{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T01:13:12Z","timestamp":1769044392280,"version":"3.49.0"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,4,28]],"date-time":"2022-04-28T00:00:00Z","timestamp":1651104000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,4,28]],"date-time":"2022-04-28T00:00:00Z","timestamp":1651104000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1007\/s11036-022-01973-z","type":"journal-article","created":{"date-parts":[[2022,4,28]],"date-time":"2022-04-28T09:03:24Z","timestamp":1651136604000},"page":"1423-1443","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["A Deep Learning Approach to Detection and Mitigation of Distributed Denial of Service Attacks in High Availability Intelligent Transport Systems"],"prefix":"10.1007","volume":"27","author":[{"given":"Nitish","family":"Mahajan","sequence":"first","affiliation":[]},{"given":"Amita","family":"Chauhan","sequence":"additional","affiliation":[]},{"given":"Harish","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Sakshi","family":"Kaushal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0229-2460","authenticated-orcid":false,"given":"Arun Kumar","family":"Sangaiah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,28]]},"reference":[{"key":"1973_CR1","unstructured":"Ddos protection kaspersky (2019) https:\/\/www.keycdn.com\/blog\/ddos-protection"},{"key":"1973_CR2","unstructured":"Cox business ddos statistics (2019) https:\/\/www.coxblue.com\/12-ddos-statistics-that-should-concern-business-leaders (Accessed: 2019)"},{"key":"1973_CR3","unstructured":"Ddos attack on a us service provider (2019) https:\/\/www.theregister.co.uk\/2018\/03\/05\/worlds_biggest_ddos_attack_record_broken_after_just_ve_days\/ (Accessed: 2019)"},{"key":"1973_CR4","unstructured":"Longest ddos attack in 2016 (2019) https:\/\/securelist.com\/kaspersky-ddos-intelligence-report-for-q1-2016\/74550\/ (Accessed: 2019)"},{"key":"1973_CR5","unstructured":"Longest ddos attack in 2018 (2019) https:\/\/securelist.com\/ddos-report-in-q2-2018\/86537\/ (Accessed: 2019)"},{"key":"1973_CR6","unstructured":"Opensips (2019) https:\/\/www.opensips.org (Accessed: 2019)"},{"key":"1973_CR7","unstructured":"Startrinity sip tester (2019) http:\/\/startrinity.com\/VoIP\/SipTester\/SipTester.aspx (Accessed: 2019)"},{"key":"1973_CR8","unstructured":"Wireshark (2019) https:\/\/www.wireshark.org\/ (Accessed: 2019)"},{"key":"1973_CR9","doi-asserted-by":"crossref","unstructured":"Aggarwal S, Mahajan N, Kaushal S, Kumar H (2019) Load balancing and clustering scheme for real-time voip applications. In: Advances in computer communication and computational sciences, pp 451\u2013461. Springer","DOI":"10.1007\/978-981-13-0344-9_38"},{"issue":"2","key":"1973_CR10","first-page":"1","volume":"7","author":"A Akbar","year":"2016","unstructured":"Akbar A, Basha SM, Sattar SA, Raziuddin S (2016) An intelligent sip message parser for detecting and mitigating ddos attacks. Int J Innov Eng Technol 7(2):1\u20137","journal-title":"Int J Innov Eng Technol"},{"issue":"2","key":"1973_CR11","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1007\/s10115-012-0595-5","volume":"38","author":"MA Akbar","year":"2014","unstructured":"Akbar MA, Farooq M (2014) Securing sip-based voip infrastructure against flooding attacks and spam over ip telephony. Knowl Inf Syst 38(2):491\u2013510","journal-title":"Knowl Inf Syst"},{"issue":"6","key":"1973_CR12","first-page":"344","volume":"10","author":"MM Alam","year":"2015","unstructured":"Alam MM, Arafat MY, Ahmed F (2015) Study on auto detecting defence mechanisms against application layer ddos attacks in sip server. J Netw 10(6):344","journal-title":"J Netw"},{"key":"1973_CR13","doi-asserted-by":"crossref","unstructured":"Asad M, Asim M, Javed T, Beg MO, Mujtaba H, Abbas S (2019) Deepdetect: Detection of distributed denial of service attacks using deep learning. Comput J","DOI":"10.1093\/comjnl\/bxz064"},{"key":"1973_CR14","unstructured":"Blander E, Peles A (2015) Geographic resiliency and load balancing for sip application services. US Patent 9,143,558"},{"key":"1973_CR15","doi-asserted-by":"crossref","unstructured":"Cviti\u0107 