{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T04:18:43Z","timestamp":1769314723735,"version":"3.49.0"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T00:00:00Z","timestamp":1630972800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T00:00:00Z","timestamp":1630972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s00521-021-06389-6","type":"journal-article","created":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T13:02:40Z","timestamp":1631019760000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["A statistical approach to secure health care services from DDoS attacks during COVID-19 pandemic"],"prefix":"10.1007","volume":"36","author":[{"given":"Zhili","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Akshat","family":"Gaurav","sequence":"additional","affiliation":[]},{"given":"B. B.","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Hedi","family":"Hamdi","sequence":"additional","affiliation":[]},{"given":"Nadia","family":"Nedjah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,7]]},"reference":[{"key":"6389_CR1","unstructured":"W.H. Organization (2020) Who coronavirus disease (covid-19) dashboard [Online]"},{"key":"6389_CR2","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.ijsu.2020.02.034","volume":"76","author":"C Sohrabi","year":"2020","unstructured":"Sohrabi C, Alsafi Z, O\u2018neill N, Khan M, Kerwan A, Al-Jabir A, Iosifidis C, Agha R (2020) World health organization declares global emergency: a review of the 2019 novel coronavirus (covid-19). Int J Surg 76:71. https:\/\/doi.org\/10.1016\/j.ijsu.2020.02.034","journal-title":"Int J Surg"},{"issue":"2","key":"6389_CR3","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"PR Jelena Mirkovic","year":"2004","unstructured":"Jelena Mirkovic PR (2004) A taxonomy of ddos attack and ddos defense mechanisms. ACM SIGCOMM Comput Commun Rev 34(2):39. https:\/\/doi.org\/10.1145\/997150.997156","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"6389_CR4","unstructured":"Swasth. https:\/\/www.swasth.app\/home (2020)"},{"issue":"14","key":"6389_CR5","first-page":"1296","volume":"7","author":"GJA Chaturvedi","year":"2020","unstructured":"Chaturvedi GJA, Kalyani S (2020) Reliability and effectiveness of Indian covid-19 mobile apps. J Critical Rev 7(14):1296\u20131305","journal-title":"J Critical Rev"},{"issue":"2","key":"6389_CR6","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/s41403-020-00109-7","volume":"5","author":"A Jhunjhunwala","year":"2020","unstructured":"Jhunjhunwala A (2020) Role of telecom network to manage covid-19 in india: Aarogya setu. Trans Indian National Acad Eng 5(2):157. https:\/\/doi.org\/10.1007\/s41403-020-00109-7","journal-title":"Trans Indian National Acad Eng"},{"key":"6389_CR7","doi-asserted-by":"crossref","unstructured":"Lochlainn MN, Lee KA, Sudre CH, Varsavsky T, Cardoso MJ, Menni C, Bowyer RC, Nguyen LH, Drew DA, Ganesh S, du Cadet JL (2020) Key predictors of attending hospital with COVID19: an association study from the COVID symptom Tracker APP in 2,618,948 individuals. medRxiv","DOI":"10.1101\/2020.04.25.20079251"},{"key":"6389_CR8","unstructured":"Bajpai MWN, Biberman J (2020) ICT initiatives in India to combat COVID-19, Columbia academic commons"},{"key":"6389_CR9","doi-asserted-by":"crossref","unstructured":"Gaurav AKSA (2017) Super-router: a collaborative filtering technique against ddos attacks, International Conference on Advanced Informatics for Computing Research pp. 294\u2013305","DOI":"10.1007\/978-981-10-5780-9_27"},{"key":"6389_CR10","unstructured":"Dittrich D (1999) The DoS project\u2019s \u2018trinoo\u2019distributed denial of service attack tool"},{"key":"6389_CR11","doi-asserted-by":"crossref","unstructured":"Criscuolo PJ (2000) Distributed denial of service: trin00, tribe flood network, tribe flood network 2000, and stacheldraht ciac-2319. California Univ Livermore Radiation Lab","DOI":"10.2172\/792253"},{"issue":"2","key":"6389_CR12","first-page":"21","volume":"13","author":"WTJ Barlow","year":"2000","unstructured":"Barlow