{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T10:15:59Z","timestamp":1771236959341,"version":"3.50.1"},"reference-count":96,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,11,27]],"date-time":"2020-11-27T00:00:00Z","timestamp":1606435200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,27]],"date-time":"2020-11-27T00:00:00Z","timestamp":1606435200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s00607-020-00866-x","type":"journal-article","created":{"date-parts":[[2020,11,27]],"date-time":"2020-11-27T10:02:39Z","timestamp":1606471359000},"page":"641-673","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["SADM-SDNC: security anomaly detection and mitigation in software-defined networking using C-support vector classification"],"prefix":"10.1007","volume":"103","author":[{"given":"Tohid","family":"Jafarian","sequence":"first","affiliation":[]},{"given":"Mohammad","family":"Masdari","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Ghaffari","sequence":"additional","affiliation":[]},{"given":"Kambiz","family":"Majidzadeh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,27]]},"reference":[{"issue":"2","key":"866_CR1","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1145\/3165290","volume":"51","author":"E Rojas","year":"2018","unstructured":"Rojas E et al (2018) Are we ready to drive software-defined networks? A comprehensive survey on management tools and techniques. ACM Comput Surv (CSUR) 51(2):27","journal-title":"ACM Comput Surv (CSUR)"},{"key":"866_CR2","doi-asserted-by":"publisher","unstructured":"Bilal R, Khan BM (2019) Software-defined networks (SDN): a survey. In: Gupta B, Agrawal DP (eds) Handbook of research on cloud computing and big data applications in IoT. IGI Global, pp 516\u2013536. https:\/\/doi.org\/10.4018\/978-1-5225-8407-0.ch023","DOI":"10.4018\/978-1-5225-8407-0.ch023"},{"issue":"1","key":"866_CR3","first-page":"884","volume":"7","author":"DS Rana","year":"2019","unstructured":"Rana DS, Dhondiyal SA, Chamoli SK (2019) Software defined networking (SDN) challenges, issues and solution. Int J Comput Sci Eng 7(1):884\u2013889","journal-title":"Int J Comput Sci Eng"},{"key":"866_CR4","doi-asserted-by":"crossref","first-page":"15980","DOI":"10.1109\/ACCESS.2018.2814738","volume":"6","author":"T Hu","year":"2018","unstructured":"Hu T, Guo Z, Yi P, Baker T, Lan J (2018) Multi-controller based software-defined networking: a survey. IEEE Access 6:15980\u201315996","journal-title":"IEEE Access"},{"key":"866_CR5","doi-asserted-by":"crossref","first-page":"12914","DOI":"10.1109\/ACCESS.2019.2893058","volume":"7","author":"C Yu","year":"2019","unstructured":"Yu C, Lan J, Guo Z, Hu Y, Baker T (2019) An adaptive and lightweight update mechanism for SDN. IEEE Access 7:12914\u201312927","journal-title":"IEEE Access"},{"issue":"18","key":"866_CR6","doi-asserted-by":"crossref","first-page":"5803","DOI":"10.1002\/sec.1737","volume":"9","author":"K Benzekki","year":"2017","unstructured":"Benzekki K, El Fergougui A, Elbelrhiti Elalaoui A (2017) Software-defined networking (SDN): a survey. Secur Commun Netw 9(18):5803\u20135833","journal-title":"Secur Commun Netw"},{"key":"866_CR7","doi-asserted-by":"crossref","unstructured":"Alfoudi ASD, Newaz SS, Ramlie R, Lee GM, Baker T (2019) Seamless mobility management in heterogeneous 5G networks: a coordination approach among distributed sdn controllers. In: 2019 IEEE 89th vehicular technology conference (VTC2019-Spring), IEEE, pp 1\u20136","DOI":"10.1109\/VTCSpring.2019.8746712"},{"key":"866_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2016.03.016","volume":"67","author":"R Masoudi","year":"2016","unstructured":"Masoudi R, Ghaffari A (2016) Software defined networks: a survey. J Netw Comput Appl 67:1\u201325","journal-title":"J Netw Comput Appl"},{"issue":"1","key":"866_CR9","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/JPROC.2014.2371999","volume":"103","author":"D