{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:29:48Z","timestamp":1766449788684,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":87,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,30]],"date-time":"2022-11-30T00:00:00Z","timestamp":1669766400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Tata Communications"},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-1955422; CNS-1955487"],"award-info":[{"award-number":["CNS-1955422; CNS-1955487"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,30]]},"DOI":"10.1145\/3555050.3569121","type":"proceedings-article","created":{"date-parts":[[2022,11,30]],"date-time":"2022-11-30T22:24:56Z","timestamp":1669847096000},"page":"1-17","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Xatu"],"prefix":"10.1145","author":[{"given":"Zhiying","family":"Xu","sequence":"first","affiliation":[{"name":"Harvard University"}]},{"given":"Sivaramakrishnan","family":"Ramanathan","sequence":"additional","affiliation":[{"name":"USC\/Meta"}]},{"given":"Alexander","family":"Rush","sequence":"additional","affiliation":[{"name":"Cornell Tech"}]},{"given":"Jelena","family":"Mirkovic","sequence":"additional","affiliation":[{"name":"USC\/ISI"}]},{"given":"Minlan","family":"Yu","sequence":"additional","affiliation":[{"name":"Harvard University"}]}],"member":"320","published-online":{"date-parts":[[2022,11,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3062909"},{"volume-title":"Proceedings of International Conference on Computer Recognition Systems CORES. 797--806","author":"Tomasz","key":"e_1_3_2_1_2_1","unstructured":"Tomasz Andrysiak and \u0141ukasz Saganowski. 2016. DDoS Attacks Detection by Means of Statistical Models . In Proceedings of International Conference on Computer Recognition Systems CORES. 797--806 . Tomasz Andrysiak and \u0141ukasz Saganowski. 2016. DDoS Attacks Detection by Means of Statistical Models. In Proceedings of International Conference on Computer Recognition Systems CORES. 797--806."},{"key":"e_1_3_2_1_3_1","volume-title":"Understanding the Mirai Botnet. In USENIX Security Symposium. 1093--1110","author":"Antonakakis Manos","year":"2017","unstructured":"Manos Antonakakis , Tim April , Michael Bailey , Matt Bernhard , Elie Bursztein , Jaime Cochran , Zakir Durumeric , J Alex Halderman , Luca Invernizzi , Michalis Kallitsis , 2017 . Understanding the Mirai Botnet. In USENIX Security Symposium. 1093--1110 . Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J Alex Halderman, Luca Invernizzi, Michalis Kallitsis, et al. 2017. Understanding the Mirai Botnet. In USENIX Security Symposium. 1093--1110."},{"key":"e_1_3_2_1_4_1","volume-title":"USENIX ATC","volume":"38","author":"Argyraki Katerina J","year":"2005","unstructured":"Katerina J Argyraki and David R Cheriton . 2005 . Active Internet Traffic Filtering: Real-Time Response to Denial-of-Service Attacks . In USENIX ATC , Vol. 38 . Katerina J Argyraki and David R Cheriton. 2005. Active Internet Traffic Filtering: Real-Time Response to Denial-of-Service Attacks. In USENIX ATC, Vol. 38."},{"key":"e_1_3_2_1_5_1","volume-title":"Xinming Ou, S Raj Rajagopalan, and Marc R Eisenbarth.","author":"Bardas Alexandru G","year":"2012","unstructured":"Alexandru G Bardas , Loai Zomlot , Sathya Chandran Sundaramurthy , Xinming Ou, S Raj Rajagopalan, and Marc R Eisenbarth. 2012 . Classification of UDP Traffic for DDoS Detection.. In LEET. Alexandru G Bardas, Loai Zomlot, Sathya Chandran Sundaramurthy, Xinming Ou, S Raj Rajagopalan, and Marc R Eisenbarth. 2012. Classification of UDP Traffic for DDoS Detection.. In LEET."},{"key":"e_1_3_2_1_6_1","first-page":"53","article-title":"The Spoofer Project: Inferring the Extent of Source Address Filtering on the Internet","volume":"5","author":"Beverly Robert","year":"2005","unstructured":"Robert Beverly and Steven Bauer . 2005 . The Spoofer Project: Inferring the Extent of Source Address Filtering on the Internet . In Usenix Sruti , Vol. 5. 53 -- 59 . Robert Beverly and Steven Bauer. 