{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T11:25:48Z","timestamp":1751887548220,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1109\/comsnets.2011.5716474","type":"proceedings-article","created":{"date-parts":[[2011,2,18]],"date-time":"2011-02-18T19:10:46Z","timestamp":1298056246000},"page":"1-10","source":"Crossref","is-referenced-by-count":17,"title":["A system approach to network modeling for DDoS detection using a Na"],"prefix":"10.1109","author":[{"given":"R","family":"Vijayasarathy","sequence":"first","affiliation":[]},{"given":"S V","family":"Raghavan","sequence":"additional","affiliation":[]},{"given":"B","family":"Ravindran","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IMSCCS.2006.159"},{"key":"ref11","article-title":"A new ddos detection model using multiple svms and tra","volume":"3823","author":"seo","year":"2005","journal-title":"Machine Learning and Cybernetics"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1109\/IAW.2005.1495950","article-title":"A machine learning framework for network anomaly detection using svm and ga","author":"shon","year":"2005","journal-title":"Information Assurance Workshop 2005 IAW '05 Proceedings from the Sixth Annual IEEE SMC"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.08.014"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2005.1577940"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/775094.775102"},{"key":"ref16","article-title":"Detecting ddos attacks based on multistream fused hmm in source-end network","author":"kang","year":"2006","journal-title":"International Conference on Cryptograohy and Network Security"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71549-8_17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3844\/ajassp.2009.1948.1959"},{"key":"ref4","article-title":"Client puzzles: A cryptographic countermeasure against connection deoletion attacks","author":"juels","year":"1999","journal-title":"NDSS"},{"article-title":"Syn cookies","year":"0","author":"bernstein","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194894"},{"key":"ref5","first-page":"170","article-title":"Dos-resistant authentication with client puzzles","author":"aura","year":"2000","journal-title":"Lecture Notes in Computer Science"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"4210","DOI":"10.1109\/ICMLC.2004.1384578","article-title":"Ddos detection based on feature space modeling","volume":"7","author":"jin","year":"2004","journal-title":"Proc of 2004 International Conference on Machine Learning and Cybernetics"},{"key":"ref7","first-page":"1882","article-title":"A covariance analysis model for ddos attack detection","author":"jin","year":"2004","journal-title":"Communications 2004 IEEE International Conference on"},{"article-title":"The stacheldraht distributed denial of service attack tool","year":"1999","author":"dittrich","key":"ref2"},{"year":"0","author":"yamamura","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.4.9.921-928"},{"key":"ref20","article-title":"Combining naive bayes and decision tree for adaptive intrusion detection","volume":"abs 1005 4496","author":"farid","year":"2010","journal-title":"CoRR"},{"year":"0","key":"ref22","article-title":"Darpa intrusion detection datasets"},{"year":"1999","key":"ref21","article-title":"Kdd cups 1999 data"}],"event":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","start":{"date-parts":[[2011,1,4]]},"location":"Bangalore","end":{"date-parts":[[2011,1,8]]}},"container-title":["2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5710820\/5716386\/05716474.pdf?arnumber=5716474","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T19:57:43Z","timestamp":1497902263000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5716474\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2011.5716474","relation":{},"subject":[],"published":{"date-parts":[[2011,1]]}}}