{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:11:47Z","timestamp":1730207507920,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/cisda.2015.7208635","type":"proceedings-article","created":{"date-parts":[[2015,8,20]],"date-time":"2015-08-20T21:41:42Z","timestamp":1440106902000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Highlights on analyzing one-way traffic using different tools"],"prefix":"10.1109","author":[{"given":"Eray","family":"Balkanli","sequence":"first","affiliation":[]},{"given":"A. Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2009.124"},{"key":"ref11","article-title":"Detecting P2P botnets through network behavior analysis and machine learning","author":"sherif","year":"2011","journal-title":"Privacy Security and Trust (PST) 2011 Ninth Annual International Conference On IEEE"},{"key":"ref12","first-page":"286295","article-title":"Detecting distributed denial of service (DDoS) attacks through inductive learning","volume":"2690","author":"noh","year":"2003","journal-title":"Lecture Notes in Computer Science"},{"key":"ref13","article-title":"Using machine learning technliques to identify botnet traffic","author":"carl","year":"2006","journal-title":"Local Computer Networks Proceedings 2006 31st IEEE Conference On IEEE"},{"key":"ref14","first-page":"115","article-title":"Inferring internet denial-of-service activity","volume":"2","author":"david","year":"2006","journal-title":"ACM Trans Computer Systems (TOCS)"},{"year":"0","key":"ref15","article-title":"Cisco ASA 5500 and ASA 5500-X Series Next-Generation Firewalls for Small Offices and Branch Locations"},{"journal-title":"The CAIDA UCSD Backscatter-2008 data set Nov","year":"2008","key":"ref16"},{"journal-title":"The CAIDA UCSD Network Telescope Educational data set","year":"0","key":"ref17"},{"journal-title":"GeoLiteCity","year":"0","key":"ref18"},{"article-title":"Analysis of Unidirectional IP Traffic to Darkspace with an Educational Data Kit","year":"0","author":"tanja","key":"ref19"},{"article-title":"Scandinavian banks hit with DDoS attacks","year":"2015","author":"zorz","key":"ref4"},{"journal-title":"Introduction to Machine Learning","year":"2004","author":"ethem","key":"ref27"},{"article-title":"Biggest DDoS Attack in History Hammers Spamhaus","year":"2013","author":"leyden","key":"ref3"},{"journal-title":"Corsaro","year":"0","key":"ref6"},{"key":"ref5","first-page":"1496","author":"bailey","year":"2006","journal-title":"Practical darknet measurement Information Sciences and Systems 40th Annual Conference on"},{"journal-title":"Understanding IPS and IDS Using IPS and IDS together for Defense in Depth SANA Institute","year":"2004","author":"ted","key":"ref8"},{"journal-title":"The UCSD Network Telescope","year":"0","key":"ref7"},{"journal-title":"NSFOCUS Ltd","article-title":"Mid-Year DDoS Threat Report 2013","year":"2013","key":"ref2"},{"key":"ref9","article-title":"Supervised learning to detect DDoS Attacks","author":"eray","year":"2014","journal-title":"IEEE Symposium Series on Computational Intelligence (SSCI)"},{"key":"ref1","article-title":"Worldwide Infrastructure Security Report","volume":"ix","author":"networks","year":"2013"},{"year":"0","key":"ref20","article-title":"Cisco Adaptive Security Appliance (ASA) Software"},{"journal-title":"Libpcap File Format","year":"0","key":"ref22"},{"journal-title":"Tcpreplay","year":"0","key":"ref21"},{"key":"ref24","article-title":"The WEKA Data Mining Software: An Update","volume":"11","author":"mark","year":"2009","journal-title":"SIGKDD Explorations"},{"key":"ref23","article-title":"C4. 5: programs for machine learning","volume":"1","author":"quinlan","year":"1993","journal-title":"Morgan Kaufmann"},{"key":"ref26","article-title":"Experiments with a new boosting algorithm","volume":"96","author":"yoav","year":"1996"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116251"}],"event":{"name":"2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)","start":{"date-parts":[[2015,5,26]]},"location":"Verona, NY, USA","end":{"date-parts":[[2015,5,28]]}},"container-title":["2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7165058\/7208613\/07208635.pdf?arnumber=7208635","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T21:36:43Z","timestamp":1490391403000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7208635\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/cisda.2015.7208635","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}