{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T01:01:21Z","timestamp":1648861281450},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,5,14]],"date-time":"2018-05-14T00:00:00Z","timestamp":1526256000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s10586-018-2808-5","type":"journal-article","created":{"date-parts":[[2018,5,14]],"date-time":"2018-05-14T04:11:36Z","timestamp":1526271096000},"page":"1765-1783","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["DEFAD: ensemble classifier for DDOS enabled flood attack defense in distributed network environment"],"prefix":"10.1007","volume":"21","author":[{"given":"K. Munivara","family":"Prasad","sequence":"first","affiliation":[]},{"given":"A. Rama Mohan","family":"Reddy","sequence":"additional","affiliation":[]},{"given":"K. Venugopal","family":"Rao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,14]]},"reference":[{"issue":"71","key":"2808_CR1","doi-asserted-by":"publisher","first-page":"1620","DOI":"10.1007\/s11227-014-1242-6","volume":"5","author":"F Palmieri","year":"2015","unstructured":"Palmieri, F., Ricciardi, S., Fiore, U., Ficco, M., Castiglione, A.: Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures. J. Supercomput. 5(71), 1620\u20131641 (2015)","journal-title":"J. Supercomput."},{"issue":"1","key":"2808_CR2","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1109\/COMST.2015.2487361","volume":"18","author":"Q Yan","year":"2016","unstructured":"Yan, Q., Yu, F.R., Gong, Q., Li, J.: Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: a survey, some research issues, and challenges. IEEE Commun. Surv. Tutor. 18(1), 602\u2013622 (2016)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"2808_CR3","unstructured":"Najafabadi, M.M., Khoshgoftaar, T.M., Napolitano, A., Wheelus, C.: RUDY attack: detection at the network level and its important features. In: FLAIRS Conference, 30 March 2016, pp. 288\u2013293"},{"issue":"1","key":"2808_CR4","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/s11277-017-4505-8","volume":"97","author":"KM Prasad","year":"2017","unstructured":"Prasad, K.M., Reddy, A.R., Rao, K.V.: BIFAD: bio-inspired anomaly based HTTP-flood attack detection. Wirel. Pers. Commun. 97(1), 281\u2013308 (2017)","journal-title":"Wirel. Pers. Commun."},{"issue":"20","key":"2808_CR5","first-page":"11","volume":"41","author":"S Vivin Sandar","year":"2012","unstructured":"Vivin Sandar, S., Shenai, S.: Economic denial of sustainability (EDOS) in cloud services using http and xml based DDOS attacks. Int. J. Comput. Appl. 41(20), 11\u201316 (2012)","journal-title":"Int. J. Comput. Appl."},{"key":"2808_CR6","first-page":"101","volume":"1","author":"F Iglesias","year":"2015","unstructured":"Iglesias, F., Zseby, T.: Analysis of network traffic features for anomaly detection. Mach. Learn. 1, 101 (2015)","journal-title":"Mach. Learn."},{"key":"2808_CR7","doi-asserted-by":"crossref","unstructured":"Claise, B., Trammell, B., Aitken, P.: Specification of the IP flow information export (IPFIX) protocol for the exchange of flow information. Request for Comments 7011 (2013)","DOI":"10.17487\/rfc7015"},{"key":"2808_CR8","first-page":"195","volume-title":"Communications in Computer and Information Science","author":"Enrico Cambiaso","year":"2012","unstructured":"Cambiaso, E., Papaleo, G., Aiello, M.: Taxonomy of slow DoS attacks to web applications. In: Recent Trends in Computer Networks and Distributed Systems Security, pp. 195\u2013204 (2012)"},{"key":"2808_CR9","unstructured":"Akamai: Akamai\u2019s [State of the Internet]\/Security Q1\/2016 Report. \n                    http:\/\/www.akamai.com\/StateofTheInternet\n                    \n                   (2016)"},{"issue":"1","key":"2808_CR10","first-page":"436","volume":"7","author":"M Alkasassbeh","year":"2016","unstructured":"Alkasassbeh, M., Al-Naymat, G., Hassanat, A.B., Almseidin, M.: Detecting distributed denial of service attacks using data mining techniques. Int. J. Adv. Comput. Sci. Appl. 7(1), 436\u2013445 (2016)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"issue":"7","key":"2808_CR11","doi-asserted-by":"publisher","first-page":"1020","DOI":"10.1093\/comjnl\/bxp078","volume":"53","author":"G Loukas","year":"2009","unstructured":"Loukas, G., \u00d6ke, G.: Protection against denial of service attacks: a survey. Comput. J. 53(7), 1020\u20131037 (2009)","journal-title":"Comput. J."