{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:41:57Z","timestamp":1759092117551,"version":"3.40.5"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,1,11]],"date-time":"2016-01-11T00:00:00Z","timestamp":1452470400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1007\/s10586-015-0528-7","type":"journal-article","created":{"date-parts":[[2016,1,11]],"date-time":"2016-01-11T14:25:08Z","timestamp":1452522308000},"page":"79-86","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Distributed denial-of-service attacks against HTTP\/2 services"],"prefix":"10.1007","volume":"19","author":[{"given":"Erwin","family":"Adi","sequence":"first","affiliation":[]},{"given":"Zubair A.","family":"Baig","sequence":"additional","affiliation":[]},{"given":"Philip","family":"Hingston","sequence":"additional","affiliation":[]},{"given":"Chiou-Peng","family":"Lam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,11]]},"reference":[{"key":"528_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, P., Gupta, B., Jain, S.: SVM based scheme for predicting number of zombies in a DDoS attack. In: Intelligence and Security Informatics Conference (EISIC), 2011 European, pp. 178\u2013182. IEEE (2011)","DOI":"10.1109\/EISIC.2011.19"},{"issue":"10","key":"528_CR2","doi-asserted-by":"crossref","first-page":"9","DOI":"10.5815\/ijmecs.2013.10.02","volume":"5","author":"P Barthakur","year":"2013","unstructured":"Barthakur, P., Dahal, M., Ghose, M.K.: An efficient machine learning based classification scheme for detecting distributed command & control traffic of P2P botnets. Int. J. Mod. Educ. Comput. Sci. (IJMECS) 5(10), 9 (2013)","journal-title":"Int. J. Mod. Educ. Comput. Sci. (IJMECS)"},{"key":"528_CR3","doi-asserted-by":"crossref","unstructured":"Belshe, M., Peon, R., Thomson, M.: Hypertext Transfer Protocol version 2 (HTTP\/2). Report RFC 7540, Internet Engineering Task Force (May 2015)","DOI":"10.17487\/RFC7540"},{"key":"528_CR4","unstructured":"CERT: Denial of Service attacks (2014). http:\/\/www.cert.org\/historical\/tech_tips\/denial_of_service.cfm?"},{"issue":"10","key":"528_CR5","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MCOM.2002.1039856","volume":"40","author":"RK Chang","year":"2002","unstructured":"Chang, R.K.: Defending against flooding-based distributed denial-of-service attacks: a tutorial. Commun. Mag., IEEE 40(10), 42\u201351 (2002)","journal-title":"Commun. Mag., IEEE"},{"key":"528_CR6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s00500-014-1250-8","volume":"18","author":"J Choi","year":"2014","unstructured":"Choi, J., Choi, C., Ko, B., Kim, P.: A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment. Soft Comput. 18, 1\u20137 (2014)","journal-title":"Soft Comput."},{"key":"528_CR7","unstructured":"Crosby, S.A., Wallach, D.S.: Denial of service via algorithmic complexity attacks. In: Usenix Security, vol. 2 (2003)"},{"key":"528_CR8","doi-asserted-by":"crossref","unstructured":"Garg, S., Singh, A.K., Sarje, A.K., Peddoju, S.K.: Behaviour analysis of machine learning algorithms for detecting P2P botnets. In: Advanced Computing Technologies (ICACT), 2013 15th International Conference on, pp. 1\u20134. IEEE (2013)","DOI":"10.1109\/ICACT.2013.6710523"},{"key":"528_CR9","unstructured":"Grigorik, I.: High Performance Browser Networking: what Every Web Developer should Know About Networking and Web Performance. \u201d O\u2019Reilly Media, Inc\u201d., New York (2013)"},{"issue":"5","key":"528_CR10","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/S1353-4858(10)70056-8","volume":"2010","author":"S Heron","year":"2010","unstructured":"Heron, S.: Denial of service: motivations and trends. Netw. Secur. 2010(5), 10\u201312 (2010)","journal-title":"Netw. Secur."