{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T21:47:27Z","timestamp":1755035247954,"version":"3.37.3"},"reference-count":98,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,6,16]],"date-time":"2021-06-16T00:00:00Z","timestamp":1623801600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,16]],"date-time":"2021-06-16T00:00:00Z","timestamp":1623801600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1007\/s11277-021-08556-3","type":"journal-article","created":{"date-parts":[[2021,6,16]],"date-time":"2021-06-16T12:02:36Z","timestamp":1623844956000},"page":"2773-2799","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Shield Techniques for Application Layer DDoS Attack in MANET: A Methodological Review"],"prefix":"10.1007","volume":"120","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1991-2048","authenticated-orcid":false,"given":"Kiran","family":"Salunke","sequence":"first","affiliation":[]},{"given":"U","family":"Ragavendran","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,16]]},"reference":[{"key":"8556_CR1","unstructured":"https:\/\/www.bankinfosecurity.com\/bank-spain-hit-by-ddos-attack-a-11430. Accessed 28 July 2018."},{"key":"8556_CR2","unstructured":"https:\/\/www.darkreading.com\/cloud\/eight-hour-ddos-attack-struck-aws-customers\/d\/d-id\/1336165. Accessed 28 Sept 2018"},{"key":"8556_CR3","unstructured":"https:\/\/www.reuters.com\/article\/telegram-cyber\/messaging-service-telegram-hit-by-ddos-cyber-attack-idUSL4N23J2QX. Accessed 13 Dec 2019."},{"key":"8556_CR4","unstructured":"https:\/\/media.kasperskycontenthub.com\/wpcontent\/uploads\/sites\/43\/2019\/05\/20135454\/en-candc.png. Accessed 12 Nov 2019."},{"key":"8556_CR5","unstructured":"https:\/\/www.theregister.co.uk\/2018\/03\/01\/github_ddos_biggest_ever. Accessed 23 Dec 2019."},{"key":"8556_CR6","unstructured":"https:\/\/www.ddosattacks.net\/twitter-amazon-other-top-websites-shut-in-cyber-attack. Accessed 18 Oct 2019."},{"key":"8556_CR7","unstructured":"https:\/\/www.corero.com\/blog\/749-ddos-attacks-plague-olympic-brazilian-governmentwebsites.html. Accessed 8 Aug 2019."},{"key":"8556_CR8","unstructured":"https:\/\/www.infosecuritymagazine.com\/news\/anonymous-attacks-spanish\/. Accessed 12 Oct 2019."},{"key":"8556_CR9","unstructured":"https:\/\/www.theguardian.com\/money\/2016\/jan\/29\/hsbc-online-banking-cyber-attack. Accessed 12 Oct 2018."},{"key":"8556_CR10","unstructured":"Leading u.s. banks targeted in ddos attacks. https:\/\/nakedsecurity.sophos.com\/2012\/09\/27\/banks-targeted-ddos-attacks\/. Accessed 12 Oct 2018."},{"key":"8556_CR11","unstructured":"https:\/\/dyn.com\/blog\/dyn-analysis-summary-offriday- october-21-attack. Accessed 12 Oct 2018"},{"key":"8556_CR12","doi-asserted-by":"crossref","unstructured":"https:\/\/securelist.com\/ddos-report-q1-2019\/90792. Accessed 12 Nov 2019.","DOI":"10.1016\/S1365-6937(19)30100-5"},{"key":"8556_CR13","unstructured":"https:\/\/media.kasperskycontenthub.com\/wpcontent\/uploads\/sites\/43\/2019\/05\/20135112\/ddos-in-q1.png. Accessed 12 Nov 2019."},{"key":"8556_CR14","unstructured":"https:\/\/www.akamai.com\/us\/en\/...\/q4-2016-state-of-the-internet-security-report.pdf. Accessed 18 Dec 2019."},{"key":"8556_CR15","unstructured":"Ddos attack report. http:\/\/www.arbornetworks.com\/images\/documents\/WISR2016ENWeb.pdf. Accessed 18 Oct 2019."},{"key":"8556_CR16","unstructured":"Ddos attack report. https:\/\/www.darkreading.com\/vulnerabilities-and%20-threats\/2016-ddos-attack-trends-by-the-numbers\/d\/d-id\/1326754?image-number=3. Accessed 2018-11-05."},{"key":"8556_CR17","unstructured":"Ddos attack report. https:\/\/www.imperva.com\/docs\/DS_Incapsula_The_Top_10_DDoS_Attack_Trends_ebook.pdf. Accessed 05 Nov 2018."