{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T06:40:57Z","timestamp":1769841657189,"version":"3.49.0"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,1,4]],"date-time":"2021-01-04T00:00:00Z","timestamp":1609718400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,4]],"date-time":"2021-01-04T00:00:00Z","timestamp":1609718400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11277-020-07954-3","type":"journal-article","created":{"date-parts":[[2021,1,4]],"date-time":"2021-01-04T03:03:18Z","timestamp":1609729398000},"page":"1985-2006","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A Novel Feature-Based DDoS Detection and Mitigation Scheme in SDN Controller Using Queueing Theory"],"prefix":"10.1007","volume":"117","author":[{"given":"Ava","family":"Tahmasebi","sequence":"first","affiliation":[]},{"given":"Ahmad","family":"Salahi","sequence":"additional","affiliation":[]},{"given":"Mohammad Ali","family":"Pourmina","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,4]]},"reference":[{"issue":"4","key":"7954_CR1","doi-asserted-by":"publisher","first-page":"3559","DOI":"10.1109\/JIOT.2020.2973176","volume":"7","author":"N Ravi","year":"2020","unstructured":"Ravi, N., & Shalinie, M. (2020). Learning-driven detection and mitigation of DDoS attack in IoT via SDN-cloud architecture. IEEE Internet of Things Journal, 7(4), 3559\u20133570. https:\/\/doi.org\/10.1109\/JIOT.2020.2973176.","journal-title":"IEEE Internet of Things Journal"},{"issue":"4","key":"7954_CR2","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1093\/comjnl\/bxy117","volume":"62","author":"V Dang","year":"2019","unstructured":"Dang, V., Huong, T., Thanh, N., Nam, P., & Thanh, N. (2019). SDN-based SYN Proxy\u2014A solution to enhance performance of attack mitigation under TCP SYN flood. The Computer Journal, 62(4), 518\u2013534. https:\/\/doi.org\/10.1093\/comjnl\/bxy117.","journal-title":"The Computer Journal"},{"key":"7954_CR3","unstructured":"Wang, H., Xu, L., & Gu. G. (2014). FloodGuard, a DoS attack prevention extension in software-defined networks. In 45th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), Rio de Janeiro, Brazil (pp. 239\u2013250)."},{"key":"7954_CR4","doi-asserted-by":"crossref","unstructured":"Lim, S., Ha, J., Kim, H., Kim, Y., & Yang, S. (2014). A SDN-oriented DDoS blocking scheme for botnet-based attacks. In IEEE 6th International Conference on Ubiquitous and Future Networks (ICUFN), Shanghai, China (pp. 63\u201368).","DOI":"10.1109\/ICUFN.2014.6876752"},{"issue":"7","key":"7954_CR5","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1109\/MCOM.2015.7158284","volume":"53","author":"M Comeras","year":"2015","unstructured":"Comeras, M., Bafalluy, J., Krendzel, A., & Esteso, M. (2015). An evolutionary path for the evolved packet system. IEEE Communications Magazine, 53(7), 184\u2013191. https:\/\/doi.org\/10.1109\/MCOM.2015.7158284.","journal-title":"IEEE Communications Magazine"},{"key":"7954_CR6","doi-asserted-by":"crossref","unstructured":"Zhao, G., Huang, L., Yu, Z., Xu, H., & Wang, P. (2017). On the effect of flow table size and controller capacity on SDN network throughput. In IEEE International Conference on Communications (ICC), Paris, France (pp. 1\u20136).","DOI":"10.1109\/ICC.2017.7996512"},{"key":"7954_CR7","doi-asserted-by":"crossref","unstructured":"Yao, L, Hong, P, & Zhou, W. (2014). Evaluating the controller capacity in software defined networking. In 23rd International Conference on Computer Communication and Networks (ICCCN), Shanghai, China (pp. 1\u20136).","DOI":"10.1109\/ICCCN.2014.6911857"},{"key":"7954_CR8","doi-asserted-by":"crossref","unstructured":"Bari, M., Roy, A., Chowdhury, S., Zhang, Q., Zhani, M., Ahmed, R., et al. (2013). Dynamic controller provisioning in software defined networks. In 9th International Conference on Network and Service Management (CNSM), Zurich, Switzerland (pp. 18\u201325).","DOI":"10.1109\/CNSM.2013.6727805"},{"issue":"4","key":"7954_CR9","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/2534169.2491193","volume":"43","author":"A Dixit","year":"2013","unstructured":"Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., & Kompella, R. (2013). Towards an elastic distributed SDN