{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T20:04:34Z","timestamp":1765051474481,"version":"3.46.0"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T00:00:00Z","timestamp":1759968000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T00:00:00Z","timestamp":1759968000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s10586-025-05671-9","type":"journal-article","created":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:10:19Z","timestamp":1760033419000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Detecting application layer DDoS attacks with RSPF: A hybrid ensemble learning approach"],"prefix":"10.1007","volume":"28","author":[{"given":"Amardeep","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Danish Ali","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Ruhul","family":"Amin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,9]]},"reference":[{"key":"5671_CR1","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.comnet.2019.04.027","volume":"158","author":"S Hosseini","year":"2019","unstructured":"Hosseini, S., Azizi, M.: The hybrid technique for ddos detection with supervised learning algorithms. Comput. Netw. 158, 35\u201345 (2019)","journal-title":"Comput. Netw."},{"key":"5671_CR2","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.jisa.2017.09.004","volume":"36","author":"KJ Singh","year":"2017","unstructured":"Singh, K.J., De, T.: Mlp-ga based algorithm to detect application layer ddos attack. Journal of information security and applications 36, 145\u2013153 (2017)","journal-title":"Journal of information security and applications"},{"key":"5671_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100332","volume":"39","author":"A Bhardwaj","year":"2021","unstructured":"Bhardwaj, A., Mangat, V., Vig, R., Halder, S., Conti, M.: Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions. Computer Science Review 39, 100332 (2021)","journal-title":"Computer Science Review"},{"issue":"4","key":"5671_CR4","doi-asserted-by":"publisher","first-page":"1690","DOI":"10.1016\/j.eswa.2013.08.066","volume":"41","author":"G Kim","year":"2014","unstructured":"Kim, G., Lee, S., Kim, S.: A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Syst. Appl. 41(4), 1690\u20131700 (2014)","journal-title":"Expert Syst. Appl."},{"key":"5671_CR5","doi-asserted-by":"publisher","first-page":"107792","DOI":"10.1016\/j.comnet.2020.107792","volume":"186","author":"V Miranda Rios","year":"2021","unstructured":"Miranda Rios, V., In\u00e1cio, P.R., Magoni, D., Freire, M.M.: Detection of reduction-of-quality ddos attacks using fuzzy logic and machine learning algorithms. Comput. Netw. 186, 107792 (2021)","journal-title":"Comput. Netw."},{"key":"5671_CR6","doi-asserted-by":"crossref","unstructured":"Roopak, M., Tian, G.Y., Chambers, J.: An intrusion detection system against ddos attacks in iot networks. In: 2020 10th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0562\u20130567 . IEEE (2020)","DOI":"10.1109\/CCWC47524.2020.9031206"},{"key":"5671_CR7","doi-asserted-by":"publisher","first-page":"80813","DOI":"10.1109\/ACCESS.2019.2922196","volume":"7","author":"S Dong","year":"2019","unstructured":"Dong, S., Abbas, K., Jain, R.: A survey on distributed denial of service (ddos) attacks in sdn and cloud computing environments. IEEE Access 7, 80813\u201380828 (2019)","journal-title":"IEEE Access"},{"issue":"1","key":"5671_CR8","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.jksuci.2017.07.004","volume":"32","author":"KM Prasad","year":"2020","unstructured":"Prasad, K.M., Reddy, A.R.M., Rao, K.V.: Bartd: Bio-inspired anomaly based real time detection of under rated app-ddos attack on web. Journal of King Saud University - Computer and Information Sciences 32(1), 73\u201387 (2020). https:\/\/doi.org\/10.1016\/j.jksuci.2017.07.004","journal-title":"Journal of King Saud University - Computer and Information Sciences"},{"issue":"1","key":"5671_CR9","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1109\/SURV.2013.052213.00046","volume":"16","author":"MH