{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T05:17:51Z","timestamp":1732771071584,"version":"3.29.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,24]]},"DOI":"10.1109\/icccnt61001.2024.10724816","type":"proceedings-article","created":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T23:06:46Z","timestamp":1730761606000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Predicting DDoS Attacks: A Machine Learning Approach using ALDDoS Dataset"],"prefix":"10.1109","author":[{"given":"Shantanu","family":"Shookdeb","sequence":"first","affiliation":[{"name":"C V Raman Global University,Dept. of computer Science and Eng.,Bhubaneswar,India"}]},{"given":"Debendra","family":"Muduli","sequence":"additional","affiliation":[{"name":"C V Raman Global University,Dept. of computer Science and Eng.,Bhubaneswar,India"}]},{"given":"Sandesh","family":"Bhatta","sequence":"additional","affiliation":[{"name":"C V Raman Global University,Dept. of computer Science and Eng.,Bhubaneswar,India"}]},{"given":"Aayush","family":"Adhikari","sequence":"additional","affiliation":[{"name":"C V Raman Global University,Dept. of computer Science and Engineering,Bhubaneswar,India"}]},{"given":"Aaron","family":"Sapkota","sequence":"additional","affiliation":[{"name":"C V Raman Global University,Dept. of computer Science and Eng.,Bhubaneswar,India"}]},{"given":"Prabhat","family":"Chaturvedi","sequence":"additional","affiliation":[{"name":"C V Raman Global University,Dept. of computer Science and Eng.,Bhubaneswar,India"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Ddos attack and defense: Review of some traditional and current techniques","author":"Aamir","year":"2014","journal-title":"arXiv preprint arXiv:1401.6317"},{"issue":"1","key":"ref2","first-page":"1","article-title":"Data normalization and standardization: a technical report","volume-title":"Mach Learn Tech Rep","volume":"1","author":"Muhammad Ali","year":"2014"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/app13053183"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IIT50501.2020.9299061"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10232919"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12194142"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/bf00153761"},{"article-title":"Building decision tree classifier on private data","year":"2002","author":"Du","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1086\/442582"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1097\/ACM.0b013e318204ff1d"},{"key":"ref11","article-title":"Predict and prevent ddos attacks using machine learning and statistical algorithms","author":"Golduzian","year":"2023","journal-title":"arXiv preprint arXiv:2308.15674"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2017.58"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CSP51677.2021.9357499"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-11740-z"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSEC.2018.8712757"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-022-00616-0"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1504\/IJICS.2015.073028"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-021-06608-1"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IWBIS50925.2020.9255601"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0111439"},{"article-title":"FlowScan: A network traffic flow reporting and visualization tool","volume-title":"14th Systems Administration Conference (LISA 2000)","author":"Plonka","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2017.7946652"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274717"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/21.97458"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-019-02994-2"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1009440108"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TGE.1977.6498972"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/356859.356864"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-019-00599-z"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.02.026"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/AICAI.2019.8701238"}],"event":{"name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","start":{"date-parts":[[2024,6,24]]},"location":"Kamand, India","end":{"date-parts":[[2024,6,28]]}},"container-title":["2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10723818\/10723316\/10724816.pdf?arnumber=10724816","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T06:57:02Z","timestamp":1732690622000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10724816\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,24]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/icccnt61001.2024.10724816","relation":{},"subject":[],"published":{"date-parts":[[2024,6,24]]}}}