WTJ (2000) Tfn2k an analysis. Axent Security Team 13(2):21","journal-title":"Axent Security Team"},{"key":"6389_CR13","unstructured":"Dittrich D, Weaver G, Dietrich S, Long N (2000) The mstream distributed denial of service attack tool"},{"key":"6389_CR14","unstructured":"Gupta BB, Joshi RC, Misra M (2012) Distributed denial of service prevention techniques. arXiv preprint arXiv:1208.3557"},{"issue":"7","key":"6389_CR15","doi-asserted-by":"publisher","first-page":"5164","DOI":"10.1109\/JIOT.2020.3033131","volume":"8","author":"CL Stergiou","year":"2020","unstructured":"Stergiou CL, Psannis KE, Gupta BB (2020) Iot-based big data secure management in the fog over a 6g wireless network. IEEE Int Things J 8(7):5164\u20135171","journal-title":"IEEE Int Things J"},{"key":"6389_CR16","doi-asserted-by":"crossref","unstructured":"Chhabra M, Gupta B, Almomani A (2013) A novel solution to handle DDOS attack in MANET","DOI":"10.4236\/jis.2013.43019"},{"issue":"3","key":"6389_CR17","first-page":"67","volume":"10","author":"GI Shidaganti","year":"2020","unstructured":"Shidaganti GI, Inamdar AS, Rai SV, Rajeev AM (2020) Scef: a model for prevention of ddos attacks from the cloud. Int J Cloud Appl Comput 10(3):67\u201380","journal-title":"Int J Cloud Appl Comput"},{"issue":"8","key":"6389_CR18","doi-asserted-by":"publisher","first-page":"5695","DOI":"10.1007\/s00500-019-04220-y","volume":"24","author":"A Al-Qerem","year":"2020","unstructured":"Al-Qerem A, Alauthman M, Almomani A, Gupta B (2020) Iot transaction processing through cooperative concurrency control on fog-cloud computing environment. Soft Comput 24(8):5695","journal-title":"Soft Comput"},{"key":"6389_CR19","doi-asserted-by":"publisher","unstructured":"Mishra A, Gupta BB, Perakovi\u0107 D, Yamaguchi S, Hsu CH (2021) In: 2021 IEEE International Conference on Consumer Electronics (ICCE), pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICCE50685.2021.9427772","DOI":"10.1109\/ICCE50685.2021.9427772"},{"key":"6389_CR20","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.comnet.2016.08.023","volume":"108","author":"FAK Kalkan","year":"2016","unstructured":"Kalkan FAK (2016) A distributed filtering mechanism against ddos attacks: scoreforcore. Comput Netw 108:199","journal-title":"Comput Netw"},{"key":"6389_CR21","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.jnca.2018.03.024","volume":"111","author":"MS Sunny Behal","year":"2018","unstructured":"Sunny Behal MS, Kumar K (2018) D-face: an anomaly based distributed approach for early detection of ddos attacks and flash events. J Netw Comput Appl 111:49. https:\/\/doi.org\/10.1016\/j.jnca.2018.03.024","journal-title":"J Netw Comput Appl"},{"key":"6389_CR22","doi-asserted-by":"crossref","unstructured":"Jung MRJ, Krishnamurthy B (2002) Flash crowds and denial of service attacks: characterization and implications for cdns and web sites, Proc. 11th international conference on World Wide Web pp. 293\u2013304","DOI":"10.1145\/511446.511485"},{"key":"6389_CR23","doi-asserted-by":"crossref","unstructured":"Gaurav A, Singh AK (2017) Entropy-score: a method to detect DDoS attack and flash crowd. In: 2017 2nd IEEE international conference on recent trends in electronics, information & communication technology (RTEICT). IEEE, pp 1427\u20131431","DOI":"10.1109\/RTEICT.2017.8256833"},{"key":"6389_CR24","doi-asserted-by":"publisher","first-page":"134577","DOI":"10.1109\/ACCESS.2020.3010226","volume":"8","author":"N Ahmed","year":"2020","unstructured":"Ahmed N, Michelin RA, Xue W, Ruj S, Malaney R, Kanhere SS, Seneviratne A, Hu W, Janicke H, Jha SK (2020) A survey of COVID-19 contact tracing apps. IEEE Access 8:134577\u2013134601","journal-title":"IEEE Access"},{"issue":"3","key":"6389_CR25","doi-asserted-by":"publisher","first-page":"64","DOI":"10.4018\/IJSSCI.2021070105","volume":"13","author":"D Pashchenko","year":"2021","unstructured":"Pashchenko D (2021) Fully remote software development due to covid factor: results of industry research (2020). Int J Software Sci Comput Intell (IJSSCI) 