},{"key":"8556_CR18","doi-asserted-by":"crossref","unstructured":"Wendell, P., & Freedman, M. J. (2011). Going viral: Flash crowds in an open cdn. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference (pp. 549\u2013558). ACM.","DOI":"10.1145\/2068816.2068867"},{"key":"8556_CR19","doi-asserted-by":"crossref","unstructured":"Du, P., & Nakao, A. (2010). DDoS defense deployment with network egress and ingress filtering. In 2010 IEEE international conference on communications (pp. 1\u20136). IEEE.","DOI":"10.1109\/ICC.2010.5502654"},{"key":"8556_CR20","doi-asserted-by":"crossref","unstructured":"Tada, H., Murata, M., & Aida, M. (2017). Web service flash crowd mitigation using feedback to users. In 2017 IEEE 31st international conference on advanced information networking and applications (AINA) (pp. 213\u2013219). IEEE.","DOI":"10.1109\/AINA.2017.121"},{"issue":"4","key":"8556_CR21","doi-asserted-by":"publisher","first-page":"1098","DOI":"10.1109\/TIFS.2018.2870828","volume":"14","author":"Z Liu","year":"2018","unstructured":"Liu, Z., Cao, Y., Zhu, M., & Ge, W. (2018). Umbrella: Enabling isps to offer readily deployable and privacy-preserving DDoS prevention services. IEEE Transactions on Information Forensics and Security, 14(4), 1098\u20131108.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"8556_CR22","doi-asserted-by":"crossref","unstructured":"Park, K. (2003). Scalable DDoS protection using route-based filtering-discex III demonstration. In Proceedings DARPA information survivability conference and exposition (Vol.\u00a02, p. 97). IEEE.","DOI":"10.1109\/DISCEX.2003.1194933"},{"issue":"10","key":"8556_CR23","doi-asserted-by":"publisher","first-page":"800","DOI":"10.1109\/LCOMM.2009.090840","volume":"13","author":"CV Zhou","year":"2009","unstructured":"Zhou, C. V., Leckie, C., & Ramamohanarao, K. (2009). Protecting SIP server from CPU-based DoS attacks using history-based IP filtering. IEEE Communications Letters, 13(10), 800\u2013802.","journal-title":"IEEE Communications Letters"},{"key":"8556_CR24","unstructured":"In, C.-H., Hong, C.\u00a0S., Wei, J., & Okamura, K. (2005). An enhanced SoS architecture for DDoS attack defense using active network technology. In Advanced industrial conference on telecommunications\/service assurance with partial and intermittent resources conference\/E-learning on telecommunications workshop (AICT\/SAPIR\/ELETE\u201905) (pp. 90\u201395). IEEE."},{"key":"8556_CR25","doi-asserted-by":"crossref","unstructured":"Belyaev, M., & Gaivoronski, S. (2014). Towards load balancing in sdn-networks during DDoS-attacks. In 2014 international science and technology conference (modern networking technologies) (MoNeTeC) (pp. 1\u20136). IEEE.","DOI":"10.1109\/MoNeTeC.2014.6995578"},{"issue":"8","key":"8556_CR26","doi-asserted-by":"publisher","first-page":"929","DOI":"10.1049\/iet-com.2015.0497","volume":"10","author":"R Selvaraj","year":"2016","unstructured":"Selvaraj, R., Kuthadi, V. M., & Marwala, T. (2016). Ant-based distributed denial of service detection technique using roaming virtual honeypots. IET Communications, 10(8), 929\u2013935.","journal-title":"IET Communications"},{"issue":"16","key":"8556_CR27","doi-asserted-by":"publisher","first-page":"1569","DOI":"10.1016\/j.comcom.2004.07.002","volume":"27","author":"JM Estevez-Tapiador","year":"2004","unstructured":"Estevez-Tapiador, J. M., Garcia-Teodoro, P., & Diaz-Verdejo, J. E. (2004). Anomaly detection methods in wired networks: A survey and taxonomy. Computer Communications, 27(16), 1569\u20131584.","journal-title":"Computer Communications"},{"key":"8556_CR28","unstructured":"Gupta, B. B., Misra, M., & Joshi, R.\u00a0C. (2012). An ISP level solution to combat DDoS attacks using combined statistical based approach. arXiv preprint arXiv:1203.2400."