{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T10:51:38Z","timestamp":1744368698528,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1109\/comsnets.2018.8328233","type":"proceedings-article","created":{"date-parts":[[2018,4,2]],"date-time":"2018-04-02T20:45:17Z","timestamp":1522701917000},"page":"421-424","source":"Crossref","is-referenced-by-count":19,"title":["Detection of high rate DDoS attack from flash events using information metrics in software defined networks"],"prefix":"10.1109","author":[{"given":"Kshira Sagar","family":"Sahoo","sequence":"first","affiliation":[]},{"given":"Mayank","family":"Tiwary","sequence":"additional","affiliation":[]},{"given":"Bibhudatta","family":"Sahoo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1472"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735752"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2535372.2535411"},{"key":"ref13","first-page":"29","article-title":"Software defined traffic measurement with opensketch","volume":"13","author":"yu","year":"2013","journal-title":"NSDI"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2015.7069319"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.389"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2107320"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCN.2007.350758"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1132026.1132027"},{"key":"ref19","first-page":"734","article-title":"Discriminating flash events from ddos attacks: A comprehensive review","volume":"19","author":"behal","year":"2017","journal-title":"IJ Network Security"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.63"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2979779.2983928"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/978-3-319-11599-3_14","article-title":"Spook in your network: Attacking an sdn with a compromised openflow switch","author":"antikainen","year":"2014","journal-title":"Nordic Conference in Secure IT Systems"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491188"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICAECC.2014.7002394"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081073"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2988336.2988338"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2320094"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MAMI.2015.7456584"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1016\/j.procs.2012.06.056","article-title":"Tackling application-layer ddos attacks","volume":"10","author":"beitollahi","year":"2012","journal-title":"Procedia Computer Science"},{"journal-title":"Welcome to scapys documentation!","year":"0","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.39"}],"event":{"name":"2018 10th International Conference on Communication Systems & Networks (COMSNETS)","start":{"date-parts":[[2018,1,3]]},"location":"Bengaluru","end":{"date-parts":[[2018,1,7]]}},"container-title":["2018 10th International Conference on Communication Systems &amp; Networks (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8325363\/8328170\/08328233.pdf?arnumber=8328233","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T05:26:55Z","timestamp":1643174815000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8328233\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2018.8328233","relation":{},"subject":[],"published":{"date-parts":[[2018,1]]}}}