{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T10:29:33Z","timestamp":1765448973123,"version":"3.46.0"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T00:00:00Z","timestamp":1765411200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T00:00:00Z","timestamp":1765411200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-04545-6","type":"journal-article","created":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T10:26:40Z","timestamp":1765448800000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Machine Learning Based Detection of Denial of Wallet Attacks in Serverless Computing"],"prefix":"10.1007","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-3518-399X","authenticated-orcid":false,"given":"Armin","family":"Mohammadi Ghaleh","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5849-3106","authenticated-orcid":false,"given":"Saeed","family":"Sedighian Kashi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,11]]},"reference":[{"issue":"12","key":"4545_CR1","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1145\/3368454","volume":"62","author":"P Castro","year":"2019","unstructured":"Castro P, Isahagian V, Muthusamy V, Slominski A. The rise of serverless computing. Communications ACM Cilt. 2019;62(12):44\u201354.","journal-title":"Communications ACM Cilt"},{"issue":"1","key":"4545_CR2","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1504\/IJES.2020.108287","volume":"13","author":"K Jaiswal","year":"2020","unstructured":"Jaiswal K, Sobhanayak S, Turuk A, Sahoo B, Mohanta ve B, Jena D. Container-based task scheduling for edge computing in IoT-cloud environment using improved HBF optimisation algorithm. Int J Embedded Syst Cilt. 2020;13(1):85\u2013100.","journal-title":"International J Embedded Syst Cilt"},{"key":"4545_CR3","doi-asserted-by":"publisher","unstructured":"Kelly D, Glavin FG ve, Barrett E. Denial of wallet\u2014Defining a looming threat to serverless computing,\u00a0J Inf Secur Appl, cilt 60, Art No 102843, August 2021. https:\/\/doi.org\/10.1016\/j.jisa.2021.102843","DOI":"10.1016\/j.jisa.2021.102843"},{"issue":"1","key":"4545_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2019\/1574749","volume":"2019","author":"F Filho","year":"2019","unstructured":"Filho F, Silveira F, Junior A. Smart Detection: An Online Approach for DoS\/DDoS Attack Detection Using Machine Learning. Secur Commun Netw. 2019;2019(1):1\u201315.","journal-title":"Secur Commun Netw"},{"key":"4545_CR5","unstructured":"Jegan DS, Wang L, Bhagat S, Ristenpart T, Swift M Guarding Serverless Applications with SecLambda,\u00a0arxiv pre-print, 2020."},{"issue":"4","key":"4545_CR6","doi-asserted-by":"publisher","first-page":"3769","DOI":"10.1109\/COMST.2019.2934468","volume":"21","author":"N Agrawal","year":"2019","unstructured":"Agrawal N, Tapaswi S. Defense Mechanisms Against DDoS Attacks in a Cloud Computing Environment: State-of-the-Art and Research Challenges. IEEE Commun Surv Tutor. 2019;21(4):3769\u201395.","journal-title":"IEEE Commun Surv Tutor"},{"key":"4545_CR7","doi-asserted-by":"crossref","unstructured":"Datta P, Kumar P, Morris T, Grace M, Rahmati A, Bates A. Valve: Securing Function Workflows on Serverless Computing Platforms, %1 i\u00e7inde In:\u00a020th Proceedings of The Web Conference 2020, Taipei, Taiwan, 2020.","DOI":"10.1145\/3366423.3380173"},{"key":"4545_CR8","doi-asserted-by":"crossref","unstructured":"Barna C, Shtern M, Smit M, Tzerpos ve V, Litoiu M. Model-based adaptive DoS attack mitigation, %1 i\u00e7inde In:\u00a07th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), Zurich, Switzerland, 2012.","DOI":"10.1109\/SEAMS.2012.6224398"},{"key":"4545_CR9","unstructured":"Mukhopadhyay D, Oh BJ, Shim SH, Kim YC A Study on Recent Approaches in Handling DDoS Attacks,\u00a0arXiv pre-print, 2010."},{"issue":"2","key":"4545_CR10","doi-asserted-by":"publisher","first-page":"718","DOI":"10.18517\/ijaseit.13.2.17810","volume":"13","author":"R Nadhir ve","year":"2023","unstructured":"Nadhir ve R, Mardhani R. XGBoost Classifier for DDOS Attack Detection in Software Defined Network Using sFlow Protocol. Int J Adv Sci Eng Inf Technol. 2023;13(2):718\u201325.","journal-title":"Int J Adv Sci Eng Inf Technol"},{"issue":"3","key":"4545_CR11","first-page":"49","volume":"1","author":"A Amer","year":"2018","unstructured":"Amer A, Mahmood A. Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms. Iraqi J Inf Commun Technol (IJICT). 