{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T21:36:56Z","timestamp":1776548216078,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T00:00:00Z","timestamp":1472083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,8,25]]},"DOI":"10.1145\/2980258.2980431","type":"proceedings-article","created":{"date-parts":[[2016,11,2]],"date-time":"2016-11-02T12:22:17Z","timestamp":1478089337000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Detection of DDoS DNS Amplification Attack Using Classification Algorithm"],"prefix":"10.1145","author":[{"given":"Irom Lalit","family":"Meitei","sequence":"first","affiliation":[{"name":"Department of CSE, NIT, Manipur"}]},{"given":"Khundrakpam Johnson","family":"Singh","sequence":"additional","affiliation":[{"name":"Department of CSE, NIT, Manipur"}]},{"given":"Tanmay","family":"De","sequence":"additional","affiliation":[{"name":"Department of CSE, NIT, Durgapur"}]}],"member":"320","published-online":{"date-parts":[[2016,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"TechNet -- Microsoft How DNS query works https:\/\/technet.microsoft.com\/enus\/library\/cc779380(v=ws.10).aspx  TechNet -- Microsoft How DNS query works https:\/\/technet.microsoft.com\/enus\/library\/cc779380(v=ws.10).aspx"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(07)70005-3"},{"key":"e_1_3_2_1_3_1","volume-title":"Accessed date","author":"The Trace","year":"2015","unstructured":"Trace -- SimpleWiki -- The Simpleweb www.simpleweb.org\/wiki\/ Traces . Accessed date 19 November 2015 . Trace -- SimpleWiki -- The Simpleweb www.simpleweb.org\/wiki\/Traces. Accessed date 19 November 2015."},{"key":"e_1_3_2_1_4_1","volume-title":"Accessed date","author":"Internet Traces The CAIDA","year":"2015","unstructured":"The CAIDA Anonymized OC48 Internet Traces Dataset http:\/\/www.caida.org\/data\/passive\/passive_oc48_dataset.xml. Accessed date 21 November 2015 . The CAIDA Anonymized OC48 Internet Traces Dataset http:\/\/www.caida.org\/data\/passive\/passive_oc48_dataset.xml. Accessed date 21 November 2015."},{"key":"e_1_3_2_1_5_1","first-page":"441","volume-title":"Conf. on Front of Intell Comput., AISC 199","author":"Satpute Khushboo","unstructured":"Khushboo Satpute , S. Agrawal , J. Agrawal , Sanjeev Sharma . A Survey on Anomaly Detection in Network Intrusion Detection System Using Particle Swarm Optimization Based Machine Learning Techniques. Proc. of Int . Conf. on Front of Intell Comput., AISC 199 , pp. 441 -- 452 . Khushboo Satpute, S. Agrawal, J. Agrawal, Sanjeev Sharma. A Survey on Anomaly Detection in Network Intrusion Detection System Using Particle Swarm Optimization Based Machine Learning Techniques. Proc. of Int. Conf. on Front of Intell Comput., AISC 199, pp. 441--452."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.10.001"},{"key":"e_1_3_2_1_8_1","first-page":"1","volume-title":"Fingerprinting Internet DNS Amplification DDoS Activities. 2014 6th International Conference on New Technologies, Mobility and Security (NTMS)","author":"Fachkha Claude","year":"2014","unstructured":"Claude Fachkha , 2014 . Fingerprinting Internet DNS Amplification DDoS Activities. 2014 6th International Conference on New Technologies, Mobility and Security (NTMS) , 2014, pp. 1 -- 5 . Claude Fachkha, 2014. Fingerprinting Internet DNS Amplification DDoS Activities. 2014 6th International Conference on New Technologies, Mobility and Security (NTMS), 2014, pp. 1--5."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.05.012"},{"key":"e_1_3_2_1_10_1","first-page":"20","volume-title":"Eighth International Conference on Digital Information Management (ICDIM)","year":"2013","unstructured":"UzmaSattar , 2013 . Secure DNS from amplification attack by using Modified Bloom Filters . Eighth International Conference on Digital Information Management (ICDIM) , 2013, pp. 20 -- 23 . UzmaSattar, 2013. Secure DNS from amplification attack by using Modified Bloom Filters. Eighth International Conference on Digital Information Management (ICDIM), 2013, pp. 20--23."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1308177.1308404"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.09.006"},{"key":"e_1_3_2_1_13_1","first-page":"715","volume-title":"7th IEEE International Conference on Computer and Information Technology (CIT)","author":"Choi H.","year":"2007","unstructured":"H. Choi , H. Lee and H. Kim , 2007. Botnet Detection by Monitoring Group Activities in DNS traffic . 7th IEEE International Conference on Computer and Information Technology (CIT) , 2007 . pp. 715 -- 720 . H. Choi, H. Lee and H. Kim, 2007. Botnet Detection by Monitoring Group Activities in DNS traffic. 7th IEEE International Conference on Computer and Information Technology (CIT), 2007. pp. 715--720."