Bhuyan","year":"2013","unstructured":"Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Network anomaly detection: methods, systems and tools. Ieee communications surveys & tutorials 16(1), 303\u2013336 (2013)","journal-title":"Ieee communications surveys & tutorials"},{"issue":"2","key":"5671_CR10","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2015","unstructured":"Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications surveys & tutorials 18(2), 1153\u20131176 (2015)","journal-title":"IEEE Communications surveys & tutorials"},{"issue":"1","key":"5671_CR11","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1186\/s40537-023-00699-3","volume":"10","author":"C Kemp","year":"2023","unstructured":"Kemp, C., Calvert, C., Khoshgoftaar, T.M., Leevy, J.L.: An approach to application-layer dos detection. Journal of Big Data 10(1), 22 (2023)","journal-title":"Journal of Big Data"},{"key":"5671_CR12","doi-asserted-by":"publisher","first-page":"59353","DOI":"10.1109\/ACCESS.2021.3073408","volume":"9","author":"N Mishra","year":"2021","unstructured":"Mishra, N., Pandya, S.: Internet of things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review. IEEE Access 9, 59353\u201359377 (2021)","journal-title":"IEEE Access"},{"key":"5671_CR13","doi-asserted-by":"publisher","first-page":"108495","DOI":"10.1109\/ACCESS.2021.3101650","volume":"9","author":"NM Yungaicela-Naula","year":"2021","unstructured":"Yungaicela-Naula, N.M., Vargas-Rosales, C., Perez-Diaz, J.A.: Sdn-based architecture for transport and application layer ddos attack detection by using machine and deep learning. IEEE Access 9, 108495\u2013108512 (2021)","journal-title":"IEEE Access"},{"key":"5671_CR14","doi-asserted-by":"crossref","unstructured":"Nanda, S., Zafari, F., DeCusatis, C., Wedaa, E., Yang, B.: Predicting network attack patterns in sdn using machine learning approach. In: 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), pp. 167\u2013172 . IEEE (2016)","DOI":"10.1109\/NFV-SDN.2016.7919493"},{"issue":"1","key":"5671_CR15","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1109\/COMST.2018.2870658","volume":"21","author":"A Praseed","year":"2018","unstructured":"Praseed, A., Thilagam, P.S.: Ddos attacks at the application layer: Challenges and research perspectives for safeguarding web applications. IEEE Communications Surveys & Tutorials 21(1), 661\u2013685 (2018)","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"27","key":"5671_CR16","doi-asserted-by":"publisher","first-page":"7334","DOI":"10.1002\/cpe.7334","volume":"34","author":"S Sokkalingam","year":"2022","unstructured":"Sokkalingam, S., Ramakrishnan, R.: An intelligent intrusion detection system for distributed denial of service attacks: A support vector machine with hybrid optimization algorithm based approach. Concurrency and Computation: Practice and Experience 34(27), 7334 (2022)","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"5671_CR17","unstructured":"Sumathi, S., Rajesh, R., Karthikeyan, N.: Ddos attack detection using hybrid machine learning based ids models. Journal of Scientific and Industrial Research (2022)"},{"key":"5671_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101645","volume":"88","author":"M Wang","year":"2020","unstructured":"Wang, M., Lu, Y., Qin, J.: A dynamic mlp-based ddos attack detection method using feature selection and feedback. Computers & Security 88, 101645 (2020)","journal-title":"Computers & Security"},{"key":"5671_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.teler.2023.100053","volume":"10","author":"V Hnamte","year":"2023","unstructured":"Hnamte, V., Hussain, J.: Dcnnbilstm: An efficient hybrid deep learning-based intrusion detection system. Telematics and Informatics Reports 10, 100053 (2023)","journal-title":"Telematics and Informatics Reports"},{"issue":"1","key":"5671_CR20","first-page":"8530312","volume":"2022","author":"S