{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:35:05Z","timestamp":1750221305398,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,1,5]],"date-time":"2018-01-05T00:00:00Z","timestamp":1515110400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,1,5]]},"DOI":"10.1145\/3164541.3164562","type":"proceedings-article","created":{"date-parts":[[2018,5,16]],"date-time":"2018-05-16T11:57:40Z","timestamp":1526471860000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Toward Network-based DDoS Detection in Software-defined Networks"],"prefix":"10.1145","author":[{"given":"Stefan","family":"Jevtic","sequence":"first","affiliation":[{"name":"Indiana University Purdue University, Indianapolis, Indianapolis, IN"}]},{"given":"Hamidreza","family":"Lotfalizadeh","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN"}]},{"given":"Dongsoo S.","family":"Kim","sequence":"additional","affiliation":[{"name":"Indiana University Purdue University, Indianapolis, Indianapolis, IN"}]}],"member":"320","published-online":{"date-parts":[[2018,1,5]]},"reference":[{"key":"e_1_3_2_1_2_1","unstructured":"2017. Accessed: 6\/24\/2017. What is NS-3. http:\/\/www.nsnam.org  2017. Accessed: 6\/24\/2017. What is NS-3. http:\/\/www.nsnam.org"},{"key":"e_1_3_2_1_3_1","unstructured":"2017. Accessed: 6\/25\/2017. 2017 Study on Mobile IoT Application Security. https:\/\/media.scmagazine.com\/documents\/282\/2017_study_mobile_and_iot_70394.pdf.  2017. Accessed: 6\/25\/2017. 2017 Study on Mobile IoT Application Security. https:\/\/media.scmagazine.com\/documents\/282\/2017_study_mobile_and_iot_70394.pdf."},{"key":"e_1_3_2_1_5_1","unstructured":"2017. Accessed: 6\/25\/2017. Floodlight SDN Controller. http:\/\/www.projectfloodlight.org\/floodlight\/  2017. Accessed: 6\/25\/2017. Floodlight SDN Controller. http:\/\/www.projectfloodlight.org\/floodlight\/"},{"key":"e_1_3_2_1_6_1","unstructured":"2017. Accessed 6\/25\/2017. IEEE 802.3 EthernetWorking Group. http:\/\/www.ieee802.org\/3\/.  2017. Accessed 6\/25\/2017. IEEE 802.3 EthernetWorking Group. http:\/\/www.ieee802.org\/3\/."},{"key":"e_1_3_2_1_7_1","unstructured":"2017. Accessed: 6\/25\/2017). Python Programming Language. https:\/\/www.python.org\/  2017. Accessed: 6\/25\/2017). Python Programming Language. https:\/\/www.python.org\/"},{"key":"e_1_3_2_1_8_1","unstructured":"2017. Accessed: 7\/1\/2017. ns3::CsmaNetDevice Class Reference. https:\/\/www.nsnam.org\/doxygen\/classns3_1_1_csma_net_device.html  2017. Accessed: 7\/1\/2017. ns3::CsmaNetDevice Class Reference. https:\/\/www.nsnam.org\/doxygen\/classns3_1_1_csma_net_device.html"},{"key":"e_1_3_2_1_9_1","unstructured":"2017. Accessed: 7\/4\/2017. Mininet: An Instant Virtual Network on your Laptop (or other PC). http:\/\/mininet.org\/  2017. Accessed: 7\/4\/2017. Mininet: An Instant Virtual Network on your Laptop (or other PC). http:\/\/mininet.org\/"},{"key":"e_1_3_2_1_10_1","unstructured":"2017. Accessed: 7\/4\/2017. NOX Network Control Platform. https:\/\/github.com\/noxrepo\/nox  2017. Accessed: 7\/4\/2017. NOX Network Control Platform. https:\/\/github.com\/noxrepo\/nox"},{"key":"e_1_3_2_1_11_1","unstructured":"2017. Accessed: 7\/4\/2017. The POX Controller. https:\/\/github.com\/noxrepo\/pox  2017. Accessed: 7\/4\/2017. The POX Controller. https:\/\/github.com\/noxrepo\/pox"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177699147"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735752"},{"volume-title":"Technical Report","author":"Chaves Luciano Jerez","key":"e_1_3_2_1_15_1","unstructured":"Luciano Jerez Chaves . 2017. OpenFlow 1.3 Module Documentation . Technical Report . University of Campinas. Luciano Jerez Chaves. 2017. OpenFlow 1.3 Module Documentation. Technical Report. University of Campinas."},{"key":"e_1_3_2_1_16_1","unstructured":"Thomas H. Cormen Charles E. Leiserson Ronald L. Rivest and Clifford Stein. 2009.. MIT Press. 256--285 pages.  Thomas H. Cormen Charles E. Leiserson Ronald L. Rivest and Clifford Stein. 2009.. MIT Press. 256--285 pages."