{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T05:50:11Z","timestamp":1771307411621,"version":"3.50.1"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,1,7]],"date-time":"2022-01-07T00:00:00Z","timestamp":1641513600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,7]],"date-time":"2022-01-07T00:00:00Z","timestamp":1641513600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1007\/s11227-021-04253-x","type":"journal-article","created":{"date-parts":[[2022,1,7]],"date-time":"2022-01-07T12:04:09Z","timestamp":1641557049000},"page":"8106-8136","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":55,"title":["A hybrid machine learning approach for detecting unprecedented DDoS attacks"],"prefix":"10.1007","volume":"78","author":[{"given":"Mohammad","family":"Najafimehr","sequence":"first","affiliation":[]},{"given":"Sajjad","family":"Zarifzadeh","sequence":"additional","affiliation":[]},{"given":"Seyedakbar","family":"Mostafavi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,7]]},"reference":[{"key":"4253_CR1","unstructured":"CAIDA UCSD Network Telescope Traffic Samples (formerly the Backscatter Dataset). https:\/\/www.caida.org\/data\/passive\/backscatter_dataset.xml. Accessed: Jan. 23, 2020"},{"key":"4253_CR2","unstructured":"Mininet: An Instant Virtual Network on your Laptop (or other PC) - Mininet. http:\/\/mininet.org\/. Accessed: May 23, 2021"},{"key":"4253_CR3","unstructured":"MS SQL PacketResolution DoS: Attack signature - symantec corp. https:\/\/www.symantec.com\/security_response\/attacksignatures\/detail.jsp?asid=20533. Accessed: Jan. 7, 2021"},{"key":"4253_CR4","unstructured":"Old Protocols, New Exploits: LDAP Unwittingly Serves DDoS Amplification Attacks. https:\/\/www.f5.com\/labs\/articles\/threat-intelligence\/old-protocols-new-exploits-ldap-unwittingly-serves-ddos-amplification-attacks-22609. Accessed: Jan. 20, 2021"},{"key":"4253_CR5","doi-asserted-by":"publisher","first-page":"126215","DOI":"10.1109\/ACCESS.2020.2995820","volume":"8","author":"R Abubakar","year":"2020","unstructured":"Abubakar R, Aldegheishem A, Majeed MF, Mehmood A, Maryam H, Alrajeh NA, Maple C, Jawad M (2020) An effective mechanism to mitigate real-time DDoS attack. IEEE Access 8:126215\u2013126227. https:\/\/doi.org\/10.1109\/ACCESS.2020.2995820","journal-title":"IEEE Access"},{"key":"4253_CR6","unstructured":"Akamai Technologies (2021) Inc.: Threat advisory: Netbios name server, rpc portmap and sentinel reflection DDoS. https:\/\/www.akamai.com\/uk\/en\/multimedia\/documents\/state-of-the-internet\/ddos-reflection-netbios-name-server-rpc-portmap-sentinel-udp-threat-advisory.pdf. Accessed: Jan. 31, 2021"},{"key":"4253_CR7","doi-asserted-by":"publisher","unstructured":"Bakker JN, Ng B, Seah WKG (2018) Can machine learning techniques be effectively used in real networks against DDoS attacks? In: 2018 27th International Conference on Computer Communication and Networks (ICCCN), pp. 1\u20136. Hangzhou, China (2018). https:\/\/doi.org\/10.1109\/ICCCN.2018.8487445","DOI":"10.1109\/ICCCN.2018.8487445"},{"key":"4253_CR8","doi-asserted-by":"publisher","unstructured":"Balkanli E, Alves J, Zincir-Heywood AN (2014) Supervised learning to detect DDoS attacks. In: 2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), pp. 1\u20138. Orlando, FL, USA (2014). https:\/\/doi.org\/10.1109\/CICYBS.2014.7013367","DOI":"10.1109\/CICYBS.2014.7013367"},{"issue":"8","key":"4253_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5815\/ijcnis.2013.08.01","volume":"5","author":"M Bogdanoski","year":"2013","unstructured":"Bogdanoski M, Suminoski T, Risteski A (2013) Analysis of the syn flood dos attack. Int J Comput Netw Inform Secur (IJCNIS) 