{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T10:38:55Z","timestamp":1766486335320,"version":"3.37.3"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,8,9]],"date-time":"2021-08-09T00:00:00Z","timestamp":1628467200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,9]],"date-time":"2021-08-09T00:00:00Z","timestamp":1628467200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Parallel Prog"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s10766-021-00715-0","type":"journal-article","created":{"date-parts":[[2021,8,9]],"date-time":"2021-08-09T12:45:19Z","timestamp":1628513119000},"page":"89-114","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Statistical Analysis Based Intrusion Detection System for Ultra-High-Speed Software Defined Network"],"prefix":"10.1007","volume":"50","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9614-3780","authenticated-orcid":false,"given":"Talha","family":"Naqash","sequence":"first","affiliation":[]},{"given":"Sajjad Hussain","family":"Shah","sequence":"additional","affiliation":[]},{"given":"Muhammad Najam Ul","family":"Islam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,9]]},"reference":[{"key":"715_CR1","doi-asserted-by":"publisher","first-page":"20255","DOI":"10.1109\/ACCESS.2018.2820092","volume":"6","author":"MH Ali","year":"2018","unstructured":"Ali, M.H., AlMohammed, B.A.D., Ismail, A., Zolkipli, M.F.: A new intrusion detection system based on fast learning network and particle swarm optimization. IEEE Access 6, 20255\u201320261 (2018)","journal-title":"IEEE Access"},{"key":"715_CR2","unstructured":"L Mitch, CBS News:Percentage of companies that report systems hacked Accessed on May 2019, Available at:https:\/\/www.cbsnews.com\/news\/percentage-of-companies-that-report-systems-hacked\/"},{"issue":"1","key":"715_CR3","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1109\/TSIPN.2018.2801622","volume":"4","author":"T Zhang","year":"2018","unstructured":"Zhang, T., Zhu, Q.: Distributed privacy-preserving collaborative intrusion detection systems for VANETs. IEEE Trans Signal Inf Process Over Net 4(1), 148\u2013161 (March 2018)","journal-title":"IEEE Trans Signal Inf Process Over Net"},{"issue":"2007","key":"715_CR4","first-page":"94","volume":"800","author":"K Scarfone","year":"2007","unstructured":"Scarfone, K., Mell, P.: Guide to intrusion detection and prevention systems (IDPS). NIST Spec. Publ. 800(2007), 94 (2007)","journal-title":"NIST Spec. Publ."},{"key":"715_CR5","doi-asserted-by":"publisher","first-page":"10179","DOI":"10.1109\/ACCESS.2018.2799854","volume":"6","author":"W Meng","year":"2018","unstructured":"Meng, W., Tischhauser, E.W., Wang, Q., Wang, Y., Han, J.: When intrusion detection meets blockchain technology: a review. IEEE Access 6, 10179\u201310188 (2018)","journal-title":"IEEE Access"},{"key":"715_CR6","first-page":"1","volume":"99","author":"L Suvchul","year":"2016","unstructured":"Suvchul, L., Sungho, K., Sungil, L., et al.: LARGen: automatic signature generation for malwares using latent dirichlet allocation. IEEE Trans. Dependable Secure Comput. 99, 1\u201314 (2016)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"715_CR7","unstructured":"M Jiefei, L Franck, R Alessandra, L Jorge, Detecting Distributed Signature based Intrusion: The case of Multi path Routing Attacks. IEEE conference on computer Communication (INFOCOM), 2015"},{"key":"715_CR8","unstructured":"H Omessaad, M Maissa, K Francine A cloud based Architecture for Network Attack Signature Learning. 7th International Conference on New Technologies, Mobility and Security (NTMS), 2015"},{"key":"715_CR9","unstructured":"BA Mohamed, FEA Nawal et al., Using Patch Management Tools to Enhance Signature Customization for IDSs based on Vulnerability Scanners. 11th International Conference on information technology: New Generation, 2014"},{"issue":"1","key":"715_CR10","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/TNSM.2016.2627340","volume":"14","author":"J Dromard","year":"2017","unstructured":"Dromard, J., Roudi\u00e8re, G., Owezarski, P.: Online and scalable unsupervised network anomaly detection method. IEEE Trans. Netw. Serv. Manage. 