Sumathi","year":"2022","unstructured":"Sumathi, S., Rajesh, R., Lim, S.: Recurrent and deep learning neural network models for ddos attack detection. Journal of Sensors 2022(1), 8530312 (2022)","journal-title":"Journal of Sensors"},{"key":"5671_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103661","volume":"138","author":"V Hnamte","year":"2024","unstructured":"Hnamte, V., Najar, A.A., Nhung-Nguyen, H., Hussain, J., Sugali, M.N.: Ddos attack detection and mitigation using deep neural network in sdn environment. Computers & Security 138, 103661 (2024)","journal-title":"Computers & Security"},{"issue":"1","key":"5671_CR22","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1109\/JSYST.2019.2906120","volume":"14","author":"H Li","year":"2019","unstructured":"Li, H., Zhou, S., Yuan, W., Li, J., Leung, H.: Adversarial-example attacks toward android malware detection system. IEEE Syst. J. 14(1), 653\u2013656 (2019)","journal-title":"IEEE Syst. J."},{"key":"5671_CR23","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/j.future.2021.06.047","volume":"125","author":"MP Novaes","year":"2021","unstructured":"Novaes, M.P., Carvalho, L.F., Lloret, J., Proen\u00e7a, M.L., Jr.: Adversarial deep learning approach detection and defense against ddos attacks in sdn environments. Future Generation Computer Systems 125, 156\u2013167 (2021)","journal-title":"Future Generation Computer Systems"},{"key":"5671_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114520","volume":"169","author":"AE Cil","year":"2021","unstructured":"Cil, A.E., Yildiz, K., Buldu, A.: Detection of ddos attacks with feed forward based deep neural network model. Expert Systems with Applications 169, 114520 (2021)","journal-title":"Expert Systems with Applications"},{"key":"5671_CR25","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.future.2020.03.049","volume":"110","author":"S Velliangiri","year":"2020","unstructured":"Velliangiri, S., Pandey, H.M.: Fuzzy-taylor-elephant herd optimization inspired deep belief network for ddos attack detection and comparison with state-of-the-arts algorithms. Futur. Gener. Comput. Syst. 110, 80\u201390 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"5671_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.112052","volume":"299","author":"S Kumar","year":"2024","unstructured":"Kumar, S., Keshri, A.: An effective ddos attack mitigation strategy for iot using an optimization-based adaptive security model. Knowledge-Based Systems 299, 112052 (2024)","journal-title":"Knowledge-Based Systems"},{"issue":"1","key":"5671_CR27","doi-asserted-by":"publisher","first-page":"9855022","DOI":"10.1155\/2022\/9855022","volume":"2022","author":"A Agrawal","year":"2022","unstructured":"Agrawal, A., Singh, R., Khari, M., Vimal, S., Lim, S.: Autoencoder for design of mitigation model for ddos attacks via m-dbnn. Wirel. Commun. Mob. Comput. 2022(1), 9855022 (2022)","journal-title":"Wirel. Commun. Mob. Comput."},{"issue":"2","key":"5671_CR28","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/s10586-024-04744-5","volume":"28","author":"AA Najar","year":"2025","unstructured":"Najar, A.A., Manohar Naik, S.: Ae-ciam: a hybrid ai-enabled framework for low-rate ddos attack detection in cloud computing. Clust. Comput. 28(2), 103 (2025)","journal-title":"Clust. Comput."},{"issue":"24","key":"5671_CR29","doi-asserted-by":"publisher","first-page":"8264","DOI":"10.1002\/cpe.8264","volume":"36","author":"S Sumathi","year":"2024","unstructured":"Sumathi, S., Rajesh, R.: Hybgbs: A hybrid neural network and grey wolf optimizer for intrusion detection in a cloud computing environment. Concurrency and Computation: Practice and Experience 36(24), 8264 (2024)","journal-title":"Concurrency and Computation: Practice and Experience"},{"issue":"8","key":"5671_CR30","doi-asserted-by":"publisher","first-page":"240","DOI":"10.3390\/fi14080240","volume":"14","author":"AL Yaser","year":"2022","unstructured":"Yaser, A.L., Mousa, H.M., Hussein, M.: Improved ddos detection utilizing deep neural networks and feedforward neural networks as autoencoder. Future Internet 14(8), 240 (2022)","journal-title":"Future Internet"},{"issue":"4","key":"5671_CR31","doi-asserted-by":"publisher","DOI":"10.3390\/app13042276","volume":"13","author":"S Alzughaibi","year":"2023","unstructured":"Alzughaibi, S., El Khediri, S.: A cloud intrusion detection systems based on dnn using backpropagation and pso on the cse-cic-ids2018 dataset. Applied Sciences 13(4), 2276 (2023)","journal-title":"Applied Sciences"},{"key":"5671_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.teler.2025.100211","volume":"18","author":"AA Najar","year":"2025","unstructured":"Najar, A.A., Naik, Manohar S..: Ddos attack detection using cnn-bilstm with attention mechanism. Telematics and Informatics Reports 18, 100211 (2025)","journal-title":"Telematics and Informatics Reports"},{"key":"5671_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103445","volume":"74","author":"US Chanu","year":"2023","unstructured":"Chanu, U.S., Singh, K.J., Chanu, Y.J.: A dynamic feature selection technique to detect ddos attack. Journal Of Information Security And Applications 74, 103445 (2023)","journal-title":"Journal Of Information Security And Applications"},{"issue":"43","key":"5671_CR34","doi-asserted-by":"publisher","first-page":"3890","DOI":"10.17485\/IJST\/v16i43.1718","volume":"16","author":"S Sumathi","year":"2023","unstructured":"Sumathi, S., Rajesh, R.: A dynamic bpn-mlp neural network ddos detection model using hybrid swarm intelligent framework. Indian J. Sci. Technol. 16(43), 3890\u20133904 (2023)","journal-title":"Indian J. Sci. Technol."},{"key":"5671_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103661","volume":"138","author":"V Hnamte","year":"2024","unstructured":"Hnamte, V., Najar, A.A., Nhung-Nguyen, H., Hussain, J., Sugali, M.N.: Ddos attack detection and mitigation using deep neural network in sdn environment. Comput. Secur. 138, 103661 (2024)","journal-title":"Comput. Secur."},{"issue":"2","key":"5671_CR36","first-page":"256","volume":"6","author":"TR Patil","year":"2013","unstructured":"Patil, T.R., Sherekar, S.S.: Performance analysis of naive bayes and j48 classification algorithm for data classification. Int. J. Comput. Sci. Appl. 6(2), 256\u2013261 (2013)","journal-title":"Int. J. Comput. Sci. Appl."},{"key":"5671_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.105361","volume":"192","author":"S Chen","year":"2020","unstructured":"Chen, S., Webb, G.I., Liu, L., Ma, X.: A novel selective na\u00efve bayes algorithm. Knowledge-Based Systems 192, 105361 (2020)","journal-title":"Knowledge-Based Systems"},{"key":"5671_CR38","unstructured":"Hassanat, A.B., Abbadi, M.A., Altarawneh, G.A., Alhasanat, A.A.: Solving the problem of the k parameter in the knn classifier using an ensemble learning approach. arXiv preprint arXiv:1409.0919 (2014)"},{"issue":"01","key":"5671_CR39","doi-asserted-by":"publisher","first-page":"20","DOI":"10.38094\/jastt20165","volume":"2","author":"B Charbuty","year":"2021","unstructured":"Charbuty, B., Abdulazeez, A.: Classification based on decision tree algorithm for machine learning. Journal of Applied Science and Technology Trends 2(01), 20\u201328 (2021)","journal-title":"Journal of Applied Science and Technology Trends"},{"issue":"4","key":"5671_CR40","doi-asserted-by":"publisher","first-page":"5114","DOI":"10.1002\/cpe.5114","volume":"32","author":"E Fenil","year":"2020","unstructured":"Fenil, E., Mohan Kumar, P.: Survey on ddos defense mechanisms. Concurrency and Computation: Practice and Experience 32(4), 5114 (2020)","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"5671_CR41","doi-asserted-by":"crossref","unstructured":"Suthaharan, S., Suthaharan, S.: Support vector machine. Machine learning models and algorithms for big data classification: thinking with examples for effective learning, 207\u2013235 (2016)","DOI":"10.1007\/978-1-4899-7641-3_9"},{"key":"5671_CR42","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/B978-0-12-815739-8.00006-7","volume-title":"Machine Learning","author":"DA Pisner","year":"2020","unstructured":"Pisner, D.A., Schnyer, D.M.: Support vector machine. In: Arbib, M.R. (ed.) Machine Learning, pp. 101\u2013121. Elsevier, Amsterdam (2020)"},{"key":"5671_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102532","volume":"53","author":"GS Kushwah","year":"2020","unstructured":"Kushwah, G.S., Ranga, V.: Voting extreme learning machine based distributed denial of service attack detection in cloud computing. Journal of Information Security and Applications 53, 102532 (2020)","journal-title":"Journal of Information Security and Applications"},{"issue":"2","key":"5671_CR44","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.icte.2020.08.005","volume":"7","author":"N Muraleedharan","year":"2021","unstructured":"Muraleedharan, N., Janet, B.: A deep learning based http slow dos classification approach using flow data. ICT Express 7(2), 210\u2013214 (2021)","journal-title":"ICT Express"},{"key":"5671_CR45","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.comcom.2019.09.014","volume":"148","author":"P Krishnan","year":"2019","unstructured":"Krishnan, P., Duttagupta, S., Achuthan, K.: Varman: Multi-plane security framework for software defined networks. Comput. Commun. 148, 215\u2013239 (2019)","journal-title":"Comput. Commun."},{"key":"5671_CR46","doi-asserted-by":"publisher","first-page":"37131","DOI":"10.1109\/ACCESS.2023.3266979","volume":"11","author":"V Hnamte","year":"2023","unstructured":"Hnamte, V., Nhung-Nguyen, H., Hussain, J., Hwa-Kim, Y.: A novel two-stage deep learning model for network intrusion detection: Lstm-ae. Ieee Access 11, 37131\u201337148 (2023)","journal-title":"Ieee Access"},{"key":"5671_CR47","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1016\/j.inffus.2022.09.026","volume":"90","author":"A Thakkar","year":"2023","unstructured":"Thakkar, A., Lohiya, R.: Fusion of statistical importance for feature selection in deep neural network-based intrusion detection system. Information Fusion 90, 353\u2013363 (2023)","journal-title":"Information Fusion"},{"key":"5671_CR48","doi-asserted-by":"crossref","unstructured":"Zhu, M., Ye, K., Xu, C.-Z.: Network anomaly detection and identification based on deep learning methods. In: Cloud Computing\u2013CLOUD 2018: 11th International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25\u201330, 2018, Proceedings 11, pp. 219\u2013234 . Springer (2018)","DOI":"10.1007\/978-3-319-94295-7_15"},{"key":"5671_CR49","unstructured":"Buldu, A.: Detection of ddos attacks with feed forward based deep neural network model (2021)"},{"key":"5671_CR50","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103160","volume":"191","author":"MS ElSayed","year":"2021","unstructured":"ElSayed, M.S., Le-Khac, N.-A., Albahar, M.A., Jurcut, A.: A novel hybrid model for intrusion detection systems in sdns based on cnn and a new regularization technique. Journal of Network and Computer Applications 191, 103160 (2021)","journal-title":"Journal of Network and Computer Applications"},{"key":"5671_CR51","doi-asserted-by":"publisher","first-page":"970","DOI":"10.1016\/j.procs.2018.10.337","volume":"143","author":"MZ Hasan","year":"2018","unstructured":"Hasan, M.Z., Hasan, K.Z., Sattar, A.: Burst header packet flood detection in optical burst switching network using deep learning model. Procedia computer science 143, 970\u2013977 (2018)","journal-title":"Procedia computer science"},{"key":"5671_CR52","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100709","volume":"22","author":"A El-Ghamry","year":"2023","unstructured":"El-Ghamry, A., Darwish, A., Hassanien, A.E.: An optimized cnn-based intrusion detection system for reducing risks in smart farming. Internet of Things 22, 100709 (2023)","journal-title":"Internet of Things"},{"issue":"4","key":"5671_CR53","doi-asserted-by":"publisher","first-page":"2322","DOI":"10.11591\/eei.v11i4.3835","volume":"11","author":"H Kamel","year":"2022","unstructured":"Kamel, H., Abdullah, M.Z.: Distributed denial of service attacks detection for software defined networks based on evolutionary decision tree model. Bulletin of Electrical Engineering and Informatics 11(4), 2322\u20132330 (2022)","journal-title":"Bulletin of Electrical Engineering and Informatics"},{"key":"5671_CR54","doi-asserted-by":"crossref","unstructured":"Wu, C.