{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T23:33:03Z","timestamp":1768433583227,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T00:00:00Z","timestamp":1621814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,24]]},"DOI":"10.1145\/3433210.3453083","type":"proceedings-article","created":{"date-parts":[[2021,6,4]],"date-time":"2021-06-04T15:26:39Z","timestamp":1622820399000},"page":"432-446","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning"],"prefix":"10.1145","author":[{"given":"Wesley Joon-Wie","family":"Tann","sequence":"first","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Jackie Jin Wei","family":"Tan","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Joanna","family":"Purba","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Ee-Chien","family":"Chang","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2021,6,4]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"IEEE Local Computer Network Conference.","author":"Braga R.","unstructured":"R. Braga , E. Mota , and A. Passito . 2010. Lightweight DDoS flooding attack detection using NOX\/OpenFlow . In IEEE Local Computer Network Conference. R. Braga, E. Mota, and A. Passito. 2010. Lightweight DDoS flooding attack detection using NOX\/OpenFlow. In IEEE Local Computer Network Conference."},{"key":"e_1_3_2_2_2_1","unstructured":"Paul J Criscuolo. 200"},{"key":"e_1_3_2_2_3_1","unstructured":"Jianjing Cui Jun Long Erxue Min Qiang Liu and Qian Li. 2018. Comparative Study of CNN and RNN for Deep Learning Based Intrusion Detection System. In Cloud Computing and Security.  Jianjing Cui Jun Long Erxue Min Qiang Liu and Qian Li. 2018. Comparative Study of CNN and RNN for Deep Learning Based Intrusion Detection System. In Cloud Computing and Security."},{"key":"e_1_3_2_2_4_1","volume-title":"Online DDoS attack detection using Mahalanobis distance and Kernel-based learning algorithm. Journal of Network and Computer Applications","author":"Salva Daneshgadeh","year":"2020","unstructured":"Salva Daneshgadeh \u00c7akmak\u00e7?, Thomas Kemmerich , Tarem Ahmed , and Nazife Baykal . 2020. Online DDoS attack detection using Mahalanobis distance and Kernel-based learning algorithm. Journal of Network and Computer Applications ( 2020 ). Salva Daneshgadeh \u00c7akmak\u00e7?, Thomas Kemmerich, Tarem Ahmed, and Nazife Baykal. 2020. Online DDoS attack detection using Mahalanobis distance and Kernel-based learning algorithm. Journal of Network and Computer Applications (2020)."},{"key":"e_1_3_2_2_5_1","volume-title":"LUCID: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection","author":"Doriguzzi-Corin R.","year":"2020","unstructured":"R. Doriguzzi-Corin , S. Millar , S. Scott-Hayward , J. Martinez- del Rincon , and D. Siracusa . 2020 . LUCID: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection . IEEE Transactions on Network and Service Management ( 2020). R. Doriguzzi-Corin, S. Millar, S. Scott-Hayward, J. Martinez-del Rincon, and D. Siracusa. 2020. LUCID: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection. IEEE Transactions on Network and Service Management (2020)."},{"key":"e_1_3_2_2_6_1","volume-title":"2017 2nd IEEE International Conference on Recent Trends in Electronics, Information Communication Technology (RTEICT).","author":"Gaurav A.","unstructured":"A. Gaurav and A. K. Singh . 2017. Entropy-score: A method to detect DDoS attack and flash crowd . In 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information Communication Technology (RTEICT). A. Gaurav and A. K. Singh. 2017. Entropy-score: A method to detect DDoS attack and flash crowd. In 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information Communication Technology (RTEICT)."},{"key":"e_1_3_2_2_7_1","volume-title":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud).","author":"He Z.","unstructured":"Z. He , T. Zhang , and R. B. Lee . 2017. Machine Learning Based DDoS Attack Detection from Source Side in Cloud . In 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud). Z. He, T. Zhang, and R. B. Lee. 2017. Machine Learning Based DDoS Attack Detection from Source Side in Cloud. In 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)."},{"key":"e_1_3_2_2_8_1","volume":"200","author":"Hick P.","unstructured":"P. Hick , E. Aben , K. Claffy , and J. Polterock. 