},{"key":"8556_CR29","unstructured":"Xia, T., Qu, G., Hariri, S., & Yousif, M. (2005). An efficient network intrusion detection method based on information theory and genetic algorithm. In PCCC 2005. 24th IEEE international performance, computing, and communications conference, 2005 (pp. 11\u201317). IEEE."},{"key":"8556_CR30","doi-asserted-by":"crossref","unstructured":"Thomas, R., Mark, B., Johnson, T., & Croall, J. (2003). Netbouncer: Client-legitimacy-based high-performance DDoS filtering. In Proceedings DARPA information survivability conference and exposition, (Vol. 1, pp. 14\u201325). IEEE.","DOI":"10.1109\/DISCEX.2003.1194869"},{"issue":"3","key":"8556_CR31","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1109\/TIFS.2017.2758754","volume":"13","author":"C Wang","year":"2017","unstructured":"Wang, C., Miu, T. T. N., Luo, X., & Wang, J. (2017). Skyshield: A sketch-based defense system against application layer DDoS attacks. IEEE Transactions on Information Forensics and Security, 13(3), 559\u2013573.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"16","key":"8556_CR32","doi-asserted-by":"publisher","first-page":"3251","DOI":"10.1002\/sec.1530","volume":"9","author":"MH Bhuyan","year":"2016","unstructured":"Bhuyan, M. H., Bhattacharyya, D. K., & Kalita, J. K. (2016). E-ldat: A lightweight system for DDoS flooding attack detection and ip traceback using extended entropy metric. Security and Communication Networks, 9(16), 3251\u20133270.","journal-title":"Security and Communication Networks"},{"key":"8556_CR33","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.jnca.2018.03.024","volume":"111","author":"S Behal","year":"2018","unstructured":"Behal, S., Kumar, K., & Sachdeva, M. (2018). D-face: An anomaly based distributed approach for early detection of DDoS attacks and flash events. Journal of Network and Computer Applications, 111, 49\u201363.","journal-title":"Journal of Network and Computer Applications"},{"key":"8556_CR34","unstructured":"Behal, S., Kumar, K., & Sachdeva, M. (2018). D-fac: A novel $$\\phi$$-divergence based distributed DDoS defense system. Journal of King Saud University-Computer and Information Sciences."},{"key":"8556_CR35","first-page":"1","volume":"2018","author":"Y Zhao","year":"2018","unstructured":"Zhao, Y., Zhang, W., Feng, Y., & Yu, B. (2018). A classification detection algorithm based on joint entropy vector against application-layer DDoS attack. Security and Communication Networks, 2018, 1\u20138.","journal-title":"Security and Communication Networks"},{"issue":"1","key":"8556_CR36","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1186\/s13635-018-0081-z","volume":"2018","author":"S Hameed","year":"2018","unstructured":"Hameed, S., & Ali, U. (2018). Hadec: Hadoop-based live DDoS detection framework. EURASIP Journal on Information Security, 2018(1), 11.","journal-title":"EURASIP Journal on Information Security"},{"key":"8556_CR37","doi-asserted-by":"crossref","unstructured":"Aborujilah, A., & Musa, S. (2017). Cloud-based DDoS http attack detection using covariance matrix approach. Journal of Computer Networks and. (Communications).","DOI":"10.1155\/2017\/7674594"},{"issue":"10","key":"8556_CR38","doi-asserted-by":"publisher","first-page":"350","DOI":"10.3390\/e18100350","volume":"18","author":"K Johnson Singh","year":"2016","unstructured":"Johnson Singh, K., Thongam, K., & De, T. (2016). Entropy-based application layer DDoS attack detection using artificial neural networks. Entropy, 18(10), 350.","journal-title":"Entropy"},{"key":"8556_CR39","doi-asserted-by":"crossref","unstructured":"Liao, Q., Li, H., Kang, S., & Liu, C. (2014). Feature extraction and construction of