5(8):1\u201311. https:\/\/doi.org\/10.5815\/ijcnis.2013.08.01","journal-title":"Int J Comput Netw Inform Secur (IJCNIS)"},{"key":"4253_CR10","unstructured":"University\u00a0of California, I. (2021) KDD Cup 1999 Data. http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html. Accessed: May 23, 2021"},{"key":"4253_CR11","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.comnet.2019.01.007","volume":"150","author":"E Cambiasoa","year":"2019","unstructured":"Cambiasoa E, Chiola G, Aiello M (2019) Introducing the slowdrop attack. Comput Netw 150:234\u2013249. https:\/\/doi.org\/10.1016\/j.comnet.2019.01.007","journal-title":"Comput Netw"},{"key":"4253_CR12","doi-asserted-by":"publisher","unstructured":"Chen J, Yang Yt, Hu Kk, Zheng Hb, Wang Z (2019) DAD-MCNN: DDoS attack detection via multi-channel CNN. In: Proceedings of the 2019 11th International Conference on Machine Learning and Computing, ICMLC \u201919, p. 484-488. Association for Computing Machinery, Zhuhai, China (2019). https:\/\/doi.org\/10.1145\/3318299.3318329","DOI":"10.1145\/3318299.3318329"},{"key":"4253_CR13","doi-asserted-by":"publisher","unstructured":"Deepa V, Sudar KM, Deepalakshmi P (2018) Detection of DDoS attack on SDN control plane using hybrid machine learning techniques. In: 2018 International Conference on Smart Systems and Inventive Technology (ICSSIT), pp. 299\u2013303. IEEE, Tirunelveli, India (2018). https:\/\/doi.org\/10.1109\/ICSSIT.2018.8748836","DOI":"10.1109\/ICSSIT.2018.8748836"},{"key":"4253_CR14","doi-asserted-by":"publisher","unstructured":"Doshi R, Apthorpe N, Feamster N (2018) Machine learning DDoS detection for consumer internet of things devices. In: 2018 IEEE Security and Privacy Workshops (SPW), pp. 29\u201335. San Francisco, CA, USA (2018). https:\/\/doi.org\/10.1109\/SPW.2018.00013","DOI":"10.1109\/SPW.2018.00013"},{"key":"4253_CR15","doi-asserted-by":"publisher","unstructured":"Draper-Gil G, Lashkari AH, Mamun MSI, A Ghorbani A (2016) Characterization of encrypted and vpn traffic using time-related features. In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy - ICISSP,, pp. 407\u2013414. INSTICC, SciTePress (2016). https:\/\/doi.org\/10.5220\/0005740704070414","DOI":"10.5220\/0005740704070414"},{"issue":"1","key":"4253_CR16","first-page":"123","volume":"6","author":"MT Elbatta","year":"2013","unstructured":"Elbatta MT, Ashour WM (2013) A dynamic method for discovering density varied clusters. Int J Signal Process Image Process Pattern Recognit 6(1):123\u2013134","journal-title":"Int J Signal Process Image Process Pattern Recognit"},{"key":"4253_CR17","unstructured":"Ester M, Kriegel HP, Sander J, Xu X (1996) A density-based algorithm for discovering clusters in large spatial databases with noise. In: Proceedings of the Second International Conference on Knowledge Discovery and Data Mining, KDD\u201996, p. 226-231. AAAI Press (1996)"},{"key":"4253_CR18","unstructured":"Habibi Lashkari A, Draper Gil G, Mamun MSI (2021) Github - ahlashkari\/cicflowmeter. https:\/\/github.com\/ahlashkari\/CICFlowMeter. Accessed on: Jun. 2, 2021"},{"key":"4253_CR19","unstructured":"Habibi Lashkari A, Draper Gil G, Mamun MSI (2021) Github - ahlashkari\/cicflowmeter\/readme. https:\/\/github.com\/ahlashkari\/CICFlowMeter\/blob\/master\/ReadMe.txt. Accessed on: Jun. 2, 2021"},{"key":"4253_CR20","doi-asserted-by":"publisher","unstructured":"Habibi Lashkari A, Draper Gil G, Mamun MSI, Ghorbani AA (2017) Characterization of tor traffic using time based features. In: Proceedings of the 3rd International Conference on Information Systems Security and Privacy - ICISSP,, pp. 253\u2013262. INSTICC, SciTePress (2017). https:\/\/doi.org\/10.5220\/0006105602530262","DOI":"10.5220\/0006105602530262"},{"key":"4253_CR21","doi-asserted-by":"publisher","first-page":"53972","DOI":"10.1109\/ACCESS.2020.2976908","volume":"8","author":"S Haider","year":"2020","unstructured":"Haider S, Akhunzada A, Mustafa I, Patel TB, Fernandez A, Choo KKR, Iqbal J (2020) A deep cnn ensemble framework for efficient ddos attack detection in software defined networks. IEEE Access 8:53972\u201353983. https:\/\/doi.org\/10.1109\/ACCESS.2020.2976908","journal-title":"IEEE Access"},{"key":"4253_CR22","doi-asserted-by":"publisher","unstructured":"Han J, Pei J, Kamber M (2012) Data mining: concepts and techniques, third edn. Elsevier (2012). https:\/\/doi.org\/10.1016\/C2009-0-61819-5","DOI":"10.1016\/C2009-0-61819-5"},{"key":"4253_CR23","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.comnet.2019.04.027","volume":"158","author":"S Hosseini","year":"2019","unstructured":"Hosseini S, Azizi M (2019) The hybrid technique for ddos detection with supervised learning algorithms. Comput Netw 158:35\u201345. https:\/\/doi.org\/10.1016\/j.comnet.2019.04.027","journal-title":"Comput Netw"},{"key":"4253_CR24","doi-asserted-by":"publisher","unstructured":"Hou J, Fu P, Cao Z, Xu A (2018) Machine learning based DDoS detection through netflow analysis. In: MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM), pp. 1\u20136. Los Angeles, CA, USA (2018). https:\/\/doi.org\/10.1109\/MILCOM.2018.8599738","DOI":"10.1109\/MILCOM.2018.8599738"},{"issue":"10","key":"4253_CR25","doi-asserted-by":"publisher","first-page":"3193","DOI":"10.1007\/s10489-018-1141-2","volume":"48","author":"M Idhammad","year":"2018","unstructured":"Idhammad M, Afdel K, Belouch M (2018) Semi-supervised machine learning approach for DDoS detection. Appl Intell 48(10):3193\u20133208. https:\/\/doi.org\/10.1007\/s10489-018-1141-2","journal-title":"Appl Intell"},{"key":"4253_CR26","unstructured":"Imperva Research Labs (2021) DDoS Attacks in the Time of COVID-19. https:\/\/www.imperva.com\/resources\/reports\/Imperva_DDoSAttacksCOVID-19_Report_20201217.pdf. Accessed: Mar. 3, 2021"},{"issue":"6","key":"4253_CR27","doi-asserted-by":"publisher","first-page":"e4330","DOI":"10.1002\/dac.4330","volume":"34","author":"R Kalathiripi","year":"2021","unstructured":"Kalathiripi R (2021) Regression coefficients of traffic flow metrics (rctfm) for ddos defense in iot networks. Int J Commun Syst 34(6):e4330. https:\/\/doi.org\/10.1002\/dac.4330","journal-title":"Int J Commun Syst"},{"key":"4253_CR28","unstructured":"Kupreev O, Badovskaya E, Gutnikov A (2021) DDoS attacks in q4 2019. https:\/\/securelist.com\/ddos-report-q4-2019\/96154\/. Accessed: Mar. 3, 2021"},{"key":"4253_CR29","unstructured":"Kupreev O, Badovskaya E, Gutnikov A (2021) DDoS attacks in q4 2020. https:\/\/securelist.com\/ddos-attacks-in-q4-2020\/100650\/. Accessed: Mar. 3, 2021"},{"key":"4253_CR30","unstructured":"Labs BL (2021) A new DDoS reflection attack: Portmapper; an early warning to the industry. https:\/\/blog.lumen.com\/a-new-ddos-reflection-attack-portmapper-an-early-warning-to-the-industry\/. Accessed on: May. 20, 2021"},{"key":"4253_CR31","doi-asserted-by":"publisher","first-page":"36191","DOI":"10.1109\/ACCESS.2020.2974293","volume":"8","author":"J Li","year":"2020","unstructured":"Li J, Liu M, Xue Z, Fan X, He X (2020) RTVD: a real-time volumetric detection scheme for ddos in the internet of things. IEEE Access 8:36191\u201336201","journal-title":"IEEE Access"},{"key":"4253_CR32","doi-asserted-by":"publisher","unstructured":"Liang X, Znati T (2019) A long short-term memory enabled framework for ddos detection. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp. 1\u20136. Waikoloa, HI, USA (2019). https:\/\/doi.org\/10.1109\/GLOBECOM38437.2019.9013450","DOI":"10.1109\/GLOBECOM38437.2019.9013450"},{"key":"4253_CR33","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071","volume-title":"Introduction to information retrieval","author":"CD Manning","year":"2008","unstructured":"Manning CD, Sch\u00fctze H, Raghavan P (2008) Introduction to information retrieval. Cambridge University Press, Cambridge. https:\/\/doi.org\/10.1017\/CBO9780511809071"},{"key":"4253_CR34","unstructured":"Marshall AD (2005) Remote procedure calls (rpc). In: Programming in C - UNIX System Calls and Subroutines using C. Cardiff School of Computer Science & Informatics (2005). https:\/\/users.cs.cf.ac.uk\/Dave.Marshall\/C\/node33.html"},{"issue":"1","key":"4253_CR35","first-page":"1235","volume":"17","author":"X Meng","year":"2016","unstructured":"Meng X, Bradley J, Yavuz B, Sparks E, Venkataraman S, Liu D, Freeman J, Tsai D, Amde M, Owen S, Xin D, Xin R, Franklin MJ, Zadeh R, Zaharia M, Talwalkar A (2016) Mllib: machine learning in apache spark. J Mach Learn Res 17(1):1235\u20131241","journal-title":"J Mach Learn Res"},{"key":"4253_CR36","doi-asserted-by":"publisher","unstructured":"Mirsky Y, Doitshman T, Elovici Y, Shabtai A (2018) Kitsune: an ensemble of autoencoders for online network intrusion detection. arXiv preprint arXiv:1802.09089 (2018). https:\/\/doi.org\/10.14722\/ndss.2018.23204","DOI":"10.14722\/ndss.2018.23204"},{"issue":"3","key":"4253_CR37","doi-asserted-by":"publisher","first-page":"444","DOI":"10.3390\/electronics9030444","volume":"9","author":"V Morfino","year":"2020","unstructured":"Morfino V, Rampone S (2020) Towards near-real-time intrusion detection for iot devices using supervised learning and apache spark. Electronics 9(3):444. https:\/\/doi.org\/10.3390\/electronics9030444","journal-title":"Electronics"},{"key":"4253_CR38","doi-asserted-by":"publisher","unstructured":"Moustafa N, Slay J (2015) Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 military communications and information systems conference (MilCIS), pp. 1\u20136. IEEE, Canberra, ACT, Australia (2015). https:\/\/doi.org\/10.1109\/MilCIS.2015.7348942","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"4253_CR39","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V, Vanderplas J, Passos A, Cournapeau D, Brucher M, Perrot M, Duchesnay E (2011) Scikit-learn: machine learning in python. J Mach Learn Res 12:2825\u20132830","journal-title":"J Mach Learn Res"},{"issue":"1","key":"4253_CR40","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/BF00116251","volume":"1","author":"JR Quinlan","year":"1986","unstructured":"Quinlan JR (1986) Induction of decision trees. Mach Learn 1(1):81\u2013106. https:\/\/doi.org\/10.1007\/BF00116251","journal-title":"Mach Learn"},{"key":"4253_CR41","doi-asserted-by":"publisher","unstructured":"Rahman O, Quraishi MAG, Lung C (2019) DDoS attacks detection and mitigation in SDN using machine learning. In: 2019 IEEE World Congress on Services (SERVICES), 2642-939X, pp. 184\u2013189. Milan, Italy (2019). https:\/\/doi.org\/10.1109\/SERVICES.2019.00051","DOI":"10.1109\/SERVICES.2019.00051"},{"key":"4253_CR42","doi-asserted-by":"publisher","unstructured":"Rezapour A, Tzeng WG (2021) Rl-shield: mitigating target link-flooding attacks using sdn and deep reinforcement learning routing algorithm. IEEE Transactions on Dependable and Secure Computing pp. 1\u20131 (2021). https:\/\/doi.org\/10.1109\/TDSC.2021.3118081","DOI":"10.1109\/TDSC.2021.3118081"},{"key":"4253_CR43","doi-asserted-by":"publisher","unstructured":"Rios VdM, In\u00e1cio PR, Magoni D, Freire MM (2021) Detection of reduction-of-quality DDoS attacks using fuzzy logic and machine learning algorithms. Computer Networks 