Kreutz","year":"2015","unstructured":"Kreutz D, Ramos FM, Verissimo PE, Rothenberg CE, Azodolmolky S, Uhlig S (2015) Software-defined networking: a comprehensive survey. Proc IEEE 103(1):14\u201376","journal-title":"Proc IEEE"},{"key":"866_CR10","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.comnet.2015.02.014","volume":"81","author":"H Farhady","year":"2015","unstructured":"Farhady H, Lee H, Nakao A (2015) Software-defined networking: a survey. Comput Netw 81:79\u201395","journal-title":"Comput Netw"},{"issue":"2","key":"866_CR11","first-page":"72","volume":"14","author":"RK Gupta","year":"2018","unstructured":"Gupta RK, Sahoo B (2018) Security issues in software-defined networks. IUP J Inf Technol 14(2):72\u201382","journal-title":"IUP J Inf Technol"},{"issue":"7","key":"866_CR12","doi-asserted-by":"crossref","first-page":"13","DOI":"10.23919\/JCC.2019.07.002","volume":"16","author":"Y Liu","year":"2019","unstructured":"Liu Y, Zhao B, Zhao P, Fan P, Liu H (2019) A survey: typical security issues of software-defined networking. China Commun 16(7):13\u201331","journal-title":"China Commun"},{"key":"866_CR13","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.jnca.2019.01.019","volume":"131","author":"R Sahay","year":"2019","unstructured":"Sahay R, Meng W, Jensen CD (2019) The application of software defined networking on securing computer networks: a survey. J Netw Comput Appl 131:89\u2013108","journal-title":"J Netw Comput Appl"},{"issue":"2","key":"866_CR14","doi-asserted-by":"crossref","first-page":"493","DOI":"10.1007\/s12083-017-0630-0","volume":"12","author":"N Sultana","year":"2019","unstructured":"Sultana N, Chilamkurti N, Peng W, Alhadad R (2019) Survey on SDN based network intrusion detection system using machine learning approaches. Peer-to-Peer Netw Appl 12(2):493\u2013501","journal-title":"Peer-to-Peer Netw Appl"},{"key":"866_CR15","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1016\/j.future.2019.04.034","volume":"111","author":"J Ai","year":"2020","unstructured":"Ai J, Chen H, Guo Z, Cheng G, Baker T (2020) Mitigating malicious packets attack via vulnerability-aware heterogeneous network devices assignment. Future Gener Comput Syst 111:841\u2013852","journal-title":"Future Gener Comput Syst"},{"key":"866_CR16","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1016\/j.jpdc.2019.08.013","volume":"134","author":"N Tariq","year":"2019","unstructured":"Tariq N, Asim M, Maamar Z, Farooqi MZ, Faci N, Baker T (2019) A mobile code-driven trust mechanism for detecting internal attacks in sensor node-powered IoT. J Parall Distrib Comput 134:198\u2013206","journal-title":"J Parall Distrib Comput"},{"key":"866_CR17","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1016\/j.future.2019.11.003","volume":"111","author":"Y Wang","year":"2020","unstructured":"Wang Y, Guo Y, Guo Z, Baker T, Liu W (2020) CLOSURE: a cloud scientific workflow scheduling algorithm based on attack\u2013defense game model. Future Gener Comput Syst 111:460\u2013474","journal-title":"Future Gener Comput Syst"},{"key":"866_CR18","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/j.jnca.2015.11.012","volume":"61","author":"A Akhunzada","year":"2016","unstructured":"Akhunzada A et al (2016) Secure and dependable software defined networks. J Netw Comput Appl 61:199\u2013221","journal-title":"J Netw Comput Appl"},{"issue":"4","key":"866_CR19","doi-asserted-by":"crossref","first-page":"2317","DOI":"10.1109\/COMST.2015.2474118","volume":"17","author":"I Ahmad","year":"2015","unstructured":"Ahmad I, Namal S, Ylianttila M, Gurtov A (2015) Security in software defined networks: a survey. IEEE Commun Surv Tutor 17(4):2317\u20132346","journal-title":"IEEE Commun Surv Tutor"},{"key":"866_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-020-03184-1","author":"T Jafarian","year":"2020","unstructured":"Jafarian T, Masdari M, Ghaffari A, Majidzadeh K (2020) A survey and