.jnca.2015.11.016","volume":"60","author":"Ahmed Mohiuddin","year":"2016","unstructured":"Mohiuddin Ahmed, Mahmood AN, Jiankun H (2016) A survey of network anomaly detection techniques. J Netw Comput Appl 60:19\u201331","journal-title":"J Netw Comput Appl"},{"issue":"02","key":"6679_CR15","first-page":"80","volume":"1","author":"SR Mugunthan","year":"2019","unstructured":"Mugunthan SR (2019) Soft computing based autonomous low rate DDOS attack detection and security for cloud computing. J Soft Comput Paradig (JSCP) 1(02):80\u201390","journal-title":"J Soft Comput Paradig (JSCP)"},{"key":"6679_CR16","doi-asserted-by":"publisher","DOI":"10.1111\/coin.12408.datastorage","author":"V Prabhakaran","year":"2020","unstructured":"Prabhakaran V, Kulandasamy A (2020) Integration of recurrent convolutional neural network and optimal encryption scheme for intrusion detection with secure in the cloud. Comput Intell. https:\/\/doi.org\/10.1111\/coin.12408.datastorage","journal-title":"Comput Intell"},{"issue":"2","key":"6679_CR17","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MCOM.2018.1700621","volume":"56","author":"Y Qiao","year":"2018","unstructured":"Qiao Y, Huang W, Luo X, Gong Q, Richard Yu F (2018) A multi-level DDoS mitigation framework for the industrial internet of things. IEEE Commun Mag 56(2):30\u201336","journal-title":"IEEE Commun Mag"},{"issue":"3","key":"6679_CR18","doi-asserted-by":"publisher","first-page":"188","DOI":"10.36548\/jismac.2019.3.006","volume":"1","author":"JS Raj","year":"2019","unstructured":"Raj JS, Smys S (2019) Virtual structure for sustainable wireless networks in cloud services and enterprise information system. J ISMAC 1(3):188\u2013205","journal-title":"J ISMAC"},{"issue":"2","key":"6679_CR19","first-page":"241","volume":"4","author":"P Ramprakash","year":"2014","unstructured":"Ramprakash P, Sakthivadivel M, Krishnaraj N, Ramprasath J (2014) Host-based intrusion detection system using sequence of system calls. Int J Eng Manag Res, Vandana Publ 4(2):241\u2013247","journal-title":"Int J Eng Manag Res, Vandana Publ"},{"key":"6679_CR20","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4607","author":"J Ramprasath","year":"2020","unstructured":"Ramprasath J, Seethalakshmi V (2020) Secure access of resources in software-defined networks using dynamic access control list. Int J Commun Syst. https:\/\/doi.org\/10.1002\/dac.4607","journal-title":"Int J Commun Syst"},{"key":"6679_CR21","doi-asserted-by":"publisher","first-page":"2743","DOI":"10.1007\/s11277-020-08042-2","volume":"116","author":"J Ramprasath","year":"2021","unstructured":"Ramprasath J, Seethalakshmi V (2021a) Improved network monitoring using software-defined networking for DDoS detection and mitigation evaluation. Wireless Pers Commun 116:2743\u20132757. https:\/\/doi.org\/10.1007\/s11277-020-08042-2","journal-title":"Wireless Pers Commun"},{"key":"6679_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08626-6","author":"J Ramprasath","year":"2021","unstructured":"Ramprasath J, Seethalakshmi V (2021b) Mitigation of malicious flooding in software defined networks using dynamic access control list. Wireless Pers Commun. https:\/\/doi.org\/10.1007\/s11277-021-08626-6","journal-title":"Wireless Pers Commun"},{"issue":"1","key":"6679_CR23","first-page":"2349","volume":"3","author":"J Ramprasath","year":"2016","unstructured":"Ramprasath J, Ramakrishnan S, SaravanaPerumal P, Sivaprakasam M, ManokaranVishnuraj U (2016) Secure network implementation using VLAN and ACL. Int J Adv Eng Res Sci 3(1):2349\u20136495","journal-title":"Int J Adv Eng Res Sci"},{"issue":"1","key":"6679_CR24","first-page":"22","volume":"11","author":"J Ramprasath","year":"2020","unstructured":"Ramprasath J, Ramya P, Rathnapriya T (2020) Malicious attack detection in software defined networking using machine learning approach. Int J Adv Eng Emerg Technol 11(1):22\u201327","journal-title":"Int