{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T18:32:43Z","timestamp":1777401163431,"version":"3.51.4"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T00:00:00Z","timestamp":1659484800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T00:00:00Z","timestamp":1659484800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s10586-022-03666-4","type":"journal-article","created":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T11:03:19Z","timestamp":1659524599000},"page":"1461-1477","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["TFAD: TCP flooding attack detection in software-defined networking using proxy-based and machine learning-based mechanisms"],"prefix":"10.1007","volume":"26","author":[{"given":"K. Muthamil","family":"Sudar","sequence":"first","affiliation":[]},{"given":"P.","family":"Deepalakshmi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5974-0415","authenticated-orcid":false,"given":"Ashish","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Parvathaneni Naga","family":"Srinivasu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,3]]},"reference":[{"issue":"1","key":"3666_CR1","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/JPROC.2014.2371999","volume":"103","author":"D Kreutz","year":"2014","unstructured":"Kreutz, D., Ramos, F.M., Verissimo, P.E., Rothenberg, C.E., Azodolmolky, S., Uhlig, S.: Software-defined networking: a comprehensive survey. Proc. IEEE 103(1), 14\u201376 (2014)","journal-title":"Proc. IEEE"},{"issue":"2","key":"3666_CR2","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/s13369-017-2414-5","volume":"42","author":"NZ Bawany","year":"2017","unstructured":"Bawany, N.Z., Shamsi, J.A., Salah, K.: DDoS attack detection and mitigation using SDN: methods, practices, and solutions. Arab. J. Sci. Eng. 42(2), 425\u2013441 (2017)","journal-title":"Arab. J. Sci. Eng."},{"key":"3666_CR3","unstructured":"Netscout Threat report on DDoS attacks. https:\/\/www.netscout.com\/threatreport. accessed 24 Feb 2022"},{"key":"3666_CR4","unstructured":"Akamai Internet Security DDoS Atatack report. https:\/\/www.akamai.com\/us\/en\/resources\/our-thinking\/state-of-the-internet-report\/global-state-of-the-internet-security-ddos-attack-reports.jsp? accessed 24 Feb 2022"},{"key":"3666_CR5","unstructured":"Radware security solutions DDOS attckreport. https:\/\/www.radware.com\/solutions\/security\/ accessed 02 June 2021"},{"key":"3666_CR6","doi-asserted-by":"publisher","first-page":"3477","DOI":"10.1007\/s11227-021-03871-9","volume":"78","author":"A Javadpour","year":"2022","unstructured":"Javadpour, A., Wang, G.: cTMvSDN: improving resource management using combination of Markov-process and TDMA in software-defined networking. J. Supercomput. 78, 3477\u20133499 (2022). https:\/\/doi.org\/10.1007\/s11227-021-03871-9","journal-title":"J. Supercomput."},{"key":"3666_CR7","doi-asserted-by":"publisher","first-page":"2471","DOI":"10.1007\/s11277-020-07691-7","volume":"115","author":"A Javadpour","year":"2020","unstructured":"Javadpour, A., Wang, G., Rezaei, S.: Resource management in a peer to peer cloud network for IoT. Wirel. Pers. Commun. 115, 2471\u20132488 (2020). https:\/\/doi.org\/10.1007\/s11277-020-07691-7","journal-title":"Wirel. Pers. Commun."},{"issue":"1\u20133","key":"3666_CR8","first-page":"15","volume":"7","author":"KM Sudar","year":"2020","unstructured":"Sudar, K.M., Deepalakshmi, P.: Comparative study on IDS using machine learning approaches for software defined networks. Int. J. Intell. Enterp. 7(1\u20133), 15\u201327 (2020)","journal-title":"Int. J. Intell. Enterp."