{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T01:40:34Z","timestamp":1775698834292,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s11036-024-02392-y","type":"journal-article","created":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T03:43:24Z","timestamp":1731383004000},"page":"961-980","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Simulation of DOS Attacks Mitigation in Software Defined Network Architecture using Load Balancing Algorithm"],"prefix":"10.1007","volume":"29","author":[{"given":"Chandra","family":"Wijaya","sequence":"first","affiliation":[]},{"given":"Rita","family":"Wiryasaputra","sequence":"additional","affiliation":[]},{"given":"I-Jan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ruey-Chyi","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Chao-Tung","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,12]]},"reference":[{"key":"2392_CR1","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1016\/j.future.2018.08.050","volume":"93","author":"C-T Yang","year":"2019","unstructured":"Yang C-T, Chen S-T, Liu J-C, Yang Y-Y, Mitra K, Ranjan R (2019) Implementation of a real-time network traffic monitoring service with network functions virtualization. Futur Gener Comput Syst 93:687\u2013701. https:\/\/doi.org\/10.1016\/j.future.2018.08.050","journal-title":"Futur Gener Comput Syst"},{"key":"2392_CR2","doi-asserted-by":"publisher","unstructured":"Wiryasaputra R, Huang C-Y, Kristiani E, Liu P-Y, Yeh T-K, Yang C-T (2023) Review of an intelligent indoor environment monitoring and management system for covid-19 risk mitigation. Frontiers in Public Health 10. https:\/\/doi.org\/10.3389\/fpubh.2022.1022055","DOI":"10.3389\/fpubh.2022.1022055"},{"key":"2392_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jhazmat.2021.126442","volume":"419","author":"C-T Yang","year":"2021","unstructured":"Yang C-T, Chen H-W, Chang E-J, Kristiani E, Nguyen KLP, Chang J-S (2021) Current advances and future challenges of aiot applications in particulate matters (pm) monitoring and control. J Hazard Mater 419:126442. https:\/\/doi.org\/10.1016\/j.jhazmat.2021.126442","journal-title":"J Hazard Mater"},{"key":"2392_CR4","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.jpdc.2019.05.011","volume":"133","author":"C-H Chang","year":"2019","unstructured":"Chang C-H, Jiang F-C, Yang C-T, Chou S-C (2019) On construction of a big data warehouse accessing platform for campus power usages. J Parallel Distrib Comput 133:40\u201350. https:\/\/doi.org\/10.1016\/j.jpdc.2019.05.011","journal-title":"J Parallel Distrib Comput"},{"key":"2392_CR5","doi-asserted-by":"publisher","first-page":"731","DOI":"10.1016\/j.future.2018.02.041","volume":"96","author":"C-T Yang","year":"2019","unstructured":"Yang C-T, Chen S-T, Den W, Wang Y-T, Kristiani E (2019) Implementation of an intelligent indoor environmental monitoring and management system in cloud. Futur Gener Comput Syst 96:731\u2013749. https:\/\/doi.org\/10.1016\/j.future.2018.02.041","journal-title":"Futur Gener Comput Syst"},{"key":"2392_CR6","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1016\/j.chb.2018.10.009","volume":"100","author":"C-T Yang","year":"2019","unstructured":"Yang C-T, Chen C-J, Tsan Y-T, Liu P-Y, Chan Y-W, Chan W-C (2019) An implementation of real-time air quality and influenza-like illness data storage and processing platform. Comput Hum Behav 100:266\u2013274. https:\/\/doi.org\/10.1016\/j.chb.2018.10.009","journal-title":"Comput Hum Behav"},{"issue":"3","key":"2392_CR7","doi-asserted-by":"publisher","first-page":"383","DOI":"10.6633\/IJNS.201703.19(3).07","volume":"19","author":"S Behal","year":"2017","unstructured":"Behal S, Kumar K (2017) Characterization and comparison of ddos attack tools and traffic generators - a review. Int J Netw Secur 19(3):383\u2013393. https:\/\/doi.org\/10.6633\/IJNS.201703.19(3).07","journal-title":"Int J Netw Secur"},{"key":"2392_CR8","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-031-55976-1_15","volume-title":"Smart Grid and Internet of Things","author":"C Wijaya","year":"2024","unstructured":"Wijaya C, Wiryasaputra R, Huang C-Y, Tanato J, Yang C-T (2024) Load balancing algorithm in a software-defined network environment with round robin and least connections. In: Deng D-J, Chen J-C (eds) Smart Grid and Internet of Things. Springer, Cham, pp 