2005. The Spoofer Project: Inferring the Extent of Source Address Filtering on the Internet. In Usenix Sruti, Vol. 5. 53--59.","journal-title":"Usenix Sruti"},{"key":"e_1_3_2_1_7_1","volume-title":"Workshop on the Economics of Information Security. 06--26","author":"Brunt Ryan","year":"2017","unstructured":"Ryan Brunt , Prakhar Pandey , and Damon McCoy . 2017 . Booted: An Analysis of a Payment Intervention on a DDoS-for-hire Service . In Workshop on the Economics of Information Security. 06--26 . Ryan Brunt, Prakhar Pandey, and Damon McCoy. 2017. Booted: An Analysis of a Payment Intervention on a DDoS-for-hire Service. In Workshop on the Economics of Information Security. 06--26."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851196"},{"key":"e_1_3_2_1_9_1","unstructured":"CAIDA. 2007. The CAIDA UCSD \"DDoS Attack 2007\" Dataset. https:\/\/www.caida.org\/catalog\/datasets\/ddos-20070804_dataset CAIDA. 2007. The CAIDA UCSD \"DDoS Attack 2007\" Dataset. https:\/\/www.caida.org\/catalog\/datasets\/ddos-20070804_dataset"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2006.5"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714637"},{"volume-title":"MS-LSTM: A Multi-scale LSTM Model for BGP Anomaly Detection","author":"Cheng Min","key":"e_1_3_2_1_12_1","unstructured":"Min Cheng , Qian Xu , Jianming Lv , Wenyin Liu , Qing Li , and Jianping Wang . 2016. MS-LSTM: A Multi-scale LSTM Model for BGP Anomaly Detection . In IEEE ICNP. 1--6. Min Cheng, Qian Xu, Jianming Lv, Wenyin Liu, Qing Li, and Jianping Wang. 2016. MS-LSTM: A Multi-scale LSTM Model for BGP Anomaly Detection. In IEEE ICNP. 1--6."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663717"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2559218"},{"key":"e_1_3_2_1_16_1","volume-title":"DDoS-capable IoT Malwares: Comparative Analysis and Mirai Investigation. Security and Communication Networks 2018","author":"Donno Michele De","year":"2018","unstructured":"Michele De Donno , Nicola Dragoni , Alberto Giaretta , and Angelo Spognardi . 2018. DDoS-capable IoT Malwares: Comparative Analysis and Mirai Investigation. Security and Communication Networks 2018 ( 2018 ). Michele De Donno, Nicola Dragoni, Alberto Giaretta, and Angelo Spognardi. 2018. DDoS-capable IoT Malwares: Comparative Analysis and Mirai Investigation. Security and Communication Networks 2018 (2018)."},{"key":"e_1_3_2_1_17_1","volume-title":"Detection of DNS Tunneling in Mobile Networks Using Machine Learning. In International Conference on Information Science and Applications. 221--230","author":"Do Van Thuan","year":"2017","unstructured":"Van Thuan Do , Paal Engelstad , Boning Feng , and Thanh van Do . 2017 . Detection of DNS Tunneling in Mobile Networks Using Machine Learning. In International Conference on Information Science and Applications. 221--230 . Van Thuan Do, Paal Engelstad, Boning Feng, and Thanh van Do. 2017. Detection of DNS Tunneling in Mobile Networks Using Machine Learning. In International Conference on Information Science and Applications. 221--230."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00013"},{"key":"e_1_3_2_1_19_1","volume-title":"Hajime: Analysis of a Decentralized Internet Worm for IoT Devices. Rapidity Networks 16","author":"Edwards Sam","year":"2016","unstructured":"Sam Edwards and Ioannis Profetis . 2016 . Hajime: Analysis of a Decentralized Internet Worm for IoT Devices. Rapidity Networks 16 (2016). Sam Edwards and Ioannis Profetis. 2016. Hajime: Analysis of a Decentralized Internet Worm for IoT Devices. Rapidity Networks 16 (2016)."},{"key":"e_1_3_2_1_20_1","volume-title":"Bohatei: Flexible and Elastic DDoS Defense. In USENIX Security Symposium. 817--832","author":"Fayaz Seyed K","year":"2015","unstructured":"Seyed K Fayaz , Yoshiaki Tobioka , Vyas Sekar , and Michael Bailey . 2015 . Bohatei: Flexible and Elastic DDoS Defense. In USENIX Security Symposium. 817--832 . Seyed K Fayaz, Yoshiaki Tobioka, Vyas Sekar, and Michael Bailey. 