{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T09:53:17Z","timestamp":1773654797012,"version":"3.50.1"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/cicybs.2014.7013367","type":"proceedings-article","created":{"date-parts":[[2015,1,21]],"date-time":"2015-01-21T14:37:37Z","timestamp":1421851057000},"page":"1-8","source":"Crossref","is-referenced-by-count":25,"title":["Supervised learning to detect DDoS attacks"],"prefix":"10.1109","author":[{"given":"Eray","family":"Balkanli","sequence":"first","affiliation":[]},{"given":"Jander","family":"Alves","sequence":"additional","affiliation":[]},{"given":"A. Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Adapting bro into scada: Building a specification-based intrusion detection system for the dnp3 protocol","author":"hui","year":"2013","journal-title":"Eighth Annual Workshop on Cyber Security and Information Intelligence Research"},{"key":"17","year":"0","journal-title":"SNORT"},{"key":"18","year":"0","journal-title":"The Bro Network Security Monitor"},{"key":"33","year":"0","journal-title":"TShark"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1023\/A:1006624031083"},{"key":"16","article-title":"A rule based DDoS detection and mitigation technique","author":"md","year":"2012","journal-title":"Engineering (NUiCONE) 2012 Nirma University International Conference on"},{"key":"13","author":"claude","year":"2013","journal-title":"Finger-printing Internet Dns Amplification DDoS Activities"},{"key":"14","article-title":"On the analysis of backscatter traffic","author":"eray","year":"2014","journal-title":"The 8th Ieee Workshop on Network Measurements Ieee"},{"key":"11","article-title":"Investigating the dark cyberspace: Profiling, threat-based analysis and correlation","author":"claude","year":"2012","journal-title":"Risk and Security of Internet and Systems (CRiSIS) 2012 7th International Conference On Ieee"},{"key":"12","article-title":"Towards a forecasting model for distributed denial of service activities","author":"claude","year":"2013","journal-title":"Network Computing and Applications (Nca) 2013 12th Ieee International Symposium On Ieee"},{"key":"21","year":"0","journal-title":"Corsaro"},{"key":"20","year":"0","journal-title":"Iatmon"},{"key":"22","year":"0"},{"key":"23","year":"0"},{"key":"24","article-title":"Hop-count filtering: An effective defense against spoofed DDoS traffic","author":"cheng","year":"2003","journal-title":"Proceedings of the 10th ACM Conference on Computer and Communications Security ACM"},{"key":"25","year":"0"},{"key":"26","year":"0"},{"key":"27","year":"0"},{"key":"28","year":"0","journal-title":"The R Project for Statistical Computing"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"key":"3","year":"2004","journal-title":"Understanding IPS and IDS Using IPS and IDS Together for Defense in Depth"},{"key":"2","year":"0"},{"key":"10","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1145\/2567561.2567568","article-title":"Estimating internet address space usage through passive measurements","volume":"44","author":"alberto","year":"2013","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"1","year":"0"},{"key":"30","article-title":"Locally weighted naive bayes","author":"eibe","year":"2002","journal-title":"Proceedings of the Nineteenth Conference on Uncertainty in Artificial Intelligence"},{"key":"7","year":"0","journal-title":"The UCSD Network Telescope"},{"key":"6","author":"raywood","year":"2009","journal-title":"Conficker Worm Authors Could Launch DDoS Attacks"},{"key":"32","author":"roman","year":"2004","journal-title":"Classification and Regression Trees (CART) Theory and Applications"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2173486"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-007-0118-y"},{"key":"4","year":"2008","journal-title":"Uk-Anti-fraud Site Bobbear Infested by DDoS Attack"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1132026.1132027"},{"key":"8","year":"2008","journal-title":"The Caida Ucsd Backscatter-2008 Dataset"}],"event":{"name":"2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)","location":"Orlando, FL, USA","start":{"date-parts":[[2014,12,9]]},"end":{"date-parts":[[2014,12,12]]}},"container-title":["2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6999019\/7013356\/07013367.pdf?arnumber=7013367","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T00:03:41Z","timestamp":1498176221000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7013367\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/cicybs.2014.7013367","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}