application layer DDoS attack based on user behavior. In Proceedings of the 33rd Chinese control conference (pp. 5492\u20135497). IEEE.","DOI":"10.1109\/ChiCC.2014.6895878"},{"key":"8556_CR40","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.jisa.2017.09.004","volume":"36","author":"KJ Singh","year":"2017","unstructured":"Singh, K. J., & De, T. (2017). MLP-GA based algorithm to detect application layer DDoS attack. Journal of Information Security and Applications, 36, 145\u2013153.","journal-title":"Journal of Information Security and Applications"},{"key":"8556_CR41","doi-asserted-by":"crossref","unstructured":"Myint Oo, M., Kamolphiwong, S., Kamolphiwong, T., & Vasupongayya, S. (2019). Advanced support vector machine-(ASVM-) based detection for distributed denial of service (DDoS) attack on software defined networking (SDN). Journal of Computer Networks and. (Communications).","DOI":"10.1155\/2019\/8012568"},{"key":"8556_CR42","doi-asserted-by":"crossref","unstructured":"Mahajan, D., & Sachdeva, M. (2013). DDoS attack prevention and mitigation techniques-a review. International Journal of Computer Applications, 67(19).","DOI":"10.5120\/11504-7221"},{"key":"8556_CR43","doi-asserted-by":"crossref","unstructured":"Liu, X., Yang, X., & Lu, Y. (2008). To filter or to authorize: Network-layer dos defense against multimillion-node botnets. In ACM SIGCOMM computer communication review (Vol. 38, pp. 195\u2013206). ACM.","DOI":"10.1145\/1402946.1402981"},{"key":"8556_CR44","unstructured":"Argyraki, K.\u00a0J., & Cheriton, D. R. (2005). Active internet traffic filtering: Real-time response to denial-of-service attacks. In USENIX annual technical conference, general track (Vol.\u00a038)."},{"issue":"16","key":"8556_CR45","doi-asserted-by":"publisher","first-page":"1952","DOI":"10.1049\/iet-com.2009.0809","volume":"4","author":"J Yu","year":"2010","unstructured":"Yu, J., Fang, C., Lu, L., & Li, Z. (2010). Mitigating application layer distributed denial of service attacks via effective trust management. IET Communications, 4(16), 1952\u20131962.","journal-title":"IET Communications"},{"issue":"6","key":"8556_CR46","doi-asserted-by":"publisher","first-page":"959","DOI":"10.1109\/TDSC.2017.2763160","volume":"15","author":"G Somani","year":"2017","unstructured":"Somani, G., Gaur, M. S., Sanghi, D., Conti, M., & Rajarajan, M. (2017). Scale inside-out: Rapid mitigation of cloud DDoS attacks. IEEE Transactions on Dependable and Secure Computing, 15(6), 959\u2013973.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"2","key":"8556_CR47","doi-asserted-by":"publisher","first-page":"959","DOI":"10.1007\/s13369-017-2844-0","volume":"43","author":"N Bharot","year":"2018","unstructured":"Bharot, N., Verma, P., Sharma, S., & Suraparaju, V. (2018). Distributed denial-of-service attack detection and mitigation using feature selection and intensive care request processing unit. Arabian Journal for Science and Engineering, 43(2), 959\u2013967.","journal-title":"Arabian Journal for Science and Engineering"},{"issue":"4","key":"8556_CR48","doi-asserted-by":"publisher","first-page":"1948","DOI":"10.1109\/TNET.2018.2854795","volume":"26","author":"Z Liu","year":"2018","unstructured":"Liu, Z., Jin, H., Yih-Chun, H., & Bailey, M. (2018). Practical proactive DDoS-attack mitigation via endpoint-driven in-network traffic control. IEEE\/ACM Transactions on Networking, 26(4), 1948\u20131961.","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"4","key":"8556_CR49","doi-asserted-by":"publisher","first-page":"1547","DOI":"10.1007\/s12652-018-0754-y","volume":"10","author":"H Pillutla","year":"2019","unstructured":"Pillutla, H., & Arjunan, A. (2019). Fuzzy self organizing maps-based DDoS mitigation mechanism for software defined networking in cloud computing. Journal of Ambient Intelligence and Humanized Computing, 10(4), 1547\u20131559.