{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:21:56Z","timestamp":1776082916250,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/ccst.2019.8888419","type":"proceedings-article","created":{"date-parts":[[2019,10,31]],"date-time":"2019-10-31T23:58:31Z","timestamp":1572566311000},"page":"1-8","source":"Crossref","is-referenced-by-count":860,"title":["Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy"],"prefix":"10.1109","author":[{"given":"Iman","family":"Sharafaldin","sequence":"first","affiliation":[]},{"given":"Arash Habibi","family":"Lashkari","sequence":"additional","affiliation":[]},{"given":"Saqib","family":"Hakak","sequence":"additional","affiliation":[]},{"given":"Ali A.","family":"Ghorbani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5220\/0006105602530262"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"ref12","first-page":"281","article-title":"A comprehensive taxonomy of ddos attacks and defense mechanism applying in a smart classification","volume":"7","author":"asosheh","year":"2008","journal-title":"WSEAS Transactions on Computers"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SCOPES.2016.7955549"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1539"},{"key":"ref15","article-title":"Request for comments: 1001 (rfc1001)","year":"1987","journal-title":"Protocol Standard for a NetBIOS Service on a TCP\/UDP Transport Concepts and Methods"},{"key":"ref16","article-title":"Request for comments: 7766 (rfc7766)","year":"2016","journal-title":"DNS Transport over TCP - Implementation Requirements"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.10.005"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.13052\/jsn2445-9739.2017.009"},{"key":"ref19","year":"2017","journal-title":"CICFlowMeter"},{"key":"ref4","year":"0","journal-title":"The CAIDA UCSD &#x201D;DDoS Attack 2007&#x201D; Dataset"},{"key":"ref3","article-title":"Dos and ddos attacks: Defense, detection and traceback mechanisms - a survey","volume":"14","author":"munivara prasad","year":"2014","journal-title":"Global Journal of Computer Science and Technology"},{"key":"ref6","article-title":"Analysis of the 1999 darpa\/lincoln laboratory ids evaluation data with netadhict","author":"carson brown","year":"2009","journal-title":"Proceedings of the Second IEEE International Conference on Computational Intelligence for Security and Defense Applications CISDA&#x2019;09"},{"key":"ref5","year":"0","journal-title":"DARPA 2000 Intrustion Detection Scenario Specific Data Sets"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.262"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2550-8_41"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICoAC.2011.6165212"},{"key":"ref1","first-page":"1882","article-title":"A covariance analysis model for ddos attack detection","volume":"4","author":"jin","year":"2004","journal-title":"2004 IEEE International Conference on Communications"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref20","author":"pedregosa","year":"2011","journal-title":"Scikit-learn Machine Learning in Python"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116251"}],"event":{"name":"2019 International Carnahan Conference on Security Technology (ICCST)","location":"CHENNAI, India","start":{"date-parts":[[2019,10,1]]},"end":{"date-parts":[[2019,10,3]]}},"container-title":["2019 International Carnahan Conference on Security Technology (ICCST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8883862\/8888368\/08888419.pdf?arnumber=8888419","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:09:24Z","timestamp":1657854564000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8888419\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/ccst.2019.8888419","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}