2015. Bohatei: Flexible and Elastic DDoS Defense. In USENIX Security Symposium. 817--832."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194894"},{"key":"e_1_3_2_1_22_1","volume-title":"Stealthy Denial of Service Strategy in Cloud Computing","author":"Ficco Massimo","year":"2014","unstructured":"Massimo Ficco and Massimiliano Rak . 2014. Stealthy Denial of Service Strategy in Cloud Computing . IEEE transactions on cloud computing 3, 1 ( 2014 ), 80--94. Massimo Ficco and Massimiliano Rak. 2014. Stealthy Denial of Service Strategy in Cloud Computing. IEEE transactions on cloud computing 3, 1 (2014), 80--94."},{"key":"e_1_3_2_1_23_1","volume-title":"Cemil Eren Kayatas, and Emin Anarim","author":"Fouladi Ramin Fadaei","year":"2018","unstructured":"Ramin Fadaei Fouladi , Cemil Eren Kayatas, and Emin Anarim . 2018 . Statistical Measures : Promising Features for Time Series based DDoS Attack Detection. In Multidisciplinary Digital Publishing Institute Proceedings , Vol. 2 . 96. Ramin Fadaei Fouladi, Cemil Eren Kayatas, and Emin Anarim. 2018. Statistical Measures: Promising Features for Time Series based DDoS Attack Detection. In Multidisciplinary Digital Publishing Institute Proceedings, Vol. 2. 96."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Felix A Gers J\u00fcrgen Schmidhuber and Fred Cummins. 1999. Learning to Forget: Continual Prediction with LSTM. (1999). Felix A Gers J\u00fcrgen Schmidhuber and Fred Cummins. 1999. Learning to Forget: Continual Prediction with LSTM. (1999).","DOI":"10.1049\/cp:19991218"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmva.2007.01.003"},{"key":"e_1_3_2_1_26_1","unstructured":"Google. 2022. Project Shield. https:\/\/projectshield.withgoogle.com\/landing Google. 2022. Project Shield. https:\/\/projectshield.withgoogle.com\/landing"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1177\/096228020301200205"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of international conference on document analysis and recognition","volume":"1","author":"Ho Tin Kam","year":"1995","unstructured":"Tin Kam Ho . 1995 . Random Decision Forests . In Proceedings of international conference on document analysis and recognition , Vol. 1 . 278--282. Tin Kam Ho. 1995. Random Decision Forests. In Proceedings of international conference on document analysis and recognition, Vol. 1. 278--282."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2013.6727841"},{"key":"e_1_3_2_1_30_1","volume-title":"Detection System of HTTP DDoS Attacks in a Cloud Environment based on Information Theoretic Entropy and Random Forest. Security and Communication Networks 2018","author":"Idhammad Mohamed","year":"2018","unstructured":"Mohamed Idhammad , Karim Afdel , and Mustapha Belouch . 2018. Detection System of HTTP DDoS Attacks in a Cloud Environment based on Information Theoretic Entropy and Random Forest. Security and Communication Networks 2018 ( 2018 ). Mohamed Idhammad, Karim Afdel, and Mustapha Belouch. 2018. Detection System of HTTP DDoS Attacks in a Cloud Environment based on Information Theoretic Entropy and Random Forest. Security and Communication Networks 2018 (2018)."},{"key":"e_1_3_2_1_31_1","unstructured":"ImpactCyberTrust.org. 2016. Merit Network \"RADB DDoS 2016\" Dataset. https:\/\/www.impactcybertrust.org\/dataset_view?idDataset=576 ImpactCyberTrust.org. 2016. Merit Network \"RADB DDoS 2016\" Dataset. https:\/\/www.impactcybertrust.org\/dataset_view?idDataset=576"},{"key":"e_1_3_2_1_32_1","unstructured":"Imperva. 2022. How To Choose The Right Mitigation Service. https:\/\/www.imperva.com\/learn\/ddos\/ddos-mitigation-services Imperva. 