148\u2013157"},{"key":"2392_CR9","doi-asserted-by":"publisher","unstructured":"Roy S, Hossain MA, Sen S, Hossain N, Asif MRA (2019) Measuring the performance on load balancing algorithms 19. https:\/\/doi.org\/10.34257\/GJCSTBVOL19IS1PG41","DOI":"10.34257\/GJCSTBVOL19IS1PG41"},{"key":"2392_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103269","volume":"130","author":"N Dayal","year":"2023","unstructured":"Dayal N, Srivastava S (2023) Analyzing effective mitigation of ddos attack with software defined networking. Computers & Security 130:103269. https:\/\/doi.org\/10.1016\/j.cose.2023.103269","journal-title":"Computers & Security"},{"key":"2392_CR11","doi-asserted-by":"publisher","unstructured":"Bawany N, Shamsi J, Salah K (2017) Ddos attack detection and mitigation using sdn: Methods, practices, and solutions. Arab J Sci Eng 42. https:\/\/doi.org\/10.1007\/s13369-017-2414-5","DOI":"10.1007\/s13369-017-2414-5"},{"issue":"1","key":"2392_CR12","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1186\/s13673-019-0176-7","volume":"9","author":"M Imran","year":"2019","unstructured":"Imran M, Durad MH, Khan FA, Derhab A (2019) Reducing the effects of dos attacks in software defined networks using parallel flow installation. HCIS 9(1):16. https:\/\/doi.org\/10.1186\/s13673-019-0176-7","journal-title":"HCIS"},{"key":"2392_CR13","doi-asserted-by":"publisher","unstructured":"Wang S, Gomez K, Sithamparanathan K, Asghar MR, Russello G, Zanna P (2021) Mitigating ddos attacks in sdn-based iot networks leveraging secure control and data plane algorithm. Applied Sciences 11(3). https:\/\/doi.org\/10.3390\/app11030929","DOI":"10.3390\/app11030929"},{"key":"2392_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107706","volume":"99","author":"B Alhijawi","year":"2022","unstructured":"Alhijawi B, Almajali S, Elgala H, Bany Salameh H, Ayyash M (2022) A survey on dos\/ddos mitigation techniques in sdns: Classification, comparison, solutions, testing tools and datasets. Comput Electr Eng 99:107706. https:\/\/doi.org\/10.1016\/j.compeleceng.2022.107706","journal-title":"Comput Electr Eng"},{"key":"2392_CR15","doi-asserted-by":"publisher","unstructured":"Ladigatti A, Merawade V, Jain S, Bengeri A, Narayan DG, Shettar P (2023) Mitigation of ddos attacks in sdn using access control list, entropy and puzzle-based mechanisms. In: 2023 International Conference on Applied Intelligence and Sustainable Computing (ICAISC), pp 1\u20138. https:\/\/doi.org\/10.1109\/ICAISC58445.2023.10200273","DOI":"10.1109\/ICAISC58445.2023.10200273"},{"key":"2392_CR16","doi-asserted-by":"publisher","unstructured":"Wang J, Wang L, Wang R (2023) A method of ddos attack detection and mitigation for the comprehensive coordinated protection of sdn controllers. Entropy 25(8). https:\/\/doi.org\/10.3390\/e25081210","DOI":"10.3390\/e25081210"},{"key":"2392_CR17","doi-asserted-by":"publisher","unstructured":"Ghorbani H, Mohammadzadeh MS, Ahmadzadegan MH (2020) Ddos attacks on the iot network with the emergence of 5g. In: 2020 International Conference on Technology and Entrepreneurship - Virtual (ICTE-V), pp 1\u20135. https:\/\/doi.org\/10.1109\/ICTE-V50708.2020.9113779","DOI":"10.1109\/ICTE-V50708.2020.9113779"},{"key":"2392_CR18","doi-asserted-by":"publisher","unstructured":"Huraj L, Horak T, Strelec P, Tanuska P (2021) Mitigation against ddos attacks on an iot-based production line using machine learning. Applied Sciences 11(4). https:\/\/doi.org\/10.3390\/app11041847","DOI":"10.3390\/app11041847"},{"key":"2392_CR19","doi-asserted-by":"publisher","first-page":"103096","DOI":"10.1016\/j.cose.2023.103096","volume":"127","author":"P Kumari","year":"2023","unstructured":"Kumari P, Jain AK (2023) A comprehensive study of ddos attacks over iot network and their countermeasures. Computers & Security 127:103096. https:\/\/doi.org\/10.1016\/j.cose.2023.103096","journal-title":"Computers & Security"},{"key":"2392_CR20","doi-asserted-by":"publisher","first-page":"107716","DOI":"10.1016\/j.compeleceng.2022.107716","volume":"98","author":"A Mihoub","year":"2022","unstructured":"Mihoub A, Fredj OB, Cheikhrouhou O, Derhab A, Krichen M (2022) Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques. Comput Electr Eng 98:107716. https:\/\/doi.org\/10.1016\/j.compeleceng.2022.107716","journal-title":"Comput Electr Eng"},{"key":"2392_CR21","doi-asserted-by":"publisher","first-page":"107871","DOI":"10.1016\/j.comnet.2021.107871","volume":"188","author":"GC