classification of the security anomaly detection mechanisms in software defined networks. Cluster Comput. https:\/\/doi.org\/10.1007\/s10586-020-03184-1","journal-title":"Cluster Comput"},{"issue":"2","key":"866_CR21","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1007\/s13369-017-2414-5","volume":"42","author":"NZ Bawany","year":"2017","unstructured":"Bawany NZ, Shamsi JA, Salah K (2017) DDoS attack detection and mitigation using SDN: methods, practices, and solutions. Arab J Sci Eng 42(2):425\u2013441","journal-title":"Arab J Sci Eng"},{"issue":"1","key":"866_CR22","doi-asserted-by":"crossref","first-page":"602","DOI":"10.1109\/COMST.2015.2487361","volume":"18","author":"Q Yan","year":"2016","unstructured":"Yan Q, Yu FR, Gong Q, Li J (2016) Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: a survey, some research issues, and challenges. IEEE Commun Surv Tutor 18(1):602\u2013622","journal-title":"IEEE Commun Surv Tutor"},{"key":"866_CR23","unstructured":"da Silva AS, Wickboldt JA, Granville LZ, Schaeffer-Filho A (2016) ATLANTIC: a framework for anomaly traffic detection, classification, and mitigation in SDN. In: Network operations and management symposium (NOMS), 2016 IEEE\/IFIP, pp 27\u201335: IEEE"},{"key":"866_CR24","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1016\/j.future.2015.01.001","volume":"55","author":"M Ahmed","year":"2016","unstructured":"Ahmed M, Mahmood AN, Islam MR (2016) A survey of anomaly detection techniques in financial domain. Future Gener Comput Syst 55:278\u2013288","journal-title":"Future Gener Comput Syst"},{"key":"866_CR25","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.jnca.2015.11.016","volume":"60","author":"M Ahmed","year":"2016","unstructured":"Ahmed M, Mahmood AN, Hu J (2016) A survey of network anomaly detection techniques. J Netw Comput Appl 60:19\u201331","journal-title":"J Netw Comput Appl"},{"issue":"2","key":"866_CR26","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1007\/s10586-018-2835-2","volume":"22","author":"R Sun","year":"2019","unstructured":"Sun R, Zhang S, Yin C, Wang J, Min S (2019) Strategies for data stream mining method applied in anomaly detection. Cluster Comput 22(2):399\u2013408","journal-title":"Cluster Comput"},{"issue":"4","key":"866_CR27","doi-asserted-by":"crossref","first-page":"9229","DOI":"10.1007\/s10586-018-2114-2","volume":"22","author":"J Wang","year":"2019","unstructured":"Wang J, Xia L (2019) Abnormal behavior detection in videos using deep learning. Cluster Comput 22(4):9229\u20139239","journal-title":"Cluster Comput"},{"issue":"5","key":"866_CR28","doi-asserted-by":"crossref","first-page":"10615","DOI":"10.1007\/s10586-017-1149-0","volume":"22","author":"S Velliangiri","year":"2019","unstructured":"Velliangiri S, Premalatha J (2019) Intrusion detection of distributed denial of service attack in cloud. Cluster Comput 22(5):10615\u201310623","journal-title":"Cluster Comput"},{"key":"866_CR29","doi-asserted-by":"publisher","first-page":"1729","DOI":"10.1007\/s10586-017-1066-2","volume":"22","author":"C Yin","year":"2019","unstructured":"Yin C, Zhang S, Yin Z, Wang J (2019) Anomaly detection model based on data stream clustering. Cluster Comput 22:1729\u20131738. https:\/\/doi.org\/10.1007\/s10586-017-1066-2","journal-title":"Cluster Comput"},{"key":"866_CR30","doi-asserted-by":"publisher","first-page":"3221","DOI":"10.1007\/s10586-020-03082-6","volume":"23","author":"AN Jaber","year":"2020","unstructured":"Jaber AN, Rehman SU (2020) FCM\u2013SVM based intrusion detection system for cloud computing environment. Cluster Comput 23:3221\u20133231. https:\/\/doi.org\/10.1007\/s10586-020-03082-6","journal-title":"Cluster Comput"},{"issue":"5","key":"866_CR31","doi-asserted-by":"crossref","first-page":"10549","DOI":"10.1007\/s10586-017-1109-8","volume":"22","author":"S Aljawarneh","year":"2019","unstructured":"Aljawarneh S, Yassein MB, Aljundi M (2019) An enhanced J48 