186, 107792 (2021). https:\/\/doi.org\/10.1016\/j.comnet.2020.107792","DOI":"10.1016\/j.comnet.2020.107792"},{"key":"4253_CR44","doi-asserted-by":"publisher","unstructured":"Roempluk T, Surinta O (2019) A machine learning approach for detecting distributed denial of service attacks. In: 2019 Joint International Conference on Digital Arts, Media and Technology with ECTI Northern Section Conference on Electrical, Electronics, Computer and Telecommunications Engineering (ECTI DAMT-NCON), pp. 146\u2013149. Nan, Thailand (2019). https:\/\/doi.org\/10.1109\/ECTI-NCON.2019.8692243","DOI":"10.1109\/ECTI-NCON.2019.8692243"},{"key":"4253_CR45","doi-asserted-by":"publisher","unstructured":"Roopak M, Tian GY, Chambers J (2019) Deep learning models for cyber security in iot networks. In: 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0452\u20130457. IEEE, Las Vegas, NV, USA (2019). https:\/\/doi.org\/10.1109\/CCWC.2019.8666588","DOI":"10.1109\/CCWC.2019.8666588"},{"key":"4253_CR46","unstructured":"Rosenberg A, Hirschberg J (2007) V-measure: A conditional entropy-based external cluster evaluation measure. In: Proceedings of the 2007 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning (EMNLP-CoNLL), pp. 410\u2013420. Association for Computational Linguistics, Prague, Czech Republic (2007). https:\/\/www.aclweb.org\/anthology\/D07-1043"},{"key":"4253_CR47","doi-asserted-by":"publisher","unstructured":"Rossow C (2014) Amplification hell: Revisiting network protocols for DDoS abuse. In: The Netw. and Distrib. Syst. Secur. Symp. (2014). https:\/\/doi.org\/10.14722\/ndss.2014.23233","DOI":"10.14722\/ndss.2014.23233"},{"key":"4253_CR48","doi-asserted-by":"publisher","unstructured":"Saini PS, Behal S, Bhatia S (2020) Detection of DDoS attacks using machine learning algorithms. In: 2020 7th International Conference on Computing for Sustainable Global Development (INDIACom), pp. 16\u201321. IEEE, New Delhi, India (2020). https:\/\/doi.org\/10.23919\/INDIACom49435.2020.9083716","DOI":"10.23919\/INDIACom49435.2020.9083716"},{"key":"4253_CR49","doi-asserted-by":"publisher","unstructured":"Sharafaldin I, Habibi\u00a0Lashkari A, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy, pp. 108\u2013116. Funchal, Madeira, Portugal (2018). https:\/\/doi.org\/10.5220\/0006639801080116","DOI":"10.5220\/0006639801080116"},{"key":"4253_CR50","doi-asserted-by":"publisher","unstructured":"Sharafaldin I, Lashkari AH, Hakak S, Ghorbani AA (2019) Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. In: 2019 International Carnahan Conference on Security Technology (ICCST), pp. 1\u20138. Chennai, India (2019). https:\/\/doi.org\/10.1109\/CCST.2019.8888419","DOI":"10.1109\/CCST.2019.8888419"},{"key":"4253_CR51","doi-asserted-by":"publisher","DOI":"10.3390\/app11115213","author":"CS Shieh","year":"2021","unstructured":"Shieh CS, Lin WW, Nguyen TT, Chen CH, Horng MF, Miu D (2021) Detection of unknown ddos attacks with deep learning and gaussian mixture model. Appl Sci. https:\/\/doi.org\/10.3390\/app11115213","journal-title":"Appl Sci"},{"issue":"3","key":"4253_CR52","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.cose.2011.12.012","volume":"31","author":"A Shiravi","year":"2012","unstructured":"Shiravi A, Shiravi H, Tavallaee M, Ghorbani AA (2012) Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput Secur 31(3):357\u2013374. https:\/\/doi.org\/10.1016\/j.cose.2011.12.012","journal-title":"Comput Secur"},{"key":"4253_CR53","doi-asserted-by":"publisher","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1\u20136. Ottawa, ON, Canada (2009). https:\/\/doi.org\/10.1109\/CISDA.2009.5356528","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"4253_CR54","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1016\/j.future.2019.10.015","volume":"111","author":"RMA