controller. ACM SIGCOMM Computer Communication Review, 43(4), 7\u201312. https:\/\/doi.org\/10.1145\/2534169.2491193.","journal-title":"ACM SIGCOMM Computer Communication Review"},{"issue":"1","key":"7954_CR10","doi-asserted-by":"publisher","first-page":"34699","DOI":"10.1109\/ACCESS.2019.2895092","volume":"7","author":"Y Wang","year":"2019","unstructured":"Wang, Y., Hu, T., Tang, G., Xie, J., & Lu, J. (2019). SGS: Safe-guard scheme for protecting control plane against DDoS attacks in software-defined networking. IEEE Access, 7(1), 34699\u201334710. https:\/\/doi.org\/10.1109\/ACCESS.2019.2895092.","journal-title":"IEEE Access"},{"issue":"1","key":"7954_CR11","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1002\/nem.1917","volume":"26","author":"C Basile","year":"2016","unstructured":"Basile, C., Canavese, D., Lioy, A., Pitscheider, C., & Valenza, F. (2016). Interfunction anomaly analysis for correct SDN\/NFV deployment. Networks, 26(1), 25\u201343. https:\/\/doi.org\/10.1002\/nem.1917.","journal-title":"Networks"},{"issue":"2","key":"7954_CR12","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1109\/TNSM.2017.2669082","volume":"14","author":"S Song","year":"2017","unstructured":"Song, S., Park, H., Choi, H., Choi, T., & Zhu, H. (2017). Control path management framework for enhancing software-defined network (SDN) reliability. IEEE Transactions on Network Service Management, 14(2), 302\u2013316. https:\/\/doi.org\/10.1109\/TNSM.2017.2669082.","journal-title":"IEEE Transactions on Network Service Management"},{"issue":"1","key":"7954_CR13","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1109\/TNSM.2019.2960202","volume":"17","author":"K Simpson","year":"2020","unstructured":"Simpson, K., Rogers, S., & Pezaros, D. (2020). Per-Host DDoS mitigation by direct-control reinforcement learning. IEEE Transactions on Network and Service Management, 17(1), 103\u2013117. https:\/\/doi.org\/10.1109\/TNSM.2019.2960202.","journal-title":"IEEE Transactions on Network and Service Management"},{"issue":"1","key":"7954_CR14","doi-asserted-by":"publisher","first-page":"39547","DOI":"10.1109\/ACCESS.2018.2855135","volume":"6","author":"Q Zhang","year":"2018","unstructured":"Zhang, Q., Wang, X., Huang, M., Li, K., & Das, K. (2018). Software de_ned networking meets information centric networking: A survey. IEEE Access, 6(1), 39547\u201339563. https:\/\/doi.org\/10.1109\/ACCESS.2018.2855135.","journal-title":"IEEE Access"},{"issue":"1","key":"7954_CR15","doi-asserted-by":"publisher","first-page":"64351","DOI":"10.1109\/ACCESS.2019.2917532","volume":"7","author":"Y Gu","year":"2019","unstructured":"Gu, Y., Li, K., Guo, Z., & Wang, Y. (2019). Semi-supervised K-means DDoS detection method using hybrid feature selection algorithm. IEEE Access, 7(1), 64351\u201364365. https:\/\/doi.org\/10.1109\/ACCESS.2019.2917532.","journal-title":"IEEE Access"},{"issue":"3","key":"7954_CR16","doi-asserted-by":"publisher","first-page":"936","DOI":"10.1109\/TNSM.2019.2929425","volume":"16","author":"A Alsirhani","year":"2019","unstructured":"Alsirhani, A., Sampalli, S., & Bodorik, P. (2019). DoS detection system: Using a set of classification algorithms controlled by fuzzy logic system in apache spark. IEEE Transactions on Network and Service Management, 16(3), 936\u2013949. https:\/\/doi.org\/10.1109\/TNSM.2019.2929425.","journal-title":"IEEE Transactions on Network and Service Management"},{"issue":"10","key":"7954_CR17","doi-asserted-by":"publisher","first-page":"1700","DOI":"10.1109\/LCOMM.2019.2931832","volume":"23","author":"L Zhou","year":"2019","unstructured":"Zhou, L., Sood, K., & Xiang, Y. (2019). An accurate approach to detect DDoS attacks using entropy rate measurement. IEEE Communications Letters, 23(10), 1700\u201317003. https:\/\/doi.org\/10.1109\/LCOMM.2019.2931832.","journal-title":"IEEE Communications Letters"},{"key":"7954_CR18","unstructured":"Lincoln Laboratory Scenario of DARPA (DDoS) Intrusion Detection Evaluation Data Sets [Online]. Retrieved from http:\/\/www.ll.mit.edu\/ideval\/data\/2000.html"},{"key":"7954_CR19","unstructured":"The CAIDA UCSD \u201cDDoS Attack 2007\u201d Dataset [Online]. Retrieved from