{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:28:12Z","timestamp":1763202492758},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,2,21]],"date-time":"2021-02-21T00:00:00Z","timestamp":1613865600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,21]],"date-time":"2021-02-21T00:00:00Z","timestamp":1613865600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11277-021-08280-y","type":"journal-article","created":{"date-parts":[[2021,2,21]],"date-time":"2021-02-21T07:04:10Z","timestamp":1613891050000},"page":"3487-3503","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A Profile-Based Novel Framework for Detecting EDoS Attacks in the Cloud Environment"],"prefix":"10.1007","volume":"117","author":[{"given":"J. Britto","family":"Dennis","sequence":"first","affiliation":[]},{"given":"M. Shanmuga","family":"Priya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,21]]},"reference":[{"key":"8280_CR1","doi-asserted-by":"publisher","unstructured":"Saleh, M. A. & Manaf, A. A. (2015) A novel protective framework for defeating HTTP-based denial of service and distributed denial of service attacks. The Scientific World Journal, 2015, Article ID 238230, 19. https:\/\/doi.org\/10.1155\/2015\/238230","DOI":"10.1155\/2015\/238230"},{"key":"8280_CR2","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/s41635-018-0061-2","volume":"3","author":"H Abbasi","year":"2019","unstructured":"Abbasi, H., Ezzati-Jivan, N., Bellaiche, M., et al. (2019). Machine learning-based EDoS attack detection technique using execution trace analysis. Journal of Hardware Systems and Security, 3, 164\u2013176. https:\/\/doi.org\/10.1007\/s41635-018-0061-2.","journal-title":"Journal of Hardware Systems and Security"},{"key":"8280_CR3","doi-asserted-by":"publisher","unstructured":"Shamshirband, S., Fathi, M., Chronopoulos, A. T., Montieri, A., Palumbo, F., & Pescap\u00e8, A. (2020). Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues. Journal of Information Security and Applications, 55, 102582. ISSN 221-2126. https:\/\/doi.org\/10.1016\/j.jisa.2020.102582.","DOI":"10.1016\/j.jisa.2020.102582"},{"key":"8280_CR4","doi-asserted-by":"publisher","unstructured":"Monge, M. A. S., Vidal, J. M., & P\u00e9rez, G. M. (2019). Detection of economic denial of sustainability (EDoS) threats in self-organizing networks. Computer Communications, 145, 284\u2013308. ISSN 0140-3664. https:\/\/doi.org\/10.1016\/j.comcom.2019.07.002.","DOI":"10.1016\/j.comcom.2019.07.002"},{"key":"8280_CR5","doi-asserted-by":"publisher","first-page":"4047","DOI":"10.1007\/s10489-018-1190-6","volume":"48","author":"LM Abualigah","year":"2018","unstructured":"Abualigah, L. M., Khader, A. T., & Hanandeh, E. S. (2018). Hybrid clustering analysis using improved krill herd algorithm. Applied Intelligence, 48, 4047\u20134071. https:\/\/doi.org\/10.1007\/s10489-018-1190-6.","journal-title":"Applied Intelligence"},{"key":"8280_CR6","doi-asserted-by":"publisher","unstructured":"Agrawal, N., & Tapaswi, S. (2019). Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges. In IEEE Communications Surveys & Tutorials, Vol. 21, no. 4, pp. 3769\u20133795, Fourthquarter 2019. https:\/\/doi.org\/10.1109\/COMST.2019.2934468.","DOI":"10.1109\/COMST.2019.2934468"},{"issue":"3","key":"8280_CR7","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1504\/IJCNDS.2019.101915","volume":"23","author":"GS Kushwah","year":"2019","unstructured":"Kushwah, G. S., & Ali, S. T. (2019). Distributed denial of service attacks detection in cloud computing using extreme learning machine. International Journal of Communication Networks and Distributed Systems (IJCNDS), 23(3), 328.","journal-title":"International Journal of Communication Networks and Distributed Systems (IJCNDS)"},{"key":"8280_CR8","doi-asserted-by":"publisher","unstructured":"Virupakshar, K. B., Asundi, M., Channal, K., Shettar, P., Patil, S., & Narayan, D. G. (2020). Distributed Denial of Service (DDoS) attacks detection system for OpenStack-based private cloud. Procedia Computer Science, 167, 2297\u20132307. ISSN 1877-0509. https:\/\/doi.org\/10.1016\/j.procs.2020.03.282.","DOI":"10.1016\/j.procs.2020.03.282"},{"key":"8280_CR9","doi-asserted-by":"publisher","first-page":"80813","DOI":"10.1109\/ACCESS.2019.2922196","volume":"7","author":"S Dong","year":"2019","unstructured":"Dong, S., Abbas, K., & Jain, R. (2019). A survey on Distributed Denial of Service (DDoS) attacks in SDN and cloud computing environments. IEEE Access, 7, 80813\u201380828. https:\/\/doi.org\/10.1109\/ACCESS.2019.2922196.","journal-title":"IEEE Access"},{"key":"8280_CR10","doi-asserted-by":"publisher","unstructured":"Karan, B. V., Narayan, D. G., & Hiremath, P. S. (2018). Detection of DDoS attacks in software defined networks. In 2018 3rd International Conference on Computational Systems and