{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:49:24Z","timestamp":1729676964615,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/iscc.2013.6754984","type":"proceedings-article","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T22:14:57Z","timestamp":1394230497000},"page":"000430-000435","source":"Crossref","is-referenced-by-count":17,"title":["A similarity based approach for application DoS attacks detection"],"prefix":"10.1109","author":[{"given":"Maurizio","family":"Aiello","sequence":"first","affiliation":[]},{"given":"Enrico","family":"Cambiaso","sequence":"additional","affiliation":[]},{"given":"Silvia","family":"Scaglione","sequence":"additional","affiliation":[]},{"given":"Gianluca","family":"Papaleo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"250","author":"zander","year":"2005","journal-title":"Automated traffic classification and application identification using machine learning"},{"journal-title":"RFC 2616 Hypertext Transfer Protocol - HTTP\/1 1","year":"0","author":"fielding","key":"22"},{"key":"17","first-page":"135","author":"roughan","year":"2004","journal-title":"Class-of-service Mapping for QoS A Statistical Signature-based Approach to IP Traffic Classification"},{"journal-title":"HTTP Characterizer-SourceForge Project","year":"0","author":"aiello","key":"23"},{"key":"18","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/978-3-540-24668-8_21","article-title":"Flow clustering using machine learning techniques","author":"mcgregor","year":"2004","journal-title":"Passive and Active Network Measurement"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1002\/qre.392"},{"key":"16","first-page":"51","author":"dewes","year":"2003","journal-title":"An Analysis of Internet Chat Systems"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/90.330413"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/90.392383"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.2307\/1266540"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(98)00017-6"},{"key":"21","first-page":"84","article-title":"Research on intrusion detection and response: A survey","volume":"1","author":"kabiri","year":"2005","journal-title":"International Journal of Network Security"},{"key":"2","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1109\/3468.935043","article-title":"Probabilistic techniques for intrusion detection based on computer audit data","volume":"31","author":"ye","year":"2001","journal-title":"Systems Man and Cybernetics Part A Systems and Humans IEEE Transactions on"},{"journal-title":"Intrusion Detection Systems A Survey and Taxonomy","year":"2000","author":"axelsson","key":"20"},{"key":"1","first-page":"18","volume":"28","author":"garcia-teodoro","year":"2009","journal-title":"Anomaly-based Network Intrusion Detection Techniques Systems and Challenges Computers & Security"},{"key":"10","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1007\/978-3-642-34135-9_20","article-title":"Taxonomy of slow dos attacks to web applications","author":"cambiaso","year":"2012","journal-title":"Recent Trends in Computer Networks and Distributed Systems Security"},{"key":"7","first-page":"50","volume":"33","author":"moore","year":"2005","journal-title":"Internet traffic classification using Bayesian analysis techniques"},{"key":"6","first-page":"333","article-title":"Statistical based intrusion detection framework using six sigma technique","volume":"7","author":"kumar","year":"2007","journal-title":"IJCSNS"},{"key":"5","first-page":"2009","article-title":"Statistical-based intrusion detection","volume":"10","author":"farshchi","year":"2003","journal-title":"Retrieved October"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"9","first-page":"14","article-title":"Ddos incidents and their impact: A review","volume":"7","author":"sachdeva","year":"2010","journal-title":"International Arab Journal of Information Technology"},{"key":"8","first-page":"1131","article-title":"Flooding based ddos attacks and their influence on web services,\" IJCSIT)","volume":"2","author":"kumar","year":"2011","journal-title":"International Journal of Computer Science and Information Technologies"}],"event":{"name":"2013 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2013,7,7]]},"location":"Split, Croatia","end":{"date-parts":[[2013,7,10]]}},"container-title":["2013 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6746555\/6754912\/06754984.pdf?arnumber=6754984","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T09:15:20Z","timestamp":1498122920000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6754984\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/iscc.2013.6754984","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}