13(3):64","journal-title":"Int J Software Sci Comput Intell (IJSSCI)"},{"key":"6389_CR26","first-page":"30","volume-title":"International symposium on human aspects ofinformation security and assurance","author":"G Magklaras","year":"2021","unstructured":"Magklaras G, L\u00f3pez-Boj\u00f3rquez LN (2021) A review of information security aspects of the emerging COVID-19 contact tracing mobile phone applications. International symposium on human aspects ofinformation security and assurance. Springer, Cham, pp 30\u201344"},{"key":"6389_CR27","unstructured":"De Carli A, Franco M, Gassmann A, Killer C, Rodrigues B, Scheid E, Schoenbaechler D, Stiller B (2020) WeTrace--a privacy-preserving mobile COVID-19 tracing approach and application. arXiv preprint arXiv:2004.08812"},{"key":"6389_CR28","doi-asserted-by":"crossref","unstructured":"Masud M, Gaba GS, Alqahtani S, Muhammad G, Gupta BB, Kumar P, Ghoneim A (2020) A lightweight and robust secure key establishment protocol for internet of medical things in COVID-19 patients care. IEEE Int Things J","DOI":"10.1109\/JIOT.2020.3047662"},{"key":"6389_CR29","doi-asserted-by":"crossref","unstructured":"Sedik A, Hammad M, Abd El-Samie FE, Gupta BB, Abd El-Latif AA (2021) Efficient deep learning approach for augmented detection of Coronavirus disease. Neural Comput Appl, 1\u201318","DOI":"10.1007\/s00521-020-05410-8"},{"issue":"2","key":"6389_CR30","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1109\/TDSC.2006.25","volume":"3","author":"Y Kim","year":"2006","unstructured":"Kim Y, Lau WC, Chuah MC, Chao HJ (2006) PacketScore: a statistics-basedpacket filtering scheme against distributed denial-of-service attacks. IEEE Trans Dependable Secure Comput 3(2):141\u2013155","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"3","key":"6389_CR31","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/571697.571724","volume":"32","author":"R Mahajan","year":"2002","unstructured":"Mahajan R, Bellovin SM, Floyd S, Ioannidis J, Paxson V, Shenker S (2002) Controlling high bandwidth aggregates in the network. ACM SIGCOMM Comput Commun Rev 32(3):62\u201373","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"issue":"6","key":"6389_CR32","doi-asserted-by":"publisher","first-page":"1828","DOI":"10.1109\/tnet.2012.2194508","volume":"20","author":"RB J\u00e9r\u00f4me Francois","year":"2012","unstructured":"J\u00e9r\u00f4me Francois RB, Aib I (2012) Firecol: a collaborative protection network for the detection of flooding ddos attacks. IEEE\/ACM Trans Netw 20(6):1828. https:\/\/doi.org\/10.1109\/tnet.2012.2194508","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"5","key":"6389_CR33","doi-asserted-by":"publisher","first-page":"1985","DOI":"10.1007\/s12652-018-0800-9","volume":"10","author":"K Bhushan","year":"1985","unstructured":"Bhushan K, Gupta BB (1985) Distributed denial of service (ddos) attack mitigation in software defined network (sdn)-based cloud computing environment. J Ambient Intell Humanized Comput 10(5):1985\u20131997","journal-title":"J Ambient Intell Humanized Comput"},{"key":"6389_CR34","unstructured":"Gaurav A, Gupta BB, Hsu CH, Yamaguchi S, Chui KT (2021) In: 2021 IEEE International Conference on Consumer Electronics (ICCE) IEEE, pp. 1\u20135"},{"key":"6389_CR35","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/978-3-030-66046-8_32","volume-title":"International Conference on Computational Data and Social Networks","author":"A Gaurav","year":"2020","unstructured":"Gaurav A, Gupta BB, Castiglione A, Psannis K, Choi C (2020) International Conference on Computational Data and Social Networks. Springer, Berlin, pp 386\u2013397"},{"issue":"3","key":"6389_CR36","first-page":"17","volume":"10","author":"A Al-Nawasrah","year":"2020","unstructured":"Al-Nawasrah A, Almomani AA, Atawneh S, Alauthman M (2020) A survey of fast flux botnet detection with fast flux cloud computing. Int J Cloud Appl Comput 10(3):17\u201353","journal-title":"Int J Cloud Appl Comput"},{"key":"6389_CR37","doi-asserted-by":"crossref","unstructured":"Qin