{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:38:28Z","timestamp":1761676708831,"version":"3.43.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/giis.2018.8635701","type":"proceedings-article","created":{"date-parts":[[2019,2,7]],"date-time":"2019-02-07T18:55:53Z","timestamp":1549565753000},"page":"1-6","source":"Crossref","is-referenced-by-count":19,"title":["Detection of LDDoS Attacks Based on TCP Connection Parameters"],"prefix":"10.1109","author":[{"given":"Michael","family":"Siracusano","sequence":"first","affiliation":[{"name":"School of Computing, Electronics and Mathematics Faculty of Science and Engineering Plymouth University, UK"}]},{"given":"Stavros","family":"Shiaeles","sequence":"additional","affiliation":[{"name":"School of Computing, Electronics and Mathematics Faculty of Science and Engineering Plymouth University, UK"}]},{"given":"Bogdan","family":"Ghita","sequence":"additional","affiliation":[{"name":"School of Computing, Electronics and Mathematics Faculty of Science and Engineering Plymouth University, UK"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IISA.2013.6623707"},{"key":"ref11","first-page":"472","article-title":"EVALUATING MACHINE LEARNING ALGORITHMS FOR DETECTING NETWORK INTRUSIONS","author":"panda","year":"2009","journal-title":"International Journal of Recent Trends in Engineering"},{"key":"ref12","first-page":"60","article-title":"Analysis of slow read DoS attack. In Information Theory and its Applications (ISITA)","author":"park","year":"2014","journal-title":"2014 IEEE International Symposium on"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1109\/RAICS.2015.7488411","article-title":"Ranking of Machine learning Algorithms Based on the Performance in Classifying DDoS Attacks","author":"robinson","year":"2015","journal-title":"IEEE Recent Advances in Intelligent Computational Systems (RAICS)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.04.101"},{"key":"ref15","first-page":"1733","article-title":"CloudZombie: Launching and detecting slow-read distributed denial of service attacks from the cloud. In Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT\/IUCC\/DASC\/PICOM)","author":"shafieian","year":"2015","journal-title":"2015 IEEE International Conference"},{"year":"2017","key":"ref16","article-title":"Online banking penetration in Great Britain from 2007 to 2016"},{"key":"ref17","first-page":"21","article-title":"Artificial Neural Network based System for Intrusion Detection using Clustering on Different Feature Selection","author":"tammi","year":"2015","journal-title":"International Journal of Computer Applications"},{"journal-title":"TensorFlow&#x2122;","year":"2018","key":"ref18"},{"year":"2017","key":"ref19","article-title":"CIC DoS dataset"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2014.19"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2004.1348109"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.03.018"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/NBiS.2016.58"},{"key":"ref8","first-page":"75","article-title":"Low-rate TCP-targeted denial of service attacks&#x2013;(the shrew vs. the mice and elephants)","author":"kuzmanovic","year":"2003","journal-title":"Proc of ACM SIGCOMM Karlsruhe Germany"},{"year":"2016","key":"ref7","article-title":"Kaspersky DDoS Intelligence Report for Q1 2016"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTM.2015.7225395"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.04.015"},{"key":"ref9","first-page":"1013","volume":"51","author":"macia-fernandez","year":"2007","journal-title":"Evaluation of a low-rate DoS attack against iterative servers Computer Networks"},{"year":"0","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSNT.2012.6526103"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/HPSR.2016.7525636"}],"event":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","start":{"date-parts":[[2018,10,23]]},"location":"Thessaloniki, Greece","end":{"date-parts":[[2018,10,25]]}},"container-title":["2018 Global Information Infrastructure and Networking Symposium (GIIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8632667\/8635591\/08635701.pdf?arnumber=8635701","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T18:41:04Z","timestamp":1754332864000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8635701\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/giis.2018.8635701","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}