{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T15:12:30Z","timestamp":1769267550765,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,3,22]],"date-time":"2021-03-22T00:00:00Z","timestamp":1616371200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF-2017R1A2B4012559"],"award-info":[{"award-number":["NRF-2017R1A2B4012559"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100014188","name":"Ministry of Science and ICT, South Korea","doi-asserted-by":"publisher","award":["IITP-2020-2016-0-00314"],"award-info":[{"award-number":["IITP-2020-2016-0-00314"]}],"id":[{"id":"10.13039\/501100014188","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,3,22]]},"DOI":"10.1145\/3412841.3441987","type":"proceedings-article","created":{"date-parts":[[2021,4,23]],"date-time":"2021-04-23T05:09:42Z","timestamp":1619154582000},"page":"1130-1137","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Source-side DoS attack detection with LSTM and seasonality embedding"],"prefix":"10.1145","author":[{"given":"Sungwoong","family":"Yeom","sequence":"first","affiliation":[{"name":"Chonnam National University, Gwangju City, South Korea"}]},{"given":"Chulwoong","family":"Choi","sequence":"additional","affiliation":[{"name":"Chonnam National University, Gwangju City, South Korea"}]},{"given":"Kyungbaek","family":"Kim","sequence":"additional","affiliation":[{"name":"Chonnam National University, Gwangju City, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2021,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Manos Antonakakis Tim April Michael Bailey Matt Bernhard Elie Bursztein Jaime Cochran Zakir Durumeric J Alex Halderman Luca Invernizzi Michalis Kallitsis et al. 2017. Understanding the mirai botnet. In 26th {USENIX} security symposium ({USENIX} Security 17). 1093--1110."},{"key":"e_1_3_2_1_2_1","volume-title":"NOMS 2018 - 2018 IEEE\/IFIP Network Operations and Management Symposium. 1--5.","author":"Azzouni A.","unstructured":"A. Azzouni and G. Pujolle. 2018. NeuTM: A neural network-based framework for traffic matrix prediction in SDN. In NOMS 2018 - 2018 IEEE\/IFIP Network Operations and Management Symposium. 1--5."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.2984175"},{"key":"e_1_3_2_1_4_1","volume-title":"Impact of the COVID-19 pandemic on the Internet latency: a large-scale study. arXiv preprint arXiv:2005.06127","author":"Candela Massimo","year":"2020","unstructured":"Massimo Candela, Valerio Luconi, and Alessio Vecchio. 2020. Impact of the COVID-19 pandemic on the Internet latency: a large-scale study. arXiv preprint arXiv:2005.06127 (2020)."},{"key":"e_1_3_2_1_5_1","volume-title":"Campus traffic and e-Learning during COVID-19 pandemic. Computer Networks","author":"Favale Thomas","year":"2020","unstructured":"Thomas Favale, Francesca Soro, Martino Trevisan, Idilio Drago, and Marco Mellia. 2020. Campus traffic and e-Learning during COVID-19 pandemic. Computer Networks (2020), 107290."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Anja Feldmann Oliver Gasser Franziska Lichtblau Enric Pujol Ingmar Poese Christoph Dietzel Daniel Wagner Matthias Wichtlhuber Juan Tapidor Narseo Vallina-Rodriguez et al. 2020. The Lockdown Effect: Implications of the COVID-19 Pandemic on Internet Traffic. arXiv preprint arXiv:2008.10959 (2020).","DOI":"10.1145\/3419394.3423658"},{"key":"e_1_3_2_1_7_1","volume-title":"Network Intrusion Detection based on LSTM and Feature Embedding. arXiv preprint arXiv:1911.11552","author":"Gwon Hyeokmin","year":"2019","unstructured":"Hyeokmin Gwon, Chungjun Lee, Rakun Keum, and Heeyoul Choi. 2019. Network Intrusion Detection based on LSTM and Feature Embedding. arXiv preprint arXiv:1911.11552 (2019)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2019.8814710"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Stephen Herwig Katura Harvey George Hughey Richard Roberts and Dave Levin. 