classification algorithm for the anomaly intrusion detection systems. Cluster Comput 22(5):10549\u201310565","journal-title":"Cluster Comput"},{"issue":"4","key":"866_CR32","doi-asserted-by":"crossref","first-page":"1143","DOI":"10.1007\/s10586-018-02900-2","volume":"22","author":"KK Karmakar","year":"2019","unstructured":"Karmakar KK, Varadharajan V, Tupakula U (2019) Mitigating attacks in software defined networks. Cluster Comput 22(4):1143\u20131157","journal-title":"Cluster Comput"},{"key":"866_CR33","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-020-03133-y","author":"S Badotra","year":"2019","unstructured":"Badotra S, Panda SN (2019) SNORT based early DDoS detection system using Opendaylight and open networking operating system in software defined networking. Cluster Comput. https:\/\/doi.org\/10.1007\/s10586-020-03133-y","journal-title":"Cluster Comput"},{"key":"866_CR34","doi-asserted-by":"crossref","unstructured":"Kokila R, Selvi ST, Govindarajan K (2014) DDoS detection and analysis in SDN-based environment using support vector machine classifier. In: 2014 sixth international conference on advanced computing (ICoAC), pp 205\u2013210: IEEE","DOI":"10.1109\/ICoAC.2014.7229711"},{"key":"866_CR35","doi-asserted-by":"crossref","unstructured":"Hommes S, State R, Engel T (2014) Implications and detection of DoS attacks in OpenFlow-based networks. In: 2014 IEEE global communications conference, pp 537\u2013543: IEEE","DOI":"10.1109\/GLOCOM.2014.7036863"},{"key":"866_CR36","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.bjp.2013.10.014","volume":"62","author":"K Giotis","year":"2014","unstructured":"Giotis K, Argyropoulos C, Androulidakis G, Kalogeras D, Maglaris V (2014) Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments. Comput Netw 62:122\u2013136","journal-title":"Comput Netw"},{"key":"866_CR37","doi-asserted-by":"crossref","unstructured":"Sathya R, Thangarajan R (2015) Efficient anomaly detection and mitigation in software defined networking environment. In: 2015 2nd international conference on electronics and communication systems (ICECS), pp 479\u2013484: IEEE","DOI":"10.1109\/ECS.2015.7124952"},{"key":"866_CR38","doi-asserted-by":"crossref","unstructured":"Wang R, Jia Z, Ju L (2015) An entropy-based distributed DDoS detection mechanism in software-defined networking. In: Trustcom\/BigDataSE\/ISPA, 2015 IEEE, vol 1, pp 310\u2013317: IEEE","DOI":"10.1109\/Trustcom.2015.389"},{"key":"866_CR39","unstructured":"Niyaz Q, Sun W, Javaid AY (2016) A deep learning based DDoS detection system in software-defined networking (SDN). arXiv:1611.07400"},{"key":"866_CR40","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/9804061","author":"J Ye","year":"2018","unstructured":"Ye J, Cheng X, Zhu J, Feng L, Song L (2018) A DDoS attack detection method based on SVM in software defined network. Secur Commun Netw. https:\/\/doi.org\/10.1155\/2018\/9804061","journal-title":"Secur Commun Netw"},{"issue":"3","key":"866_CR41","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1109\/TMM.2019.2893549","volume":"21","author":"S Garg","year":"2019","unstructured":"Garg S, Kaur K, Kumar N, Rodrigues JJ (2019) Hybrid deep-learning-based anomaly detection scheme for suspicious flow detection in SDN: a social multimedia perspective. IEEE Trans Multimed 21(3):566\u2013578","journal-title":"IEEE Trans Multimed"},{"key":"866_CR42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-13057-2_8","volume-title":"Deep learning applications for cyber security. Advanced sciences and technologies for security applications","author":"TA Tang","year":"2019","unstructured":"Tang TA, McLernon D, Mhamdi L, Zaidi SAR, Ghogho M (2019) Intrusion detection in SDN-based networks: deep recurrent neural network approach. In: Alazab M, Tang M (eds) Deep learning applications for cyber security. Advanced sciences and technologies for security applications. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-13057-2_8"},{"key":"866_CR43","doi-asserted-by":"crossref","unstructured":"Dey SK, Uddin MR, Rahman MM (2020) Performance analysis of SDN-based intrusion detection model with feature selection approach. In: Proceedings of international joint conference on computational intelligence, pp 483\u2013494. Springer","DOI":"10.1007\/978-981-13-7564-4_41"},{"issue":"3","key":"866_CR44","doi-asserted-by":"crossref","first-page":"1617","DOI":"10.1109\/SURV.2014.012214.00180","volume":"16","author":"BAA Nunes","year":"2014","unstructured":"Nunes BAA, Mendonca M, Nguyen X-N, Obraczka K, Turletti T (2014) A survey of software-defined networking: past, present, and future of programmable networks. IEEE Commun Surv Tutor 16(3):1617\u20131634","journal-title":"IEEE Commun Surv Tutor"},{"issue":"1","key":"866_CR45","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/COMST.2014.2330903","volume":"17","author":"W Xia","year":"2015","unstructured":"Xia W, Wen Y, Foh CH, Niyato D, Xie H (2015) A survey on software-defined networking. IEEE Commun Surv Tutor 17(1):27\u201351","journal-title":"IEEE Commun Surv Tutor"},{"key":"866_CR46","doi-asserted-by":"crossref","unstructured":"Lockwood JW, et al. (2007) NetFPGA\u2013an open platform for gigabit-rate network switching and routing. In: 2007 IEEE international conference on microelectronic systems education (MSE\u201907), pp 160\u2013161:IEEE","DOI":"10.1109\/MSE.2007.69"},{"key":"866_CR47","unstructured":"Pfaff B, Pettit J, Amidon K, Casado M, Koponen T, Shenker S (2009) Extending networking into the virtualization layer. In: Hotnets"},{"key":"866_CR48","unstructured":"F. O. A. http:\/\/www.projectfloodlight.org\/"},{"key":"866_CR49","doi-asserted-by":"crossref","unstructured":"Mattos DM, et al. (2011) Omni: openflow management infrastructure. In: 2011 international conference on the network of the future (NOF), pp 52\u201356: IEEE","DOI":"10.1109\/NOF.2011.6126682"},{"key":"866_CR50","unstructured":"T. O. A. http:\/\/trema.github.com\/trema\/"},{"key":"866_CR51","unstructured":"R. O. A. http:\/\/osrg.github.com\/ryu\/"},{"issue":"3","key":"866_CR52","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1145\/1384609.1384625","volume":"38","author":"N Gude","year":"2008","unstructured":"Gude N et al (2008) NOX: towards an operating system for networks. ACM SIGCOMM Comput Commun Rev 38(3):105\u2013110","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"866_CR53","doi-asserted-by":"crossref","unstructured":"Shalimov A, Zuikov D, Zimarina D, Pashkov V, Smeliansky R (2013) Advanced study of SDN\/OpenFlow controllers. In: Proceedings of the 9th central & eastern european software engineering conference in Russia, p 1. ACM","DOI":"10.1145\/2556610.2556621"},{"key":"866_CR54","unstructured":"O. O. A. http:\/\/www.opendaylight.org\/"},{"issue":"1","key":"866_CR55","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1109\/TNSM.2016.2516946","volume":"13","author":"L Li","year":"2016","unstructured":"Li L, Chou W, Zhou W, Luo M (2016) Design patterns and extensibility of REST API for networking applications. IEEE Trans Netw Serv Manag 13(1):154\u2013167","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"866_CR56","doi-asserted-by":"crossref","unstructured":"Zhou W, Li L, Luo M, Chou W (2014) REST API design patterns for SDN northbound API. In: 2014 28th international conference on advanced information networking and applications workshops, pp 358\u2013365. IEEE","DOI":"10.1109\/WAINA.2014.153"},{"key":"866_CR57","doi-asserted-by":"crossref","unstructured":"Lara A, Quesada L (2018) Performance analysis of SDN northbound interfaces. In: 2018 IEEE 10th Latin-American conference on communications (LATINCOM), pp 1\u20136. IEEE","DOI":"10.1109\/LATINCOM.2018.8613250"},{"key":"866_CR58","doi-asserted-by":"crossref","unstructured":"Jerome A, Yuksel M, Ahmed SH, Bassiouni M (2018) SDN-based load balancing for multi-path