2022. How To Choose The Right Mitigation Service. https:\/\/www.imperva.com\/learn\/ddos\/ddos-mitigation-services"},{"key":"e_1_3_2_1_33_1","unstructured":"Amazon Web Services Inc. 2022. AWS Shield. https:\/\/aws.amazon.com\/shield Amazon Web Services Inc. 2022. AWS Shield. https:\/\/aws.amazon.com\/shield"},{"key":"e_1_3_2_1_34_1","unstructured":"Cloudflare Inc. 2022. Cloudflare DDoS Protection. https:\/\/www.cloudflare.com\/ddos Cloudflare Inc. 2022. Cloudflare DDoS Protection. https:\/\/www.cloudflare.com\/ddos"},{"key":"e_1_3_2_1_35_1","unstructured":"ISC. 2022. DShield Reports and Database Summaries. https:\/\/isc.sans.edu\/reports.html ISC. 2022. DShield Reports and Database Summaries. https:\/\/isc.sans.edu\/reports.html"},{"key":"e_1_3_2_1_36_1","unstructured":"ISC. 2022. General Information On Submitting Logs To DShield. https:\/\/isc.sans.edu\/howto.html ISC. 2022. General Information On Submitting Logs To DShield. https:\/\/isc.sans.edu\/howto.html"},{"key":"e_1_3_2_1_37_1","volume-title":"IEEE International Conference on Communications","volume":"4","author":"Jin Shuyuan","year":"2004","unstructured":"Shuyuan Jin and Daniel S Yeung . 2004 . A Covariance Analysis Model for DDoS Attack Detection . In IEEE International Conference on Communications , Vol. 4 . 1882--1886. Shuyuan Jin and Daniel S Yeung. 2004. A Covariance Analysis Model for DDoS Attack Detection. In IEEE International Conference on Communications, Vol. 4. 1882--1886."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131383"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987487"},{"key":"e_1_3_2_1_40_1","volume-title":"Adam: A method for Stochastic Optimization. arXiv preprint arXiv:1412.6980","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba . 2014 . Adam: A method for Stochastic Optimization. arXiv preprint arXiv:1412.6980 (2014). Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for Stochastic Optimization. arXiv preprint arXiv:1412.6980 (2014)."},{"key":"e_1_3_2_1_41_1","volume-title":"Survival Analysis: Techniques for Censored and Truncated Data.","author":"Klein John P","year":"2006","unstructured":"John P Klein and Melvin L Moeschberger . 2006 . Survival Analysis: Techniques for Censored and Truncated Data. John P Klein and Melvin L Moeschberger. 2006. Survival Analysis: Techniques for Censored and Truncated Data."},{"key":"e_1_3_2_1_42_1","first-page":"80","article-title":"DDoS in the IoT","volume":"50","author":"Kolias Constantinos","year":"2017","unstructured":"Constantinos Kolias , Georgios Kambourakis , Angelos Stavrou , and Jeffrey Voas . 2017 . DDoS in the IoT : Mirai and Other Botnets. Computer 50 , 7 (2017), 80 -- 84 . Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, and Jeffrey Voas. 2017. DDoS in the IoT: Mirai and Other Botnets. Computer 50, 7 (2017), 80--84.","journal-title":"Mirai and Other Botnets. Computer"},{"key":"e_1_3_2_1_43_1","volume-title":"Basic Notions for the Analysis of Large Two-mode Networks. Social networks 30, 1","author":"Latapy Matthieu","year":"2008","unstructured":"Matthieu Latapy , Cl\u00e9mence Magnien , and Nathalie Del Vecchio . 2008. Basic Notions for the Analysis of Large Two-mode Networks. Social networks 30, 1 ( 2008 ), 31--48. Matthieu Latapy, Cl\u00e9mence Magnien, and Nathalie Del Vecchio. 2008. Basic Notions for the Analysis of Large Two-mode Networks. Social networks 30, 1 (2008), 31--48."},{"key":"e_1_3_2_1_44_1","volume-title":"Ah Chung Tsoi, and Andrew D Back","author":"Lawrence Steve","year":"1997","unstructured":"Steve Lawrence , C Lee Giles , Ah Chung Tsoi, and Andrew D Back . 1997 . Face Recognition : A Convolutional Neural-network Approach. IEEE transactions on neural networks 8, 1 (1997), 98--113. Steve Lawrence, C Lee Giles, Ah Chung Tsoi, and Andrew D Back. 1997. Face Recognition: A Convolutional Neural-network Approach. IEEE transactions on neural networks 8, 1 (1997), 98--113."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2944951"},{"key":"e_1_3_2_1_46_1","volume-title":"Matthew Wiener, et al","author":"Liaw Andy","year":"2002","unstructured":"Andy Liaw , Matthew Wiener, et al . 2002 . Classification and Regression by Random Forest. R news 2, 3 (2002), 18--22. Andy Liaw, Matthew Wiener, et al. 2002. Classification and Regression by Random Forest. R news 2, 3 (2002), 18--22."