{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:42:50Z","timestamp":1740141770920,"version":"3.37.3"},"reference-count":29,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2014,3,1]],"date-time":"2014-03-01T00:00:00Z","timestamp":1393632000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/100012913","name":"Tata Consultancy Services","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100012913","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2014,3,1]]},"abstract":"<jats:p> The main objective of this paper is to propose Adaptive Distributed Critical-Care Extensive Response Network (AD-CERN) which includes self-management and self-defense in the network. The proposed network has the following considerations. (1) Dynamic coevolution is elucidated with interaction between independent rational strategies and structure of overlay network. (2) Evolutionary Game Theory (EGT) specific to overlay network is adopted with the combination of network reciprocity and group selection mechanism. (3) The cooperative efficient network structure is put forth by the multinode link-formation game. In this network, each node will be trained independently based on Na\u00efve Bayes classification algorithm to react against any critical services in the network. The proposed network's significant characteristics are self-learning, independent training, collaborative detection, reaction to critical services, protecting the target machine before being collapsed, and maintaining the network performance without any hindrances. It controls the flow of high rate critical services such as Distributed Denial of Services (DDoS) flooding attacks and blocks the unwarranted services without any interruption to legitimate users. Hence, there is no doubt that this self-managed and self-defensive system will move from realm of fiction to real-time network engineering with high detection accuracy (98.3%), classification rate up to 99%, and improved clustering coefficient. <\/jats:p>","DOI":"10.1155\/2014\/754898","type":"journal-article","created":{"date-parts":[[2014,3,30]],"date-time":"2014-03-30T21:05:24Z","timestamp":1396213524000},"page":"754898","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["Design of an Adaptive Distributed Critical-Care Extensive Response Network (AD-CERN) Using Cooperative Overlay Network"],"prefix":"10.1177","volume":"10","author":[{"given":"V.","family":"Akilandeswari","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Thiagarajar College of Engineering, Madurai, Tamil Nadu 625010, India"}]},{"given":"S.","family":"Mercy Shalinie","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Thiagarajar College of Engineering, Madurai, Tamil Nadu 625010, India"}]}],"member":"179","published-online":{"date-parts":[[2014,3,30]]},"reference":[{"key":"B3-2014-754898","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15257-3_12"},{"key":"B7-2014-754898","doi-asserted-by":"publisher","DOI":"10.1145\/1600176.1600183"},{"issue":"1","key":"B9-2014-754898","first-page":"69","volume":"38","author":"Zhang G.","year":"2006","journal-title":"Journal of Research and Practice in Information Technology"},{"key":"B1-2014-754898","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2009.2027221"},{"key":"B5-2014-754898","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2009.4804322"},{"key":"B2-2014-754898","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19513-6_11"},{"key":"B11-2014-754898","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.818780"},{"key":"B16-2014-754898","doi-asserted-by":"publisher","DOI":"10.1145\/510726.510740"},{"key":"B18-2014-754898","doi-asserted-by":"publisher","DOI":"10.1117\/12.475264"},{"key":"B19-2014-754898","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.818782"},{"volume-title":"Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '02)","author":"Subramanian L.","key":"B20-2014-754898"},{"key":"B13-2014-754898","doi-asserted-by":"publisher","DOI":"10.1126\/science.1133755"},{"key":"B32-2014-754898","doi-asserted-by":"publisher","DOI":"10.1038\/srep02470"},{"key":"B23-2014-754898","doi-asserted-by":"publisher","DOI":"10.1038\/nature03204"},{"key":"B24-2014-754898","doi-asserted-by":"publisher","DOI":"10.1038\/nature04605"},{"key":"B10-2014-754898","doi-asserted-by":"publisher","DOI":"10.1109\/PTP.2004.1334942"},{"key":"B31-2014-754898","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/11\/9\/093033"},{"key":"B25-2014-754898","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0602530103"},{"key":"B4-2014-754898","doi-asserted-by":"publisher","DOI":"10.1109\/NSS.2010.68"},{"key":"B21-2014-754898","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.08.014"},{"key":"B26-2014-754898","doi-asserted-by":"publisher","DOI":"10.1126\/science.162.3859.1243"},{"key":"B30-2014-754898","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2013.06.002"},{"key":"B12-2014-754898","doi-asserted-by":"publisher","DOI":"10.1007\/11587552_5"},{"first-page":"99","volume-title":"Proceedings of the 24th Annual ACM Symposium on Principles of Distributed Computing (PODC '05)","author":"Corbo J.","key":"B27-2014-754898"},{"first-page":"133","volume-title":"Proceedings of the 25th Annual ACM Symposium on Principles of Distributed Computing","author":"Moscibroda T.","key":"B28-2014-754898"},{"key":"B8-2014-754898","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73078-1_63"},{"key":"B6-2014-754898","doi-asserted-by":"publisher","DOI":"10.1145\/1456377.1456389"},{"key":"B14-2014-754898","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.09.018"},{"first-page":"445","volume-title":"Proceedings of the IEEE International Conference on Recent Trends In Information Technology (ICRTIT '12)","author":"Akilandeswari V.","key":"B29-2014-754898"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2014\/754898","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2014\/754898","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2014\/754898","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T16:29:37Z","timestamp":1621182577000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2014\/754898"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,1]]},"references-count":29,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,3,1]]}},"alternative-id":["10.1155\/2014\/754898"],"URL":"https:\/\/doi.org\/10.1155\/2014\/754898","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2014,3,1]]}}}