{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T16:35:18Z","timestamp":1778603718615,"version":"3.51.4"},"reference-count":29,"publisher":"SAGE Publications","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JHS"],"published-print":{"date-parts":[[2020,3,31]]},"DOI":"10.3233\/jhs-200630","type":"journal-article","created":{"date-parts":[[2020,3,10]],"date-time":"2020-03-10T14:53:57Z","timestamp":1583852037000},"page":"55-76","source":"Crossref","is-referenced-by-count":33,"title":["A two level security mechanism to detect a DDoS flooding attack in software-defined networks using entropy-based and C4.5\u00a0technique"],"prefix":"10.1177","volume":"26","author":[{"given":"K.","family":"Muthamil Sudar","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, School of Computing, Kalasalingam Academy of Research and Education, Krishnankoil, Tamilnadu, India. E-mails:\u00a0k.muthamilsudar@klu.ac.in,\u00a0deepa.kumar@klu.ac.in"}]},{"given":"P.","family":"Deepalakshmi","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, School of Computing, Kalasalingam Academy of Research and Education, Krishnankoil, Tamilnadu, India. E-mails:\u00a0k.muthamilsudar@klu.ac.in,\u00a0deepa.kumar@klu.ac.in"}]}],"member":"179","reference":[{"key":"10.3233\/JHS-200630_ref1","doi-asserted-by":"crossref","unstructured":"A.\u00a0Alshamrani, A.\u00a0Chowdhary, S.\u00a0Pisharody, D.\u00a0Lu and D.\u00a0Huang, A defense system for defeating ddos attacks in sdn based networks, in: Proceedings of the 15th ACM International Symposium on Mobility Management and Wireless Access, ACM, 2017, pp.\u00a083\u201392.","DOI":"10.1145\/3132062.3132074"},{"key":"10.3233\/JHS-200630_ref2","doi-asserted-by":"crossref","unstructured":"L.\u00a0Barki, A.\u00a0Shidling, N.\u00a0Meti, D.G.\u00a0Narayan and M.M.\u00a0Mulla, Detection of distributed denial of service attacks in software defined networks, in: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), IEEE, 2016, pp.\u00a02576\u20132581.","DOI":"10.1109\/ICACCI.2016.7732445"},{"issue":"2","key":"10.3233\/JHS-200630_ref3","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/s13369-017-2414-5","article-title":"DDoS attack detection and mitigation using SDN: Methods, practices, and solutions","volume":"42","author":"Bawany","year":"2017","journal-title":"Arabian Journal for Science and Engineering"},{"key":"10.3233\/JHS-200630_ref4","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735752"},{"key":"10.3233\/JHS-200630_ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2015.7357519"},{"key":"10.3233\/JHS-200630_ref6","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.ins.2019.02.015","article-title":"Detecting unfair recommendations in trust-based pervasive environments","volume":"486","author":"D\u2019Angelo","year":"2019","journal-title":"Information Sciences"},{"key":"10.3233\/JHS-200630_ref7","doi-asserted-by":"crossref","unstructured":"L.\u00a0Dridi and M.F.\u00a0Zhani, SDN-guard: DoS attacks mitigation in SDN networks, in: 2016 5th IEEE International Conference on Cloud Networking (Cloudnet), IEEE, 2016, pp.\u00a0212\u2013217.","DOI":"10.1109\/CloudNet.2016.9"},{"key":"10.3233\/JHS-200630_ref8","doi-asserted-by":"publisher","DOI":"10.1002\/nem.1996"},{"key":"10.3233\/JHS-200630_ref9","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.bjp.2013.10.014","article-title":"Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments","volume":"62","author":"Giotis","year":"2014","journal-title":"Computer Networks"},{"issue":"1","key":"10.3233\/JHS-200630_ref11","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1145\/1352322.1352222","article-title":"Undergraduate data communications and networking projects using opnet and wireshark software","volume":"40","author":"Hnatyshin","year":"2008","journal-title":"ACM SIGCSE Bulletin"},{"key":"10.3233\/JHS-200630_ref12","unstructured":"T.Y.\u00a0Huang, V.\u00a0Jeyakumar, B.\u00a0Lantz, N.\u00a0Feamster, K.\u00a0Winstein and A.\u00a0Sivaraman, Teaching computer networking with mininet, in: ACM SIGCOMM, 2014."},{"key":"10.3233\/JHS-200630_ref13","first-page":"478","article-title":"An intelligent DDoS attack detection system using packet analysis and support vector machine","author":"Kato","year":"2014","journal-title":"IJICR"},{"key":"10.3233\/JHS-200630_ref14","unstructured":"S.\u00a0Kaur, J.\u00a0Singh and N.S.\u00a0Ghumman, Network programmability using POX controller, in: ICCCS International Conference on Communication, Computing & Systems, Vol.\u00a0138, IEEE, 2014."},{"key":"10.3233\/JHS-200630_ref15","doi-asserted-by":"crossref","unstructured":"R.T.\u00a0Kokila, S.T.\u00a0Selvi and K.\u00a0Govindarajan, DDoS detection and analysis in SDN-based environment using support vector machine classifier, in: 2014 Sixth International Conference on Advanced Computing (ICoAC), IEEE, 2014, pp.