-s., Chen, S.: A heuristic intrusion detection approach using deep learning model. In: 2023 International Conference on Information Networking (ICOIN), pp. 438\u2013442 . IEEE (2023)","DOI":"10.1109\/ICOIN56518.2023.10049024"},{"key":"5671_CR55","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103108","volume":"187","author":"N Ahuja","year":"2021","unstructured":"Ahuja, N., Singal, G., Mukhopadhyay, D., Kumar, N.: Automated ddos attack detection in software defined networking. Journal of Network and Computer Applications 187, 103108 (2021)","journal-title":"Journal of Network and Computer Applications"},{"key":"5671_CR56","doi-asserted-by":"crossref","unstructured":"Sharma, B., Sharma, L., Lal, C.: Anomaly-based dnn model for intrusion detection in iot and model explanation: Explainable artificial intelligence. In: Proceedings of Second International Conference on Computational Electronics for Wireless Communications: ICCWC 2022, pp. 315\u2013324 . Springer (2023)","DOI":"10.1007\/978-981-19-6661-3_28"},{"issue":"3","key":"5671_CR57","doi-asserted-by":"publisher","first-page":"825","DOI":"10.1016\/j.jksuci.2019.04.010","volume":"34","author":"R Priyadarshini","year":"2022","unstructured":"Priyadarshini, R., Barik, R.K.: A deep learning based intelligent framework to mitigate ddos attack in fog environment. Journal of King Saud University-Computer and Information Sciences 34(3), 825\u2013831 (2022)","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"key":"5671_CR58","doi-asserted-by":"crossref","unstructured":"Alzahrani, S., Hong, L.: Detection of distributed denial of service (ddos) attacks using artificial intelligence on cloud. In: 2018 IEEE World Congress on Services (SERVICES), pp. 35\u201336 . IEEE (2018)","DOI":"10.1109\/SERVICES.2018.00031"},{"key":"5671_CR59","doi-asserted-by":"crossref","unstructured":"Hussain, J., Hnamte, V.: Deep learning based intrusion detection system: Software defined network. In: 2021 Asian Conference on Innovation in Technology (ASIANCON), pp. 1\u20136 . IEEE (2021)","DOI":"10.1109\/ASIANCON51346.2021.9544913"},{"key":"5671_CR60","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A.H., Hakak, S., Ghorbani, A.A.: Developing realistic distributed denial of service (ddos) attack dataset and taxonomy. In: 2019 International Carnahan Conference on Security Technology (ICCST), pp. 1\u20138. IEEE, Chennai, India (2019)","DOI":"10.1109\/CCST.2019.8888419"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05671-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05671-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05671-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T20:01:13Z","timestamp":1765051273000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05671-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,9]]},"references-count":60,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["5671"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05671-9","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2025,10,9]]},"assertion":[{"value":"24 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 June 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 October 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors of this work declare that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}},{"value":"This work does not involve any studies conducted with human participants or animals by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"990"}}