200 7. The CAIDA DDoS attack 2007 dataset. P. Hick, E. Aben, K. Claffy, and J. Polterock. 2007. The CAIDA DDoS attack 2007 dataset.","journal-title":"J. Polterock."},{"key":"e_1_3_2_2_9_1","volume-title":"IEEE International Conference on Communications.","author":"Himura Y.","unstructured":"Y. Himura , K. Fukuda , K. Cho , and H. Esaki . 2009. An Automatic and Dynamic Parameter Tuning of a Statistics-Based Anomaly Detection Algorithm . In IEEE International Conference on Communications. Y. Himura, K. Fukuda, K. Cho, and H. Esaki. 2009. An Automatic and Dynamic Parameter Tuning of a Statistics-Based Anomaly Detection Algorithm. In IEEE International Conference on Communications."},{"key":"e_1_3_2_2_10_1","volume-title":"2018 International Conference on Computer Communication and Informatics (ICCCI).","author":"Hoon K. S.","unstructured":"K. S. Hoon , K. C. Yeo , S. Azam , B. Shunmugam , and F. De Boer . 2018. Critical review of machine learning approaches to apply big data analytics in DDoS forensics . In 2018 International Conference on Computer Communication and Informatics (ICCCI). K. S. Hoon, K. C. Yeo, S. Azam, B. Shunmugam, and F. De Boer. 2018. Critical review of machine learning approaches to apply big data analytics in DDoS forensics. In 2018 International Conference on Computer Communication and Informatics (ICCCI)."},{"key":"e_1_3_2_2_11_1","volume-title":"JESS: Joint Entropy-Based DDoS Defense Scheme in SDN","author":"Kalkan K.","year":"2018","unstructured":"K. Kalkan , L. Altay , G. G\u00fcr , and F. Alag\u00f6z . 2018 . JESS: Joint Entropy-Based DDoS Defense Scheme in SDN . IEEE Journal on Selected Areas in Communications ( 2018). K. Kalkan, L. Altay, G. G\u00fcr, and F. Alag\u00f6z. 2018. JESS: Joint Entropy-Based DDoS Defense Scheme in SDN. IEEE Journal on Selected Areas in Communications (2018)."},{"key":"e_1_3_2_2_12_1","volume-title":"DDoS attacks in Q1","author":"Kupreev Oleg","year":"2020","unstructured":"Oleg Kupreev , Ekaterina Badovskaya , and Alexander Gutnikov . 2020. DDoS attacks in Q1 2020 . https:\/\/securelist.com\/ddos-attacks-in-q1--2020\/96837\/ Oleg Kupreev, Ekaterina Badovskaya, and Alexander Gutnikov. 2020. DDoS attacks in Q1 2020. https:\/\/securelist.com\/ddos-attacks-in-q1--2020\/96837\/"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"Vadim Kuznetsov Helena Sandstr\u00f6m and Andrei Simkin. 2002. An Evaluation of Different IP Traceback Approaches. In Information and Communications Security.  Vadim Kuznetsov Helena Sandstr\u00f6m and Andrei Simkin. 2002. An Evaluation of Different IP Traceback Approaches. In Information and Communications Security.","DOI":"10.1007\/3-540-36159-6_4"},{"key":"e_1_3_2_2_14_1","volume":"201","author":"Kwon D.","unstructured":"D. Kwon , K. Natarajan , S. C. Suh , H. Kim , and J. Kim. 201 8. An Empirical Study on Network Anomaly Detection Using Convolutional Neural Networks. In 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS). D. Kwon, K. Natarajan, S. C. Suh, H. Kim, and J. Kim. 2018. An Empirical Study on Network Anomaly Detection Using Convolutional Neural Networks. In 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS).","journal-title":"J. Kim."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3497"},{"key":"e_1_3_2_2_16_1","volume-title":"2010 2nd International Symposium on Aware Computing.","author":"Li J.","unstructured":"J. Li , Y. Liu , and L. Gu . 2010. DDoS attack detection based on neural network . In 2010 2nd International Symposium on Aware Computing. J. Li, Y. Liu, and L. Gu. 2010. DDoS attack detection based on neural network. In 2010 2nd International Symposium on Aware Computing."},{"key":"e_1_3_2_2_17_1","volume-title":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","author":"Li Q.","unstructured":"Q. Li , E.. Chang, and M. C. Chan . 2005. On the effectiveness of DDoS attacks on statistical filtering . In Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Q. Li, E.. Chang, and M. C. Chan. 2005. On the effectiveness of DDoS attacks on statistical filtering. In Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies."},{"key":"e_1_3_2_2_18_1","volume-title":"Agostinho de Medeiros Brito Junior, Genoveva Vargas-Solar, and Luiz F Silveira.","author":"de Lima Filho Francisco Sales","year":"2019","unstructured":"Francisco Sales de Lima Filho , Frederico AF Silveira , Agostinho de Medeiros Brito Junior, Genoveva Vargas-Solar, and Luiz F Silveira. 2019 . Smart Detection : An Online Approach for DoS\/DDoS Attack Detection Using Machine Learning. Security and Communication Networks ( 2019). Francisco Sales de Lima Filho, Frederico AF Silveira, Agostinho de Medeiros Brito Junior, Genoveva Vargas-Solar, and Luiz F Silveira. 2019. Smart Detection: An Online Approach for DoS\/DDoS Attack Detection Using Machine Learning. Security and Communication Networks (2019)."},{"key":"e_1_3_2_2_19_1","volume-title":"Proceedings of the Third International IFIP-TC6 Networking Conference.","author":"Peng Tao","year":"2002","unstructured":"Tao Peng , Christopher Leckie , and Kotagiri Ramamohanarao . 2002 . Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring . In Proceedings of the Third International IFIP-TC6 Networking Conference. Tao Peng, Christopher Leckie, and Kotagiri Ramamohanarao. 2002. Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring. In Proceedings of the Third International IFIP-TC6 Networking Conference."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"T. V. Phan N. K. Bao and M. Park. 2016a. A Novel Hybrid Flow-Based Handler with DDoS Attacks in Software-Defined Networking. In 2016 Intl IEEE Conferences on Ubiquitous Intelligence Computing Advanced and Trusted Computing Scalable Computing and Communications Cloud and Big Data Computing Internet of People and Smart World Congress (UIC\/ATC\/ScalCom\/CBDCom\/IoP\/SmartWorld).  T. V. Phan N. K. Bao and M. Park. 2016a. A Novel Hybrid Flow-Based Handler with DDoS Attacks in Software-Defined Networking. In 2016 Intl IEEE Conferences on Ubiquitous Intelligence Computing Advanced and Trusted Computing Scalable Computing and Communications Cloud and Big Data Computing Internet of People and Smart World Congress (UIC\/ATC\/ScalCom\/CBDCom\/IoP\/SmartWorld).","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0069"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"crossref","unstructured":"T. V. Phan and M. Park. 2019. Efficient Distributed Denial-of-Service Attack Defense in SDN-Based Cloud. IEEE Access (2019).  T. V. Phan and M. Park. 2019. Efficient Distributed Denial-of-Service Attack Defense in SDN-Based Cloud. IEEE Access (2019).","DOI":"10.1109\/ACCESS.2019.2896783"},{"key":"e_1_3_2_2_22_1","volume-title":"2016 IEEE Sixth International Conference on Communications and Electronics (ICCE).","author":"Phan T. V.","unstructured":"T. V. Phan , T. Van Toan , D. Van Tuyen , T. T. Huong , and N. H. Thanh . 2016b. OpenFlowSIA: An optimized protection scheme for software-defined networks from flooding attacks . In 2016 IEEE Sixth International Conference on Communications and Electronics (ICCE). T. V. Phan, T. Van Toan, D. Van Tuyen, T. T. Huong, and N. H. Thanh. 2016b. OpenFlowSIA: An optimized protection scheme for software-defined networks from flooding attacks. In 2016 IEEE Sixth International Conference on Communications and Electronics (ICCE)."},{"key":"e_1_3_2_2_23_1","volume":"201","author":"Roopak M.","unstructured":"M. Roopak , G. Yun Tian , and J. Chambers. 201 9. Deep Learning Models for Cyber Security in IoT Networks. In 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC). M. Roopak, G. Yun Tian, and J. Chambers. 2019. Deep Learning Models for Cyber Security in IoT Networks. In 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC).","journal-title":"J. Chambers."},{"key":"e_1_3_2_2_24_1","volume-title":"Proceedings of the 4th International Conference on Information Systems Security and Privacy -","author":"Sharafaldin Iman","unstructured":"Iman Sharafaldin ., Arash Habibi Lashkari ., and Ali A. Ghorbani . 2018. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization . In Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP. Iman Sharafaldin., Arash Habibi Lashkari., and Ali A. Ghorbani. 2018. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. In Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP."},{"key":"e_1_3_2_2_25_1","volume-title":"IEEE International Conference on Communications. ICC.","author":"Peng Tao","unstructured":"Tao Peng , C. Leckie , and K. Ramamohanarao . 