{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T17:56:08Z","timestamp":1775670968305,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T00:00:00Z","timestamp":1472083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,8,25]]},"DOI":"10.1145\/2980258.2980379","type":"proceedings-article","created":{"date-parts":[[2016,11,2]],"date-time":"2016-11-02T12:22:17Z","timestamp":1478089337000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Distributed denial of service attack detection using Naive Bayes Classifier through Info Gain Feature Selection"],"prefix":"10.1145","author":[{"given":"Ningombam Anandshree","family":"Singh","sequence":"first","affiliation":[{"name":"Dept. of Computer Science and Engineering, National Institute of Technology, Manipur, Imphal, Manipur"}]},{"given":"Khundrakpam Johnson","family":"Singh","sequence":"additional","affiliation":[{"name":"Dept. of Computer Science and Engineering, National Institute of Technology, Manipur, Imphal, Manipur"}]},{"given":"Tanmay","family":"De","sequence":"additional","affiliation":[{"name":"Dept. of Computer Science and Engineering, National Institute of Technology, Durgapur, Durgapur, West Bengal"}]}],"member":"320","published-online":{"date-parts":[[2016,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.04.101"},{"key":"e_1_3_2_1_2_1","first-page":"196","volume-title":"DDOS Attack Detection and Mitigation Technique Based On Http Count and Verification Using CAPTCHA. International Conference on Computational Intelligence & Networks","author":"Singh K. J.","year":"2015","unstructured":"Singh , K. J. , De , T. 2015 . DDOS Attack Detection and Mitigation Technique Based On Http Count and Verification Using CAPTCHA. International Conference on Computational Intelligence & Networks , 2015, Pages 196 -- 197 Singh, K. J., De, T. 2015. DDOS Attack Detection and Mitigation Technique Based On Http Count and Verification Using CAPTCHA. International Conference on Computational Intelligence & Networks, 2015, Pages 196--197"},{"key":"e_1_3_2_1_3_1","first-page":"12","volume-title":"DDoS Attack Detection Method and Mitigation Using Pattern of the Flow. In International Conference of Information and Communication Technology (ICoICT).","author":"Sanmorino A.","year":"2013","unstructured":"Sanmorino , A. , Yazid , S. 2013 . DDoS Attack Detection Method and Mitigation Using Pattern of the Flow. In International Conference of Information and Communication Technology (ICoICT). 2013. Pages 12 -- 16 Sanmorino, A., Yazid, S. 2013. DDoS Attack Detection Method and Mitigation Using Pattern of the Flow. In International Conference of Information and Communication Technology (ICoICT). 2013. Pages 12--16"},{"key":"e_1_3_2_1_4_1","volume-title":"Machine Learning 81-117, 128-145, 157-198","author":"Mitchell T. M.","year":"1997","unstructured":"Mitchell , T. M. 1997. Machine Learning 81-117, 128-145, 157-198 , 1 st ed., McGrawHill Science\/Engineering\/Math, New York ( 1997 ) 52--78, Chapters 3,4,6,7. Mitchell, T. M. 1997. Machine Learning 81-117, 128-145, 157-198, 1st ed., McGrawHill Science\/Engineering\/Math, New York (1997) 52--78, Chapters 3,4,6,7.","edition":"1"},{"key":"e_1_3_2_1_5_1","volume-title":"International Journal of Computer Science and Information Technologies.","author":"Gunasekhar T.","year":"2014","unstructured":"Gunasekhar , T. , Rao , K. T. , Saikiran , P. , Lakshmi , P.V.S. 2014. A Survey on Denial of Service Attacks . International Journal of Computer Science and Information Technologies. 2014 . Vol. 5 (2), 2014, Pages 2373--2376. Gunasekhar, T., Rao, K. T., Saikiran, P., Lakshmi, P.V.S. 2014. A Survey on Denial of Service Attacks. International Journal of Computer Science and Information Technologies. 2014. Vol. 5 (2), 2014, Pages 2373--2376."},{"key":"e_1_3_2_1_6_1","volume-title":"http:\/\/tools.ietf.org\/html\/rfc4987. Accessed date","author":"Flooding Attacks","year":"2015","unstructured":"RFC 4987 -- TCP SYN Flooding Attacks and Common Mitigations. http:\/\/tools.ietf.org\/html\/rfc4987. Accessed date 19 August 2015 . RFC 4987 -- TCP SYN Flooding Attacks and Common Mitigations. http:\/\/tools.ietf.org\/html\/rfc4987. Accessed date 19 August 2015."},{"key":"e_1_3_2_1_7_1","first-page":"1","volume-title":"3rd International Conference on Communication Systems and Networks (COMSNETS'11)","author":"Vijayasarathy R.","year":"2011","unstructured":"Vijayasarathy , R. , Raghavan , S.V. , Ravindran , B. 2011 . A System Approach to Network Modeling for DDoS Detection using a Naive Bayesian Classifier . In 3rd International Conference on Communication Systems and Networks (COMSNETS'11) . IEEE Press , 2011, Pages 1 -- 10 Vijayasarathy, R., Raghavan, S.V., Ravindran, B. 2011. A System Approach to Network Modeling for DDoS Detection using a Naive Bayesian Classifier. In 3rd International Conference on Communication Systems and Networks (COMSNETS'11). IEEE Press, 2011, Pages 1--10"},{"key":"e_1_3_2_1_8_1","first-page":"1","volume-title":"Detecting Denial of Service Attacks with Bayesian Classifiers and the Random Neural Network. In IEEE International Conference on Fuzzy Systems, FUZZ-IEEE","author":"Oke G.","year":"2007","unstructured":"Oke , G. , Loukas , G. , Gelenbe , E. 2007 . Detecting Denial of Service Attacks with Bayesian Classifiers and the Random Neural Network. In IEEE International Conference on Fuzzy Systems, FUZZ-IEEE , June 2017, Pages 1 -- 6 . Oke, G., Loukas, G., Gelenbe, E. 2007. Detecting Denial of Service Attacks with Bayesian Classifiers and the Random Neural Network. In IEEE International Conference on Fuzzy Systems, FUZZ-IEEE, June 2017, Pages 1--6."