J Adv Eng Emerg Technol"},{"key":"6679_CR25","unstructured":"Ramprasath J, Aswin Yegappan M, Dinesh R, Balakrishnan N, Kaarthi S (2017) Assigning Static Ip Using DHCP In Accordance With MAC. Int J Trends Eng Technol, 20(1)"},{"key":"6679_CR26","first-page":"221","volume-title":"Innovations in Computer Science and Engineering","author":"N Rao","year":"2019","unstructured":"Rao N, Srihari K, Chandra S, Ananda Rao A (2019) A survey of distributed denial-of-service (DDoS) defense techniques in ISP domains. In: Saini HS, Sayal R, Govardhan A, Buyya R (eds) Innovations in Computer Science and Engineering. Springer, Singapore, pp 221\u2013230"},{"key":"6679_CR27","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1016\/j.future.2018.07.017","volume":"89","author":"KS Sahoo","year":"2018","unstructured":"Sahoo KS, Puthal D, Tiwary M, Rodrigues JJPC, Sahoo B, Dash R (2018) An early detection of low rate DDoS attack to SDN based data center networks using information distance metrics. J Future Generat Comput Syst 89:685\u2013697","journal-title":"J Future Generat Comput Syst"},{"key":"6679_CR28","first-page":"163","volume-title":"Advances in Communication Cloud and Big Data","author":"R Sandesh","year":"2019","unstructured":"Sandesh R, Sharma K, Dhakal D (2019) A Survey on Detection and Mitigation of Distributed Denial-of-Service Attack in Named Data Networking. In: Sarma Hiren Kumar Deva, Borah Samarjeet, Dutta Nitul (eds) Advances in Communication Cloud and Big Data. Springer, Singapore, pp 163\u2013171"},{"issue":"01","key":"6679_CR29","first-page":"45","volume":"1","author":"S Shakya","year":"2019","unstructured":"Shakya S (2019) An efficient security framework for data migration in a cloud computing environment. J Artif Intell 1(01):45\u201353","journal-title":"J Artif Intell"},{"issue":"01","key":"6679_CR30","first-page":"55","volume":"1","author":"S Smys","year":"2019","unstructured":"Smys S, Raj JS (2019) A stochastic mobile data traffic model for vehicular ad hoc networks. J Ubiquitous Comput CommTechnol (UCCT) 1(01):55\u201363","journal-title":"J Ubiquitous Comput CommTechnol (UCCT)"},{"issue":"02","key":"6679_CR31","first-page":"67","volume":"3","author":"S Smys","year":"2021","unstructured":"Smys S, Vijesh Joe C (2021) Metric routing protocol for detecting untrustworthy nodes for packet transmission. J Inform Technol 3(02):67\u201376","journal-title":"J Inform Technol"},{"issue":"04","key":"6679_CR32","doi-asserted-by":"publisher","first-page":"190","DOI":"10.36548\/jismac.2020.4.002","volume":"2","author":"S Smys","year":"2020","unstructured":"Smys S, Abul B, Haoxiang W (2020) Hybrid intrusion detection system for internet of things (IoT). J ISMAC 2(04):190\u2013199","journal-title":"J ISMAC"},{"issue":"1","key":"6679_CR33","first-page":"2","volume":"23","author":"VB Vaghela","year":"2014","unstructured":"Vaghela VB, Vandra KH, Modi NK (2014) Entropy based feature selection for multi-relational na\u00efve bayesian classifier. J Int Technol Inform Manag 23(1):2","journal-title":"J Int Technol Inform Manag"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-021-06679-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-021-06679-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-021-06679-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T16:20:41Z","timestamp":1665764441000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-021-06679-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,3]]},"references-count":33,"journal-issue":{"issue":"23","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["6679"],"URL":"https:\/\/doi.org\/10.1007\/s00500-021-06679-0","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,3]]},"assertion":[{"value":"13 December 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 February 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"None to declare.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}