{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T19:19:40Z","timestamp":1768677580571,"version":"3.49.0"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T00:00:00Z","timestamp":1496275200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1007\/s11277-017-4505-8","type":"journal-article","created":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T06:57:41Z","timestamp":1496300261000},"page":"281-308","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["BIFAD: Bio-Inspired Anomaly Based HTTP-Flood Attack Detection"],"prefix":"10.1007","volume":"97","author":[{"given":"K.","family":"Munivara Prasad","sequence":"first","affiliation":[]},{"given":"A.","family":"Rama Mohan Reddy","sequence":"additional","affiliation":[]},{"given":"K.","family":"Venugopal Rao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,1]]},"reference":[{"issue":"2","key":"4505_CR1","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J Mirkovic","year":"2004","unstructured":"Mirkovic, J., & Reiher, P. (2004). A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review, 34(2), 39\u201353.","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"4505_CR2","doi-asserted-by":"crossref","unstructured":"Kumar, K., Joshi, R. C., & Singh, K. (2007). A distributed approach using entropy to detect DDoS attacks in ISP domain. In Signal processing, communications and networking. IEEE.","DOI":"10.1109\/ICSCN.2007.350758"},{"key":"4505_CR3","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1016\/j.cose.2016.10.005","volume":"65","author":"K Singh","year":"2016","unstructured":"Singh, K., Singh, P., & Kumar, K. (2016). Application layer HTTP-GET flood DDoS attacks: Research landscape and challenges. Computers and Security, 65, 344\u2013372.","journal-title":"Computers and Security"},{"key":"4505_CR4","doi-asserted-by":"crossref","unstructured":"Udhayan, J., & R. Anitha. (2009). Demystifying and rate limiting ICMP hosted DoS\/DDoS flooding attacks with attack productivity analysis. In Advance computing conference, 2009. IACC 2009. IEEE International. IEEE.","DOI":"10.1109\/IADCC.2009.4809072"},{"key":"4505_CR5","doi-asserted-by":"crossref","unstructured":"Chun-Tao, X., et al. (2012). An algorithm of detecting and defending CC attack in real time. In International conference on industrial control and electronics engineering (ICICEE), 2012. IEEE.","DOI":"10.1109\/ICICEE.2012.477"},{"key":"4505_CR6","unstructured":"Specht, S. M., & Lee, R. B. (2004). Distributed denial of service: Taxonomies of attacks, tools, and countermeasures. In ISCA PDCS."},{"issue":"3","key":"4505_CR7","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1145\/1013202.1013203","volume":"4","author":"S Byers","year":"2004","unstructured":"Byers, S., Rubin, A. D., & Kormann, D. (2004). Defending against an Internet-based attack on the physical world. ACM Transactions on Internet Technology (TOIT), 4(3), 239\u2013254.","journal-title":"ACM Transactions on Internet Technology (TOIT)"},{"key":"4505_CR8","doi-asserted-by":"crossref","unstructured":"Estevez-Tapiador, J. M., Garc\u00eda-Teodoro, P., & D\u00edaz-Verdejo, J. E. (2005) Detection of web-based attacks through Markovian protocol parsing. In 10th IEEE Symposium on Computers and Communications (ISCC\u201905). IEEE.","DOI":"10.1109\/ISCC.2005.51"},{"key":"4505_CR9","doi-asserted-by":"crossref","unstructured":"Ishida, C., et al. (2005). Forecast techniques for predicting increase or decrease of attacks using Bayesian inference. In PACRIM. 2005 IEEE Pacific rim conference on communications, computers and signal processing, 2005. IEEE.","DOI":"10.1109\/PACRIM.2005.1517323"},{"key":"4505_CR10","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1007\/978-0-387-53991-1_3","volume-title":"QoS requirements for multimedia services. Resource management in satellite networks","author":"RA Cacheda","year":"2007","unstructured":"Cacheda, R. A., et al. (2007). QoS requirements for multimedia services. Resource management in satellite networks (pp. 67\u201394). New York: Springer."},{"key":"4505_CR11","doi-asserted-by":"crossref","unstructured":"Yang, X-S., & Deb S. (2009). Cuckoo search via L\u00e9vy flights. Nature & biologically inspired computing, 2009. NaBIC 2009. World Congress on. IEEE.","DOI":"10.1109\/NABIC.2009.5393690"},{"issue":"3","key":"4505_CR12","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1093\/sysbio\/45.3.380","volume":"45","author":"R Real","year":"1996","unstructured":"Real, R., & Vargas, J. M. (1996). The probabilistic basis of Jaccard\u2019s index of similarity. Systematic Biology, 45(3), 380\u2013385.","journal-title":"Systematic Biology"},{"key":"4505_CR13","doi-asserted-by":"crossref","unstructured":"Yatagai, T., Takamasa I., & Iwao S. (2007). Detection of HTTP-GET flood attack based on analysis of page access behavior. In 2007 IEEE Pacific rim conference on communications, computers and signal processing. IEEE.","DOI":"10.1109\/PACRIM.2007.4313218"},{"key":"4505_CR14","unstructured":"Jin, J., Nodar, Im, C., & Nam, S. Y. (2010). Mitigating HTTP GET flooding attacks through modified NetFPGA reference router. 