{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T03:40:09Z","timestamp":1774669209705,"version":"3.50.1"},"reference-count":32,"publisher":"IEEE","funder":[{"DOI":"10.13039\/501100004895","name":"European Social Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004895","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,3,1]]},"DOI":"10.1109\/icin51074.2021.9385540","type":"proceedings-article","created":{"date-parts":[[2021,3,29]],"date-time":"2021-03-29T22:06:02Z","timestamp":1617055562000},"page":"126-133","source":"Crossref","is-referenced-by-count":21,"title":["SYN Flood Attack Detection and Mitigation using Machine Learning Traffic Classification and Programmable Data Plane Filtering"],"prefix":"10.1109","author":[{"given":"Marinos","family":"Dimolianis","sequence":"first","affiliation":[]},{"given":"Adam","family":"Pavlidis","sequence":"additional","affiliation":[]},{"given":"Vasilis","family":"Maglaris","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","article-title":"IETF Internet-Draft: BGP FlowSpec Payload Matching","author":"khare","year":"0"},{"key":"ref31","article-title":"Federated Learning: Strategies for Improving Communication Efficiency","author":"kone?n\u00fd","year":"2016"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888920000259"},{"key":"ref10","article-title":"A Network Traffic Classification and Attack Mitigation Schema based on Programmable Data Planes","author":"dimolianis","year":"2020","journal-title":"Journal of Network and Systems Management (under review)"},{"key":"ref11","author":"fabre","year":"0","journal-title":"L4Drop XDP DDoS Mitigations"},{"key":"ref12","author":"bertin","year":"0","journal-title":"Introducing the p0f BPF compiler"},{"key":"ref13","article-title":"Me Love (SYN-) Cookies: SYN Flood Mitigation in Programmable Data Planes","author":"scholz","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.08.038"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2018.2861741"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2017.2701549"},{"key":"ref17","author":"eddy","year":"0","journal-title":"TCP SYN Flooding Attacks and Common Mitigations RFC 4987 (Informational)"},{"key":"ref18","year":"0","journal-title":"Fortinet - Configuring a TCP SYN flood protection policy"},{"key":"ref19","author":"phaal","year":"0","journal-title":"RFC 3176 - InMon Corporation's sFlow A Method for Monitoring Traffic in Switched and Routed Networks"},{"key":"ref28","year":"0","journal-title":"RandomForestClassifier -- scikit-learn"},{"key":"ref4","author":"bernstein","year":"0","journal-title":"Syn cookies"},{"key":"ref27","year":"0","journal-title":"WIDE backbone samplepoint-F traffic traces 08\/04\/2020"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062172"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"ref29","first-page":"1","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2015","journal-title":"Proceedings of the 3rd International Conference on Learning Representations"},{"key":"ref5","author":"majkowski","year":"0","journal-title":"SYN packet handling in the wild"},{"key":"ref8","first-page":"19","article-title":"Offloading real-time DDoS attack detection to programmable data planes","author":"lapolli","year":"2019","journal-title":"Proc IFIP\/IEEE Int Symp Integr Netw Manage"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281443"},{"key":"ref2","year":"0","journal-title":"Imperva mitigates largest DDoS attacks of 2020 so far"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN48450.2020.9059327"},{"key":"ref1","year":"0","journal-title":"Cloudflare - Network-layer DDoS attack trends for Q2 2020"},{"key":"ref20","author":"serodio","year":"0","journal-title":"Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec"},{"key":"ref22","year":"0","journal-title":"TCP SYN Flood mitigation via XDP"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"key":"ref24","year":"0","journal-title":"Netronome Agilio CX SmartNICs"},{"key":"ref23","year":"0","journal-title":"Platypus Multiobjective Optimization in Python"},{"key":"ref26","article-title":"Traffic data repository at the WIDE project","author":"cho","year":"2000","journal-title":"Proceedings of the Annual Conference on USENIX Annual Technical Conference"},{"key":"ref25","year":"0","journal-title":"PF_RING-ntop"}],"event":{"name":"2021 24th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","location":"Paris, France","start":{"date-parts":[[2021,3,1]]},"end":{"date-parts":[[2021,3,4]]}},"container-title":["2021 24th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9385428\/9385523\/09385540.pdf?arnumber=9385540","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T20:55:30Z","timestamp":1630529730000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9385540\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,1]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icin51074.2021.9385540","relation":{},"subject":[],"published":{"date-parts":[[2021,3,1]]}}}