Ujjan","year":"2020","unstructured":"Ujjan RMA, Pervez Z, Dahal K, Bashir AK, Mumtaz R, Gonz\u00e1lez J (2020) Towards sFlow and adaptive polling sampling for deep learning based DDoS detection in SDN. Futur Gener Comput Syst 111:763\u2013779. https:\/\/doi.org\/10.1016\/j.future.2019.10.015","journal-title":"Futur Gener Comput Syst"},{"key":"4253_CR55","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101645","author":"M Wang","year":"2020","unstructured":"Wang M, Lu Y, Qin J (2020) A dynamic MLP-based DDoS attack detection method using feature selection and feedback. Comput Secur. https:\/\/doi.org\/10.1016\/j.cose.2019.101645","journal-title":"Comput Secur"},{"key":"4253_CR56","doi-asserted-by":"publisher","unstructured":"Wani AR, Rana QP, Saxena U, Pandey N (2019) Analysis and detection of DDoS attacks on cloud computing environment using machine learning techniques. In: 2019 Amity International Conference on Artificial Intelligence (AICAI), pp. 870\u2013875. Dubai, United Arab Emirates (2019). https:\/\/doi.org\/10.1109\/AICAI.2019.8701238","DOI":"10.1109\/AICAI.2019.8701238"},{"key":"4253_CR57","doi-asserted-by":"publisher","unstructured":"Yang K, Zhang J, Xu Y, Chao J (2020) Ddos attacks detection with autoencoder. In: NOMS 2020 - 2020 IEEE\/IFIP Network Operations and Management Symposium, pp. 1\u20139. Budapest, Hungary (2020). https:\/\/doi.org\/10.1109\/NOMS47738.2020.9110372","DOI":"10.1109\/NOMS47738.2020.9110372"},{"key":"4253_CR58","doi-asserted-by":"publisher","first-page":"108495","DOI":"10.1109\/ACCESS.2021.3101650","volume":"9","author":"NM Yungaicela-Naula","year":"2021","unstructured":"Yungaicela-Naula NM, Vargas-Rosales C, Perez-Diaz JA (2021) SDN-based architecture for transport and application layer DDoS attack detection by using machine and deep learning. IEEE Access 9:108495\u2013108512. https:\/\/doi.org\/10.1109\/ACCESS.2021.3101650","journal-title":"IEEE Access"},{"issue":"11","key":"4253_CR59","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/2934664","volume":"59","author":"M Zaharia","year":"2016","unstructured":"Zaharia M, Xin RS, Wendell P, Das T, Armbrust M, Dave A, Meng X, Rosen J, Venkataraman S, Franklin MJ, Ghodsi A, Gonzalez J, Shenker S, Stoica I (2016) Apache spark: a unified engine for big data processing. Commun ACM 59(11):56\u201365. https:\/\/doi.org\/10.1145\/2934664","journal-title":"Commun ACM"},{"key":"4253_CR60","doi-asserted-by":"publisher","unstructured":"Zhou B, Li J, Wu J, Guo S, Gu Y, Li Z (2018) Machine-learning-based online distributed denial-of-service attack detection using spark streaming. In: 2018 IEEE International Conference on Communications (ICC), pp. 1\u20136. Kansas City, MO, USA (2018). https:\/\/doi.org\/10.1109\/ICC.2018.8422327","DOI":"10.1109\/ICC.2018.8422327"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04253-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-021-04253-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04253-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T10:53:57Z","timestamp":1744196037000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-021-04253-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,7]]},"references-count":60,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["4253"],"URL":"https:\/\/doi.org\/10.1007\/s11227-021-04253-x","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,7]]},"assertion":[{"value":"16 December 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The code will be available after obtaining permission from the Yazd University.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}}]}}