Information Technology for Sustainable Solutions (CSITSS), Bengaluru, India, pp. 265\u2013270. https:\/\/doi.org\/10.1109\/CSITSS.2018.8768551.","DOI":"10.1109\/CSITSS.2018.8768551"},{"key":"8280_CR11","doi-asserted-by":"publisher","first-page":"4501","DOI":"10.3390\/s20164501","volume":"20","author":"KS Huancayo Ramos","year":"2020","unstructured":"Huancayo Ramos, K. S., Sotelo Monge, M. A., & Maestre Vidal, J. (2020). Benchmark-based reference model for evaluating botnet detection tools driven by traffic-flow analytics. Sensors, 20, 4501.","journal-title":"Sensors"},{"key":"8280_CR12","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.asoc.2018.05.049","volume":"72","author":"S Rathore","year":"2018","unstructured":"Rathore, S., & Park, J. H. (2018). Semi-supervised learning based distributed attack detection framework for IoT. Applied Soft Computing, 72, 79\u201389.","journal-title":"Applied Soft Computing"},{"key":"8280_CR13","doi-asserted-by":"publisher","unstructured":"Abualigah, L. M., Khader, A. T., & Hanandeh, E. S. (2018). A new feature selection method to improve the document clustering using particle swarm optimization algorithm. Journal of Computational Science, 25, 456\u2013466. ISSN 1877-7503. https:\/\/doi.org\/10.1016\/j.jocs.2017.07.018.","DOI":"10.1016\/j.jocs.2017.07.018"},{"key":"8280_CR14","doi-asserted-by":"crossref","unstructured":"Pelloso, M., Vergutz, A., Santos, A., et al. (2018). A self-adaptable system for DDoS attack prediction based on the metastability theory. In 2018 IEEE Global Communications Conf. (GLOBECOM), Abu Dhabi, UAE, pp. 1\u20136.","DOI":"10.1109\/GLOCOM.2018.8647934"},{"key":"8280_CR15","doi-asserted-by":"crossref","unstructured":"Xing, J., Zhou, H., Shen, J., et al. (2018). AsIDPS: Auto-scaling intrusion detection and prevention system for cloud. In 2018 25th Int. Conf. on Telecommunications (ICT), Saint Malo, France, pp. 207\u2013212.","DOI":"10.1109\/ICT.2018.8464855"},{"key":"8280_CR16","unstructured":"Desnoyers, M., & Dagenais, M. (2018). LTTNg: Tracing across execution layers, from the hypervisor to user-space. In Proceedings of the Ottawa linux symposium."},{"key":"8280_CR17","unstructured":"Alger, L. (2018). DDoS attackers increasingly abuse public cloud services (11 September 2018). https:\/\/www.devopsonline.co.uk\/ddos-attackers-increasingly-abuse-public-cloud-services\/."},{"key":"8280_CR18","doi-asserted-by":"publisher","first-page":"1424","DOI":"10.1109\/TCYB.2015.2444435","volume":"46","author":"G Karakaya","year":"2016","unstructured":"Karakaya, G., Galelli, S., Ahipa\u015fao\u011flu, S. D., et al. (2016). Identifying (quasi) equally informative subsets in feature selection problems for classification: A max-relevance min-redundancy approach. IEEE Transactions on Cybernetics, 46, 1424\u20131437.","journal-title":"IEEE Transactions on Cybernetics"},{"key":"8280_CR19","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1016\/j.comcom.2019.07.002","volume":"145","author":"MAS Monge","year":"2019","unstructured":"Monge, M. A. S., Vidal, J. M., & P\u00e9rez, G. M. (2019). Detection of economic denial of sustainability (EDoS) threats in self-organizing networks. Computer Communications, 145, 284\u2013308.","journal-title":"Computer Communications"},{"issue":"4","key":"8280_CR20","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/SURV.2008.080406","volume":"10","author":"TTT Nguyen","year":"2019","unstructured":"Nguyen, T. T. T., & Armitage, G. (2019). A survey of techniques for internet traffic classification using machine learning. IEEE Communications Survey & Tutorials, 10(4), 56\u201376.","journal-title":"IEEE Communications Survey & Tutorials"},{"issue":"18","key":"8280_CR21","doi-asserted-by":"publisher","first-page":"3799","DOI":"10.1016\/j.ins.2007.03.025","volume":"177","author":"T Shon","year":"2017","unstructured":"Shon, T., & Moon, J. (2017). A hybrid machine learning approach to network anomaly detection. Information Sciences, 177(18), 3799\u20133821.","journal-title":"Information Sciences"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08280-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-021-08280-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08280-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,22]],"date-time":"2021-03-22T12:28:09Z","timestamp":1616416089000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-021-08280-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,21]]},"references-count":21,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["8280"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-08280-y","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,21]]},"assertion":[{"value":"4 February 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 February 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}