14(1), 34\u201347 (March 2017)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"issue":"7","key":"715_CR11","doi-asserted-by":"publisher","first-page":"1013","DOI":"10.1109\/TC.2011.129","volume":"61","author":"YH Yang","year":"2012","unstructured":"Yang, Y.H., Prasanna, V.: High-performance and compact architecture for regular expression matching on FPGA. IEEE Trans. Comput. 61(7), 1013\u20131025 (2012)","journal-title":"IEEE Trans. Comput."},{"key":"715_CR12","unstructured":"M Yuxin, L Wenjuan and LF Kwok Design of Cloud-based Parallel Exclusive Signature Matching Model in Intrusion Detection. IEEE International Conference on High Performance Computing and Communications and IEEE International Conference on Embedded and Ubiquitous Computing, 2013"},{"key":"715_CR13","unstructured":"G Masoud, S Bharanidharan, N Ganthan, Signature Based Gybrid Intrusion Detection System(HIDS) for Android Devices. IEEE Business Engineering and Industrial Application Colloquium (BEIAC), 2013"},{"key":"715_CR14","unstructured":"K Xiaoming and W Qiaoyan Intrusion detection model based on Android. In: Broadband Network and Multimedia Technology (ICBNMT), 2011 4th IEEE International Conference on, 2011, pp. 624\u2013628"},{"issue":"6","key":"715_CR15","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1109\/TMC.2017.2762692","volume":"17","author":"R Spolaor","year":"2018","unstructured":"Spolaor, R., Santo, E.D., Conti, M.: DELTA: data extraction and logging tool for android. IEEE Trans. Mob. Comput. 17(6), 1289\u20131302 (2018)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"715_CR16","doi-asserted-by":"crossref","unstructured":"FI Shiri, B Shanmugan and IB Norbik, A Parallel Technique for Improving the Performance of Signature-Based Network Intrusion Detection System. IEEE 3rd International Conference on Communication Software and Networks (ICCSN), 2011","DOI":"10.1109\/ICCSN.2011.6014986"},{"key":"715_CR17","unstructured":"Z Yanjie Network Intrusion Detection System Model Based on Data Mining. 17th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD), 2016"},{"key":"715_CR18","doi-asserted-by":"crossref","unstructured":"M Liyanage, I Ahmad, A Abro et al. Software Defined Security Monitoring in 5G Networks. In: A Comprehensive Guide to 5G Security, 1, Wiley Telecom, 2017","DOI":"10.1002\/9781119293071.ch10"},{"key":"715_CR19","doi-asserted-by":"crossref","unstructured":"X Chen, C Song, Y Qi, X Dai and M Liu, A Scalable Framework of Testbed for SDN Simulation with Multiple Controllers. IEEE International Symposium on Parallel and Distributed Processing with Applications 2017","DOI":"10.1109\/ISPA\/IUCC.2017.00185"},{"key":"715_CR20","unstructured":"Jyrki T. J. Penttinen, Protocols. In: The Telecommunications Handbook: Engineering Guidelines for Fixed, Mobile and Satellite Systems, 1, Wiley Telecom, 2013, 1008"},{"key":"715_CR21","doi-asserted-by":"crossref","unstructured":"J Korinth, Ddl Chevallerie and A Koch, An Open-Source Tool Flow for the Composition of Reconfigurable Hardware Thread Pool Architectures. 2015 IEEE 23rd Annual International Symposium on Field-Programmable Custom Computing Machines, Vancouver, 2015","DOI":"10.1109\/FCCM.2015.22"},{"issue":"7","key":"715_CR22","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/MCOM.2017.1600990","volume":"55","author":"S Yoon","year":"2017","unstructured":"Yoon, S., Ha, T., Kim, S., Lim, H.: Scalable traffic sampling using centrality measure on software-defined networks. IEEE Commun. Mag. 55(7), 43\u201349 (2017)","journal-title":"IEEE Commun. Mag."},{"key":"715_CR23","volume-title":"\"Improving performance of anomaly-based IDS by combining multiple classifiers,\" 2011 IEEE\/IPSJ International Symposium on Applications and the Internet","author":"K Kishimoto","year":"2011","unstructured":"Kishimoto, K., Yamaki, H., Takakura, H.: \u201cImproving performance of anomaly-based IDS by combining multiple classifiers,\u201d 2011 IEEE\/IPSJ International Symposium on Applications and the Internet. Munich, Bavaria (2011)"},{"key":"715_CR24","unstructured":"M Yuxin and KF Lam, A Generic Scheme for the Construction of Contextual Signatures with Hash Function in Intrusion Detection. IEEE Seventh International Conference on Computational Intelligence and Security, 2011"},{"key":"715_CR25","unstructured":"B. Rebert, S. Hossain and H. Hisham, Informatic Theoratic Anomaly Detectionn framework for Web Application. IEEE 40th Annual Computer Software and Application Conference, 2016"},{"key":"715_CR26","doi-asserted-by":"publisher","first-page":"13624","DOI":"10.1109\/ACCESS.2018.2810198","volume":"6","author":"P Tao","year":"2018","unstructured":"Tao, P., Sun, Z., Sun, Z.: An improved intrusion detection algorithm based on GA and SVM. IEEE Access 6, 13624\u201313631 (2018)","journal-title":"IEEE Access"},{"key":"715_CR27","unstructured":"KE Md and H Jianku, A statistical Framework for Intrusion Detection System. 