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"8556_CR50","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.comnet.2017.02.015","volume":"116","author":"S Behal","year":"2017","unstructured":"Behal, S., & Kumar, K. (2017). Detection of DDoS attacks and flash events using novel information theory metrics. Computer Networks, 116, 96\u2013110.","journal-title":"Computer Networks"},{"issue":"13","key":"8556_CR51","doi-asserted-by":"crossref","first-page":"2222","DOI":"10.1002\/sec.1472","volume":"9","author":"A Bhandari","year":"2016","unstructured":"Bhandari, A., Sangal, A. L., & Kumar, K. (2016). Characterizing flash events and distributed denial-of-service attacks: An empirical investigation. Security and Communication Networks, 9(13), 2222\u20132239.","journal-title":"Security and Communication Networks"},{"key":"8556_CR52","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.jisa.2015.11.001","volume":"26","author":"M Sachdeva","year":"2016","unstructured":"Sachdeva, M., Kumar, K., & Singh, G. (2016). A comprehensive approach to discriminate DDoS attacks from flash events. Journal of information security and applications, 26, 8\u201322.","journal-title":"Journal of information security and applications"},{"key":"8556_CR53","doi-asserted-by":"crossref","unstructured":"Saleh, M. A., & Abdul Manaf, A. (2015). A novel protective framework for defeating http-based denial of service and distributed denial of service attacks. The Scientific World Journal.","DOI":"10.1155\/2015\/238230"},{"issue":"2","key":"8556_CR54","first-page":"53","volume":"6","author":"KM Prasad","year":"2013","unstructured":"Prasad, K. M., Reddy, A. R. M., & Rao, K. V. (2013). Discriminating DDoS attack traffic from flash crowds on internet threat monitors (itm) using entropy variations. African Journal of Computing and ICT, 6(2), 53\u201362.","journal-title":"African Journal of Computing and ICT"},{"key":"8556_CR55","doi-asserted-by":"crossref","unstructured":"Tao, Y., & Yu, S. (2013). DDoS attack detection at local area networks using information theoretical metrics. In 2013 12th IEEE international conference on trust, security and privacy in computing and communications (pp. 233\u2013240). IEEE.","DOI":"10.1109\/TrustCom.2013.32"},{"issue":"6","key":"8556_CR56","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1049\/iet-ifs.2017.0500","volume":"12","author":"KJ Singh","year":"2018","unstructured":"Singh, K. J., Thongam, K., & De, T. (2018). Detection and differentiation of application layer DDoS attack from flash events using fuzzy-GA computation. IET Information Security, 12(6), 502\u2013512.","journal-title":"IET Information Security"},{"key":"8556_CR57","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.comcom.2017.02.003","volume":"103","author":"S Behal","year":"2017","unstructured":"Behal, S., & Kumar, K. (2017). Detection of DDoS attacks and flash events using information theory metrics\u2014An empirical investigation. Computer Communications, 103, 18\u201328.","journal-title":"Computer Communications"},{"issue":"2","key":"8556_CR58","doi-asserted-by":"publisher","first-page":"510","DOI":"10.3906\/elk-1308-188","volume":"24","author":"R Saravanan","year":"2016","unstructured":"Saravanan, R., Shanmuganathan, S., & Palanichamy, Y. (2016). Behavior-based detection of application layer distributed denial of service attacks during flash events. Turkish Journal of Electrical Engineering & Computer Sciences, 24(2), 510\u2013523.","journal-title":"Turkish Journal of Electrical Engineering & Computer