{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T14:25:09Z","timestamp":1756995909876,"version":"3.37.3"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,8,24]],"date-time":"2017-08-24T00:00:00Z","timestamp":1503532800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1007\/s11235-017-0375-3","type":"journal-article","created":{"date-parts":[[2017,8,24]],"date-time":"2017-08-24T15:08:41Z","timestamp":1503587321000},"page":"67-78","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Reducing false rate packet recognition using Dual Counting Bloom Filter"],"prefix":"10.1007","volume":"68","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3005-9949","authenticated-orcid":false,"given":"Ivica","family":"Dodig","sequence":"first","affiliation":[]},{"given":"Vlado","family":"Sruk","sequence":"additional","affiliation":[]},{"given":"Davor","family":"Cafuta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,24]]},"reference":[{"key":"375_CR1","unstructured":"Cisco. (2016). Annual Security Report 2016. http:\/\/www.cisco.com\/c\/dam\/assets\/offers\/pdfs\/cisco-asr-2016.pdf . Accessed Jan 2016."},{"issue":"1","key":"375_CR2","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/s11235-009-9234-1","volume":"45","author":"G Zhang","year":"2010","unstructured":"Zhang, G., Fischer-H\u00fcbner, S., & Ehlert, S. (2010). Blocking attacks on SIP VoIP proxies caused by external processing. Telecommunication Systems, 45(1), 61\u201376.","journal-title":"Telecommunication Systems"},{"key":"375_CR3","doi-asserted-by":"crossref","unstructured":"Sun, C., Fan, J., & Liu, B. (2007). A robust scheme to detect SYN flooding attacks. In Second International Conference on Communications and Networking (pp. 397\u2013401).","DOI":"10.1109\/CHINACOM.2007.4469411"},{"issue":"3\u20134","key":"375_CR4","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1007\/s11235-004-5581-0","volume":"28","author":"L Li","year":"2005","unstructured":"Li, L., & Lee, G. (2005). DDoS attack detection and wavelets. Telecommunication Systems, 28(3\u20134), 435\u2013451.","journal-title":"Telecommunication Systems"},{"issue":"1","key":"375_CR5","first-page":"1","volume":"20","author":"V Zlomisli\u0107","year":"2017","unstructured":"Zlomisli\u0107, V., Fertalj, K., & Sruk, V. (2017). Denial of service attacks, defences and research challenges. Cluster Computing The Journal of Networks, Software Tools and Applications, 20(1), 1\u201311.","journal-title":"Cluster Computing The Journal of Networks, Software Tools and Applications"},{"key":"375_CR6","unstructured":"DDoS Attacks in Q4 2015. Kaspersky Lab Report. https:\/\/securelist.com\/analysis\/quarterly-malware-reports\/73414\/kaspersky-ddos-intelligence-report-for-q4-2015\/ . Accessed Jan 2016."},{"issue":"5","key":"375_CR7","doi-asserted-by":"crossref","first-page":"1463","DOI":"10.1109\/TNET.2013.2281614","volume":"22","author":"A Markku","year":"2014","unstructured":"Markku, A., Aura, T., & S\u00e4rel\u00e4, M. (2014). Denial-of-service attacks in Bloom-filter-based forwarding. IEEE\/ACM Transactions on Networking (TON), 22(5), 1463\u20131476.","journal-title":"IEEE\/ACM Transactions on Networking (TON)"},{"issue":"1","key":"375_CR8","doi-asserted-by":"crossref","first-page":"99","DOI":"10.5121\/ijdps.2012.3108","volume":"3","author":"MA Mehdi","year":"2012","unstructured":"Mehdi, M. A., & Amphawan, A. (2012). Review of syn-flooding attack detection mechanism. International Journal of Distributed & Parallel Systems, 3(1), 99\u2013117.","journal-title":"International Journal of Distributed & Parallel Systems"},{"key":"375_CR9","unstructured":"Scarfone, K., & Mell, P. (2010). Guide to intrusion detection and prevention systems (IDPS) (NIST SP 800-94). Washington, DC: Computer Security Resource Center, National Institute of Standards and Technology, U.S. Department of Commerce."},{"key":"375_CR10","unstructured":"Wang, G., Xu, M., & Huan, X. (2012). Design and implementation of an embedded router with packet filtering. In Proceedings\u20142012 IEEE Symposium on Electrical and Electronics Engineering, EEESYM 2012 (pp. 285\u2013288)."