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131367"},{"key":"e_1_3_2_1_48_1","volume-title":"Jaqen: A High-Performance Switch-Native Approach for Detecting and Mitigating Volumetric DDoS Attacks with Programmable Switches. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Liu Zaoxing","year":"2021","unstructured":"Zaoxing Liu , Hun Namkung , Georgios Nikolaidis , Jeongkeun Lee , Changhoon Kim , Xin Jin , Vladimir Braverman , Minlan Yu , and Vyas Sekar . 2021 . Jaqen: A High-Performance Switch-Native Approach for Detecting and Mitigating Volumetric DDoS Attacks with Programmable Switches. In 30th USENIX Security Symposium (USENIX Security 21) . 3829--3846. Zaoxing Liu, Hun Namkung, Georgios Nikolaidis, Jeongkeun Lee, Changhoon Kim, Xin Jin, Vladimir Braverman, Minlan Yu, and Vyas Sekar. 2021. Jaqen: A High-Performance Switch-Native Approach for Detecting and Mitigating Volumetric DDoS Attacks with Programmable Switches. In 30th USENIX Security Symposium (USENIX Security 21). 3829--3846."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354232"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(14)70523-8"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3050605"},{"key":"e_1_3_2_1_52_1","volume-title":"Internet Trends. In Proc D11 Conference.","author":"Meeker Mary","year":"2013","unstructured":"Mary Meeker and Liang Wu . 2013 . Internet Trends. In Proc D11 Conference. Mary Meeker and Liang Wu. 2013. Internet Trends. In Proc D11 Conference."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"crossref","unstructured":"Nisharani Meti DG Narayan and VP Baligar. 2017. Detection of Distributed Denial of Service Attacks Using Machine Learning Algorithms in Software-defined Networks. In International conference on advances in computing communications and informatics. 1366--1371. Nisharani Meti DG Narayan and VP Baligar. 2017. Detection of Distributed Denial of Service Attacks Using Machine Learning Algorithms in Software-defined Networks. In International conference on advances in computing communications and informatics. 1366--1371.","DOI":"10.1109\/ICACCI.2017.8126031"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815707"},{"key":"e_1_3_2_1_55_1","unstructured":"Microsoft. 2022. Azure DDoS Protection Overview. https:\/\/docs.microsoft.com\/en-us\/azure\/ddos-protection\/ddos-protection-overview Microsoft. 2022. Azure DDoS Protection Overview. https:\/\/docs.microsoft.com\/en-us\/azure\/ddos-protection\/ddos-protection-overview"},{"key":"e_1_3_2_1_56_1","unstructured":"Microsoft. 2022. DDoS Protection and Mitigation Services. https:\/\/azure.microsoft.com\/en-us\/services\/ddos-protection Microsoft. 2022. DDoS Protection and Mitigation Services. https:\/\/azure.microsoft.com\/en-us\/services\/ddos-protection"},{"key":"e_1_3_2_1_57_1","volume-title":"Kitsune: an Ensemble of Autoencoders for Online Network Intrusion Detection. arXiv preprint arXiv:1802.09089","author":"Mirsky Yisroel","year":"2018","unstructured":"Yisroel Mirsky , Tomer Doitshman , Yuval Elovici , and Asaf Shabtai . 2018. Kitsune: an Ensemble of Autoencoders for Online Network Intrusion Detection. arXiv preprint arXiv:1802.09089 ( 2018 ). Yisroel Mirsky, Tomer Doitshman, Yuval Elovici, and Asaf Shabtai. 2018. Kitsune: an Ensemble of Autoencoders for Online Network Intrusion Detection. arXiv preprint arXiv:1802.09089 (2018)."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00081"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987446"},{"key":"e_1_3_2_1_60_1","unstructured":"RIPE NCC. 2022. RIPE Routing Information Service (RIS). https:\/\/www.ripe.net\/analyse\/internet-measurements\/routing-information-service-ris RIPE NCC. 2022. RIPE Routing Information Service (RIS). https:\/\/www.ripe.net\/analyse\/internet-measurements\/routing-information-service-ris"},{"key":"e_1_3_2_1_61_1","unstructured":"NETSCOUT. 2020. NETSCOUT Maintains #1 Position in the DDoS Prevention Appliance Market. https:\/\/www.netscout.com\/report\/omdia-ddos-prevention-appliances-excerpts NETSCOUT. 