TCP. In: IEEE INFOCOM 2018-IEEE conference on computer communications workshops (INFOCOM WKSHPS), pp 859\u2013864. IEEE","DOI":"10.1109\/INFCOMW.2018.8406943"},{"key":"866_CR59","doi-asserted-by":"crossref","first-page":"42516","DOI":"10.1109\/ACCESS.2018.2837889","volume":"6","author":"T Chin","year":"2018","unstructured":"Chin T, Xiong K, Hu C (2018) Phishlimiter: a phishing detection and mitigation approach using software-defined networking. IEEE Access 6:42516\u201342531","journal-title":"IEEE Access"},{"key":"866_CR60","doi-asserted-by":"crossref","unstructured":"Lantz B, Heller B, McKeown N (2010) A network in a laptop: rapid prototyping for software-defined networks. In: Proceedings of the 9th ACM SIGCOMM workshop on hot topics in networks, p 19. ACM","DOI":"10.1145\/1868447.1868466"},{"issue":"2","key":"866_CR61","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1016\/j.jnca.2012.12.020","volume":"36","author":"B Li","year":"2013","unstructured":"Li B, Springer J, Bebis G, Gunes MH (2013) A survey of network flow applications. J Netw Comput Appl 36(2):567\u2013581","journal-title":"J Netw Comput Appl"},{"key":"866_CR62","unstructured":"Kerr DR, Bruins BL (2001) Network flow switching and flow data export,\u201d ed: Google Patents"},{"key":"866_CR63","unstructured":"Nacshon L, Puzis R, Zilberman P (2016) Floware: balanced flow monitoring in software defined networks. arXiv:1608.03307"},{"key":"866_CR64","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-020-05373-x","author":"M Hosseinzadeh","year":"2020","unstructured":"Hosseinzadeh M, Rahmani AM, Vo B, Bidaki M, Masdari M, Zangakani M (2020) Improving security using SVM-based anomaly detection: issues and challenges. Soft Comput. https:\/\/doi.org\/10.1007\/s00500-020-05373-x","journal-title":"Soft Comput"},{"key":"866_CR65","doi-asserted-by":"publisher","DOI":"10.1007\/s10700-020-09332-x","author":"M Masdari","year":"2020","unstructured":"Masdari M, Khezri H (2020) Towards fuzzy anomaly detection-based security: a comprehensive review. Fuzzy Optim Decis Making. https:\/\/doi.org\/10.1007\/s10700-020-09332-x","journal-title":"Fuzzy Optim Decis Making"},{"key":"866_CR66","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106301","author":"M Masdari","year":"2020","unstructured":"Masdari M, Khezri H (2020) A survey and taxonomy of the fuzzy signature-based intrusion detection systems. Appl Soft Comput. https:\/\/doi.org\/10.1016\/j.asoc.2020.106301","journal-title":"Appl Soft Comput"},{"issue":"16","key":"866_CR67","doi-asserted-by":"crossref","first-page":"3724","DOI":"10.1002\/sec.1539","volume":"9","author":"M Masdari","year":"2016","unstructured":"Masdari M, Jalali M (2016) A survey and taxonomy of DoS attacks in cloud computing. Secur Commun Netw 9(16):3724\u20133751","journal-title":"Secur Commun Netw"},{"key":"866_CR68","first-page":"3","volume":"160","author":"SB Kotsiantis","year":"2007","unstructured":"Kotsiantis SB, Zaharakis I, Pintelas P (2007) Supervised machine learning: a review of classification techniques. Emerg Artif Intell Appl Comput Eng 160:3\u201324","journal-title":"Emerg Artif Intell Appl Comput Eng"},{"issue":"1\u20134","key":"866_CR69","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/SURV.2008.080406","volume":"10","author":"TT Nguyen","year":"2008","unstructured":"Nguyen TT, Armitage GJ (2008) A survey of techniques for internet traffic classification using machine learning. IEEE Commun Surv Tutor 10(1\u20134):56\u201376","journal-title":"IEEE Commun Surv Tutor"},{"key":"866_CR70","volume-title":"Machine learning in action","author":"P Harrington","year":"2012","unstructured":"Harrington P (2012) Machine learning in action. Manning Publications Co., New York"},{"key":"866_CR71","doi-asserted-by":"publisher","unstructured":"Chapaneri R, Shah S (2019) A comprehensive survey of machine learning-based network intrusion detection. In: Satapathy S, Bhateja V, Das S (eds) Smart intelligent computing and applications. Smart innovation, Systems and technologies, vol 104. Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-13-1921-1_35","DOI":"10.1007\/978-981-13-1921-1_35"},{"key":"866_CR72","doi-asserted-by":"crossref","unstructured":"Lin C-H, Liu J-C, Ho C-H (2008) Anomaly detection using LibSVM training tools. In: 2008 international conference on information security and assurance (isa 2008), pp 166\u2013171. IEEE","DOI":"10.1109\/ISA.2008.12"},{"key":"866_CR73","doi-asserted-by":"crossref","unstructured":"Avallone S, Guadagno S, Emma D, Pescap\u00e8 A, Ventre G (2004) D-ITG distributed internet traffic generator. In: First international conference on the quantitative evaluation of systems, 2004. QEST 2004. Proceedings, pp 316\u2013317. IEEE","DOI":"10.1109\/QEST.2004.1348045"},{"key":"866_CR74","doi-asserted-by":"crossref","unstructured":"Avallone S, Pescape A, Ventre G (2003) Distributed internet traffic generator (D-ITG): analysis and experimentation over heterogeneous networks. In: Poster at international conference on network protocols, ICNP","DOI":"10.1109\/QEST.2004.1348045"},{"key":"866_CR75","unstructured":"Ops B (2016) Denial-of-service Attack\u2013DOS using hping3 with spoofed IP in Kali Linux. BlackMORE Ops. BlackMORE Ops, 17"},{"key":"866_CR76","unstructured":"Sanfilippo S (2005) Hping3 (8)-Linux Man Page,\u201d l\u00ednea]. Disponible en: https:\/\/linux.die.net\/man\/8\/hping3. [Accedido: 11-sep-2017]"},{"key":"866_CR77","unstructured":"Tools K (2014) hping3. ICMP or SYN flooding tool,\u201d ed"},{"key":"866_CR78","unstructured":"Buchanan B, Flandrin F, Macfarlane R, Graves J (2010) A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS). In: Cyberforensics 2011. http:\/\/researchrepository.napier.ac.uk\/output\/201098"},{"key":"866_CR79","volume-title":"RapidMiner: data mining use cases and business analytics applications","author":"M Hofmann","year":"2013","unstructured":"Hofmann M, Klinkenberg R (2013) RapidMiner: data mining use cases and business analytics applications. CRC Press, Boca Raton"},{"key":"866_CR80","volume-title":"Python machine learning","author":"S Raschka","year":"2015","unstructured":"Raschka S (2015) Python machine learning. Packt Publishing Ltd, Birmingham"},{"issue":"2","key":"866_CR81","first-page":"271","volume":"2","author":"AG Karegowda","year":"2010","unstructured":"Karegowda AG, Manjunath A, Jayaram M (2010) Comparative study of attribute selection using gain ratio and correlation based feature selection. Int J Inf Technol Knowl Manag 2(2):271\u2013277","journal-title":"Int J Inf Technol Knowl Manag"},{"key":"866_CR82","doi-asserted-by":"publisher","unstructured":"Mladeni\u0107 D (2006) Feature Selection for dimensionality reduction. In: Saunders C, Grobelnik M, Gunn S, Shawe-Taylor J  (eds)  Subspace, latent structure and feature selection SLSFS 2005. Lecture notes in computer science, vol 3940. Springer, Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/11752790_5","DOI":"10.1007\/11752790_5"},{"key":"866_CR83","doi-asserted-by":"publisher","unstructured":"Yang J, Honavar V (1998) Feature subset selection using a genetic algorithm. In: Liu H., Motoda H. (eds) Feature extraction, construction and selection. The Springer international series in engineering and computer science, vol 453. Springer, Boston, MA. https:\/\/doi.org\/10.1007\/978-1-4615-5725-8_8c","DOI":"10.1007\/978-1-4615-5725-8_8c"},{"key":"866_CR84","doi-asserted-by":"crossref","unstructured":"Novakovic J, Veljovic A (2011) C-support vector classification: selection of kernel and parameters in medical diagnosis. In: 2011 IEEE 9th international symposium on intelligent systems and informatics, pp 465\u2013470. IEEE","DOI":"10.1109\/SISY.2011.6034373"},{"key":"866_CR85","doi-asserted-by":"crossref","unstructured":"Banados JA, Espinosa KJ (2014) Optimizing support vector machine in classifying sentiments on