},{"key":"e_1_3_2_1_9_1","first-page":"1823","volume-title":"Control and Information Engineering","volume":"8","author":"Umarani S.","year":"2014","unstructured":"Umarani , S. , Sharmila , D. 2014 . Predicting Application Layer DDoS Attacks Using Machine Learning Algorithms. 2014 International Journal of Computer, Electrical, Automation , Control and Information Engineering , Vol. 8 , Pages 1823 -- 1828 Umarani, S., Sharmila, D. 2014. Predicting Application Layer DDoS Attacks Using Machine Learning Algorithms. 2014 International Journal of Computer, Electrical, Automation, Control and Information Engineering, Vol. 8, Pages 1823--1828"},{"key":"e_1_3_2_1_10_1","first-page":"118","volume-title":"proceedings of ICANN'10 Proceedings of the 20th international conference on Artificial neural networks: Part III.","author":"Siaterlis C.","year":"2004","unstructured":"Siaterlis , C. , Maglaris , B. 2004 . Detecting DDoS attacks using a multilayer Perceptron classifier . In proceedings of ICANN'10 Proceedings of the 20th international conference on Artificial neural networks: Part III. March 2004, Pages 118 -- 123 Siaterlis, C., Maglaris, B. 2004. Detecting DDoS attacks using a multilayer Perceptron classifier. In proceedings of ICANN'10 Proceedings of the 20th international conference on Artificial neural networks: Part III. March 2004, Pages 118--123"},{"key":"e_1_3_2_1_11_1","first-page":"232","volume-title":"Computers and Signal Processing, 2007","author":"Sasase I.","year":"2007","unstructured":"Sasase , I. , Yatagai , T. , Isohara , T. 2007 . Detection of HTTP-GET flood Attack Based on Analysis of Page Access Behavior. In Communications , Computers and Signal Processing, 2007 , IEEE Xplorer. September 2007, Pages 232 -- 235 Sasase, I., Yatagai, T., Isohara, T. 2007. Detection of HTTP-GET flood Attack Based on Analysis of Page Access Behavior. In Communications, Computers and Signal Processing, 2007, IEEE Xplorer. September 2007, Pages 232--235"},{"key":"e_1_3_2_1_12_1","unstructured":"Index of \/ datasets\/security\/ddos-20070804). https:\/\/data.caida.org\/datasets\/security\/ddos-20070804\/ Accessed on October 9-2015  Index of \/ datasets\/security\/ddos-20070804). https:\/\/data.caida.org\/datasets\/security\/ddos-20070804\/ Accessed on October 9-2015"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.09.009"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2011.08.020"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2013.10.012"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2015.12.005"},{"key":"e_1_3_2_1_17_1","first-page":"1800","volume-title":"International Journal of Innovative Research in Computer and Communication Engineering","volume":"1","author":"Kuriakose D.","year":"2013","unstructured":"Kuriakose , D. , Praveena , V. 2013 . A Survey on DDoS Attacks and Defense Approaches . In International Journal of Innovative Research in Computer and Communication Engineering , Vol. 1 , Issue 8, October 2013, Page: 1800 -- 1805 Kuriakose, D., Praveena, V. 2013. A Survey on DDoS Attacks and Defense Approaches. In International Journal of Innovative Research in Computer and Communication Engineering, Vol. 1, Issue 8, October 2013, Page: 1800--1805"},{"key":"e_1_3_2_1_18_1","first-page":"244","volume-title":"International Journal of Innovative Research in Computer and Communication Engineering","volume":"4","author":"Dhole R.","year":"2016","unstructured":"Dhole , R. , Lolge , S. 2016 . A Survey of Botnet Detection Techniques and Research Challenges . International Journal of Innovative Research in Computer and Communication Engineering , Vol. 4 , Issue 1, January 2016, Page: 244 -- 250 Dhole, R., Lolge, S. 2016. A Survey of Botnet Detection Techniques and Research Challenges. International Journal of Innovative Research in Computer and Communication Engineering, Vol. 4, Issue 1, January 2016, Page: 244--250"},{"key":"e_1_3_2_1_19_1","first-page":"18","volume-title":"International Journal of Innovations & Advancement in Computer Science","volume":"5","author":"Verma A.","year":"2016","unstructured":"Verma , A. , Xaxa , D. K. 2016 . A Survey on HTTP Flooding Attack Detection and Mitigating Methodologies . International Journal of Innovations & Advancement in Computer Science , Volume 5 , Issue 5, May 2016, Page: 18 -- 21 Verma, A., Xaxa, D. K. 2016. A Survey on HTTP Flooding Attack Detection and Mitigating Methodologies. International Journal of Innovations & Advancement in Computer Science, Volume 5, Issue 5, May 2016, Page: 18--21"}],"event":{"name":"ICIA-16: International Conference on Informatics and Analytics","location":"Pondicherry India","acronym":"ICIA-16"},"container-title":["Proceedings of the International Conference on Informatics and Analytics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2980258.2980379","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2980258.2980379","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:39:51Z","timestamp":1750217991000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2980258.2980379"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,25]]},"references-count":19,"alternative-id":["10.1145\/2980258.2980379","10.1145\/2980258"],"URL":"https:\/\/doi.org\/10.1145\/2980258.2980379","relation":{},"subject":[],"published":{"date-parts":[[2016,8,25]]},"assertion":[{"value":"2016-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}