},{"key":"2808_CR12","first-page":"12180","volume-title":"Network-Based Intrusion Detection Using Neural Networks","author":"C Palagiri","year":"2002","unstructured":"Palagiri, C.: Network-Based Intrusion Detection Using Neural Networks, pp. 12180\u201313590. Department of Computer Science Rensselaer Polytechnic Institute Troy, New York (2002)"},{"issue":"10","key":"2808_CR13","doi-asserted-by":"publisher","first-page":"291","DOI":"10.15623\/ijret.2014.0310045","volume":"3","author":"S Apale","year":"2014","unstructured":"Apale, S., Kamble, R., Ghodekar, M., Nemade, H., Waghmode, R.: Defense mechanism for DDoS attack through machine learning. Int. J. Res. Eng. Technol. 3(10), 291\u2013294 (2014)","journal-title":"Int. J. Res. Eng. Technol."},{"key":"2808_CR14","doi-asserted-by":"crossref","unstructured":"Vijayasarathy, R., Raghavan, S.V., Ravindran, B.: A system approach to network modeling for DDoS detection using a Naive Bayesian classifier. In: Third International Conference on Communication Systems and Networks (COMSNETS), 4 January 2011, pp. 1\u201310. IEEE, Los Alamitos (2011)","DOI":"10.1109\/COMSNETS.2011.5716474"},{"issue":"18","key":"2808_CR15","doi-asserted-by":"publisher","first-page":"5036","DOI":"10.1016\/j.comnet.2007.08.008","volume":"51","author":"K Lu","year":"2007","unstructured":"Lu, K., Wu, D., Fan, J., Todorovic, S., Nucci, A.: Robust and efficient detection of DDoS attacks for large-scale internet. Comput. Netw. 51(18), 5036\u20135056 (2007)","journal-title":"Comput. Netw."},{"key":"2808_CR16","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1007\/11576235_58","volume-title":"Parallel and Distributed Processing and Applications","author":"Wei Pan","year":"2005","unstructured":"Pan, W., Li, W.: A hybrid neural network approach to the classification of novel attacks for intrusion detection. In: International Symposium on Parallel and Distributed Processing and Applications, pp. 564\u2013575 (2005)"},{"key":"2808_CR17","unstructured":"Norouzian, M.R., Merati, S.: Classifying attacks in a network intrusion detection system based on artificial neural networks. In: 2011 13th International Conference on Advanced Communication Technology (ICACT), 13 February 2011, pp. 868\u2013873. IEEE, Los Alamitos (2011)"},{"key":"2808_CR18","doi-asserted-by":"crossref","unstructured":"Haddadi, F., Khanchi, S., Shetabi, M., Derhami, V.: Intrusion detection and attack classification using feed-forward neural network. In: Proceedings of the 2010 Second International Conference on Computer and Network Technology, 23 April 2010, pp. 262\u2013266. IEEE Computer Society, Washington DC (2010)","DOI":"10.1109\/ICCNT.2010.28"},{"key":"2808_CR19","unstructured":"Jorgenson, J., Manikopoulos, C., Li, J., Zhang, Z.: A hierarchical anomaly network intrusion detection system using neural network classification. In: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, June 2001"},{"key":"2808_CR20","unstructured":"Karimazad, R., Faraahi, A.: An anomaly-based method for DDoS attacks detection using RBF neural networks. In: Proceedings of the International Conference on Network and Electronics Engineering, vol. 11, pp. 44\u201348, 16 September 2011"},{"issue":"10","key":"2808_CR21","first-page":"75","volume":"3","author":"MD Jawale","year":"2014","unstructured":"Jawale, M.D., Bhusari, V.: Technique to detect and classify attacks in NIDS using ANN. Int. J. Emerg. Res. Manag. Technol. 3(10), 75\u201381 (2014)","journal-title":"Int. J. Emerg. Res. Manag. Technol."},{"issue":"12","key":"2808_CR22","doi-asserted-by":"publisher","first-page":"3655","DOI":"10.1007\/s00521-016-2317-5","volume":"28","author":"BB Gupta","year":"2017","unstructured":"Gupta, B.B., Badve, O.P.: Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment. Neural Comput. Appl. 28(12), 3655\u20133682 (2017)","journal-title":"Neural Comput. Appl."