product brands from Twitter. In: IISA 2014, the 5th international conference on information, intelligence, systems and applications, pp 75\u201380. IEEE","DOI":"10.1109\/IISA.2014.6878768"},{"key":"866_CR86","doi-asserted-by":"crossref","unstructured":"Zhao S, Hao X, Li X (2008) Segmentation of fingerprint images using support vector machines. In: 2008 second international symposium on intelligent information technology application, vol 2, pp 427\u2013423. EEE","DOI":"10.1109\/IITA.2008.323"},{"issue":"8","key":"866_CR87","doi-asserted-by":"crossref","first-page":"897","DOI":"10.1016\/j.conengprac.2006.10.010","volume":"15","author":"X-C Xi","year":"2007","unstructured":"Xi X-C, Poo A-N, Chou S-K (2007) Support vector regression model predictive control on a HVAC plant. Control Eng Pract 15(8):897\u2013908","journal-title":"Control Eng Pract"},{"issue":"3","key":"866_CR88","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20(3):273\u2013297","journal-title":"Mach Learn"},{"key":"866_CR89","doi-asserted-by":"crossref","unstructured":"Boser BE, Guyon IM, Vapnik VN (1992) A training algorithm for optimal margin classifiers. In: Proceedings of the fifth annual workshop on computational learning theory, pp 144\u2013152. ACM","DOI":"10.1145\/130385.130401"},{"key":"866_CR90","unstructured":"Boser BE, Guyon IM, Vapnik VN (2003) A training algorithm for optimal margin classifiers. In: Proceedings of the 5th annual ACM workshop on computational learning theory, pp 144\u2013152"},{"issue":"5","key":"866_CR91","doi-asserted-by":"crossref","first-page":"863","DOI":"10.1080\/18756891.2016.1237186","volume":"9","author":"J Hussain","year":"2016","unstructured":"Hussain J, Lalmuanawma S, Chhakchhuak L (2016) A two-stage hybrid classification technique for network intrusion detection system. Int J Comput Intell Syst 9(5):863\u2013875","journal-title":"Int J Comput Intell Syst"},{"key":"866_CR92","volume-title":"Data mining: practical machine learning tools and techniques","author":"IH Witten","year":"2016","unstructured":"Witten IH, Frank E, Hall MA, Pal CJ (2016) Data mining: practical machine learning tools and techniques. Morgan Kaufmann, Burlington"},{"issue":"3","key":"866_CR93","first-page":"27","volume":"2","author":"C-C Chang","year":"2011","unstructured":"Chang C-C, Lin C-J (2011) LIBSVM: a library for support vector machines. ACM Trans Intell Syst Technol (TIST) 2(3):27","journal-title":"ACM Trans Intell Syst Technol (TIST)"},{"key":"866_CR94","volume-title":"Neural networks: a comprehensive foundation","author":"S Haykin","year":"1994","unstructured":"Haykin S (1994) Neural networks: a comprehensive foundation. Prentice Hall PTR, Upper Saddle River"},{"key":"866_CR95","volume-title":"Pattern recognition and machine learning","author":"CM Bishop","year":"2006","unstructured":"Bishop CM (2006) Pattern recognition and machine learning. Springer, Berlin"},{"key":"866_CR96","volume-title":"Artificial intelligence: a modern approach","author":"SJ Russell","year":"2016","unstructured":"Russell SJ, Norvig P (2016) Artificial intelligence: a modern approach. Pearson Education Limited, Malaysia"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-020-00866-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00607-020-00866-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-020-00866-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,5]],"date-time":"2021-04-05T09:04:24Z","timestamp":1617613464000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00607-020-00866-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,27]]},"references-count":96,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["866"],"URL":"https:\/\/doi.org\/10.1007\/s00607-020-00866-x","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,27]]},"assertion":[{"value":"24 September 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 November 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}