2018;1(3):49\u201355.","journal-title":"Iraqi J Inf Commun Technol (IJICT)"},{"issue":"5","key":"4545_CR12","first-page":"407","volume":"15","author":"T Hussein","year":"2023","unstructured":"Hussein T. Deep learning-based DDoS detection in network traffic data. Int J Electr Comput Eng Syst. 2023;15(5):407\u201314.","journal-title":"Int J Electr Comput Eng Syst"},{"issue":"5","key":"4545_CR13","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1016\/j.comnet.2003.10.003","volume":"44","author":"D Christos","year":"2004","unstructured":"Christos D ve, Aikaterini M. DDoS attacks and defense mechanisms: classification and state-of-the-art, Comput Netw, cilt 44, no. 5, pp. 643\u2013666, 2004.","journal-title":"Comput Netw"},{"key":"4545_CR14","unstructured":"Regular. expression Denial of Service - ReDoS., OWASP, [\u00c7evrimi\u00e7i]. Available: https:\/\/owasp.org\/www-community\/attacks\/Regular_expression_Denial_of_Service_-_ReDoS"},{"key":"4545_CR15","unstructured":"Morgan TD, Al Ibrahim O XML Schema, DTD, and entity attacks. A Compendium of Known Techniques, VSR; 2014."},{"issue":"4","key":"4545_CR16","doi-asserted-by":"publisher","first-page":"2046","DOI":"10.1109\/SURV.2013.031413.00127","volume":"15","author":"S Taghavi Zargar","year":"2013","unstructured":"Taghavi Zargar S, Joshi ve J, Tipper D. A survey of defense mechanisms against distributed denial of service (DDoS) flooding Attacks. IEEE Commun Surv & Tutorials Cilt. 2013;15(4):2046\u201369.","journal-title":"IEEE Commun Surv Tutor Cilt"},{"key":"4545_CR17","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.cose.2017.09.009","volume":"72","author":"N Tripathi","year":"2018","unstructured":"N. Tripathi, N. Hubballi, Slow rate denial of service attacks against HTTP\/2 and detection\u00bb. Computers & Secur Cilt 72, pp. 255\u201372, 2018.","journal-title":"Comput Secur Cilt"},{"key":"4545_CR18","doi-asserted-by":"publisher","DOI":"10.1177\/0002764213479370","author":"M Sauter","year":"2013","unstructured":"Sauter M. \u201cLOIC will tear us apart\u201d: the impact of tool design and media portrayals in the success of activist DDOS attacks. Am Behav Sci. 2013. https:\/\/doi.org\/10.1177\/0002764213479370.","journal-title":"Am Behav Sci"},{"key":"4545_CR19","doi-asserted-by":"crossref","unstructured":"Varol O, Ferrara E, Davis CA, Menczer ve F, Flammini A. Online Human-Bot Interactions: Detection, Estimation, and Characterization, %1 i\u00e7inde Eleventh international AAAI conference on web and social media, Montreal, Quebec, Canada, 2017.","DOI":"10.1609\/icwsm.v11i1.14871"},{"key":"4545_CR20","unstructured":"Aslam S. Twitter by the Numbers: Stats, Demographics & Fun Facts, Omnicore, [\u00c7evrimi\u00e7i]. Available: https:\/\/www.omnicoreagency.com\/twitter-statistics\/"},{"key":"4545_CR21","doi-asserted-by":"crossref","unstructured":"Lucky G, Jjunju F ve, Marshall A. A Lightweight Decision-Tree Algorithm for detecting DDoS flooding attacks, %1 i\u00e7inde In:\u00a020th International Conference on Software Quality, Reliability and Security Companion (QRS-C), Macau, China, 2020.","DOI":"10.1109\/QRS-C51114.2020.00072"},{"key":"4545_CR22","doi-asserted-by":"crossref","unstructured":"Sharafaldin I, Habibi Lashkari A ve, Ghorbani AA. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization, %1 i\u00e7inde In:\u00a04th International Conference on Information Systems Security and Privacy, Funchal - Madeira, Portugal, 2018.","DOI":"10.5220\/0006639801080116"},{"key":"4545_CR23","doi-asserted-by":"crossref","unstructured":"Sharafaldin I, Habibi Lashkari A, Hakak ve S, Ghorbani AA. Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy, %1 i\u00e7inde In:\u00a02019 International Carnahan Conference on Security Technology (ICCST), Chennai, India, 2019.","DOI":"10.1109\/CCST.2019.8888419"},{"key":"4545_CR24","doi-asserted-by":"crossref","unstructured":"Sen S, Gupta ve KD, Ahsan MM. Leveraging Machine Learning Approach to Setup Software-Defined Network(SDN) Controller Rules During DDoS Attack, %1 i\u00e7inde Proceedings of International Joint Conference on Computational Intelligence, Daffodil International University, 2020.","DOI":"10.1007\/978-981-13-7564-4_5"},{"key":"4545_CR25","unstructured":"The caida ucsd ddos attack 2007 dataset, CAIDA, [\u00c7evrimi\u00e7i]. Available: http:\/\/www.caida.org\/data\/passive\/ddos"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04545-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-04545-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04545-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T10:26:43Z","timestamp":1765448803000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-04545-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,11]]},"references-count":25,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["4545"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-04545-6","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,11]]},"assertion":[{"value":"8 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Author Armin Mohammadi and Author Saeed Sedighian have no competing interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}],"article-number":"1017"}}