},{"key":"2808_CR23","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.ins.2017.05.031","volume":"12","author":"Z Huang","year":"2017","unstructured":"Huang, Z., Liu, S., et al.: Insight of the protection for data security under selective opening attacks. Inf. Sci. 12, 223\u2013241 (2017)","journal-title":"Inf. Sci."},{"issue":"7","key":"2808_CR24","first-page":"24","volume":"49","author":"E Alomari","year":"2012","unstructured":"Alomari, E., Gupta, B.B., Karuppayah, S.: Botnet-based distributed denial of service (DDoS) attacks on web servers: classification and art. Int. J. Comput. Appl. 49(7), 24\u201332 (2012)","journal-title":"Int. J. Comput. Appl."},{"issue":"1","key":"2808_CR25","first-page":"38","volume":"10","author":"X Chen","year":"2015","unstructured":"Chen, X., Huang, X., Li, J., Ma, J., Lou, W., Wong, D.S.: New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans. Inf. Forensics Security 10(1), 38 (2015)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"2808_CR26","doi-asserted-by":"crossref","unstructured":"Barford, P., Plonka, D.: Characteristics of network traffic flow anomalies. In: Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement, 1 November 2001, pp. 69\u201373. ACM, New York (2001)","DOI":"10.1145\/505208.505211"},{"key":"2808_CR27","doi-asserted-by":"crossref","unstructured":"Kalliola, A., Lee, K., Lee, H., Aura, T.: Flooding DDoS mitigation and traffic management with software defined networking. In: 2015 IEEE 4th International Conference on Cloud Networking (CloudNet), 5 October 2015, pp. 248\u2013254. IEEE, Los Alamitos (2015)","DOI":"10.1109\/CloudNet.2015.7335317"},{"key":"2808_CR28","doi-asserted-by":"crossref","unstructured":"Seufert, S., O\u2019Brien, D.: Machine learning for automatic defence against distributed denial of service attacks. In: IEEE International Conference on Communications, 2007 (ICC\u201907), 24 June 2007, pp. 1217\u20131222. IEEE, Los Alamitos (2007)","DOI":"10.1109\/ICC.2007.206"},{"key":"2808_CR29","doi-asserted-by":"crossref","unstructured":"Berral, J.L., Poggi, N., Alonso, J., Gavalda, R., Torres, J., Parashar, M.: Adaptive distributed mechanism against flooding network attacks based on machine learning. In: Proceedings of the 1st ACM workshop on Workshop on AISec 27 October 2008, pp. 43\u201350. ACM, New York (2008)","DOI":"10.1145\/1456377.1456389"},{"issue":"2","key":"2808_CR30","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1109\/TSMCB.2011.2168604","volume":"42","author":"GB Huang","year":"2012","unstructured":"Huang, G.B., Zhou, H., Ding, X., Zhang, R.: Extreme learning machine for regression and multiclass classification. IEEE Trans. Syst. Man Cybernet. Part B (Cybernetics) 42(2), 513\u2013529 (2012)","journal-title":"IEEE Trans. Syst. Man Cybernet. Part B (Cybernetics)"},{"key":"2808_CR31","doi-asserted-by":"crossref","unstructured":"Srimuang, W., Intarasothonchun, S.: Classification model of network intrusion using Weighted Extreme Learning Machine. In: 2015 12th International Joint Conference on Computer Science and Software Engineering (JCSSE), 22 July 2015, pp. 190\u2013194. IEEE, Los Alamitos (2015)","DOI":"10.1109\/JCSSE.2015.7219794"},{"issue":"8","key":"2808_CR32","doi-asserted-by":"publisher","first-page":"4062","DOI":"10.1016\/j.eswa.2014.12.040","volume":"42","author":"JM Fossaceca","year":"2015","unstructured":"Fossaceca, J.M., Mazzuchi, T.A., Sarkani, S.: MARK-ELM: application of a novel Multiple Kernel Learning framework for improving the robustness of Network Intrusion Detection. Expert Syst. Appl. 42(8), 4062\u20134080 (2015)","journal-title":"Expert Syst. Appl."},{"issue":"3","key":"2808_CR33","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1016\/j.comcom.2012.09.010","volume":"36","author":"PA Kumar","year":"2013","unstructured":"Kumar, P.A., Selvakumar, S.: Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems. Comput. Commun. 36(3), 303\u2013319 (2013)","journal-title":"Comput. Commun."},{"issue":"2","key":"2808_CR34","doi-asserted-by":"publisher","first-page":"486","DOI":"10.5812\/ijem.3505","volume":"10","author":"A Ghasemi","year":"2012","unstructured":"Ghasemi, A., Zahediasl, S.: Normality tests for statistical analysis: a guide for non-statisticians. Int. J. Endocrinol. Metab. 10(2), 486 (2012)","journal-title":"Int. J. Endocrinol. Metab."