},{"issue":"4","key":"375_CR11","doi-asserted-by":"crossref","first-page":"177","DOI":"10.5121\/ijcses.2011.2413","volume":"2","author":"A Mittal","year":"2011","unstructured":"Mittal, A., Shrivastava, A. K., & Manoria, M. (2011). A review of DDOS attack and its countermeasures in TCP based networks. International Journal of Computer Science & Engineering Survey (IJCSES), 2(4), 177\u2013187.","journal-title":"International Journal of Computer Science & Engineering Survey (IJCSES)"},{"issue":"1","key":"375_CR12","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1109\/LCOMM.2013.112613.132275","volume":"18","author":"X Ma","year":"2014","unstructured":"Ma, X., & Chen, Y. (2014). DDoS detection method based on chaos analysis of network traffic entropy. IEEE Communications Letters, 18(1), 114\u2013117.","journal-title":"IEEE Communications Letters"},{"issue":"4","key":"375_CR13","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1080\/15427951.2004.10129096","volume":"1","author":"A Broder","year":"2003","unstructured":"Broder, A., & Mitzenmacher, M. (2003). Network application of Bloom filters: A survey. Internet Mathematics, 1(4), 485\u2013509.","journal-title":"Internet Mathematics"},{"key":"375_CR14","doi-asserted-by":"crossref","unstructured":"Sun, C., Hu, C., Tang, Yi, & Liu, B. (2009). More accurate and fast SYN flood detection. In Proceedings of 18th International Conference on Computer Communications and Networks (pp. 1\u20136).","DOI":"10.1109\/ICCCN.2009.5235270"},{"issue":"2","key":"375_CR15","first-page":"41","volume":"3","author":"F Farkaz","year":"2006","unstructured":"Farkaz, F., & Halasz, S. (2006). Embedded fuzzy controller for industrial applications. Acta Polytechnica Hungarica, 3(2), 41\u201363.","journal-title":"Acta Polytechnica Hungarica"},{"issue":"4","key":"375_CR16","first-page":"497","volume":"34","author":"Z Xia","year":"2010","unstructured":"Xia, Z., Lu, S., Li, J., & Tang, J. (2010). Enhancing DDoS flood attack detection via intelligent fuzzy logic. Informatica (Slovenia) An International Journal of Computing and Informatics, 34(4), 497\u2013507.","journal-title":"Informatica (Slovenia) An International Journal of Computing and Informatics"},{"key":"375_CR17","doi-asserted-by":"crossref","unstructured":"Kawahara, R., Ishibashi, K., Mori, T., Kamiyama, N., Harada, S., & Asano, S. (2007). Detection accuracy of network anomalies using sampled flow statistics. In Global Telecommunications Conference 2007, GLOBE-COM \u201907 (pp. 1959\u20131964). IEEE.","DOI":"10.1109\/GLOCOM.2007.376"},{"issue":"1","key":"375_CR18","first-page":"1","volume":"2","author":"G Kanwal","year":"2011","unstructured":"Kanwal, G., & Rshma, C. (2011). Detection of DDoS attack using data mining. International Journal of Computing and Business Research (IJCBR), 2(1), 1\u201310.","journal-title":"International Journal of Computing and Business Research (IJCBR)"},{"issue":"1","key":"375_CR19","first-page":"16","volume":"98","author":"RC Prathibha","year":"2014","unstructured":"Prathibha, R. C., & Rejimol Robinson, R. R. (2014). A comparative study of defense mechanisms against SYN flooding attack. International Journal of Computer Applications, 98(1), 16\u201321.","journal-title":"International Journal of Computer Applications"},{"key":"375_CR20","unstructured":"Fall, R. K., & Stevens, R. W. (2012). TCP\/IP illustrated, volume 1: The protocols. Addison-Wesley Professional Computing Series. New York: Pearson Education."},{"key":"375_CR21","doi-asserted-by":"crossref","unstructured":"Sun, C., Fan, J., Shi, L., & Liu, B. (2007). A novel router-based scheme to mitigate SYN flooding DDoS attacks. In IEEE INFOCOM (Poster), Anchorage, Alaska, USA","DOI":"10.1109\/CHINACOM.2007.4469411"},{"issue":"1","key":"375_CR22","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/TNET.2006.890115","volume":"15","author":"R Kompella","year":"2007","unstructured":"Kompella, R., Singh, S., & Varghese, G. (2007). On scalable attack detection in the network. IEEE\/ACM Transactions on Networking, 15(1), 14\u201325.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"375_CR23","unstructured":"Chen, W., Yeung, D. Y. (2006). Defending against TCP SYN flooding attacks under different types of IP spoofing. In International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL06) (pp. 38\u201342)."},{"issue":"1","key":"375_CR24","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/s11235-006-9006-0","volume":"33","author":"W Chen","year":"2006","unstructured":"Chen, W., & Yeung, D. Y. (2006). Throttling spoofed SYN flooding traffic at the source. Telecommunication Systems, 33(1), 47\u201365.","journal-title":"Telecommunication Systems"},{"key":"375_CR25","doi-asserted-by":"crossref","unstructured":"Nashat, D., Juang, X., & Horiguchi, S. (2008). Router based detection for low-rate agents of DDoS attack. In 2008 International Conference on High Performance Switching and Routing (pp. 177\u2013182).","DOI":"10.1109\/HSPR.2008.4734440"},{"issue":"1","key":"375_CR26","first-page":"31","volume":"3","author":"Y Ling","year":"2009","unstructured":"Ling, Y., Gu, Y., & Wei, G. (2009). Detect SYN flooding attack in edge routers. International Journal of Security and its Applications, 3(1), 31\u201345.","journal-title":"International Journal of Security and its Applications"},{"issue":"3","key":"375_CR27","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1049\/iet-ifs.2010.0158","volume":"6","author":"C