},{"key":"528_CR11","doi-asserted-by":"crossref","unstructured":"Jung, J., Krishnamurthy, B., Rabinovich, M.: Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites. In: Proceedings of the 11th international conference on World Wide Web, pp. 293\u2013304. ACM (2002)","DOI":"10.1145\/511446.511485"},{"key":"528_CR12","doi-asserted-by":"crossref","unstructured":"Liu, H., Zhang, Y., Lin, H., Wu, J., Wu, Z., Zhang, X.: How many zombies around you? In: Data Mining (ICDM), 2013 IEEE 13th International Conference on, pp. 1133\u20131138. IEEE (2013)","DOI":"10.1109\/ICDM.2013.166"},{"key":"528_CR13","unstructured":"Malialis, K., Kudenko, D.: Large-scale DDoS response using cooperative reinforcement learning. In: 11th European Workshop on Multi-Agent Systems (EUMAS) (2013)"},{"issue":"12","key":"528_CR14","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/S1353-4858(11)70128-3","volume":"2011","author":"S Mansfield-Devine","year":"2011","unstructured":"Mansfield-Devine, S.: DDoS: threats and mitigation. Netw. Secur. 2011(12), 5\u201312 (2011)","journal-title":"Netw. Secur."},{"issue":"2","key":"528_CR15","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J Mirkovic","year":"2004","unstructured":"Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Comput. Commun. Rev. 34(2), 39\u201353 (2004)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"528_CR16","first-page":"4","volume":"2013","author":"T Ni","year":"2013","unstructured":"Ni, T., Gu, X., Wang, H., Li, Y.: Real-time detection of application-layer DDoS attack using time series analysis. J. Control Sci. Eng. 2013, 4 (2013)","journal-title":"J. Control Sci. Eng."},{"issue":"9","key":"528_CR17","doi-asserted-by":"crossref","first-page":"1049","DOI":"10.1002\/sec.392","volume":"5","author":"H Rahmani","year":"2012","unstructured":"Rahmani, H., Sahli, N., Kamoun, F.: Distributed denial-of-service attack detection scheme-based joint-entropy. Secur. Commun. Netw. 5(9), 1049\u20131061 (2012)","journal-title":"Secur. Commun. Netw."},{"issue":"2","key":"528_CR18","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1002\/sec.118","volume":"4","author":"K Salah","year":"2011","unstructured":"Salah, K., Sattar, K., Sqalli, M., Al-Shaer, E.: A potential low-rate DoS attack against network firewalls. Secur. Commun. Netw. 4(2), 136\u2013146 (2011)","journal-title":"Secur. Commun. Netw."},{"key":"528_CR19","unstructured":"Tsujikawa, T.: Nghttp2: HTTP\/2 C library (2015). https:\/\/nghttp2.org\/"},{"key":"528_CR20","unstructured":"Ye, C., Zheng, K.: Detection of application layer distributed denial of service. In: Computer Science and Network Technology (ICCSNT), 2011 International Conference on, vol. 1, pp. 310\u2013314. IEEE (2011)"},{"issue":"6","key":"528_CR21","doi-asserted-by":"crossref","first-page":"1073","DOI":"10.1109\/TPDS.2011.262","volume":"23","author":"S Yu","year":"2012","unstructured":"Yu, S., Zhou, W., Jia, W., Guo, S., Xiang, Y., Tang, F.: Discriminating DDoS attacks from flash crowds using flow correlation coefficient. Parallel Distrib. Syst., IEEE Trans. 23(6), 1073\u20131080 (2012)","journal-title":"Parallel Distrib. Syst., IEEE Trans."},{"key":"528_CR22","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.future.2013.08.002","volume":"38","author":"W Zhou","year":"2014","unstructured":"Zhou, W., Jia, W., Wen, S., Xiang, Y., Zhou, W.: Detection and defense of application-layer DDoS attacks in backbone web traffic. Futur. Gener. Comput. Syst. 38, 36\u201346 (2014)","journal-title":"Futur. Gener. Comput. Syst."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-015-0528-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-015-0528-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-015-0528-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T07:56:54Z","timestamp":1567497414000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-015-0528-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,11]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,3]]}},"alternative-id":["528"],"URL":"https:\/\/doi.org\/10.1007\/s10586-015-0528-7","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2016,1,11]]}}}