Amaizu","year":"2021","unstructured":"Amaizu GC, Nwakanma CI, Bhardwaj S, Lee JM, Kim DS (2021) Composite and efficient ddos attack detection framework for b5g networks. Comput Netw 188:107871. https:\/\/doi.org\/10.1016\/j.comnet.2021.107871","journal-title":"Comput Netw"},{"issue":"1","key":"2392_CR22","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1109\/COMST.2015.2487361","volume":"18","author":"Q Yan","year":"2016","unstructured":"Yan Q, Yu FR, Gong Q, Li J (2016) Software-defined networking (sdn) and distributed denial of service (ddos) attacks in cloud computing environments: A survey, some research issues, and challenges. IEEE Commun Surv Tutorials 18(1):602\u2013622. https:\/\/doi.org\/10.1109\/COMST.2015.2487361","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"3","key":"2392_CR23","doi-asserted-by":"publisher","first-page":"2109","DOI":"10.1109\/JIOT.2021.3090909","volume":"9","author":"I Cviti\u0107","year":"2022","unstructured":"Cviti\u0107 I, Perakovic D, Gupta BB, Choo K-KR (2022) Boosting-based ddos detection in internet of things systems. IEEE Internet Things J 9(3):2109\u20132123. https:\/\/doi.org\/10.1109\/JIOT.2021.3090909","journal-title":"IEEE Internet Things J"},{"key":"2392_CR24","doi-asserted-by":"publisher","unstructured":"Li J, Tu T, Li Y, Qin S, Shi Y, Wen Q (2022) Dosguard: Mitigating denial-of-service attacks in software-defined networks. Sensors 22(3). https:\/\/doi.org\/10.3390\/s22031061","DOI":"10.3390\/s22031061"},{"key":"2392_CR25","doi-asserted-by":"publisher","unstructured":"Singh A, Gupta, BB (2022) Distributed denial-of-service (ddos) attacks and defense mechanisms in various web-enabled computing platforms: Issues, challenges, and future research directions. International Journal on Semantic Web and Information Systems (IJSWIS) 18(1). https:\/\/doi.org\/10.4018\/IJSWIS.297143","DOI":"10.4018\/IJSWIS.297143"},{"key":"2392_CR26","doi-asserted-by":"publisher","unstructured":"Parashar M, Poonia A, Satish K (2019) A survey of attacks and their mitigations in software defined networks. In: 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp 1\u20138. https:\/\/doi.org\/10.1109\/ICCCNT45670.2019.8944621","DOI":"10.1109\/ICCCNT45670.2019.8944621"},{"key":"2392_CR27","doi-asserted-by":"publisher","unstructured":"Abdulkarem HS, Dawod, A (2020) Ddos attack detection and mitigation at sdn data plane layer. In: 2020 2nd Global Power, Energy and Communication Conference (GPECOM), pp 322\u2013326. https:\/\/doi.org\/10.1109\/GPECOM49333.2020.9247850","DOI":"10.1109\/GPECOM49333.2020.9247850"},{"key":"2392_CR28","doi-asserted-by":"publisher","unstructured":"Aladaileh MA, Anbar M, Hasbullah IH, Chong Y-W, Sanjalawe YK (2020) Detection techniques of distributed denial of service attacks on software-defined networking controller\u2013a review. IEEE Access 8:143985\u2013143995. https:\/\/doi.org\/10.1109\/ACCESS.2020.3013998","DOI":"10.1109\/ACCESS.2020.3013998"},{"key":"2392_CR29","doi-asserted-by":"publisher","unstructured":"Mohanty S, Shekhawat AS, Sahoo B, Apat HK, Khare P (2021) Minimizing latency for controller placement problem in sdn. In: 2021 19th OITS International Conference on Information Technology (OCIT), pp 393\u2013398. https:\/\/doi.org\/10.1109\/OCIT53463.2021.00083","DOI":"10.1109\/OCIT53463.2021.00083"},{"key":"2392_CR30","doi-asserted-by":"publisher","unstructured":"Jara V, Shayan, Y (2018) Latency measurement in an sdn network using a pox controller. In: 2018 IEEE Canadian Conference on Electrical & Computer Engineering (CCECE), pp 1\u20135. https:\/\/doi.org\/10.1109\/CCECE.2018.8447647","DOI":"10.1109\/CCECE.2018.8447647"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-024-02392-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-024-02392-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-024-02392-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T19:08:18Z","timestamp":1735672098000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-024-02392-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["2392"],"URL":"https:\/\/doi.org\/10.1007\/s11036-024-02392-y","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6]]},"assertion":[{"value":"11 August 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 November 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}