http:\/\/www.caida.org\/data\/passive.xml"},{"key":"7954_CR20","doi-asserted-by":"crossref","unstructured":"Bera, P., Saha, A., & Setua, S. (2016). Denial of service attack in software defined network. In 5th International Conference on Computer Science and Network Technology (ICCSNT), Changchun, China (pp. 497\u2013501).","DOI":"10.1109\/ICCSNT.2016.8070208"},{"key":"7954_CR21","unstructured":"Mininet. Retrieved from http:\/\/mininet.org\/"},{"key":"7954_CR22","unstructured":"Jarschel, W., Oechsner, S., Schlosser, D., Pries, R., Goll, S., & TranGia, P. (2011). Modeling and performance evaluation of an OpenFlow architecture. In 23rd International Teletraffic Congress (ITC), San Francisco, USA (pp. 1\u20137)."},{"key":"7954_CR23","doi-asserted-by":"publisher","first-page":"147553","DOI":"10.1109\/ACCESS.2019.2942142","volume":"7","author":"W Lin","year":"2019","unstructured":"Lin, W. (2019). Aggregation of multiple pseudo relevance feedbacks for image search re-ranking. IEEE Access, 7, 147553\u2013147559. https:\/\/doi.org\/10.1109\/ACCESS.2019.2942142.","journal-title":"IEEE Access"},{"issue":"1","key":"7954_CR24","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.procs.2016.03.007","volume":"79","author":"S Laskara","year":"2016","unstructured":"Laskara, S., & Mishra, D. (2016). Qualified vector match and merge algorithm (QVMMA) for DDoS prevention and mitigation. Computer Science, 79(1), 41\u201352. https:\/\/doi.org\/10.1016\/j.procs.2016.03.007.","journal-title":"Computer Science"},{"issue":"1","key":"7954_CR25","doi-asserted-by":"publisher","first-page":"44570","DOI":"10.1109\/ACCESS.2018.2854567","volume":"6","author":"Y Yu","year":"2018","unstructured":"Yu, Y., Guo, L., Liu, Y., Zheng, J., & Zong, Y. (2018). An efficient SDN-based DDoS attack detection and rapid response platform in vehicular networks. IEEE Access, Security and Privacy for Vehicular Networks, 6(1), 44570\u201344579. https:\/\/doi.org\/10.1109\/ACCESS.2018.2854567.","journal-title":"IEEE Access, Security and Privacy for Vehicular Networks"},{"issue":"4","key":"7954_CR26","doi-asserted-by":"publisher","first-page":"1545","DOI":"10.1109\/TNSM.2018.2861741","volume":"15","author":"P Kumar","year":"2018","unstructured":"Kumar, P., Tripathiy, M., Nehray, A., Contix, M., & Lal, C. (2018). SAFETY: Early detection and mitigation of TCP SYN flood utilizing entropy in SDN. IEEE Transactions on Network and Service Management, 15(4), 1545\u20131559. https:\/\/doi.org\/10.1109\/TNSM.2018.2861741.","journal-title":"IEEE Transactions on Network and Service Management"},{"issue":"10","key":"7954_CR27","doi-asserted-by":"publisher","first-page":"2358","DOI":"10.1109\/JSAC.2018.2869997","volume":"36","author":"K Kalkan","year":"2018","unstructured":"Kalkan, K., Altay, L., Gury, G., & Alagoz, F. (2018). JESS: Joint entropy based DDoS defense scheme in SDN. IEEE Journal on Selected Areas in Communications, 36(10), 2358\u20132372. https:\/\/doi.org\/10.1109\/JSAC.2018.2869997.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"7954_CR28","doi-asserted-by":"publisher","first-page":"9485","DOI":"10.1109\/ACCESS.2017.2702341","volume":"5","author":"M Assis","year":"2017","unstructured":"Assis, M., Hamamoto, A., Abr\u00e3o, T., & Proen\u00e7a, M. (2017). A game theoretical based system using holt-winters and genetic algorithm with fuzzy logic for DoS\/DDoS mitigation on SDN networks. IEEE Access, 5, 9485\u20139496. https:\/\/doi.org\/10.1109\/ACCESS.2017.2702341.","journal-title":"IEEE Access"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07954-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-020-07954-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07954-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,17]],"date-time":"2021-03-17T19:03:17Z","timestamp":1616007797000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-020-07954-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,4]]},"references-count":28,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["7954"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07954-3","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,4]]},"assertion":[{"value":"5 November 2020","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 January 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}