Sun","year":"2013","unstructured":"Sun, C., Hu, C., & Liu, B. (2013). $$\\mathit{SACK}^2$$ SACK 2 : Effective SYN flood detection against skillful spoofs. IET Information Security, 6(3), 149\u2013156.","journal-title":"IET Information Security"},{"key":"375_CR28","doi-asserted-by":"crossref","unstructured":"Halagan, T., Kovacik, T., Truchly, P., & Binder, A. (2015). Syn flood attack detection and type distinguishing mechanism based on Counting Bloom Filter. In Information and Communication Technology: Third IFIP TC 5\/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, 4\u20137 Oct 2015, Proceedings (pp. 30\u201339). Springer, New York.","DOI":"10.1007\/978-3-319-24315-3_4"},{"key":"375_CR29","doi-asserted-by":"crossref","unstructured":"Alzahrani, A. B., Vassilakis, G. V., & Reed, J. M. (2014). Selecting Bloom-filter header lengths for secure information centric networking. In 2014 9th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP) (pp. 628\u2013633). IEEE.","DOI":"10.1109\/CSNDSP.2014.6923904"},{"issue":"4","key":"375_CR30","first-page":"1","volume":"8","author":"B Alzahrani","year":"2016","unstructured":"Alzahrani, B., Vassilakis, V., Alreshoodi, M., Alarfaj, F., & Alhindi, A. (2016). Proactive detection of DDOS attacks in Publish-Subscribe networks. International Journal of Network Security & Its Applications (IJNSA), 8(4), 1\u201315.","journal-title":"International Journal of Network Security & Its Applications (IJNSA)"},{"key":"375_CR31","unstructured":"Blustein, J., & El-Maazawi, A. (2002). Bloom filters\u2014A tutorial, analysis, and survey. Faculty of Computer Science, Dalhousie University. https:\/\/www.cs.dal.ca\/sites\/default\/files\/technical_reports\/CS-2002-10.pdf . Accessed Jan 2016."},{"issue":"12","key":"375_CR32","doi-asserted-by":"crossref","first-page":"1378","DOI":"10.1109\/12.641938","volume":"46","author":"MV Ramakrishna","year":"1997","unstructured":"Ramakrishna, M. V., Fu, E., & Bahcekapili, E. (1997). Efficient hardware hashing functions for high performance computers. IEEE Transactions on Computers, 46(12), 1378\u20131381.","journal-title":"IEEE Transactions on Computers"},{"key":"375_CR33","unstructured":"Ramakrishna, M. V., Fu, E., & Bahcekapili, E. (1994). A performance study of hashing functions for hardware applications. In Proceedings of International Conference on Computing and Information (pp. 1621\u20131636)."},{"key":"375_CR34","doi-asserted-by":"crossref","unstructured":"Harwayne-Gidansky, J., Stefan, D., & Dalal, I. (2009). FPGA-based SoC for real-time network intrusion detection using Counting Bloom Filters. In IEEE Southeastcon 2009 (pp. 452\u2013458).","DOI":"10.1109\/SECON.2009.5174096"},{"key":"375_CR35","unstructured":"Tabataba, F.S., & Hashemi, M.R. (2011). Improving false positive in Bloom filter. In 2011 19th Iranian Conference on Electrical Engineering (pp. 1\u20135)."},{"issue":"4","key":"375_CR36","doi-asserted-by":"crossref","first-page":"1092","DOI":"10.1109\/TNET.2013.2272604","volume":"22","author":"O Rottenstreich","year":"2014","unstructured":"Rottenstreich, O., Kanizo, Y., & Keslassy, I. (2014). The variable increment counting Bloom filter. IEEE\/ACM Transactions on Networking, 22(4), 1092\u20131105.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"375_CR37","doi-asserted-by":"crossref","unstructured":"S\u00e4rel\u00e4, M., Rothenberg, C. E., Aura, T., Zahemszky, A., Nikander, P., & Ott, J. (2011). Forwarding anomalies in Bloom filter-based multicast. In INFOCOM, 2011 Proceedings IEEE (pp. 2399\u20132407).","DOI":"10.1109\/INFCOM.2011.5935060"},{"issue":"3","key":"375_CR38","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1109\/90.851975","volume":"8","author":"L Fan","year":"2000","unstructured":"Fan, L., Cao, P., Almeida, J., & Broder, A. Z. (2000). Summary cache: A scalable wide-area web cache sharing protocol. IEEE\/ACM Transactions on Networking (TON), 8(3), 281\u2013293.","journal-title":"IEEE\/ACM Transactions on Networking (TON)"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11235-017-0375-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-017-0375-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-017-0375-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T15:45:34Z","timestamp":1570031134000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11235-017-0375-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,24]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,5]]}},"alternative-id":["375"],"URL":"https:\/\/doi.org\/10.1007\/s11235-017-0375-3","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"type":"print","value":"1018-4864"},{"type":"electronic","value":"1572-9451"}],"subject":[],"published":{"date-parts":[[2017,8,24]]}}}