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/882490.884218"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1026195112518"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1162\/106365600568257"},{"volume-title":"DNS Traffic Analysis for Network-based Malware Detection. Master's thesis","author":"Hong L. V.","key":"e_1_3_2_1_22_1","unstructured":"L. V. Hong . 2012. DNS Traffic Analysis for Network-based Malware Detection. Master's thesis . Technical University of Denmark , DTU Informatics, E-mail: reception@imm.dtu.dk. L. V. Hong. 2012. DNS Traffic Analysis for Network-based Malware Detection. Master's thesis. Technical University of Denmark, DTU Informatics, E-mail: reception@imm.dtu.dk."},{"key":"e_1_3_2_1_23_1","volume-title":"Dongarra","author":"Hwang Kai","year":"2012","unstructured":"Kai Hwang , Geoffry C. Fox , and Jack J . Dongarra . 2012 . Distributed System Models and Enabling Technologies. Morgan Kaufman . 5--30 pages. Kai Hwang, Geoffry C. Fox, and Jack J. Dongarra. 2012. Distributed System Models and Enabling Technologies. Morgan Kaufman. 5--30 pages."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745493"},{"key":"e_1_3_2_1_25_1","volume-title":"Genetic and Evolutionary computation--GECCO","author":"Ji Zhou","year":"2004","unstructured":"Zhou Ji and Dipankar Dasgupta . 2004. Real-valued negative selection algorithm with variable-sized detectors . In Genetic and Evolutionary computation--GECCO 2004 . Springer , 287--298. Zhou Ji and Dipankar Dasgupta. 2004. Real-valued negative selection algorithm with variable-sized detectors. In Genetic and Evolutionary computation--GECCO 2004. Springer, 287--298."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2008.12.015"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 3rd Annual Conference on Genetic and Evolutionary Computation. Morgan Kaufmann Publishers Inc., 1330--1337","author":"Kim Jungwon","year":"2001","unstructured":"Jungwon Kim and Peter J Bentley . 2001 . An evaluation of negative selection in an artificial immune system for network intrusion detection . In Proceedings of the 3rd Annual Conference on Genetic and Evolutionary Computation. Morgan Kaufmann Publishers Inc., 1330--1337 . Jungwon Kim and Peter J Bentley. 2001. An evaluation of negative selection in an artificial immune system for network intrusion detection. In Proceedings of the 3rd Annual Conference on Genetic and Evolutionary Computation. Morgan Kaufmann Publishers Inc., 1330--1337."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0925-2312(98)00030-7"},{"volume-title":"Technical Report","author":"Krasnyansky Maxim","key":"e_1_3_2_1_29_1","unstructured":"Maxim Krasnyansky . 2000. Universal TAP\/TUN Device Driver . Technical Report . The Linux Foundation . Maxim Krasnyansky. 2000. Universal TAP\/TUN Device Driver. Technical Report. The Linux Foundation."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"e_1_3_2_1_31_1","volume-title":"On interprocess communication. Distributed computing 1, 2","author":"Lamport L.","year":"1986","unstructured":"L. Lamport . 1986. On interprocess communication. Distributed computing 1, 2 ( 1986 ), 86--101. L. Lamport. 1986. On interprocess communication. Distributed computing 1, 2 (1986), 86--101."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/645344.650161"},{"volume-title":"Delay and Loss Performance","author":"Leon-Garcia Alberto","key":"e_1_3_2_1_33_1","unstructured":"Alberto Leon-Garcia and Indira Widjaja . 2004. Delay and Loss Performance . McGraw-Hill . 845--859 pages. Alberto Leon-Garcia and Indira Widjaja. 2004. Delay and Loss Performance. McGraw-Hill. 845--859 pages."},{"volume-title":"End-to-End Digital Services","author":"Leon-Garcia Alberto","key":"e_1_3_2_1_34_1","unstructured":"Alberto Leon-Garcia and Indira Widjaja . 2004. End-to-End Digital Services . McGraw-Hill . 249--250 pages Alberto Leon-Garcia and Indira Widjaja. 2004. End-to-End Digital Services. McGraw-Hill. 249--250 pages"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2014.6876752"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2015.7069319"},{"key":"e_1_3_2_1_37_1","unstructured":"Jon Postel. 1981. Accessed: 6\/25\/2017. Transmission Control Protocol.  