},{"key":"e_1_3_2_1_14_1","first-page":"476","volume-title":"5th IEEE Consumer Communications and Networking Conference (CCNC)","author":"Salomon Ricardo Villamarin","year":"2008","unstructured":"Ricardo Villamarin Salomon , Jose Carlos Brustoloni . Identifying Botnets Using Anomaly Detection Techniques Applied to DNS Traffic . 5th IEEE Consumer Communications and Networking Conference (CCNC) , 2008 , pp. 476 -- 481 . Ricardo Villamarin Salomon, Jose Carlos Brustoloni. Identifying Botnets Using Anomaly Detection Techniques Applied to DNS Traffic. 5th IEEE Consumer Communications and Networking Conference (CCNC), 2008, pp. 476--481."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS.2014.7057227"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.04.101"},{"key":"e_1_3_2_1_17_1","volume-title":"DNS Amplification attack, https:\/\/www.us-cert.gov\/ncas\/alerts\/TA13-088A. Accessed date","year":"2015","unstructured":"US-CERT , DNS Amplification attack, https:\/\/www.us-cert.gov\/ncas\/alerts\/TA13-088A. Accessed date 23 September 2015 . US-CERT, DNS Amplification attack, https:\/\/www.us-cert.gov\/ncas\/alerts\/TA13-088A. Accessed date 23 September 2015."},{"issue":"1","key":"e_1_3_2_1_18_1","first-page":"265","article-title":"A Practical Mechanism to Counteract DNS Amplification DDoS Attacks","volume":"9","author":"Xi YE","year":"2013","unstructured":"Xi YE , Yiru YE , 2013 . A Practical Mechanism to Counteract DNS Amplification DDoS Attacks . Journal of Computational Information Systems , Vol. 9 ( 1 ), 2013, pp. 265 -- 272 . Xi YE, Yiru YE, 2013. A Practical Mechanism to Counteract DNS Amplification DDoS Attacks. Journal of Computational Information Systems, Vol. 9(1), 2013, pp. 265--272.","journal-title":"Journal of Computational Information Systems"},{"key":"e_1_3_2_1_19_1","unstructured":"Richard Sharp Ed Warnicke. Wireshark User's Guide. https:\/\/www.wireshark.org\/docs\/wsug_html_chunked\/.  Richard Sharp Ed Warnicke. Wireshark User's Guide. https:\/\/www.wireshark.org\/docs\/wsug_html_chunked\/."},{"key":"e_1_3_2_1_20_1","volume-title":"Pattern Recognition","author":"Theodoridis Sergios","unstructured":"Sergios Theodoridis , Konstantinos Kautroumbas . Pattern Recognition . Second Edition. Sergios Theodoridis, Konstantinos Kautroumbas. Pattern Recognition. Second Edition."},{"key":"e_1_3_2_1_21_1","volume-title":"http:\/\/www.ke.tu-darmstadt.de\/lehre\/archiv\/ws0809\/mldm\/dt.pdf. Accessed date","author":"Learining Decision Tree","year":"2015","unstructured":"Decision Tree Learining , http:\/\/www.ke.tu-darmstadt.de\/lehre\/archiv\/ws0809\/mldm\/dt.pdf. Accessed date 15 December 2015 . Decision Tree Learining, http:\/\/www.ke.tu-darmstadt.de\/lehre\/archiv\/ws0809\/mldm\/dt.pdf. Accessed date 15 December 2015."},{"key":"e_1_3_2_1_22_1","volume-title":"Elements of Information Theory","author":"Cover T.M.","unstructured":"T.M. Cover and J.A. Thomas , \" Elements of Information Theory \", Second Edition. T.M. Cover and J.A. Thomas, \"Elements of Information Theory\", Second Edition."},{"key":"e_1_3_2_1_23_1","first-page":"388","volume-title":"Proceedings, Seventh International Conference on Tools with Artificial Intelligence","author":"Lui Huan","year":"1995","unstructured":"Huan Lui , R. Setiono , 1995 . Chi2: feature selection and discretization of numeric attributes . In Proceedings, Seventh International Conference on Tools with Artificial Intelligence , 1995, pp. 388 -- 391 . Huan Lui, R. Setiono, 1995. Chi2: feature selection and discretization of numeric attributes. In Proceedings, Seventh International Conference on Tools with Artificial Intelligence, 1995, pp. 388--391."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(96)00142-2"},{"key":"e_1_3_2_1_25_1","volume-title":"Model Assessment with ROC curves. The Encyclopedia of Data Warehousing and Mining","author":"Hamel Lutz","year":"2008","unstructured":"Lutz Hamel , 2008. Model Assessment with ROC curves. The Encyclopedia of Data Warehousing and Mining , 2 nd Edition Idea Group Publishers , 2008 . Lutz Hamel, 2008. Model Assessment with ROC curves. The Encyclopedia of Data Warehousing and Mining, 2nd Edition Idea Group Publishers, 2008.","edition":"2"}],"event":{"name":"ICIA-16: International Conference on Informatics and Analytics","location":"Pondicherry India","acronym":"ICIA-16"},"container-title":["Proceedings of the International Conference on Informatics and Analytics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2980258.2980431","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2980258.2980431","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:39:51Z","timestamp":1750217991000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2980258.2980431"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,25]]},"references-count":25,"alternative-id":["10.1145\/2980258.2980431","10.1145\/2980258"],"URL":"https:\/\/doi.org\/10.1145\/2980258.2980431","relation":{},"subject":[],"published":{"date-parts":[[2016,8,25]]},"assertion":[{"value":"2016-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}