{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T22:04:56Z","timestamp":1726092296924},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030493387"},{"type":"electronic","value":"9783030493394"}],"license":[{"start":{"date-parts":[[2020,8,6]],"date-time":"2020-08-06T00:00:00Z","timestamp":1596672000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,6]],"date-time":"2020-08-06T00:00:00Z","timestamp":1596672000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,6]],"date-time":"2020-08-06T00:00:00Z","timestamp":1596672000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,6]],"date-time":"2020-08-06T00:00:00Z","timestamp":1596672000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-49339-4_9","type":"book-chapter","created":{"date-parts":[[2020,8,5]],"date-time":"2020-08-05T11:05:14Z","timestamp":1596625514000},"page":"78-87","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Decision Forest Classifier with Flower Search Optimization Algorithm for Efficient Detection of BHP Flooding Attacks in Optical Burst Switching Network"],"prefix":"10.1007","author":[{"given":"Mrutyunjaya","family":"Panda","sequence":"first","affiliation":[]},{"given":"Niketa","family":"Gandhi","sequence":"additional","affiliation":[]},{"given":"Ajith","family":"Abraham","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,6]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","first-page":"2602","DOI":"10.1016\/j.ijleo.2012.07.037","volume":"124","author":"PGV Ramesh","year":"2013","unstructured":"Ramesh, P.G.V., Nair, P.: A multilayered approach for load balancing in optical burst switching network. Optik 124, 2602\u20132607 (2013)","journal-title":"Optik"},{"issue":"1","key":"9_CR2","first-page":"69","volume":"8","author":"C Qiao","year":"1999","unstructured":"Qiao, C., Yoo, M.: Optical burst switching (OBS) \u2013 a new paradigm for an optical internet. J. High Speed Netw. 8(1), 69\u201384 (1999)","journal-title":"J. High Speed Netw."},{"issue":"10","key":"9_CR3","doi-asserted-by":"crossref","first-page":"1810","DOI":"10.1109\/49.887904","volume":"18","author":"B Mukherjee","year":"2000","unstructured":"Mukherjee, B.: WDM optical communication networks: progress and challenges. IEEE J. Sel. Areas Commun. 18(10), 1810\u20131824 (2000)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"4","key":"9_CR4","first-page":"292","volume":"7","author":"AK Garg","year":"2007","unstructured":"Garg, A.K., Kaler, R.S.: Performance analysis of optical burst switching highspeed network architecture. IJCSNS Int. J. Comput. Sci. Netw. Secur. 7(4), 292\u2013301 (2007)","journal-title":"IJCSNS Int. J. Comput. Sci. Netw. Secur."},{"issue":"14","key":"9_CR5","doi-asserted-by":"crossref","first-page":"2621","DOI":"10.1109\/JLT.2009.2013483","volume":"27","author":"O Ozturk","year":"2009","unstructured":"Ozturk, O., Karasen, E., Akar, N.: Performance evaluation of slotted optical burst switching systems with quality of service differentiation. J. Light Wave Technol. 27(14), 2621\u20132633 (2009)","journal-title":"J. Light Wave Technol."},{"issue":"2","key":"9_CR6","first-page":"71","volume":"5","author":"A Jesudoss","year":"2014","unstructured":"Jesudoss, A., Subramaniam, N.P.: A survey on authentication attacks and countermeasures in a distributed environment. Indian J. Comput. Sci. Eng. (IJCSE) 5(2), 71\u201377 (2014)","journal-title":"Indian J. Comput. Sci. Eng. (IJCSE)"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Sreenath, N., Muthuraj, K., Sivasubramanian, P.: Secure optical internet: attack detection and prevention mechanism. In: IEEE, pp. 1009\u20131012 (2012)","DOI":"10.1109\/ICCEET.2012.6203922"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Jindal, K., Dalal, S., Sharma, K.K.: Analyzing spoofing attacks in wireless networks. In: 2014 Fourth International Conference on Advanced Computing & Communication Technologies, Rohtak, India, February 2014, pp. 398\u2013402 (2014)","DOI":"10.1109\/ACCT.2014.46"},{"issue":"4","key":"9_CR9","first-page":"75","volume":"1","author":"K Muthuraj","year":"2012","unstructured":"Muthuraj, K., Sreenath, N.: Secure optical internet: an attack on OBS node in a TCP over OBS network. Int. J. Emerg. Trends Technol. Comput. Sci. (IJETTCS) 1(4), 75\u201380 (2012)","journal-title":"Int. J. Emerg. Trends Technol. Comput. Sci. (IJETTCS)"},{"issue":"2","key":"9_CR10","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1007\/s11107-014-0484-9","volume":"29","author":"M Sliti","year":"2015","unstructured":"Sliti, M., Boudriga, N.: BHP flooding vulnerability and countermeasure. Photon Netw. Commun. 