1-st Asia NetFPGA Developers Workshop, June 13\u201314, Daejeon, Korea."},{"issue":"1","key":"4505_CR15","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1109\/TNET.2008.925628","volume":"17","author":"Y Xie","year":"2009","unstructured":"Xie, Y., & Yu, S.-Z. (2009). Monitoring the application-layer DDoS attacks for popular websites. IEEE\/ACM Transactions on Networking, 17(1), 15\u201325.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"4505_CR16","doi-asserted-by":"crossref","unstructured":"Lu, W-Z., & Yu, S. Z. (2016) An HTTP flooding detection method based on browser behavior. In 2006 international conference on computational intelligence and security, Vol. 2. IEEE.","DOI":"10.1109\/ICCIAS.2006.295444"},{"key":"4505_CR17","doi-asserted-by":"crossref","unstructured":"Lee, J-S., et al. (2008). The activity analysis of malicious http-based botnets using degree of periodic repeatability. In International conference on security technology, 2008. SECTECH\u201908. IEEE.","DOI":"10.1109\/SecTech.2008.52"},{"issue":"4","key":"4505_CR18","first-page":"25","volume":"2","author":"S Gulati","year":"2013","unstructured":"Gulati, S., & Dhaliwal, A. (2013). Survey on ROQ attacks. International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), 2(4), 25\u201354.","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE)"},{"key":"4505_CR19","volume-title":"Internet denial of service: Attack and defense mechanisms","author":"D Dittrich","year":"2004","unstructured":"Dittrich, D., et al. (2004). Internet denial of service: Attack and defense mechanisms. London: Pearson Education."},{"issue":"7","key":"4505_CR20","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1109\/LCOMM.2009.090628","volume":"13","author":"A Shevtekar","year":"2009","unstructured":"Shevtekar, A., & Ansari, N. (2009). Is it congestion or a DDoS attack? IEEE Communications Letters, 13(7), 546\u2013548.","journal-title":"IEEE Communications Letters"},{"issue":"1","key":"4505_CR21","doi-asserted-by":"crossref","first-page":"698","DOI":"10.1016\/j.asoc.2012.08.028","volume":"13","author":"D Stevanovic","year":"2013","unstructured":"Stevanovic, D., Vlajic, N., & An, A. (2013). Detection of malicious and non-malicious website visitors using unsupervised neural network learning. Applied Soft Computing, 13(1), 698\u2013708.","journal-title":"Applied Soft Computing"},{"key":"4505_CR22","doi-asserted-by":"crossref","unstructured":"Das, D., Sharma, U., & Bhattacharyya D. K. (2011). Detection of HTTP flooding attacks in multiple scenarios. In Proceedings of the 2011 international conference on communication, computing and security. ACM.","DOI":"10.1145\/1947940.1948047"},{"key":"4505_CR23","unstructured":"Baik, N-K, et al. (2008) Analysis and design of an intrusion tolerance node for application in traffic shaping. In International conference on control, automation and systems, 2008. ICCAS 2008. IEEE."},{"key":"4505_CR24","doi-asserted-by":"crossref","unstructured":"Chen, Y. W. (2000). Study on the prevention of SYN flooding by using traffic policing. In Network operations and management symposium, 2000. NOMS 2000. 2000 IEEE\/IFIP. IEEE.","DOI":"10.1109\/NOMS.2000.830416"},{"issue":"10","key":"4505_CR25","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1016\/j.micpro.2004.08.007","volume":"28","author":"A Garg","year":"2004","unstructured":"Garg, A., & Reddy, A. L. N. (2004). Mitigation of DoS attacks through QoS regulation. Microprocessors and Microsystems, 28(10), 521\u2013530.","journal-title":"Microprocessors and Microsystems"},{"issue":"1","key":"4505_CR26","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/TNET.2008.926503","volume":"17","author":"S Ranjan","year":"2009","unstructured":"Ranjan, S., et al. (2009). DDoS-shield: DDoS-resilient scheduling to counter application layer attacks. IEEE\/ACM Transactions on Networking (TON), 17(1), 26\u201339.","journal-title":"IEEE\/ACM Transactions on Networking (TON)"},{"key":"4505_CR27","unstructured":"Kandula, S., et al. (2005). Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds. In Proceedings of the 2nd conference on symposium on networked systems design & implementation, USENIX association Vol. 2.."