},{"issue":"1","key":"3666_CR9","doi-asserted-by":"publisher","first-page":"745","DOI":"10.1109\/TNSM.2020.3037124","volume":"18","author":"N Ravi","year":"2020","unstructured":"Ravi, N., Shalinie, S.M., Lal, C., Conti, M.: AEGIS: detection and mitigation of TCP SYN flood on SDN controller. IEEE Trans. Netw. Serv. Manage. 18(1), 745\u2013759 (2020)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"3666_CR10","doi-asserted-by":"publisher","first-page":"1057","DOI":"10.1007\/s11277-019-06773-5","volume":"110","author":"A Javadpour","year":"2020","unstructured":"Javadpour, A.: Providing a way to create balance between reliability and delays in SDN networks by using the appropriate placement of controllers. Wirel. Pers. Commun. 110, 1057\u20131071 (2020). https:\/\/doi.org\/10.1007\/s11277-019-06773-5","journal-title":"Wirel. Pers. Commun."},{"key":"3666_CR11","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1007\/s11277-020-07591-w","volume":"115","author":"SM Mirmohseni","year":"2020","unstructured":"Mirmohseni, S.M., Tang, C., Javadpour, A.: Using Markov learning utilization model for resource allocation in cloud of thing network. Wirel. Pers. Commun. 115, 653\u2013677 (2020). https:\/\/doi.org\/10.1007\/s11277-020-07591-w","journal-title":"Wirel. Pers. Commun."},{"key":"3666_CR12","first-page":"6036","volume":"5","author":"A Sahi","year":"2017","unstructured":"Sahi, A., Lai, D., Li, Y., Diykh, M.: An efficient DDoS TCP flood attack detection and prevention system in a cloud environment. IEEE Access 5, 6036\u20136048 (2017)","journal-title":"IEEE Access"},{"key":"3666_CR13","unstructured":"Scapy-Packet Crafting Tool. https:\/\/scapy.net\/ accessed 24 Feb 2022"},{"issue":"4","key":"3666_CR14","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1093\/comjnl\/bxy117","volume":"62","author":"VT Dang","year":"2019","unstructured":"Dang, V.T., Huong, T.T., Thanh, N.H., Nam, P.N., Thanh, N.N., Marshall, A.: SDN-based SYN Proxy-a solution to enhance performance of attack mitigation under TCP SYN flood. Comput. J. 62(4), 518\u2013534 (2019)","journal-title":"Comput. J."},{"issue":"4","key":"3666_CR15","doi-asserted-by":"publisher","first-page":"1545","DOI":"10.1109\/TNSM.2018.2861741","volume":"15","author":"P Kumar","year":"2018","unstructured":"Kumar, P., Tripathi, M., Nehra, A., Conti, M., Lal, C.: SAFETY: early detection and mitigation of TCP SYN flood utilizing entropy in SDN. IEEE Trans. Netw. Serv. Manage. 15(4), 1545\u20131559 (2018)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"3666_CR16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3233\/JHS-200625","volume":"26","author":"KM Sudar","year":"2020","unstructured":"Sudar, K.M., Deepalakshmi, P.: A two level security mechanism to detect a DDoS flooding attack in software-defined networks using entropy-based and C4.5 technique. J. High Speed Netw. 26, 1\u201322 (2020)","journal-title":"J. High Speed Netw."},{"key":"3666_CR17","doi-asserted-by":"crossref","unstructured":"Oo, N.H., Maw, A.H.: Effective detection and mitigation of SYN flooding attack in SDN. In: 2019 19th International Symposium on Communications and Information Technologies (ISCIT) (pp. 300\u2013305). IEEE (2019, September)","DOI":"10.1109\/ISCIT.2019.8905209"},{"issue":"4","key":"3666_CR18","doi-asserted-by":"publisher","first-page":"688","DOI":"10.1109\/LCOMM.2017.2766636","volume":"22","author":"K Hong","year":"2017","unstructured":"Hong, K., Kim, Y., Choi, H., Park, J.: SDN-assisted slow HTTP DDoS attack defense method. IEEE Commun. Lett. 22(4), 688\u2013691 (2017)","journal-title":"IEEE Commun. Lett."