Sciences"},{"key":"8556_CR59","doi-asserted-by":"crossref","unstructured":"Yu, S., Thapngam, T., Liu, J., Wei, S., & Zhou, W. (2009). Discriminating DDoS flows from flash crowds using information distance. In 2009 third international conference on network and system security (pp. 351\u2013356). IEEE.","DOI":"10.1109\/NSS.2009.29"},{"key":"8556_CR60","doi-asserted-by":"crossref","unstructured":"Yatagai, T., Isohara, T., & Sasase, I. (2007). Detection of http-get flood attack based on analysis of page access behavior. In 2007 IEEE Pacific rim conference on communications, computers and signal processing (pp. 232\u2013235). IEEE.","DOI":"10.1109\/PACRIM.2007.4313218"},{"key":"8556_CR61","doi-asserted-by":"crossref","unstructured":"Li, K., Zhou, W., Li, P., Hai, J., & Liu, J. (2009). Distinguishing DDoS attacks from flash crowds using probability metrics. In 2009 third international conference on network and system security (pp. 9\u201317). IEEE.","DOI":"10.1109\/NSS.2009.35"},{"key":"8556_CR62","unstructured":"Poorrnima, N. V., ChandraPrabha, K., & Geetha, B. G. (2014). Adaptive discriminating detection for DDoS attacks from flash crowds using flow correlation coefficient with collective feedback. In Proceedings of international conference on global innovations in computing technology (ICGICT\u201914) (Vol. 2)."},{"key":"8556_CR63","unstructured":"Deshmukh, P., Patil, K. H., & Bagwan, A. (2015). Improving network performance by differentiating DDoS attacks from flash crowd. In International journal of advanced research in computer science and management studies 3) (Vol. 1)."},{"issue":"8","key":"8556_CR64","first-page":"34","volume":"4","author":"TG Varghese","year":"2015","unstructured":"Varghese, T. G., & Salitha, M. (2015). Model based prediction technique for denial of service attack detection. International Journal of Innovations & Advancement in Computer Sciences, 4(8), 34\u201339.","journal-title":"International Journal of Innovations & Advancement in Computer Sciences"},{"issue":"6","key":"8556_CR65","first-page":"1","volume":"16","author":"VN Rao","year":"2015","unstructured":"Rao, V. N., Rao, G. R., & Konduri, A. (2015). Simulation of rank correlation based detection mechanism for distributed denial of services attacks. International Journal of Computer (IJC), 16(6), 1\u20138.","journal-title":"International Journal of Computer (IJC)"},{"key":"8556_CR66","unstructured":"ROA, B. D. U. R. G. A., & Renuka, K. (2014). Implementation of detection against distributed reflection for rank correlation dos attacks. International Journal for Innovative Research, 6(6), 516\u2013520."},{"issue":"17","key":"8556_CR67","doi-asserted-by":"publisher","first-page":"4468","DOI":"10.1002\/sec.1639","volume":"9","author":"RK Deka","year":"2016","unstructured":"Deka, R. K., & Bhattacharyya, D. K. (2016). Self-similarity based DDoS attack detection using hurst parameter. Security and Communication Networks, 9(17), 4468\u20134481.","journal-title":"Security and Communication Networks"},{"issue":"17","key":"8556_CR68","doi-asserted-by":"publisher","first-page":"3111","DOI":"10.1002\/sec.1236","volume":"8","author":"Q Liao","year":"2015","unstructured":"Liao, Q., Li, H., Kang, S., & Liu, C. (2015). Application layer DDoS attack detection using cluster with label based on sparse vector decomposition and rhythm matching. Security and Communication Networks, 8(17), 3111\u20133120.","journal-title":"Security and Communication Networks"},{"key":"8556_CR69","doi-asserted-by":"crossref","unstructured":"Oikonomou, G., & Mirkovic, J. (2009). Modeling human behavior for defense against flash-crowd attacks, pp. 625\u2013630.","DOI":"10.1109\/ICC.2009.5199191"},{"key":"8556_CR70","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.cose.2013.11.005","volume":"40","author":"S