CWX, Xu T (2015) Ddos attack detection using flow entropy and clustering technique, 11th International Conference on Computational Intelligence and Security (CIS) pp. 412\u2013415","DOI":"10.1109\/CIS.2015.105"},{"key":"6389_CR38","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.jisa.2015.11.001","volume":"26","author":"GS Monika Sachdeva","year":"2016","unstructured":"Monika Sachdeva GS, Kumar Krishan (2016) A comprehensive approach to discriminate ddos attacks from flash events. J Inf Security Appl 26:8. https:\/\/doi.org\/10.1016\/j.jisa.2015.11.001","journal-title":"J Inf Security Appl"},{"key":"6389_CR39","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1109\/NSS.2009.29","volume-title":"2009 Third international conference on network and system security","author":"S Yu","year":"2009","unstructured":"Yu S, Thapngam T, Liu J, Wei S, Zhou W (2009) Discriminating DDoS flows from flash crowds using information distance. In: 2009 Third international conference on network and system security. IEEE, pp 351\u2013356"},{"key":"6389_CR40","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/NSS.2009.35","volume-title":"2009 Third international conferenceon network and system security","author":"K Li","year":"2009","unstructured":"Li K, Zhou W, Li P, Hai J, Liu J (2009) Distinguishing DDoS attacks from flash crowds using probability metrics. In: 2009 Third international conference on network and system security. IEEE, pp 9\u201317"},{"key":"6389_CR41","doi-asserted-by":"publisher","first-page":"952","DOI":"10.1109\/INFCOMW.2011.5928950","volume-title":"2011 IEEE conference on computer communications workshops (INFOCOM WKSHPS)","author":"T Thapngam","year":"2011","unstructured":"Thapngam T, Yu S, Zhou W, Beliakov G (2011) Discriminating DDoS attack traffic from flash crowd through packet arrival patterns. In: 2011 IEEE conference on computer communications workshops (INFOCOM WKSHPS). IEEE, pp 952\u2013957"},{"key":"6389_CR42","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.comcom.2015.06.012","volume":"67","author":"P Xiao","year":"2015","unstructured":"Xiao P, Qu W, Qi H, Li Z (2015) Detecting DDoS attacks against data center with correlationanalysis. Comput Commun 67:66\u201374","journal-title":"Comput Commun"},{"issue":"6","key":"6389_CR43","first-page":"929","volume":"19","author":"RC Baishya","year":"2017","unstructured":"Baishya RC, Hoque N, Bhattacharyya DK (2017) DDoS attack detection using uniquesource ip deviation. Int J Netw Secur 19(6):929\u2013939","journal-title":"Int J Netw Secur"},{"key":"6389_CR44","unstructured":"Kasera CLMKAHS, Pinheiro J (2001) Fast and robust signaling overload control, Proceedings Ninth International Conference on Network Protocols. ICNP pp. 323\u2013331"},{"issue":"4","key":"6389_CR45","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/s40766-020-00004-5","volume":"43","author":"E Witten","year":"2020","unstructured":"Witten E (2020) A mini-introduction to information theory. La Rivista del Nuovo Cimento 43(4):187. https:\/\/doi.org\/10.1007\/s40766-020-00004-5","journal-title":"La Rivista del Nuovo Cimento"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-021-06389-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-021-06389-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-021-06389-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,4]],"date-time":"2024-01-04T17:03:57Z","timestamp":1704387837000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-021-06389-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,7]]},"references-count":45,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["6389"],"URL":"https:\/\/doi.org\/10.1007\/s00521-021-06389-6","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,7]]},"assertion":[{"value":"11 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 July 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 September 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Author declares no conflicts of interest","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}