},{"key":"3666_CR19","first-page":"27","volume":"16","author":"K Hussain","year":"2016","unstructured":"Hussain, K., Syed Jawad, H., Veena, D., Muhammad, N., Muhammad Awai, A.: An adaptive SYN flooding attack mitigation in DDOS environment. Int. J. Comput. Sci. Netw. Security (IJCSNS) 16, 27\u201333 (2016)","journal-title":"Int. J. Comput. Sci. Netw. Security (IJCSNS)"},{"key":"3666_CR20","doi-asserted-by":"crossref","unstructured":"Haris, S.H.C., Ahmad, R.B., Ghan, M.A.H.A.: Detecting TCP SYN flood attack based on anomaly detectin. In: Network Applications Protocols and Services (NETAPPS), 2010 Second International Conference on IEEE, pp. 240\u2013244 (2010)","DOI":"10.1109\/NETAPPS.2010.50"},{"key":"3666_CR21","first-page":"1","volume":"975","author":"K Pai","year":"2014","unstructured":"Pai, K., Bha, A.: Detection and performance evaluation of DoS\/DDoS attacks using SYN flooding attacks. Int. J. Comput. Appl. 975, 1\u20134 (2014)","journal-title":"Int. J. Comput. Appl."},{"key":"3666_CR22","doi-asserted-by":"crossref","unstructured":"Divakaran, D.M., Murthy, H.A., Gonsalves, T.A.: Detection of SYN flooding attacks using linear prediction analysis. In 2006 14th IEEE International Conference on Networks (Vol. 1, pp. 1\u20136). IEEE (2006, September)","DOI":"10.1109\/ICON.2006.302563"},{"issue":"2","key":"3666_CR23","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1109\/TNSM.2017.2701549","volume":"14","author":"R Mohammadi","year":"2017","unstructured":"Mohammadi, R., Javidan, R., Conti, M.: Slicots: an SDN-based lightweight countermeasure for TCPSYN flooding attacks. IEEE Trans. Netw. Serv. Manage. 14(2), 487\u2013497 (2017)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"3666_CR24","doi-asserted-by":"crossref","unstructured":"Chen, K.Y., Junuthula, A.R., Siddhrau, I.K., Xu, Y., Chao, H.J.: SDNShield: towards more comprehensive defense against DDoS attacks on SDN control plane. In: IEEE Conference on Communications and Network Security (CNS), pp. 28\u201336 (2016)","DOI":"10.1109\/CNS.2016.7860467"},{"issue":"3","key":"3666_CR25","doi-asserted-by":"publisher","first-page":"413","DOI":"10.3390\/electronics9030413","volume":"9","author":"NN Tuan","year":"2020","unstructured":"Tuan, N.N., Hung, P.H., Nghia, N.D., Tho, N.V., Phan, T.V., Thanh, N.H.: A DDoS attack mitigation scheme in ISP networks using machine learning based on SDN. Electronics 9(3), 413 (2020)","journal-title":"Electronics"},{"key":"3666_CR26","first-page":"1","volume":"84","author":"R Swami","year":"2021","unstructured":"Swami, R., Dave, M., Ranga, V.: Detection and analysis of TCP-SYN DDoS attack in software-defined networking. Wirel. Pers. Commun. 84, 1\u201323 (2021)","journal-title":"Wirel. Pers. Commun."},{"key":"3666_CR27","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/j.future.2019.02.037","volume":"97","author":"J Cui","year":"2019","unstructured":"Cui, J., Wang, M., Luo, Y., Zhong, H.: DDoS detection and defense mechanism based on cognitive-inspired computing in SDN. Futur. Gener. Comput. Syst. 97, 275\u2013283 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"3666_CR28","unstructured":"Mininet Team Mininet: An instant virtual network on your laptop (or other PC). http:\/\/mininet.org\/ accessed 24 Feb 2022"},{"key":"3666_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2019.200892","volume":"32","author":"LF Sikos","year":"2020","unstructured":"Sikos, L.F.: Packet analysis for network forensics: a comprehensive survey. Forensic Sci. Int. 32, 200892 (2020). https:\/\/doi.org\/10.1016\/j.fsidi.2019.200892","journal-title":"Forensic Sci. Int."},{"key":"3666_CR30","unstructured":"BONESI A Network Stress Testing Application. https:\/\/github.com\/Markus-Go\/bonesi\/ accessed 24 Feb 2022"},{"key":"3666_CR31","unstructured":"Wireshark-Network Packet Analyzer tool. https:\/\/www.wireshark.org\/ accessed 24 Feb 2022"},{"key":"3666_CR32","unstructured":"CAIDA 2007 Dataset. https:\/\/www.caida.org\/data\/passive\/ddos-20070804_dataset.xmlaccessed 24 Feb 2022"},{"issue":"1","key":"3666_CR33","first-page":"59","volume":"15","author":"I Sreeram","year":"2019","unstructured":"Sreeram, I., Vuppala, V.P.K.: HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm. Appl. Comput. Inf. 15(1), 59\u201366 (2019)","journal-title":"Appl. Comput. Inf."