Bhatia","year":"2014","unstructured":"Bhatia, S., Schmidt, D., Mohay, G., & Tickle, A. (2014). A framework for generating realistic traffic for distributed denial-of-service attacks and flash events. Computers & Security, 40, 95\u2013107.","journal-title":"Computers & Security"},{"issue":"2","key":"8556_CR71","first-page":"21","volume":"1","author":"M Durga","year":"2016","unstructured":"Durga, M. (2016). Detecting distributed reflection dos attack using kendall\u2019s tau rank correlation. International Journal of Science and Technology, 1(2), 21\u201323.","journal-title":"International Journal of Science and Technology"},{"key":"8556_CR72","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.comcom.2015.06.012","volume":"67","author":"P Xiao","year":"2015","unstructured":"Xiao, P., Wenyu, Q., Qi, H., & Li, Z. (2015). Detecting DDoS attacks against data center with correlation analysis. Computer Communications, 67, 66\u201374.","journal-title":"Computer Communications"},{"key":"8556_CR73","unstructured":"Chawla, S., Sachdeva, M., & Behal, S. (2016). Discrimination of DDoS attacks and flash events using Pearson\u2019s product moment correlation method. International Journal of Computer Science and Information Security, 14(10), 382."},{"key":"8556_CR74","doi-asserted-by":"crossref","unstructured":"Thapngam, T., Yu, S., Zhou, W., & Beliakov, G. (2011). Discriminating DDoS attack traffic from flash crowd through packet arrival patterns. In 2011 IEEE conference on computer communications workshops (INFOCOM WKSHPS) (pp. 952\u2013957). IEEE.","DOI":"10.1109\/INFCOMW.2011.5928950"},{"key":"8556_CR75","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.future.2013.08.002","volume":"38","author":"W Zhou","year":"2014","unstructured":"Zhou, W., Jia, W., Wen, S., Xiang, Y., & Zhou, W. (2014). Detection and defense of application-layer DDoS attacks in backbone web traffic. Future Generation Computer Systems, 38, 36\u201346.","journal-title":"Future Generation Computer Systems"},{"issue":"2","key":"8556_CR76","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1049\/iet-wss.2017.0029","volume":"8","author":"AP Abidoye","year":"2017","unstructured":"Abidoye, A. P., & Obagbuwa, I. C. (2017). DDoS attacks in WSNS: Detection and countermeasures. IET Wireless Sensor Systems, 8(2), 52\u201359.","journal-title":"IET Wireless Sensor Systems"},{"issue":"6","key":"8556_CR77","doi-asserted-by":"publisher","first-page":"1471","DOI":"10.1109\/TIFS.2018.2879616","volume":"14","author":"ME Ahmed","year":"2018","unstructured":"Ahmed, M. E., Ullah, S., & Kim, H. (2018). Statistical application fingerprinting for DDoS attack mitigation. IEEE Transactions on Information Forensics and Security, 14(6), 1471\u20131484.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"8556_CR78","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/S1353-4858(18)30069-2","volume":"2018","author":"A Chadd","year":"2018","unstructured":"Chadd, A. (2018). DDoS attacks: Past, present and future. Network Security, 2018, 13\u201315.","journal-title":"Network Security"},{"issue":"1","key":"8556_CR79","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/TSIPN.2017.2749959","volume":"4","author":"Y Guan","year":"2017","unstructured":"Guan, Y., & Ge, X. (2017). Distributed attack detection and secure estimation of networked cyber-physical systems against false data injection attacks and jamming attacks. IEEE Transactions on Signal and Information Processing over Networks, 4(1), 48\u201359.","journal-title":"IEEE Transactions on Signal and Information Processing over Networks"},{"issue":"8","key":"8556_CR80","doi-asserted-by":"publisher","first-page":"1844","DOI":"10.1109\/TIFS.2017.2692685","volume":"12","author":"V Matta","year":"2017","unstructured":"Matta, V., Mauro, D., Mario, & Longo, M. (2017). DDoS attacks with randomized traffic innovation: Botnet identification challenges and strategies. IEEE Transactions on Information Forensics and Security, 12(8), 1844\u20131859.