11th International Conference on Fuzzy systems and knowledge Discovery, 2014"},{"issue":"1","key":"715_CR28","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/TDSC.2008.20","volume":"7","author":"KK Gupta","year":"2010","unstructured":"Gupta, K.K., Nath, B., Kotagiri, R.: Layered approach using conditional random fields for intrusion detection. IEEE Trans. Dependable Secure Comput. 7(1), 35\u201349 (2010)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"715_CR29","doi-asserted-by":"crossref","unstructured":"H Shah, J Undercoffer, and A Joshi, Fuzzy Clustering for Intrusion Detection. 12th IEEE International Conference Fuzzy Systems (FUZZ-IEEE 03), 2, 1274\u20131278, 2003","DOI":"10.1109\/FUZZ.2003.1206614"},{"key":"715_CR30","doi-asserted-by":"crossref","unstructured":"H Nguyen, K Franke and S Petrovic, Improving Effectiveness of Intrusion Detection by Correlation Feature Selection. International Conference on Availability, Reliability and Security, Krakow, 2010","DOI":"10.1109\/ARES.2010.70"},{"key":"715_CR31","unstructured":"H Debar, M Becke, and D Siboni, A Neural Network Component for an Intrusion Detection System. Proceedings IEEE Symposium Research in Security and Privacy (RSP 92), 240\u2013250, 1992."},{"key":"715_CR32","unstructured":"Z Zhang, J Li, CN Manikopoulos, J Jorgenson, and J Ucles, HIDE: A Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification. Proceedings IEEE Workshop Information Assurance and Security (IAW 01), 85\u201390, 2001"},{"key":"715_CR33","unstructured":"R. Samaneh, LP Chiou, A statistical Rule Learning Approach to network Intrusion detection. 5th International Conference on IT Convergence and Security (ICITCS), 2015"},{"key":"715_CR34","unstructured":"H Zhihui, X Li, Research of Worm Intrusion Detection Algorithm Based on Statistical Classification Technology. IEEE 8th Internatinal Symposium on Computational Intelligence and Design, 2015"},{"key":"715_CR35","unstructured":"G Anteneh, G Moses et al., Analysis of DDOS attacks and an introsuction of Hybrid Statistical Model to Detect DDOS attacks on Cloud Computing Environment. 12th International Conference in Information technology- New generations, 2015"},{"key":"715_CR36","doi-asserted-by":"crossref","unstructured":"Daniel S. Yeung, Xizhao Wang, Covariance-Matrix Modeling and detecting Various Flooding Attacks., IEEE Transactions on Systems, MAN, Cybernetics- Part A: Systems and Humans, 37, 2, 2007","DOI":"10.1109\/TSMCA.2006.889480"},{"issue":"1","key":"715_CR37","doi-asserted-by":"publisher","first-page":"70","DOI":"10.15837\/ijccc.2013.1.170","volume":"8","author":"AM Lonea","year":"2013","unstructured":"Lonea, A.M., Popescu, D.E., Tianfield, H.: Detecting DDoS attacks in cloud computing environment. Int. J. Comput. Commun. 8(1), 70\u201378 (2013)","journal-title":"Int. J. Comput. Commun."},{"issue":"1","key":"715_CR38","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/TNET.2008.923716","volume":"17","author":"Y Xie","year":"2009","unstructured":"Xie, Y., Yu, S.Z.: A large-scale hidden SemiMarkov model for anomaly detection on user browsing behaviors. IEEE\/ACM Trans Net (TON) 17(1), 54\u201365 (February 2009)","journal-title":"IEEE\/ACM Trans Net (TON)"},{"key":"715_CR39","doi-asserted-by":"crossref","unstructured":"R Mahajan, SM Bellovin, S Floyd, J Ioannidis, V Paxson, and S Shenker, Controlling high bandwidth aggregates in the network., Presented at Computer Communication Review, 62\u201373, 2012","DOI":"10.1145\/571697.571724"},{"key":"715_CR40","unstructured":"AB Kulkarni, SF Bush, and SC Evans, Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics, GE Research and Development