I, Perakovi\u0107 D, Peri\u0161a M, Botica M (2019) Novel approach for detection of iot generated ddos traffic. Wireless Netw 1\u201314","DOI":"10.1007\/s11276-019-02043-1"},{"key":"1973_CR16","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.cose.2017.08.003","volume":"70","author":"K Dassouki","year":"2017","unstructured":"Dassouki K, Safa H, Nassar M, Hijazi A (2017) Protecting from cloud-based sip flooding attacks by leveraging temporal and structural fingerprints. Comput Secur 70:618\u2013633","journal-title":"Comput Secur"},{"key":"1973_CR17","doi-asserted-by":"crossref","unstructured":"Dayanandam G, Reddy ES, Babu DB (2017) Regression algorithms for efficient detection and prediction of ddos attacks. In: 2017 3Rd International conference on applied and theoretical computing and communication technology (iCATcct), pp 215\u2013219. IEEE","DOI":"10.1109\/ICATCCT.2017.8389136"},{"key":"1973_CR18","doi-asserted-by":"crossref","unstructured":"Ehlert S, Wang C, Magedanz T, Sisalem D (2008) Specification-based denial-of-service detection for sip voice-over-ip networks. In: 2008 The third international conference on internet monitoring and protection, pp 59\u201366. IEEE","DOI":"10.1109\/ICIMP.2008.14"},{"key":"1973_CR19","doi-asserted-by":"crossref","unstructured":"Ferrag MA, Maglaras L, Janicke H, Smith R (2019) Deep learning techniques for cyber security intrusion detection: a detailed analysis. In: 6Th International symposium for ICS & SCADA cyber security research 2019 6, pp 126\u2013136","DOI":"10.14236\/ewic\/icscsr19.16"},{"key":"1973_CR20","unstructured":"Francis PL, Collins DA, Dubois GR, Bunch JL, Pokala NR (2014) Load balancing for sip services. US Patent 8,775,628"},{"key":"1973_CR21","unstructured":"Gao H, Qin X, Barroso RJD, Hussain W, Xu Y, Yin Y (2020) Collaborative learning-based industrial iot api recommendation for software-defined devices: The implicit knowledge discovery perspective. IEEE Trans Emerging Topics Comput Intell"},{"key":"1973_CR22","doi-asserted-by":"crossref","unstructured":"Golait D, Hubballi N (2016) Voipfd: Voice over ip flooding detection. In: 2016 Twenty second national conference on communication (NCC), pp 1\u20136. IEEE","DOI":"10.1109\/NCC.2016.7561121"},{"issue":"3","key":"1973_CR23","doi-asserted-by":"publisher","first-page":"730","DOI":"10.1109\/TIFS.2016.2632071","volume":"12","author":"D Golait","year":"2017","unstructured":"Golait D, Hubballi N (2017) Detecting anomalous behavior in voip systems: a discrete event system modeling. IEEE Trans Inf Forensics Secur 12(3):730\u2013745","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1973_CR24","unstructured":"Gutierrez SA, Branch JW (2013) Application of machine learning techniques to distributed denial of service (ddos ) attack detection : A systematic literature review"},{"issue":"2","key":"1973_CR25","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1109\/TGCN.2021.3067374","volume":"5","author":"Y Huang","year":"2021","unstructured":"Huang Y, Xu H, Gao H, Ma X, Hussain W (2021) Ssur: an approach to optimizing virtual machine allocation strategy based on user requirements for cloud data center. IEEE Trans Green Commun Netw 5(2):670\u2013681","journal-title":"IEEE Trans Green Commun Netw"},{"issue":"4","key":"1973_CR26","doi-asserted-by":"publisher","first-page":"1190","DOI":"10.1109\/TNET.2012.2183612","volume":"20","author":"H Jiang","year":"2012","unstructured":"Jiang H, Iyengar A, Nahum E, Segmuller W, Tantawi AN, Wright CP (2012) Design, implementation, and performance of a load balancer for sip server clusters. IEEE\/ACM Trans Netw 20(4):1190\u20131202","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"1","key":"1973_CR27","first-page":"11","volume":"1","author":"G Kambourakis","year":"2010","unstructured":"Kambourakis G, Geneiatakis D, Gritzalis S, Lambrinoudakis C, Dagiuklas T, Ehlert S, Fiedler J (2010) High availability for sip: Solutions and real-time measurement performance evaluation. Int J Disaster Recovery Business Continuity 1(1):11\u201330","journal-title":"Int J Disaster Recovery Business Continuity"},{"key":"1973_CR28","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.dsp.2017.10.009","volume":"77","author":"B