\u00a0205\u2013210.","DOI":"10.1109\/ICoAC.2014.7229711"},{"issue":"1","key":"10.3233\/JHS-200630_ref16","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/JPROC.2014.2371999","article-title":"Software-defined networking: A comprehensive survey","volume":"103","author":"Kreutz","year":"2015","journal-title":"Proceedings of the IEEE"},{"issue":"2","key":"10.3233\/JHS-200630_ref17","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1049\/iet-net.2018.5082","article-title":"Artificial intelligence enabled software-defined networking: A comprehensive overview","volume":"8","author":"Latah","year":"2018","journal-title":"IET Networks"},{"key":"10.3233\/JHS-200630_ref18","doi-asserted-by":"crossref","unstructured":"S.\u00a0Lim, J.\u00a0Ha, H.\u00a0Kim, Y.\u00a0Kim and S.\u00a0Yang, A SDN-oriented DDoS blocking scheme for botnet-based attacks, in: 2014 Sixth International Conference on Ubiquitous and Future Networks (ICUFN), IEEE, 2014, pp.\u00a063\u201368.","DOI":"10.1109\/ICUFN.2014.6876752"},{"key":"10.3233\/JHS-200630_ref19","doi-asserted-by":"crossref","unstructured":"Y.\u00a0Lu and M.\u00a0Wang, An easy defense mechanism against botnet-based DDoS flooding attack originated in SDN environment using sFlow, in: Proceedings of the 11th International Conference on Future Internet Technologies, ACM, 2016, pp.\u00a014\u201320.","DOI":"10.1145\/2935663.2935674"},{"key":"10.3233\/JHS-200630_ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_9"},{"key":"10.3233\/JHS-200630_ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_9"},{"key":"10.3233\/JHS-200630_ref22","doi-asserted-by":"crossref","unstructured":"N.\u00a0Meti, D.G.\u00a0Narayan and V.P.\u00a0Baligar, Detection of distributed denial of service attacks using machine learning algorithms in software defined networks, in: 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), IEEE, 2017, pp.\u00a01366\u20131371.","DOI":"10.1109\/ICACCI.2017.8126031"},{"key":"10.3233\/JHS-200630_ref23","first-page":"1","article-title":"Early detection of DDoS attacks against software defined network controllers","author":"Mousavi","year":"2018","journal-title":"Journal of Network and Systems Management"},{"issue":"5","key":"10.3233\/JHS-200630_ref24","doi-asserted-by":"publisher","first-page":"1113","DOI":"10.1002\/cpe.3061","article-title":"A distributed approach to network anomaly detection based on independent component analysis","volume":"26","author":"Palmieri","year":"2014","journal-title":"Concurrency and Computation: Practice and Experience"},{"issue":"5","key":"10.3233\/JHS-200630_ref25","doi-asserted-by":"publisher","first-page":"1620","DOI":"10.1007\/s11227-014-1242-6","article-title":"Energy-oriented denial of service attacks: An emerging menace for large cloud infrastructures","volume":"71","author":"Palmieri","year":"2015","journal-title":"The Journal of Supercomputing"},{"issue":"2","key":"10.3233\/JHS-200630_ref26","doi-asserted-by":"publisher","first-page":"1587","DOI":"10.1016\/j.eswa.2007.11.051","article-title":"A novel hybrid intelligent method based on C4.5 decision tree classifier and one-against-all approach for multi-class classification problems","volume":"36","author":"Polat","year":"2009","journal-title":"Expert Systems with Applications"},{"key":"10.3233\/JHS-200630_ref27","doi-asserted-by":"crossref","unstructured":"N.G.\u00a0Relan and D.R.\u00a0Patil, Implementation of network intrusion detection system using variant of decision tree algorithm, in: 2015 International Conference on Nascent Technologies in the Engineering Field (ICNTE), IEEE, 2015, pp.\u00a01\u20135.","DOI":"10.1109\/ICNTE.2015.7029925"},{"key":"10.3233\/JHS-200630_ref28","doi-asserted-by":"crossref","unstructured":"L.\u00a0Rokach and O.Z.\u00a0Maimon, Data Mining with Decision Trees: Theory and Applications, Vol.\u00a069, World Scientific, 2008.","DOI":"10.1142\/6604"},{"issue":"8","key":"10.3233\/JHS-200630_ref29","first-page":"1075","article-title":"Botnet classification using centralized collection of network flow counters in software defined networks","volume":"14","author":"Tariq","year":"2016","journal-title":"International Journal of Computer Science and Information Security"},{"key":"10.3233\/JHS-200630_ref30","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.389"}],"container-title":["Journal of High Speed Networks"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JHS-200630","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T08:44:12Z","timestamp":1777452252000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JHS-200630"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,31]]},"references-count":29,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.3233\/jhs-200630","relation":{},"ISSN":["1875-8940","0926-6801"],"issn-type":[{"value":"1875-8940","type":"electronic"},{"value":"0926-6801","type":"print"}],"subject":[],"published":{"date-parts":[[2020,3,31]]}}}