Jon Postel. 1981. Accessed: 6\/25\/2017. Transmission Control Protocol."},{"key":"e_1_3_2_1_38_1","volume-title":"6\/27\/2017. Distributed denial of service (DDoS) network-based detection","author":"Reams Orin","year":"2005","unstructured":"Orin Reams . 2005. Accessed : 6\/27\/2017. Distributed denial of service (DDoS) network-based detection . ( 2005 . Accessed : 6\/27\/2017). https:\/\/www.google.com\/patents\/US20070130619 Orin Reams. 2005. Accessed: 6\/27\/2017. Distributed denial of service (DDoS) network-based detection. (2005. Accessed: 6\/27\/2017). https:\/\/www.google.com\/patents\/US20070130619"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.03.042"},{"key":"e_1_3_2_1_41_1","unstructured":"OpenFlow Switch Specification. 2013. Version 1.3. 2 (Wire Protocol 0x04). Technical Report.  OpenFlow Switch Specification. 2013. Version 1.3. 2 (Wire Protocol 0x04). Technical Report."},{"volume-title":"Denial of Service","author":"Stallings William","key":"e_1_3_2_1_42_1","unstructured":"William Stallings and Lawrie Brown . 2008. Denial of Service . Pearson Education Inc . 259--270 pages William Stallings and Lawrie Brown. 2008. Denial of Service. Pearson Education Inc. 259--270 pages"},{"key":"e_1_3_2_1_43_1","unstructured":"Salvatore J Stolfo Wei Fan Wenke Lee Andreas Prodromidis and Philip K Chan. 1999. Accessed: 7\/7\/2017. KDD Cup 1999 Data. http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html  Salvatore J Stolfo Wei Fan Wenke Lee Andreas Prodromidis and Philip K Chan. 1999. Accessed: 7\/7\/2017. KDD Cup 1999 Data. http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"},{"key":"e_1_3_2_1_44_1","volume-title":"DARPA Information Survivability Conference and Exposition, 2000. DISCEX'00. Proceedings","volume":"2","author":"Stolfo Salvatore J","year":"2000","unstructured":"Salvatore J Stolfo , Wei Fan , Wenke Lee , Andreas Prodromidis , and Philip K Chan . 2000 . Cost-based modeling for fraud and intrusion detection: Results from the JAM project . In DARPA Information Survivability Conference and Exposition, 2000. DISCEX'00. Proceedings , Vol. 2 . IEEE, 130--144. Salvatore J Stolfo, Wei Fan, Wenke Lee, Andreas Prodromidis, and Philip K Chan. 2000. Cost-based modeling for fraud and intrusion detection: Results from the JAM project. In DARPA Information Survivability Conference and Exposition, 2000. DISCEX'00. Proceedings, Vol. 2. IEEE, 130--144."},{"key":"e_1_3_2_1_46_1","volume-title":"6\/26\/2017. Gartner Says 8.4 Billion Connected Things Will Be in Use","author":"Der Meulen Rob Van","year":"2017","unstructured":"Rob Van Der Meulen . 2017. Accessed : 6\/26\/2017. Gartner Says 8.4 Billion Connected Things Will Be in Use in 2017 , Up 31 Percent From 2016. http:\/\/www.gartner.com\/newsroom\/id\/3598917 Rob Van Der Meulen. 2017. Accessed: 6\/26\/2017. Gartner Says 8.4 Billion Connected Things Will Be in Use in 2017, Up 31 Percent From 2016. http:\/\/www.gartner.com\/newsroom\/id\/3598917"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2487361"},{"key":"e_1_3_2_1_48_1","unstructured":"Susan Young and Dave Aitel. 2004. The Hacker's Handbook. Auerbach. 103--119 pages.  Susan Young and Dave Aitel. 2004. The Hacker's Handbook. Auerbach. 103--119 pages."}],"event":{"name":"IMCOM '18: The 12th International Conference on Ubiquitous Information Management and Communication","sponsor":["SKKU SUNGKYUNKWAN UNIVERSITY"],"location":"Langkawi Malaysia","acronym":"IMCOM '18"},"container-title":["Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3164541.3164562","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3164541.3164562","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:27Z","timestamp":1750212807000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3164541.3164562"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,5]]},"references-count":41,"alternative-id":["10.1145\/3164541.3164562","10.1145\/3164541"],"URL":"https:\/\/doi.org\/10.1145\/3164541.3164562","relation":{},"subject":[],"published":{"date-parts":[[2018,1,5]]},"assertion":[{"value":"2018-01-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}