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"8556_CR81","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/MNET.2018.1700140","volume":"32","author":"VL Nguyen","year":"2018","unstructured":"Nguyen, V. L., Lin, P.-C., & Hwang, R.-H. (2018). Mecpass: Distributed denial of service defense architecture for mobile networks. IEEE Network, 32(1), 118\u2013124.","journal-title":"IEEE Network"},{"key":"8556_CR82","doi-asserted-by":"crossref","unstructured":"Mirkovic, J., Fahmy, S., Reiher, P., & Thomas, R. K. (2009). How to test dos defenses. In 2009 cybersecurity applications & technology conference for homeland security (pp. 103\u2013117). IEEE.","DOI":"10.1109\/CATCH.2009.23"},{"key":"8556_CR83","unstructured":"http:\/\/www.caida.org\/data\/passive\/ddos-20070804dataset.xml. Accessed 05 Nov 2018."},{"key":"8556_CR84","unstructured":"https:\/\/www.epa.gov\/keywords\/dataset. Accessed 05 Nov 2019."},{"key":"8556_CR85","unstructured":"https:\/\/www.sdsc.edu\/. Accessed 05 Nov 2019."},{"key":"8556_CR86","unstructured":"https:\/\/data.calgary.ca\/. Accessed 05 Nov 2019."},{"key":"8556_CR87","unstructured":"ftp:\/\/ita.ee.lbl.gov\/html\/contrib\/ClarkNet-HTTP.html\/. Accessed 05 Nov 2019."},{"key":"8556_CR88","unstructured":"ftp:\/\/ita.ee.lbl.gov\/html\/contrib\/NASA-HTTP.html\/. Accessed 05 Nov 2019."},{"key":"8556_CR89","unstructured":"ftp:\/\/ita.ee.lbl.gov\/html\/contrib\/Sask-HTTP.html. Accessed 05 Nov 2019."},{"key":"8556_CR90","unstructured":"https:\/\/www.ll.mit.edu\/r-d\/datasets. Accessed 05 Nov 2019."},{"key":"8556_CR91","unstructured":"https:\/\/www.cloudflare.com\/learning\/ddos\/ddos-attack-tools\/low-orbit-ion-cannon-loic\/. Accessed 06 Nov 2019."},{"key":"8556_CR92","unstructured":"https:\/\/allabouttesting.org\/hulk-ddos-tool-complete-installation-usage-with-examples\/. Accessed 06 Nov 2019."},{"key":"8556_CR93","unstructured":"https:\/\/thehackernews.com\/2011\/01\/ddosim-layer-7-ddos-simulator.html. Accessed 06 Nov 2019."},{"key":"8556_CR94","unstructured":"https:\/\/security.radware.com\/ddos-knowledge-center\/ddospedia\/rudy-r-u-dead-yet\/. Accessed 06 Nov 2019."},{"key":"8556_CR95","unstructured":"https:\/\/www.geeksforgeeks.org\/perform-ddos-attack-using-torshammer\/. Accessed 06 Nov 2019."},{"key":"8556_CR96","unstructured":"https:\/\/security.radware.com\/ddos-knowledge-center\/ddospedia\/pyloris\/. Accessed 06 Nov 2019."},{"key":"8556_CR97","unstructured":"https:\/\/allabouttesting.org\/golden-eye-ddos-tool-installation-and-tool-usage-with-examples\/. Accessed 06 Nov 2019."},{"key":"8556_CR98","unstructured":"https:\/\/resources.infosecinstitute.com\/dos-attacks-free-dos-attacking-tools\/. Accessed 06 Nov 2019."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08556-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-08556-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08556-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,4]],"date-time":"2023-11-04T23:23:39Z","timestamp":1699140219000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-08556-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,16]]},"references-count":98,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["8556"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-08556-3","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2021,6,16]]},"assertion":[{"value":"27 April 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 June 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}