},{"issue":"1","key":"4505_CR28","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/TNET.2008.923716","volume":"17","author":"Y Xie","year":"2009","unstructured":"Xie, Y., & Yu, S.-Z. (2009). A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors. IEEE\/ACM Transactions on Networking (TON), 17(1), 54\u201365.","journal-title":"IEEE\/ACM Transactions on Networking (TON)"},{"key":"4505_CR29","unstructured":"Ye, C., & Zheng, K. (2011). Detection of application layer distributed denial of service. In Computer science and network technology (ICCSNT), 2011 International Conference on. Vol. 1. IEEE."},{"key":"4505_CR30","unstructured":"Hameed, S., & Ali, U. (2015).On the efficacy of live DDoS detection with Hadoop. arXiv preprint arXiv:1506.08953 ."},{"issue":"3\/4","key":"4505_CR31","first-page":"28","volume":"3","author":"J Choi","year":"2013","unstructured":"Choi, J., et al. (2013). Detecting web based DDoS attack using map reduce operations in cloud computing environment. Journal of Internet Services and Information Security, 3(3\/4), 28\u201337.","journal-title":"Journal of Internet Services and Information Security"},{"issue":"9","key":"4505_CR32","doi-asserted-by":"crossref","first-page":"1697","DOI":"10.1007\/s00500-014-1250-8","volume":"18","author":"J Choi","year":"2014","unstructured":"Choi, J., et al. (2014). A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment. Soft Computing, 18(9), 1697\u20131703.","journal-title":"Soft Computing"},{"key":"4505_CR33","doi-asserted-by":"crossref","unstructured":"Razzaq, A., et al.(2011). Foundation of semantic rule engine to protect web application attacks. In 2011 Tenth international symposium on autonomous decentralized systems. IEEE.","DOI":"10.1109\/ISADS.2011.19"},{"key":"4505_CR34","doi-asserted-by":"crossref","unstructured":"Ansarinia, M., et al. (2012). Ontology-based modeling of DDoS attacks for attack plan detection. In 2012 Sixth international symposium on telecommunications (IST). IEEE.","DOI":"10.1109\/ISTEL.2012.6483131"},{"key":"4505_CR35","doi-asserted-by":"crossref","unstructured":"Shenbagam, J., & Salini, P. (2014). Vulnerability ontology for web applications to predict and classify attacks. In 2014 International conference on electronics, communication and computational engineering (ICECCE). IEEE.","DOI":"10.1109\/ICECCE.2014.7086625"},{"key":"4505_CR36","doi-asserted-by":"crossref","DOI":"10.4135\/9781412985642","volume-title":"Reliability and validity assessment","author":"EG Carmines","year":"1979","unstructured":"Carmines, E. G., & Zeller, R. A. (1979). Reliability and validity assessment (Vol. 17). Singapore: Sage publications."},{"key":"4505_CR37","doi-asserted-by":"crossref","unstructured":"Kiran, S., Mohapatra, A., & Swamy, R. (2015). Experiences in performance testing of web applications with Unified Authentication platform using Jmeter. In 2015 international symposium on technology management and emerging technologies (ISTMET). IEEE.","DOI":"10.1109\/ISTMET.2015.7359004"},{"key":"4505_CR38","unstructured":"NVIDIA (2015). PNY-NVIDIA-GeForce-GTX 960 4GB XLR8.pdf."},{"key":"4505_CR39","unstructured":"Nvidia, C. U. D. A. (2009). Programming guide, version 2.3."},{"issue":"3","key":"4505_CR40","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1080\/10618600.1996.10474713","volume":"5","author":"R Ihaka","year":"1996","unstructured":"Ihaka, R., & Gentleman, R. (1996). R: a language for data analysis and graphics. Journal of computational and graphical statistics, 5(3), 299\u2013314.","journal-title":"Journal of computational and graphical statistics"},{"issue":"1","key":"4505_CR41","first-page":"37","volume":"2","author":"DM Powers","year":"2011","unstructured":"Powers, D. M. (2011). Evaluation: From precision, recall and F-measure to ROC, informedness, markedness and correlation. Journal of Machine Learning Technologies, 2(1), 37\u201363.","journal-title":"Journal of Machine Learning Technologies"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-4505-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4505-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4505-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T13:45:15Z","timestamp":1719236715000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-4505-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,1]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,11]]}},"alternative-id":["4505"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-4505-8","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,6,1]]}}}