{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T13:15:18Z","timestamp":1754486118708,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T00:00:00Z","timestamp":1735948800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,1,4]]},"DOI":"10.1145\/3700838.3703687","type":"proceedings-article","created":{"date-parts":[[2025,1,2]],"date-time":"2025-01-02T12:58:12Z","timestamp":1735822692000},"page":"402-407","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["NetProbe: Deep Learning-Driven DDoS Detection with a Two-Tiered Mitigation Strategy"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-6464-7246","authenticated-orcid":false,"given":"Prianshu","family":"Jha","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Thapar Institute of Engineering and Technology, Patiala, Punjab, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-2712-3190","authenticated-orcid":false,"given":"Gurpreet","family":"Singh","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Thapar Institute of Engineering and Technology, Patiala, Punjab, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-0982-9644","authenticated-orcid":false,"given":"Amit","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Thapar Institute of Engineering and Technology, Patiala, Punjab, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-8148-159X","authenticated-orcid":false,"given":"Dewesh","family":"Agrawal","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Thapar Institute of Engineering and Technology, Patiala, Punjab, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9322-2160","authenticated-orcid":false,"given":"Yashwant Singh","family":"Patel","sequence":"additional","affiliation":[{"name":"Department of Computing Science, Umea University, Ume\u00e5, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3399-2440","authenticated-orcid":false,"given":"Javad","family":"Forough","sequence":"additional","affiliation":[{"name":"Department of Computing Science, Umea University, Ume\u00e5, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2025,1,4]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3631461.3631957"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"crossref","unstructured":"Hakan Ayd\u0131n Zeynep Orman and Muhammed\u00a0Ali Ayd\u0131n. 2022. A long short-term memory (LSTM)-based distributed denial of service (DDoS) detection and defense system design in public cloud network environment. Computers & Security 118 (2022) 102725.","DOI":"10.1016\/j.cose.2022.102725"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"crossref","unstructured":"Shuiguang Deng Zhengzhe Xiang Javid Taheri Mohammad\u00a0Ali Khoshkholghi Jianwei Yin Albert\u00a0Y. Zomaya and Schahram Dustdar. 2021. Optimal Application Deployment in Resource Constrained Distributed Edges. IEEE Transactions on Mobile Computing 20 5 (2021) 1907\u20131923.","DOI":"10.1109\/TMC.2020.2970698"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3465757"},{"key":"e_1_3_3_1_6_2","first-page":"1","volume-title":"2022 IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","author":"Gururaj HL","year":"2022","unstructured":"HL Gururaj, BC Soundarya, V Janhavi, H Lakshmi, and Prassan\u00a0Kumar MJ. 2022. Analysis of Cyber Security Attacks using Kali Linux. In 2022 IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE). IEEE, 1\u20136."},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"crossref","unstructured":"Sachin Kumar Prayag Tiwari and Mikhail Zymbler. 2019. Internet of Things is a revolutionary approach for future technology enhancement: a review. Journal of Big data 6 1 (2019) 1\u201321.","DOI":"10.1186\/s40537-019-0268-2"},{"key":"e_1_3_3_1_8_2","unstructured":"A\u00a0Habibi Lashkari. 2018. CICFlowmeter-V4. 0 (formerly known as ISCXFlowMeter) is a network traffic Bi-flow generator and analyser for anomaly detection. (2018)."},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD54268.2022.9776097"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2019.8888419"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-04036-8_6"},{"key":"e_1_3_3_1_12_2","unstructured":"A Vaswani. 2017. Attention is all you need. Advances in Neural Information Processing Systems (2017)."},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"crossref","unstructured":"Dega\u00a0Surono Wibowo Hepatika\u00a0Zidny Ilmadina Ardi\u00a0Susanto Ardi and Fariq Fadillah\u00a0Gusti Insani. 2023. Apache web server security with security hardening. Journal of Soft Computing Exploration 4 4 (2023) 213\u2013221.","DOI":"10.52465\/joscex.v4i4.230"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2017.7946998"}],"event":{"name":"ICDCN 2025: 26th International Conference on Distributed Computing and Networking","acronym":"ICDCN 2025","location":"Hyderabad India"},"container-title":["Proceedings of the 26th International Conference on Distributed Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3700838.3703687","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3700838.3703687","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:10:22Z","timestamp":1750295422000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3700838.3703687"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,4]]},"references-count":13,"alternative-id":["10.1145\/3700838.3703687","10.1145\/3700838"],"URL":"https:\/\/doi.org\/10.1145\/3700838.3703687","relation":{},"subject":[],"published":{"date-parts":[[2025,1,4]]},"assertion":[{"value":"2025-01-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}