{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:07:09Z","timestamp":1773655629796,"version":"3.50.1"},"reference-count":9,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.3103\/s0146411619080157","type":"journal-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T09:03:07Z","timestamp":1583312587000},"page":"1065-1071","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Prevention of DoS Attacks by Predicting the Values of Correlation Network Traffic Parameters"],"prefix":"10.3103","volume":"53","author":[{"given":"D. S.","family":"Lavrova","sequence":"first","affiliation":[]},{"given":"E. A.","family":"Popova","sequence":"additional","affiliation":[]},{"given":"A. A.","family":"Shtyrkina","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"7219_CR1","doi-asserted-by":"publisher","first-page":"936","DOI":"10.3103\/S014641161808028X","volume":"52","author":"P.D. Zegzhda","year":"2018","unstructured":"Zegzhda, P.D., Lavrova, D.S., and Shtyrkina, A.A., Multifractal analysis of internet backbone traffic for detecting denial of service attacks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 936\u2013944.","journal-title":"Autom. Control Comput. Sci."},{"key":"7219_CR2","doi-asserted-by":"publisher","first-page":"931","DOI":"10.3103\/S0146411618080187","volume":"52","author":"D.S. Lavrova","year":"2018","unstructured":"Lavrova, D.S., Alekseev, I.V., and Shtyrkina, A.A., Security analysis based on controlling dependences of network traffic parameters by wavelet transformation, Autom. Control Comput. Sci., 2018, vol. 52, no. 2, pp. 931\u2013935.","journal-title":"Autom. Control Comput. Sci."},{"key":"7219_CR3","unstructured":"Denial of service. http:\/\/project.net.ru\/security\/article9\/g7.html#index16. Accessed October 1, 2018."},{"key":"7219_CR4","doi-asserted-by":"crossref","unstructured":"Hussain, S.M. and Beigh, G.R., Impact of DDoS attack (UDP flooding) on queuing models, Computer and Communication Technology (ICCCT),20134th International Conference on, IEEE, 2013, pp. 210\u2013216.","DOI":"10.1109\/ICCCT.2013.6749629"},{"key":"7219_CR5","unstructured":"Harshita, H., Detection and prevention of ICMP flood DDoS attack, Int. J. New Technol. Res., 2017, vol. 3."},{"key":"7219_CR6","doi-asserted-by":"crossref","unstructured":"Yatagai, T., Isohara, T., and Sasase, I., Detection of HTTP-GET flood attack based on analysis of page access behavior, Communications, Computers and Signal Processing,2007. PacRim 2007. IEEE Pacific Rim Conference on, 2007, pp. 232\u2013235.","DOI":"10.1109\/PACRIM.2007.4313218"},{"key":"7219_CR7","unstructured":"DNS amplification attacks. https:\/\/meetings.ripe.net\/ripe-52\/presentations\/ripe52-plenary-dnsamp.pdf. Accessed October 1, 2018."},{"key":"7219_CR8","unstructured":"Forecasting time series. http:\/\/edu.mmcs.sfedu.ru\/pluginfile.php\/24419\/mod_resource\/content\/1\/ 14%20%D0%9F%D1%80%D0%BE%D0%B3%D0%BD%D0%BE%D0%B7%D0%B8%D1%80%D0%BE% D0%B2%D0%B0%D0%BD%D0%B8%D0%B5%20%D0%B2%D1%80%D0%B5%D0%BC%D0%B5%D0% BD%D0%BD%D1%8B%D1%85%20%D1%80%D1%8F%D0%B4%D0%BE%D0%B2.pdf. Accessed October 1, 2018."},{"key":"7219_CR9","unstructured":"Aliev, T.I., Seti EVM i telekommunikatsii: Ucheb. posobie (Computer Networks and Telecommunications: Textbook), St. Petersburg: S.-Peterb. Nats. Issled. Univ. Inf. Tekhnol. Mekh. Opt., 2011."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080157.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411619080157","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080157.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:00:09Z","timestamp":1773612009000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411619080157"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":9,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["7219"],"URL":"https:\/\/doi.org\/10.3103\/s0146411619080157","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"10 September 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 September 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 October 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflict of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}