2020. NETSCOUT Maintains #1 Position in the DDoS Prevention Appliance Market. https:\/\/www.netscout.com\/report\/omdia-ddos-prevention-appliances-excerpts"},{"key":"e_1_3_2_1_62_1","unstructured":"NETSCOUT. 2022. Arbor DDoS Attack Protection Solutions. https:\/\/www.netscout.com\/arbor-ddos NETSCOUT. 2022. Arbor DDoS Attack Protection Solutions. https:\/\/www.netscout.com\/arbor-ddos"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(19)30025-X"},{"key":"e_1_3_2_1_64_1","unstructured":"Pavel Odintsov. 2022. FastNetMon. https:\/\/github.com\/pavel-odintsov\/fastnetmon Pavel Odintsov. 2022. FastNetMon. https:\/\/github.com\/pavel-odintsov\/fastnetmon"},{"key":"e_1_3_2_1_65_1","unstructured":"University of Oregon. 2022. Route Views Project. http:\/\/bgplay.routeviews.org University of Oregon. 2022. Route Views Project. http:\/\/bgplay.routeviews.org"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-27272-2_6"},{"key":"e_1_3_2_1_67_1","volume-title":"Detecting Phishing Attacks Using Natural Language Processing and Machine Learning. In IEEE international conference on semantic computing. 300--301","author":"Peng Tianrui","year":"2018","unstructured":"Tianrui Peng , Ian Harris , and Yuki Sawa . 2018 . Detecting Phishing Attacks Using Natural Language Processing and Machine Learning. In IEEE international conference on semantic computing. 300--301 . Tianrui Peng, Ian Harris, and Yuki Sawa. 2018. Detecting Phishing Attacks Using Natural Language Processing and Machine Learning. In IEEE international conference on semantic computing. 300--301."},{"key":"e_1_3_2_1_68_1","volume-title":"DDoS Attack Detection Using Flow Entropy and Clustering Technique. In International Conference on Computational Intelligence and Security. 412--415","author":"Qin Xi","year":"2015","unstructured":"Xi Qin , Tongge Xu , and Chao Wang . 2015 . DDoS Attack Detection Using Flow Entropy and Clustering Technique. In International Conference on Computational Intelligence and Security. 412--415 . Xi Qin, Tongge Xu, and Chao Wang. 2015. DDoS Attack Detection Using Flow Entropy and Clustering Technique. In International Conference on Computational Intelligence and Security. 412--415."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24232"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274717"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229598.3229605"},{"key":"e_1_3_2_1_73_1","volume-title":"Booters---Analysis of DDoS-as-a-service Attacks. In IEEE International Symposium on Integrated Network Management. 243--251","author":"Santanna Jos\u00e9 Jair","year":"2015","unstructured":"Jos\u00e9 Jair Santanna , Roland van Rijswijk-Deij , Rick Hofstede , Anna Sperotto , Mark Wierbosch , Lisandro Zambenedetti Granville , and Aiko Pras . 2015 . Booters---Analysis of DDoS-as-a-service Attacks. In IEEE International Symposium on Integrated Network Management. 243--251 . Jos\u00e9 Jair Santanna, Roland van Rijswijk-Deij, Rick Hofstede, Anna Sperotto, Mark Wierbosch, Lisandro Zambenedetti Granville, and Aiko Pras. 2015. Booters---Analysis of DDoS-as-a-service Attacks. In IEEE International Symposium on Integrated Network Management. 243--251."},{"key":"e_1_3_2_1_74_1","volume-title":"Bridging Missing Gaps in Evaluating DDoS Research. In USENIX Workshop on Cyber Security Experimentation and Test.","author":"Shi Lumin","year":"2020","unstructured":"Lumin Shi , Samuel Mergendahl , Devkishen Sisodia , and Jun Li . 2020 . Bridging Missing Gaps in Evaluating DDoS Research. In USENIX Workshop on Cyber Security Experimentation and Test. Lumin Shi, Samuel Mergendahl, Devkishen Sisodia, and Jun Li. 2020. Bridging Missing Gaps in Evaluating DDoS Research. In USENIX Workshop on Cyber Security Experimentation and Test."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2980258.2980379"},{"key":"e_1_3_2_1_76_1","unstructured":"Robert Smith and Shawn Marck. 