2019. Measurement and Analysis of Hajime a Peer-to-peer IoT Botnet.. In NDSS.","DOI":"10.14722\/ndss.2019.23488"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064240"},{"key":"e_1_3_2_1_11_1","volume-title":"Research on Network Traffic Prediction Based on Long Short-Term Memory Neural Network. In 2018 IEEE 4th International Conference on Computer and Communications (ICCC). 1109--1113","author":"Lu H.","unstructured":"H. Lu and F. Yang. 2018. Research on Network Traffic Prediction Based on Long Short-Term Memory Neural Network. In 2018 IEEE 4th International Conference on Computer and Communications (ICCC). 1109--1113."},{"key":"e_1_3_2_1_12_1","unstructured":"Antonio Manzalini Roberto Saracco Cagatay Buyukkoc Prosper Chemouil Slawomir Kuklinski Andreas Gladisch Masaki Fukui E Dekel D Soldani M Ulema et al. 2013. Software-defined networks for future networks and services. In White Paper based on the IEEE Workshop SDN4FNS."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIoT.2018.00010"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2017.01.005"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of 2018 KIPS Spring Conference.","author":"Nguyen Giang-Truong","year":"2018","unstructured":"Giang-Truong Nguyen, Van-Quyet Nguyen, Huu-Duy Nguyen, and Kyungbaek Kim. 2018. LSTM based Network Traffic Volume Prediction. In Proceedings of 2018 KIPS Spring Conference."},{"key":"e_1_3_2_1_16_1","article-title":"Traffic Seasonality aware Threshold Adjustment for Effective Source-side DoS Attack Detection","volume":"13","author":"Nguyen Giang-Truong","year":"2019","unstructured":"Giang-Truong Nguyen, Van-Quyet Nguyen, Sinh-Ngoc Nguyen, and Kyungbaek Kim. 2019. Traffic Seasonality aware Threshold Adjustment for Effective Source-side DoS Attack Detection. KSII Transactions on Internet & Information Systems 13, 5 (2019).","journal-title":"KSII Transactions on Internet & Information Systems"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2018EDL8020"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2018.00035"},{"key":"e_1_3_2_1_19_1","volume-title":"Improving performance of recurrent neural network with relu nonlinearity. arXiv preprint arXiv:1511.03771","author":"Talathi Sachin S","year":"2015","unstructured":"Sachin S Talathi and Aniket Vartak. 2015. Improving performance of recurrent neural network with relu nonlinearity. arXiv preprint arXiv:1511.03771 (2015)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8126198"},{"key":"e_1_3_2_1_21_1","volume-title":"On Reconstruction and Prediction of Network Traffic in Software Defined Networking. In 2019 IEEE International Conference on Industrial Internet (ICII). IEEE, 98--102","author":"Wang Yuqing","year":"2019","unstructured":"Yuqing Wang, Dingde Jiang, Liuwei Huo, and Yong Zhao. 2019. On Reconstruction and Prediction of Network Traffic in Software Defined Networking. In 2019 IEEE International Conference on Industrial Internet (ICII). IEEE, 98--102."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MUE.2009.60"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1582379.1582403"}],"event":{"name":"SAC '21: The 36th ACM\/SIGAPP Symposium on Applied Computing","location":"Virtual Event Republic of Korea","acronym":"SAC '21","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the 36th Annual ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3412841.3441987","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3412841.3441987","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:24Z","timestamp":1750195464000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3412841.3441987"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,22]]},"references-count":23,"alternative-id":["10.1145\/3412841.3441987","10.1145\/3412841"],"URL":"https:\/\/doi.org\/10.1145\/3412841.3441987","relation":{},"subject":[],"published":{"date-parts":[[2021,3,22]]},"assertion":[{"value":"2021-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}