{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,10]],"date-time":"2026-05-10T10:14:36Z","timestamp":1778408076633,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,8]],"date-time":"2024-04-08T00:00:00Z","timestamp":1712534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nd\/4.0\/"}],"funder":[{"name":"FCT\/MCTES\/EU","award":["UIDB\/EEA\/50008\/2020"],"award-info":[{"award-number":["UIDB\/EEA\/50008\/2020"]}]},{"name":"FCT\/COMPETE\/FEDER","award":["POCI-01-0145- FEDER-030657"],"award-info":[{"award-number":["POCI-01-0145- FEDER-030657"]}]},{"name":"ERDF","award":["Centro-01-0145-FEDER- 000019"],"award-info":[{"award-number":["Centro-01-0145-FEDER- 000019"]}]},{"name":"Brazilian CAPES Foundation","award":["BEX 9095\/13-6"],"award-info":[{"award-number":["BEX 9095\/13-6"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,8]]},"DOI":"10.1145\/3605098.3635919","type":"proceedings-article","created":{"date-parts":[[2024,5,21]],"date-time":"2024-05-21T17:59:16Z","timestamp":1716314356000},"page":"1321-1330","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Detection of Slowloris Attacks using Machine Learning Algorithms"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7829-9805","authenticated-orcid":false,"given":"Vinicius","family":"Rios","sequence":"first","affiliation":[{"name":"Instituto de Educacao, Ciencia e Tecnologia do Tocantins, Palmas, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8221-0666","authenticated-orcid":false,"given":"Pedro","family":"Inacio","sequence":"additional","affiliation":[{"name":"Universidade da Beira Interior, Covilha, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2578-1803","authenticated-orcid":false,"given":"Damien","family":"Magoni","sequence":"additional","affiliation":[{"name":"Universit\u00e9 de Bordeaux, Talence, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9017-5001","authenticated-orcid":false,"given":"Mario","family":"Freire","sequence":"additional","affiliation":[{"name":"Universidade da Beira Interior, Covilha, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2024,5,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2013.6754984"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3033942"},{"key":"e_1_3_2_1_3_1","volume-title":"IEEE Military Communications Conference. 348--353","author":"Aqil A.","unstructured":"A. Aqil, A. Atya, T. Jaeger, S. Krishnamurthy, K. Levitt, P. McDaniel, J. Rowe, and A. Swami. 2015. Detection of stealthy TCP-based DoS attacks. In IEEE Military Communications Conference. 348--353."},{"key":"e_1_3_2_1_4_1","volume-title":"Luis Quesada, Gabriela Barrantes, and Adri\u00e1n Lara.","author":"Asch Christian","year":"2021","unstructured":"Christian Asch, Gabriel G\u00e1lvez, Eric R\u00edos, Juan Jos\u00e9 Vargas, Luis Quesada, Gabriela Barrantes, and Adri\u00e1n Lara. 2021. Asynchronous Detection of Slowloris Attacks Via Random Forests. In IEEE Jornadas Costarricenses de Investigaci\u00f3n en Computaci\u00f3n e Inform\u00e1tica."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108498"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-019-0230-3"},{"key":"e_1_3_2_1_7_1","unstructured":"Canadian Institute for Cybersecurity. 2017. Intrusion Detection Evaluation Dataset (CIC-IDS2017). https:\/\/www.unb.ca\/cic\/datasets\/ids-2017.html"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.02.029"},{"key":"e_1_3_2_1_9_1","volume-title":"Roma Tre University","author":"Laboratory Computer Networks","year":"2020","unstructured":"Computer Networks Laboratory, Roma Tre University. 2020. Netkit emulator. https:\/\/www.netkit.org\/"},{"key":"e_1_3_2_1_10_1","volume-title":"IEEE Joint Intelligence and Security Informatics Conference. 75--82","author":"Dantas Yuri Gil","unstructured":"Yuri Gil Dantas, Vivek Nigam, and Iguatemi E. Fonseca. 2014. A selective defense for application layer ddos attacks. In IEEE Joint Intelligence and Security Informatics Conference. 75--82."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","unstructured":"Vin\u00edcius de Miranda Rios Pedro R. M. In\u00e1cio Damien Magoni and M\u00e1rio Marques Freire. 2023. Detection of Slowloris Attacks using Machine Learning Algorithms. 10.5281\/zenodo.8316038","DOI":"10.5281\/zenodo.8316038"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CHILECON.2017.8229519"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86970-0_14"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00009"},{"key":"e_1_3_2_1_15_1","first-page":"544","article-title":"SDToW","volume":"11","author":"da Silva Faria Vinicius","year":"2020","unstructured":"Vinicius da Silva Faria, J\u00e9ssica Alc\u00e2ntara Gon\u00e7alves, Camilla Alves Mariano da Silva, Gabriele de Brito Vieira, and Dalbert Matos Mascarenhas. 