},{"key":"2808_CR35","volume-title":"Set Theory","author":"T Jech","year":"2013","unstructured":"Jech, T.: Set Theory. Springer, Berlin (2013)"},{"issue":"12","key":"2808_CR36","first-page":"1848","volume":"2","author":"S Revathi","year":"2013","unstructured":"Revathi, S., Malathi, A.: A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. Int. J. Eng. Res. Technol. 2(12), 1848\u20131853 (2013)","journal-title":"Int. J. Eng. Res. Technol."},{"key":"2808_CR37","unstructured":"KDD data set, \n                    http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html\n                    \n                   (1999)"},{"key":"2808_CR38","unstructured":"The CAIDA: \u201cDDoS Attack 2007\u201d. Dataset Paul Hick, Emile Aben, kc claffy, Josh Polterock. \n                    http:\/\/www.caida.org\/data\/passive\/ddos-20070804dataset.xml\n                    \n                   (2007)"},{"key":"2808_CR39","unstructured":"CAIDA UCSD Network telescope: \u201cThree days of conficker\u201d\u2014November 2008, Paul Hick, Emile Aben, Dan Andersen, kc claffy. \n                    www.caida.org\/data\/passive\/telescope-3days-conficker_dataset.xml\n                    \n                   (2008)"},{"key":"2808_CR40","doi-asserted-by":"crossref","unstructured":"Sommer, R., Paxson, V.: Outside the closed world: On using machine learning for network intrusion detection. In: 2010 IEEE Symposium on Security and Privacy (SP), 16 May 2010, pp. 305\u2013316. IEEE, Los Alamitos (2010)","DOI":"10.1109\/SP.2010.25"},{"issue":"3","key":"2808_CR41","first-page":"383","volume":"19","author":"S Behal","year":"2017","unstructured":"Behal, S., Kumar, K.: Characterization and comparison of DDoS attack tools and traffic generators: a review. Int. J. Netw. Security 19(3), 383\u2013393 (2017)","journal-title":"Int. J. Netw. Security"},{"key":"2808_CR42","doi-asserted-by":"crossref","unstructured":"Kiran, S., Mohapatra, A., Swamy, R.: Experiences in performance testing of web applications with Unified Authentication platform using Jmeter. In: 2015 International Symposium on Technology Management and Emerging Technologies (ISTMET), 25 August 2015, pp. 74\u201378. IEEE, Los Alamitos (2015)","DOI":"10.1109\/ISTMET.2015.7359004"},{"key":"2808_CR43","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1007\/978-81-322-2638-3_76","volume-title":"Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing","author":"Omkar P. Badve","year":"2016","unstructured":"Badve, O.P., Gupta, B.B.: Taxonomy of recent DDoS attack prevention, detection, and response schemes in cloud environment. In: Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing 2016, pp. 683\u2013693. Springer, New Delhi"},{"issue":"2","key":"2808_CR44","first-page":"1","volume":"2017","author":"B Jia","year":"2017","unstructured":"Jia, B., Huang, X., Liu, R., Ma, Y.: A DDoS attack detection method based on hybrid heterogeneous multiclassifier ensemble learning. J. Electr. Comput. Eng. 2017(2), 1\u20139 (2017)","journal-title":"J. Electr. Comput. Eng."},{"issue":"1","key":"2808_CR45","first-page":"37","volume":"2","author":"DM Powers","year":"2011","unstructured":"Powers, D.M.: Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation. J. Mach. Learn. Technol. 2(1), 37\u201363 (2011)","journal-title":"J. Mach. Learn. Technol."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-018-2808-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-018-2808-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-018-2808-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T00:42:28Z","timestamp":1557794548000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-018-2808-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,14]]},"references-count":45,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["2808"],"URL":"https:\/\/doi.org\/10.1007\/s10586-018-2808-5","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,14]]},"assertion":[{"value":"21 September 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 March 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 April 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 May 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}