2003. Protection from distributed denial of service attacks using history-based IP filtering . In IEEE International Conference on Communications. ICC. Tao Peng, C. Leckie, and K. Ramamohanarao. 2003. Protection from distributed denial of service attacks using history-based IP filtering. In IEEE International Conference on Communications. ICC."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"crossref","unstructured":"R. Wang Z. Jia and L. Ju. 2015. An Entropy-Based Distributed DDoS Detection Mechanism in Software-Defined Networking. In 2015 IEEE Trustcom\/BigDataSE\/ISPA.  R. Wang Z. Jia and L. Ju. 2015. An Entropy-Based Distributed DDoS Detection Mechanism in Software-Defined Networking. In 2015 IEEE Trustcom\/BigDataSE\/ISPA.","DOI":"10.1109\/Trustcom.2015.389"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553516"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599821"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"crossref","unstructured":"C. Yin Y. Zhu J. Fei and X. He. 2017. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks. IEEE Access (2017).  C. Yin Y. Zhu J. Fei and X. He. 2017. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks. IEEE Access (2017).","DOI":"10.1109\/ACCESS.2017.2762418"},{"key":"e_1_3_2_2_32_1","volume":"200","author":"Kim Yoohwan","unstructured":"Yoohwan Kim , Wing Cheong Lau , Mooi Choo Chuah , and H. J. Chao. 200 4. Packetscore: statistics-based overload control against distributed denial-of-service attacks. In IEEE INFOCOM. Yoohwan Kim, Wing Cheong Lau, Mooi Choo Chuah, and H. J. Chao. 2004. Packetscore: statistics-based overload control against distributed denial-of-service attacks. In IEEE INFOCOM.","journal-title":"J. Chao."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"crossref","unstructured":"S. Yu S. Guo and I. Stojmenovic. 2015. Fool Me If You Can: Mimicking Attacks and Anti-Attacks in Cyberspace. IEEE Trans. Comput. (2015).  S. Yu S. Guo and I. Stojmenovic. 2015. Fool Me If You Can: Mimicking Attacks and Anti-Attacks in Cyberspace. IEEE Trans. Comput. (2015).","DOI":"10.1109\/TC.2013.191"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"crossref","unstructured":"S. Yu W. Zhou R. Doss and W. Jia. 2011. Traceback of DDoS Attacks Using Entropy Variations. IEEE Transactions on Parallel and Distributed Systems (2011).  S. Yu W. Zhou R. Doss and W. Jia. 2011. Traceback of DDoS Attacks Using Entropy Variations. IEEE Transactions on Parallel and Distributed Systems (2011).","DOI":"10.1109\/TPDS.2010.97"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"crossref","unstructured":"S. Yu W. Zhou W. Jia S. Guo Y. Xiang and F. Tang. 2012. Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient. IEEE Transactions on Parallel and Distributed Systems (2012).  S. Yu W. Zhou W. Jia S. Guo Y. Xiang and F. Tang. 2012. Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient. IEEE Transactions on Parallel and Distributed Systems (2012).","DOI":"10.1109\/TPDS.2011.262"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2017.7946998"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"crossref","unstructured":"S. T. Zargar J. Joshi and D. Tipper. 2013. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks. IEEE Communications Surveys Tutorials (2013).  S. T. Zargar J. Joshi and D. Tipper. 2013. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks. IEEE Communications Surveys Tutorials (2013).","DOI":"10.1109\/SURV.2013.031413.00127"}],"event":{"name":"ASIA CCS '21: ACM Asia Conference on Computer and Communications Security","location":"Virtual Event Hong Kong","acronym":"ASIA CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3433210.3453083","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3433210.3453083","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:11Z","timestamp":1750193291000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3433210.3453083"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,24]]},"references-count":35,"alternative-id":["10.1145\/3433210.3453083","10.1145\/3433210"],"URL":"https:\/\/doi.org\/10.1145\/3433210.3453083","relation":{},"subject":[],"published":{"date-parts":[[2021,5,24]]},"assertion":[{"value":"2021-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}