Center, February 2012"},{"key":"715_CR41","unstructured":"J. Mirkovic, G. Prier, and P. Reiher, \u201cAttacking DDoS at the Source\u201d, In Proc. of the 10th IEEE International Conference on Network Protocols (ICNP \u201902), Washington DC, USA, 2012"},{"key":"715_CR42","unstructured":"S Abdelsayed, D Glimsholt, C Leckie, S Ryan, and S Shami, An Efficient Filter for Denial-of-Service Bandwidth Attacks, Proceedings of the 46th IEEE Global Telecommunications Conference (GLOBECOM03), 1353\u20131357, 2013"},{"key":"715_CR43","doi-asserted-by":"crossref","unstructured":"J Quittek, T Zseby, B Claise, and S Zander, Requirements for IP Flow Information Export (IPFIX) (IETF RFC 3917), The Internet Society, Oct. 2004.","DOI":"10.17487\/rfc3917"},{"key":"715_CR44","doi-asserted-by":"crossref","unstructured":"B Claise, Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information (IETF RFC 5101), The Internet Society, Jan. 2008","DOI":"10.17487\/rfc5101"},{"key":"715_CR45","unstructured":"OpenFlow Switch Specification, Version 1.3.3, Released by Open Network Foundation"},{"key":"715_CR46","unstructured":"White paper, Introduction to Cisco IOS, NetFlow Released by Cisco IOS NetFlow, 2012"},{"issue":"3","key":"715_CR47","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/CC.2018.8331988","volume":"15","author":"K Qin","year":"2018","unstructured":"Qin, K., Huang, C., Ganesan, N., Liu, K., Chen, X.: Minimum cost multi-path parallel transmission with delay constraint by extending openflow. China Commun. 15(3), 15\u201326 (March 2018)","journal-title":"China Commun."},{"key":"715_CR48","unstructured":"MACCDC\u201cPublicly available PCAP\u201d available at http:\/\/www.netresec.com\/?page=MACCDC Accessed Date: March 2018"},{"key":"715_CR49","unstructured":"Malware Traffic Analysis available at http:\/\/malware-traffic-analysis.net Accessed Date: March, 2018"},{"key":"715_CR50","unstructured":"Juniper Networks, Understanding OpenFlow Flow Entry Timers on Devices Running Junos OS Available at https:\/\/www.juniper.net\/documentation\/en_US\/junos\/topics\/concept\/junos-sdn-openflow-flow-entry-timers-overview.html Accessed date Dec, 2017"},{"key":"715_CR51","unstructured":"M Cello, M Marchese et al. Statistical Fingerprint -Based Intrusion Detection System (SF-IDS). Published in International Journal of Communication Systems, Wiley, 2016"},{"key":"715_CR52","unstructured":"I Pillai, G Fumera, F Roli, F-measure optimisation in multi-label classifiers. Proceedings of the 21st International Conference on Pattern Recognition (ICPR2012) 2012, 2424\u20132427"},{"issue":"7","key":"715_CR53","doi-asserted-by":"publisher","first-page":"1919","DOI":"10.1162\/NECO_a_00972","volume":"29","author":"H Narasimhan","year":"2017","unstructured":"Narasimhan, H., Agarwal, S.: Support vector algorithms for optimizing the partial area under the ROC curve. Neural Comput. 29(7), 1919\u20131963 (2017)","journal-title":"Neural Comput."},{"key":"715_CR54","doi-asserted-by":"crossref","unstructured":"D Chen, H Wang, DE Henson, L Sheng Clustering Cancer Data by Areas between Survival Curves IEEE First International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE) 2016, 61\u201366","DOI":"10.1109\/CHASE.2016.35"}],"container-title":["International Journal of Parallel Programming"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10766-021-00715-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10766-021-00715-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10766-021-00715-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T03:22:47Z","timestamp":1725592967000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10766-021-00715-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,9]]},"references-count":54,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["715"],"URL":"https:\/\/doi.org\/10.1007\/s10766-021-00715-0","relation":{},"ISSN":["0885-7458","1573-7640"],"issn-type":[{"type":"print","value":"0885-7458"},{"type":"electronic","value":"1573-7640"}],"subject":[],"published":{"date-parts":[[2021,8,9]]},"assertion":[{"value":"26 July 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 April 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 August 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}