{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T19:02:06Z","timestamp":1777662126168,"version":"3.51.4"},"reference-count":81,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Faculty of Arts, Science and Technology, Wrexham Glynd\u0175r University, U.K"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3109490","type":"journal-article","created":{"date-parts":[[2021,8,31]],"date-time":"2021-08-31T20:05:56Z","timestamp":1630440356000},"page":"122495-122508","source":"Crossref","is-referenced-by-count":89,"title":["Detection and Classification of DDoS Flooding Attacks on Software-Defined Networks: A Case Study for the Application of Machine Learning"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7346-4701","authenticated-orcid":false,"given":"Abimbola O.","family":"Sangodoyin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1164-5501","authenticated-orcid":false,"given":"Mobayode O.","family":"Akinsolu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5314-5030","authenticated-orcid":false,"given":"Prashant","family":"Pillai","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4330-0137","authenticated-orcid":false,"given":"Vic","family":"Grout","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","volume":"1","author":"burkov","year":"2019","journal-title":"The Hundred-Page Machine Learning Book"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2020.102099"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TNSRE.2017.2776149"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1186\/s40064-016-2941-7"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.01.016"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10080918"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-4380-9_16"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/BigComp.2018.00044"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2904236"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735752"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-1809.1936.tb02137.x"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.21629\/JSEE.2019.05.06"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.389"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7510992"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.06.012"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.01.040"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1049\/el.2015.0334"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/NAS.2016.7549402"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_9"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2015.7069319"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511996504"},{"key":"ref62","volume":"1","author":"friedman","year":"2001","journal-title":"The Elements of Statistical Learning"},{"key":"ref61","first-page":"1","author":"yan","year":"2011","journal-title":"Proc Int Conf Manage Service Sci"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2836440"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2018.8460090"},{"key":"ref64","volume":"31","author":"devroye","year":"2013","journal-title":"A Probabilistic Theory of Pattern Recognition"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.08.014"},{"key":"ref65","author":"forbes","year":"2011","journal-title":"Statistical Distributions"},{"key":"ref66","first-page":"41","article-title":"A comparison of event models for Naive Bayes text classification","volume":"752","author":"mccallum","year":"1998","journal-title":"Proc AAAI Workshop Learn Text Categorization"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-007-0114-2"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.840903"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1976.5408784"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3003086"},{"key":"ref2","first-page":"450","author":"alam","year":"2018","journal-title":"A Reliable Communication Framework and Its Use in Internet of Things (IoT)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2018.2851738"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3497"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICoAC.2014.7229711"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/65.642356"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.05.005"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.181"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2006.5"},{"key":"ref50","volume":"544","author":"mclachlan","year":"2004","journal-title":"Discriminant Analysis and Statistical Pattern Recognition"},{"key":"ref51","first-page":"358","author":"praagman","year":"1984","journal-title":"Classification and Regression Trees"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1504\/IJAPR.2016.079050"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2005.847744"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2965617"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2020.2965787"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(03)00117-X"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007465528199"},{"key":"ref53","author":"stork","year":"2000","journal-title":"Pattern Classification"},{"key":"ref52","volume":"81","author":"maimon","year":"2014","journal-title":"Data Mining with Decision Trees Theory and Applications"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6553676"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491199"},{"key":"ref40","year":"2018","journal-title":"Mininet Team"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1201\/b20614"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2877710"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3082290"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3006358"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/NSEC.2014.6998241"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0069"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.02.026"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-017-2414-5"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.07.017"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2012.2188541"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486019"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.10.015"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.bjp.2013.12.037"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/s20247326"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23064"},{"key":"ref9","first-page":"11","article-title":"DoS attack impact assessment on software defined networks","author":"sangodoyin","year":"2017","journal-title":"Proc Int Conf Wireless Satell Syst"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45248-5_13"},{"key":"ref48","first-page":"383","article-title":"Characterization and comparison of DDoS attack tools and traffic generators: A review","volume":"19","author":"behal","year":"2017","journal-title":"IJ Netw Secur"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2015.1125974"},{"key":"ref42","year":"2018","journal-title":"Praetox Technologies Low Orbit Ion Cannon"},{"key":"ref41","year":"2018","journal-title":"Floodlight"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2019.00019"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09526586.pdf?arnumber=9526586","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:57:45Z","timestamp":1639771065000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9526586\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":81,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3109490","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}