{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T15:27:05Z","timestamp":1778167625784,"version":"3.51.4"},"reference-count":25,"publisher":"Allerton Press","issue":"5","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.3103\/s0146411619050043","type":"journal-article","created":{"date-parts":[[2019,11,18]],"date-time":"2019-11-18T07:01:41Z","timestamp":1574060501000},"page":"419-428","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":87,"title":["Detecting DDoS Attacks Using Machine Learning Techniques and Contemporary Intrusion Detection Dataset"],"prefix":"10.3103","volume":"53","author":[{"family":"Naveen Bindra","sequence":"first","affiliation":[]},{"family":"Manu Sood","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2019,11,18]]},"reference":[{"key":"7143_CR1","unstructured":"Cybersecurity Trends, 2018. https:\/\/www.incapsula.com\/ddos\/attack-glossary\/high-orbit-ion-cannon.html. Accessed February 5, 2018."},{"key":"7143_CR2","unstructured":"DDoS Attack, 2018. https:\/\/en.wikipedia.org\/wiki\/Denial-of-service_attack. Accessed February 8, 2018."},{"key":"7143_CR3","doi-asserted-by":"crossref","unstructured":"Hacking Incidents, 2018. https:\/\/en.wikipedia.org\/wiki\/List_of_security_hacking_incidents. Accessed February 15, 2018.","DOI":"10.1016\/S1353-4858(18)30102-8"},{"key":"7143_CR4","unstructured":"Transformation of DDoS attacks in Global warefare, 2018. https:\/\/qz.com\/860630\/ddos-attacks-have-gone-from-a-minor-nuisance-to-a-possible-new-form-of-global-warfare\/. Accessed January 1, 2018."},{"key":"7143_CR5","unstructured":"DDoS attacks Trend Report, 2018. https:\/\/www.cdnetworks.com\/CDNetworks_Q3_2017_DDoS%20Attack% 20Trends%20Report_EN_201712.pdf. Accessed February 26, 2018."},{"key":"7143_CR6","doi-asserted-by":"crossref","unstructured":"Robinson, R. and Thomas, C., Ranking of machine learning algorithms based on the performance in classifying DDoS attacks, Proceedings of the IEEE Recent Advances in Intelligent Computational Systems (RAICS), Trivandrum, 2015, pp. 185\u2013190.","DOI":"10.1109\/RAICS.2015.7488411"},{"key":"7143_CR7","doi-asserted-by":"crossref","unstructured":"Azab, A., Alazab, M., and Aiash, M., Machine learning based Botnet identification traffic, 2016 IEEE Trustcom\/BigDataSE\/ISPA, Tianjin, 2016, pp. 1788\u20131794.","DOI":"10.1109\/TrustCom.2016.0275"},{"key":"7143_CR8","doi-asserted-by":"crossref","unstructured":"Agrawal, P.K., Gupta, B.B., and Jain, S., SVM based scheme for predicting number of zombies in a DDoS attack, 2011 European Intelligence and Security Informatics Conference, Athens, 2011, pp. 178\u2013182.","DOI":"10.1109\/EISIC.2011.19"},{"key":"7143_CR9","doi-asserted-by":"crossref","unstructured":"Chonka, A., Zhou, W., Singh, J., and Xiang, Y., Detecting and tracing DDoS attacks by intelligent decision prototype, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), Hong Kong, 2008, pp. 578\u2013583.","DOI":"10.1109\/PERCOM.2008.76"},{"key":"7143_CR10","doi-asserted-by":"crossref","unstructured":"Jalil, K.A., Kamarudin, M.H., and Masrek, M.N., Comparison of machine learning algorithms performance in detecting network intrusion, 2010 International Conference on Networking and Information Technology, Manila, 2010, pp. 221\u2013226.","DOI":"10.1109\/ICNIT.2010.5508526"},{"key":"7143_CR11","doi-asserted-by":"crossref","unstructured":"Balkanli, E., Alves, J., and Zincir-Heywood, A.N., Supervised learning to detect DDoS attacks, 2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), Orlando, FL, 2014, pp. 1\u20138.","DOI":"10.1109\/CICYBS.2014.7013367"},{"key":"7143_CR12","doi-asserted-by":"crossref","unstructured":"Saad, S., et al., Detecting P2P Botnets through network behavior analysis and Machine Learning, 2011 Ninth Annual International Conference on Privacy, Security and Trust, Montreal, QC, 2011, pp. 174\u2013180.","DOI":"10.1109\/PST.2011.5971980"},{"key":"7143_CR13","unstructured":"Application of Machine Learning, 2018. https:\/\/medium.com\/app-affairs\/9-applications-of-machine-learning-from-day-to-day-life-112a47a429d0. Accessed February 5, 2018."