Kurt","year":"2018","unstructured":"Kurt B, Y\u0131ld\u0131z \u00c7, Ceritli TY, Sankur B, Cemgil AT (2018) A bayesian change point model for detecting sip-based ddos attacks. Digital Signal Processing 77:48\u201362","journal-title":"Digital Signal Processing"},{"key":"1973_CR29","unstructured":"Langen AR, Kramer R, Connelly D, Khan RN, Beatty J, Cosmadopoulos I, Cheenath M (2010) Sip server architecture fault tolerance and failover. US Patent 7,661,027"},{"key":"1973_CR30","doi-asserted-by":"crossref","unstructured":"Linda O, Vollmer T, Manic M (2009) Neural network based intrusion detection system for critical infrastructures. In: 2009 International joint conference on neural networks, pp 1827\u20131834. IEEE","DOI":"10.1109\/IJCNN.2009.5178592"},{"issue":"1","key":"1973_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-019-1557-3","volume":"2019","author":"X Ma","year":"2019","unstructured":"Ma X, Gao H, Xu H, Bian M (2019) An iot-based task scheduling optimization scheme considering the deadline and cost-aware scientific workflow for cloud computing. EURASIP J Wirel Commun Netw 2019(1):1\u201319","journal-title":"EURASIP J Wirel Commun Netw"},{"issue":"102","key":"1973_CR32","first-page":"422","volume":"147","author":"J Manan","year":"2019","unstructured":"Manan J, Ahmed A, Ullah I, Merghem-Boulahia L, Ga\u00efti D (2019) Distributed intrusion detection scheme for next generation networks. J Netw Comput Appl 147(102):422","journal-title":"J Netw Comput Appl"},{"key":"1973_CR33","doi-asserted-by":"crossref","unstructured":"Mladenov B (2018) Research and solutions for ddos detection and mitigation with software defined networks","DOI":"10.35543\/osf.io\/jnhsm"},{"key":"1973_CR34","doi-asserted-by":"crossref","unstructured":"Nassar M, Festor O, et al. (2010) Labeled voip data-set for intrusion detection evaluation. In: Meeting of the european network of universities and companies in information and communication engineering, pp 97\u2013106. Springer","DOI":"10.1007\/978-3-642-13971-0_10"},{"issue":"1","key":"1973_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13174-019-0115-x","volume":"10","author":"Y Pan","year":"2019","unstructured":"Pan Y, Sun F, Teng Z, White J, Schmidt DC, Staples J, Krause L (2019) Detecting web attacks with end-to-end deep learning. J Internet Serv Appl 10(1):1\u201322","journal-title":"J Internet Serv Appl"},{"key":"1973_CR36","doi-asserted-by":"crossref","unstructured":"Rahal R, Korba AA, Ghoualmi-Zine N (2020) Towards the development of realistic dos dataset for intelligent transportation systems. Wirel Pers Commun, 1\u201330","DOI":"10.1007\/s11277-020-07635-1"},{"key":"1973_CR37","unstructured":"Sanders J (2015) Chinese government linked to largest ddos attack in github history. TechRepublic April"},{"key":"1973_CR38","doi-asserted-by":"publisher","unstructured":"Schooler E, Rosenberg J, Schulzrinne H, Johnston A, Camarillo G, Peterson J, Sparks R, Handley MJ (2002) SIP: Session Initiation Protocol. RFC 3261. https:\/\/doi.org\/10.17487\/RFC3261. https:\/\/rfc-editor.org\/rfc\/rfc3261.txt","DOI":"10.17487\/RFC3261"},{"key":"1973_CR39","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.comnet.2018.02.025","volume":"136","author":"M Semerci","year":"2018","unstructured":"Semerci M, Cemgil AT, Sankur B (2018) An intelligent cyber security system against ddos attacks in sip networks. Comput Netw 136:137\u2013154","journal-title":"Comput Netw"},{"key":"1973_CR40","doi-asserted-by":"crossref","unstructured":"Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSP, pp. 108\u2013116","DOI":"10.5220\/0006639801080116"},{"key":"1973_CR41","unstructured":"Shim CB, Xie L (2010) System and method for load balancing a communications network. US Patent 7,805,517"},{"issue":"3","key":"1973_CR42","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.cose.2011.12.012","volume":"31","author":"A Shiravi","year":"2012","unstructured":"Shiravi A, Shiravi H, Tavallaee M, Ghorbani A A (2012) Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput Secur 31(3):357\u2013374","journal-title":"Comput Secur"},{"key":"1973_CR43","doi-asserted-by":"crossref","unstructured":"Shoket