{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:29:37Z","timestamp":1771705777876,"version":"3.50.1"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,15]]},"DOI":"10.1109\/bigdata62323.2024.10825144","type":"proceedings-article","created":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T18:31:23Z","timestamp":1737052283000},"page":"5551-5560","source":"Crossref","is-referenced-by-count":1,"title":["The Evaluation of Extracted Features for Detecting Eclipse Attacks on Ethereum Network Layers"],"prefix":"10.1109","author":[{"given":"Dhanasak","family":"Bhumichai","sequence":"first","affiliation":[{"name":"University of South Alabama,School Of Computing,Mobile,Alabama,USA"}]},{"given":"Ryan G.","family":"Benton","sequence":"additional","affiliation":[{"name":"University of South Alabama,School Of Computing,Mobile,Alabama,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2021.100048"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2009.5198772"},{"key":"ref3","first-page":"129","article-title":"Eclipse Attacks on Bitcoin\u2019s Peer-to-Peer Network","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Heilman"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2021.100048"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/infocom.2006.231"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/978-3-642-01399-7_9","article-title":"Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer Network","volume-title":"Networking 2009","volume":"5550","author":"Kohnen","year":"2009"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC51069.2021.9461081"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IEC52205.2021.9476132"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3173598"},{"key":"ref10","first-page":"1","article-title":"Eclipse Attack Detection for Blockchain Network Layer Based on Deep Feature Extraction","volume-title":"Wireless Commun. and Mobile Comput.","volume":"2022","author":"Dai","year":"2022"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2907043"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SoutheastCon51012.2023.10115126"},{"key":"ref13","article-title":"Open access to the Proceedings of the 24th USENIX Security Symposium is sponsored by USENIX Eclipse Attacks on Bitcoin\u2019s Peer-to-Peer Network Eclipse Attacks on Bitcoin\u2019s Peer-to-Peer Network","author":"Heilman","year":"2015"},{"key":"ref14","article-title":"Ethereum Eclipse Attacks","volume-title":"research-collection.ethz.ch","author":"W\u00fcst"},{"key":"ref15","article-title":"Low-Resource Eclipse Attacks on Ethereum\u2019s Peer-to-Peer Network","volume-title":"eprint.iacr.org","author":"Marcus"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101604"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/1451813"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SoutheastCon51012.2023.10115068"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/35.755458"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.02.015"},{"key":"ref21","article-title":"Normalization","volume-title":"Codecademy"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-2002-6504"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14710\/jtsiskom.8.2.2020.89-93"},{"issue":"9","key":"ref25","first-page":"3246","article-title":"Tomek Link and SMOTE Approaches for Machine Fault Classification with an Imbalanced Dataset","volume-title":"Sensors","volume":"22","author":"Swana","year":"2022"},{"issue":"4","key":"ref26","first-page":"1184","article-title":"Mutual information-based feature selection for intrusion detection systems","volume-title":"J. Netw. and Comput. Appl.","volume":"34","author":"Amiri","year":"2011"},{"key":"ref27","first-page":"100044","article-title":"Mutual Information based Logistic Regression for phishing URL detection","volume-title":"Cyber secur. and appl.","author":"Vajrobol","year":"2024"},{"issue":"4","key":"ref28","first-page":"3492","article-title":"Real-time anomaly detection systems for Denial-of-Service attacks by weighted k-nearest-neighbor classifiers","volume-title":"Expert Syst. with Appl.","volume":"38","author":"Su","year":"2011"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2004.843247"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761580"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.5120\/15771-4100"},{"issue":"1","key":"ref32","first-page":"5","article-title":"Random Forests","volume-title":"Machine Learning","volume":"45","author":"Breiman","year":"2001"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3328951"},{"issue":"7","key":"ref34","first-page":"149","article-title":"Effective Intrusion Detection System Using XGBoost","volume-title":"Information","volume":"9","author":"Dhaliwal","year":"2018"},{"key":"ref35","article-title":"Binomial coefficient","volume-title":"StatLect","author":"Taboga"},{"key":"ref36","article-title":"go-ethereum: Official Go implementation of the Ethereum protocol","volume-title":"go-ethereum"},{"key":"ref37","article-title":"ethereum_devp2p_wireshark_dissector","volume-title":"BCSEC"}],"event":{"name":"2024 IEEE International Conference on Big Data (BigData)","location":"Washington, DC, USA","start":{"date-parts":[[2024,12,15]]},"end":{"date-parts":[[2024,12,18]]}},"container-title":["2024 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10824975\/10824942\/10825144.pdf?arnumber=10825144","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T07:45:20Z","timestamp":1737099920000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10825144\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/bigdata62323.2024.10825144","relation":{},"subject":[],"published":{"date-parts":[[2024,12,15]]}}}