},{"issue":"3","key":"3666_CR34","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1007\/s12083-016-0507-7","volume":"10","author":"VK Sharma","year":"2017","unstructured":"Sharma, V.K., Kumar, M.: Adaptive congestion control scheme in mobile ad-hoc networks. Peer-to-Peer Netw. Appl. 10(3), 633\u2013657 (2017)","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"3666_CR35","doi-asserted-by":"crossref","unstructured":"Hu, D., Hong, P., Chen, Y.: FADM: DDoS flooding attack detection and mitigation system in software-defined networking. In GLOBECOM 2017-2017 IEEE Global Communications Conference (pp. 1\u20137). IEEE (2017)","DOI":"10.1109\/GLOCOM.2017.8254023"},{"key":"3666_CR36","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1016\/j.future.2019.03.013","volume":"97","author":"VK Sharma","year":"2019","unstructured":"Sharma, V.K., Verma, L.P., Kumar, M.: CL-ADSP: cross-Layer adaptive data scheduling policy in mobile ad-hoc networks. Futur. Gener. Comput. Syst. 97, 530\u2013563 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"3666_CR37","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/j.comcom.2020.04.047","volume":"158","author":"VK Sharma","year":"2020","unstructured":"Sharma, V.K., Verma, L.P., Kumar, M., Naha, R.K., Mahanti, A.: A-CAFDSP: an adaptive-congestion aware Fibonacci sequence based data scheduling policy. Comput. Commun. 158, 141\u2013165 (2020)","journal-title":"Comput. Commun."},{"issue":"6","key":"3666_CR38","doi-asserted-by":"publisher","first-page":"1980","DOI":"10.3390\/s21061980","volume":"21","author":"FH Hsu","year":"2021","unstructured":"Hsu, F.H., Lee, C.H., Wang, C.Y., Hung, R.Y., Zhuang, Y.: DDoS flood and destination service changing sensor. Sensors 21(6), 1980 (2021)","journal-title":"Sensors"},{"issue":"12","key":"3666_CR39","doi-asserted-by":"publisher","first-page":"1437","DOI":"10.3390\/electronics10121437","volume":"10","author":"PN Srinivasu","year":"2021","unstructured":"Srinivasu, P.N., Bhoi, A.K., Nayak, S.R., Bhutta, M.R., Wo\u017aniak, M.: Blockchain technology for secured healthcare data communication among the non-terminal nodes in IoT architecture in 5G network. Electronics 10(12), 1437 (2021)","journal-title":"Electronics"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-022-03666-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-022-03666-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-022-03666-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T01:23:39Z","timestamp":1679880219000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-022-03666-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,3]]},"references-count":39,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["3666"],"URL":"https:\/\/doi.org\/10.1007\/s10586-022-03666-4","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,3]]},"assertion":[{"value":"10 January 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 May 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 June 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 August 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest."}},{"value":"We did not use animals and Human participants in the study reported in this work","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"For this type of study informed consent is not required.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"For this type of study consent for publication is not required.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}