2020. SDToW: A Slowloris Detecting Tool for WMNs. Information journal 11, 12 (2020), 544.","journal-title":"A Slowloris Detecting Tool for WMNs. Information journal"},{"key":"e_1_3_2_1_16_1","first-page":"1","article-title":"Secure-MQTT: an efficient fuzzy logic-based approach to detect DoS attack in MQTT protocol for internet of things","volume":"1","author":"Haripriya A.","year":"2019","unstructured":"A. Haripriya and K. Kulothungan. 2019. Secure-MQTT: an efficient fuzzy logic-based approach to detect DoS attack in MQTT protocol for internet of things. EURASIP Journal on Wireless Communications and Networking 1 (2019), 1--15.","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/NBiS.2016.58"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.04.027"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"M. Idhammad K. Afdel and M. Belouch. 2018. Detection system of HTTP DDoS attacks in a cloud environment based on information theoretic entropy and random forest. Security and Communication Networks (2018).","DOI":"10.1155\/2018\/1263123"},{"key":"e_1_3_2_1_20_1","volume-title":"IEEE International Conf. on Computing Communication Control and Automation. 280--285","author":"Katkar V.","unstructured":"V. Katkar, A. Zinjade, S. Dalvi, T. Bafna, and R. Mahajan. 2015. Detection of DoS\/DDoS attack against HTTP servers using naive Bayesian. In IEEE International Conf. on Computing Communication Control and Automation. 280--285."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"E. H. Mamdani and S. Assilian. 1999. An experiment in linguistic synthesis with a fuzzy logic controller. International journal of human-computer studies 51 2 (1999) 135--147.","DOI":"10.1006\/ijhc.1973.0303"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1002\/nem.2152"},{"key":"e_1_3_2_1_23_1","volume-title":"International Conference on Advances in Computing, Communications and Informatics. 1366--1371","author":"Meti Nisharani","unstructured":"Nisharani Meti, D. G. Narayan, and V. P. Baligar. 2017. Detection of distributed denial of service attacks using machine learning algorithms in software defined networks. In International Conference on Advances in Computing, Communications and Informatics. 1366--1371."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249476"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2020.08.005"},{"key":"e_1_3_2_1_26_1","article-title":"Hypertext transfer protocol performance analysis in traditional and software defined networks during Slowloris attack","volume":"13","author":"Murthy Anusha A.","year":"2023","unstructured":"Anusha A. Murthy, Prathima Mabel John, and Rama Mohan Babu Kasturi Nagappasetty. 2023. Hypertext transfer protocol performance analysis in traditional and software defined networks during Slowloris attack. International Journal of Electrical & Computer Engineering 13, 4 (2023).","journal-title":"International Journal of Electrical & Computer Engineering"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC2IE56416.2022.9970143"},{"key":"e_1_3_2_1_28_1","volume-title":"International Conference on Information Assurance and Security. 5--10","author":"Panda Mrutyunjaya","year":"2010","unstructured":"Mrutyunjaya Panda, Ajith Abraham, and Manas Ranjan Patra. 2010. Discriminative multinomial naive bayes for network intrusion detection. In International Conference on Information Assurance and Security. 5--10."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.11.013"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107792"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3191430"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft51509.2021.9492633"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.09.004"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-020-04907-7"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.gsf.2020.04.011"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2011.038998"}],"event":{"name":"SAC '24: 39th ACM\/SIGAPP Symposium on Applied Computing","location":"Avila Spain","acronym":"SAC '24","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the 39th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605098.3635919","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605098.3635919","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:14Z","timestamp":1750178174000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605098.3635919"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,8]]},"references-count":37,"alternative-id":["10.1145\/3605098.3635919","10.1145\/3605098"],"URL":"https:\/\/doi.org\/10.1145\/3605098.3635919","relation":{},"subject":[],"published":{"date-parts":[[2024,4,8]]},"assertion":[{"value":"2024-05-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}