},{"key":"7143_CR14","first-page":"1174","volume":"7","author":"Ayon Dey","year":"2016","unstructured":"Ayon Dey, Machine learning algorithms: A review, Int. J. Comput. Sci. Inf. Technol., 2016, vol. 7, no. 3, pp.\u00a01174\u20131179.","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"key":"7143_CR15","unstructured":"Logistic Regression, 2018. https:\/\/machinelearningmastery.com\/logistic-regression-for-machine-learning\/.  Accessed December 16, 2017."},{"key":"7143_CR16","unstructured":"Types of Machine Learning Algorithms, 2017. https:\/\/towardsdatascience.com\/types-of-machine-learning-algorithms-you-should-know-953a08248861. Accessed December 12, 2017."},{"key":"7143_CR17","unstructured":"Supervised Machine Learning, 2017. https:\/\/en.wikipedia.org\/wiki\/Supervised_learning#Algorithms.  Accessed October 2, 2017."},{"key":"7143_CR18","unstructured":"Sci-kit Learn, Machine Learning in Python, 2017. http:\/\/scikit-learn.org\/stable\/. Accessed November 5, 2017."},{"key":"7143_CR19","doi-asserted-by":"crossref","unstructured":"Iman Sharafaldin, Arash Habibi Lashkari, and Ali A. Ghorbani, Toward generating a new intrusion detection dataset and intrusion traffic characterization, 4th International Conference on Information Systems Security and Privacy (ICISSP), Portugal, 2018.","DOI":"10.5220\/0006639801080116"},{"key":"7143_CR20","unstructured":"DDoS Attacks, 2017. https:\/\/en.wikipedia.org\/wiki\/Denial-of-service_attack.  Accessed November 14, 2017."},{"key":"7143_CR21","first-page":"215","volume":"3","author":"A. Chaudhary","year":"2016","unstructured":"Chaudhary, A., Kolhe, S., and Kamal, R., An improved random forest classifier for multi-class classification, Inf. Process. Agric., 2016, vol. 3, no. 4, pp. 215\u2013222.","journal-title":"Inf. Process. Agric."},{"key":"7143_CR22","first-page":"26","volume":"101","author":"S. Bharathidason","year":"2014","unstructured":"Bharathidason, S. and Venkataeswaran, C.J., Improving classification accuracy based on random forest model with uncorrelated high performing trees, Int. J. Comput. Appl., 2014, vol. 101, no. 13, pp. 26\u201330.","journal-title":"Int. J. Comput. Appl."},{"key":"7143_CR23","doi-asserted-by":"publisher","first-page":"2838","DOI":"10.3390\/rs5062838","volume":"5","author":"A. Mellor","year":"2013","unstructured":"Mellor, A., Haywood, A., Stone, C., and Jones, S., The performance of random forests in an operational setting for large area sclerophyll forest classification, Remote Sens., 2013, vol. 5, no. 6, pp. 2838\u20132856. https:\/\/doi.org\/10.3390\/rs5062838","journal-title":"Remote Sens."},{"key":"7143_CR24","doi-asserted-by":"crossref","unstructured":"Almseidin, M., Alzubi, S., and Kovacs, M., Alkasassbeh, Evaluation of machine learning algorithms for intrusion detection system, 2017 IEEE 15th International Symposium on Intelligent Systems and Informatics (SISY), 2017, pp. 277\u2013282.","DOI":"10.1109\/SISY.2017.8080566"},{"key":"7143_CR25","doi-asserted-by":"crossref","unstructured":"Gharib, A., Sharafaldin, I., Lashkari, A.H., and Ghorbani, A.A., An evaluation framework for intrusion detection dataset, Proc. 2016 International Conference on Information Science and Security (ICISS), 2016, pp. 1\u20136.","DOI":"10.1109\/ICISSEC.2016.7885840"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619050043.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411619050043","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619050043.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:00:33Z","timestamp":1773612033000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411619050043"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":25,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["7143"],"URL":"https:\/\/doi.org\/10.3103\/s0146411619050043","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9]]},"assertion":[{"value":"12 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 March 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 March 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 November 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that there is no conflict of interest regarding the publication of this paper.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}