H, Aulakh JS (2018) Secure voip lte network for secure transmission using plrt (packet level restraining technique) under ddos attack. In: 2018 5Th International conference on signal processing and integrated networks (SPIN), pp 878\u2013882. IEEE","DOI":"10.1109\/SPIN.2018.8474211"},{"issue":"1","key":"1973_CR44","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/TETCI.2017.2772792","volume":"2","author":"N Shone","year":"2018","unstructured":"Shone N, Ngoc TN, Phai VD, Shi Q (2018) A deep learning approach to network intrusion detection. IEEE Trans Emerging Topics Comput Intell 2(1):41\u201350","journal-title":"IEEE Trans Emerging Topics Comput Intell"},{"key":"1973_CR45","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.cose.2016.08.007","volume":"63","author":"IM Tas","year":"2016","unstructured":"Tas IM, Ugurdogan B, Baktir S (2016) Novel session initiation protocol-based distributed denial-of-service attacks and effective defense strategies. Comput Secur 63:29\u201344","journal-title":"Comput Secur"},{"key":"1973_CR46","doi-asserted-by":"crossref","unstructured":"Tsiatsikas Z, Fakis A, Papamartzivanos D, Geneiatakis D, Kambourakis G, Kolias C (2015) Battling against ddos in sip: is machine learning-based detection an effective weapon?. In: E-business and telecommunications (ICETE), 2015 12th international joint conference on, vol 4, pp 301\u2013308. IEEE","DOI":"10.5220\/0005549103010308"},{"key":"1973_CR47","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.comcom.2014.11.002","volume":"57","author":"Z Tsiatsikas","year":"2015","unstructured":"Tsiatsikas Z, Geneiatakis D, Kambourakis G, Keromytis AD (2015) An efficient and easily deployable method for dealing with dos in sip services. Comput Commun 57:50\u201363","journal-title":"Comput Commun"},{"key":"1973_CR48","doi-asserted-by":"crossref","unstructured":"Wang C, Wu J, Zheng X, Pei B, Zhang X, Yu D, Tang J (2020) Leveraging icn with network sensing for intelligent transportation systems: A dynamic naming approach. IEEE Sensors Journal","DOI":"10.1109\/JSEN.2020.3004839"},{"key":"1973_CR49","doi-asserted-by":"crossref","unstructured":"Yang X, Zhou S, Cao M (2020) An approach to alleviate the sparsity problem of hybrid collaborative filtering based recommendations: The product-attribute perspective from user reviews. Mobile Networks & Applications 25(2)","DOI":"10.1007\/s11036-019-01246-2"},{"issue":"4","key":"1973_CR50","doi-asserted-by":"publisher","first-page":"1136","DOI":"10.1109\/TCCN.2020.3027681","volume":"6","author":"Y Yin","year":"2020","unstructured":"Yin Y, Cao Z, Xu Y, Gao H, Li R, Mai Z (2020) Qos prediction for service recommendation with features learning in mobile edge computing environment. IEEE Trans Cogn Commun Netw 6 (4):1136\u20131145","journal-title":"IEEE Trans Cogn Commun Netw"},{"key":"1973_CR51","doi-asserted-by":"crossref","unstructured":"Yu J (2016) An empirical study of denial of service (dos) against voip. In: 2016 15Th international conference on ubiquitous computing and communications and 2016 international symposium on cyberspace and security (IUCC-CSS), pp 54\u201360. IEEE,","DOI":"10.1109\/IUCC-CSS.2016.016"},{"key":"1973_CR52","doi-asserted-by":"crossref","unstructured":"Yuan X, Li C, Li X (2017) Deepdefense: identifying ddos attack via deep learning. In: 2017 IEEE International conference on smart computing (SMARTCOMP), pp 1\u20138. IEEE","DOI":"10.1109\/SMARTCOMP.2017.7946998"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-022-01973-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-022-01973-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-022-01973-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T19:39:02Z","timestamp":1664307542000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-022-01973-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,28]]},"references-count":52,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["1973"],"URL":"https:\/\/doi.org\/10.1007\/s11036-022-01973-z","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,28]]},"assertion":[{"value":"12 October 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}