2019. Identifying a Potential DDOS Attack Using Statistical Analysis. https:\/\/patents.google.com\/patent\/US20160127406A1\/en Robert Smith and Shawn Marck. 2019. Identifying a Potential DDOS Attack Using Statistical Analysis. https:\/\/patents.google.com\/patent\/US20160127406A1\/en"},{"key":"e_1_3_2_1_77_1","unstructured":"Akamai Technologies. 2022. Large Complex DDoS Attacks on the Rise in 2020 - The Akamai Blog. https:\/\/blogs.akamai.com\/2020\/07\/large-complex-ddos-attacks-on-the-rise-in-2020.html Akamai Technologies. 2022. Large Complex DDoS Attacks on the Rise in 2020 - The Akamai Blog. https:\/\/blogs.akamai.com\/2020\/07\/large-complex-ddos-attacks-on-the-rise-in-2020.html"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355581"},{"key":"e_1_3_2_1_79_1","unstructured":"Liam Tung. 2022. DDoS Attackers Have Found This New Trick to Knock over Websites. https:\/\/www.zdnet.com\/article\/attackers-now-hit-firewalls-to-knock-out-websites\/ Liam Tung. 2022. DDoS Attackers Have Found This New Trick to Knock over Websites. https:\/\/www.zdnet.com\/article\/attackers-now-hit-firewalls-to-knock-out-websites\/"},{"key":"e_1_3_2_1_80_1","unstructured":"Verizon. 2020. DDoS Security - Service Level Agreement. https:\/\/enterprise.verizon.com\/service_guide\/reg\/cp_ddos_security_sla.pdf Verizon. 2020. DDoS Security - Service Level Agreement. https:\/\/enterprise.verizon.com\/service_guide\/reg\/cp_ddos_security_sla.pdf"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485385"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544268"},{"key":"e_1_3_2_1_84_1","unstructured":"James Edward Winquist Joseph Welch Tim Hoffman and Olan Patrick Barnes. 2016. Forced Alert Thresholds for Profiled Detection. https:\/\/patents.google.com\/patent\/US9344440 James Edward Winquist Joseph Welch Tim Hoffman and Olan Patrick Barnes. 2016. Forced Alert Thresholds for Profiled Detection. https:\/\/patents.google.com\/patent\/US9344440"},{"key":"e_1_3_2_1_85_1","unstructured":"Wired. 2018. A 1.3-Tbs DDoS Hit GitHub the Largest Yet Recorded. https:\/\/www.wired.com\/story\/github-ddos-memcached\/ Wired. 2018. A 1.3-Tbs DDoS Hit GitHub the Largest Yet Recorded. https:\/\/www.wired.com\/story\/github-ddos-memcached\/"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5104-0"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.08.018"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24007"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011278"},{"key":"e_1_3_2_1_90_1","volume-title":"Dynashield: Reducing the Cost of DDoS Defense Using Cloud Services. In USENIX HotCloud 19.","author":"Zheng Shengbao","year":"2019","unstructured":"Shengbao Zheng and Xiaowei Yang . 2019 . Dynashield: Reducing the Cost of DDoS Defense Using Cloud Services. In USENIX HotCloud 19. Shengbao Zheng and Xiaowei Yang. 2019. Dynashield: Reducing the Cost of DDoS Defense Using Cloud Services. In USENIX HotCloud 19."}],"event":{"name":"CoNEXT '22: The 18th International Conference on emerging Networking EXperiments and Technologies","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Roma Italy","acronym":"CoNEXT '22"},"container-title":["Proceedings of the 18th International Conference on emerging Networking EXperiments and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3555050.3569121","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3555050.3569121","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3555050.3569121","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:50Z","timestamp":1750178810000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3555050.3569121"}},"subtitle":["boosting existing DDoS detection systems using auxiliary signals"],"short-title":[],"issued":{"date-parts":[[2022,11,30]]},"references-count":87,"alternative-id":["10.1145\/3555050.3569121","10.1145\/3555050"],"URL":"https:\/\/doi.org\/10.1145\/3555050.3569121","relation":{},"subject":[],"published":{"date-parts":[[2022,11,30]]},"assertion":[{"value":"2022-11-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}