29(2), 198\u2013213 (2015)","journal-title":"Photon Netw. Commun."},{"issue":"2","key":"9_CR11","first-page":"160","volume":"18","author":"R Alshboul","year":"2018","unstructured":"Alshboul, R.: Flood attacks control in optical burst networks by inducing rules using data mining. Int. J. Comput. Sci. Netw. Secur. 18(2), 160\u2013167 (2018)","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"issue":"1","key":"9_CR12","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1071690.1064220","volume":"33","author":"AW Moore","year":"2005","unstructured":"Moore, A.W., Zuev, D.: Internet traffic classification using Bayesian analysis techniques. ACM SIGMETRICS Perform. Eval. Rev. 33(1), 50\u201360 (2005)","journal-title":"ACM SIGMETRICS Perform. Eval. Rev."},{"key":"9_CR13","doi-asserted-by":"publisher","unstructured":"Bowes, D., Hall, T., Petri\u0107, J.: Softw. Qual. J. 26, 525. Springer (2018). https:\/\/doi.org\/10.1007\/s11219-016-9353-3","DOI":"10.1007\/s11219-016-9353-3"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Sliti, M., Hamdi, M., Boudriga, N.: A novel optical firewall architecture for burst switched networks. In: Proceedings of 12th International Conference on Transparent Optical Networks (ICTON), pp. 1\u20135 (2010)","DOI":"10.1109\/ICTON.2010.5549054"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Rajab, A., Huang, C.T., Alshargabi, M., Cobb, J.: Countering burst header packet flooding attack in optical burst switching network. In: International Conference on Information Security Practice and Experience, 16 November 2016, pp. 315\u2013329. Springer (2016)","DOI":"10.1007\/978-3-319-49151-6_22"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Rajab, A.: Burst Header Packet (BHP) flooding attack on Optical Burst Switching (OBS) network data set. Ph.D. dissertation, University of California Irvine Data Repository (2017)","DOI":"10.1007\/978-3-319-49151-6_22"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Musumeci, F., Rottondi, C., Nag, A., Macaluso, I., Zibar, D., Ruffini, M., Tornatore, M.: A survey on application of machine learning techniques in optical networks. arXiv preprint arXiv:1803.07976v1 [cs.NI], 21 March 2018","DOI":"10.1109\/COMST.2018.2880039"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Zahid Hasan, Md., Zubair Hasan, K.M., Sattar, A.: Burst header packet flood detection in optical burst switching network using deep learning model. In: 8th International Conference on Advances in Computing and Communication (ICACC-2018). Procedia Comput. Sci. 143, 970\u2013977. Elsevier (2018)","DOI":"10.1016\/j.procs.2018.10.337"},{"key":"9_CR19","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.osn.2018.03.001","volume":"29","author":"A Rajab","year":"2018","unstructured":"Rajab, A., Huang, C.T., Al-Shargabi, M.: Decision tree rule learning approach to counter burst header packet flooding attack in optical burst switching network. J. Opt. Switch. Netw. 29, 15\u201326 (2018)","journal-title":"J. Opt. Switch. Netw."},{"issue":"36","key":"9_CR20","first-page":"1","volume":"9","author":"H Kaur","year":"2016","unstructured":"Kaur, H., Singh, S.: Prevention of DDOS in optical burst switching using genetic algorithm. Indian J. Sci. Technol. 9(36), 1\u20138 (2016)","journal-title":"Indian J. Sci. Technol."},{"issue":"2","key":"9_CR21","first-page":"160","volume":"18","author":"R Alshboul","year":"2018","unstructured":"Alshboul, R.: Flood attacks control in optical burst networks by inducing rules using data mining. IJCSNS Int. J. Comput. Sci. Netw. Secur. 18(2), 160\u2013167 (2018)","journal-title":"IJCSNS Int. J. Comput. Sci. Netw. Secur."},{"issue":"6","key":"9_CR22","doi-asserted-by":"crossref","first-page":"855","DOI":"10.1142\/S0218194011005463","volume":"21","author":"F Thabtah","year":"2011","unstructured":"Thabtah, F., Hadi, W., Abdelhamid, N., Issa, A.: Prediction phase in associative classification. J. Knowl. Eng. Softw. Eng. 21(6), 855\u2013876 (2011)","journal-title":"J. Knowl. Eng. Softw. Eng."},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"McGregor, A., Hall, M., Lorier, P., Brunskill, J.: Flow clustering using machine learning techniques. In: Proceedings of the Fifth Passive and Active Measurement Workshop, pp. 205\u2013214. Springer, Heidelberg (2004)","DOI":"10.1007\/978-3-540-24668-8_21"},{"issue":"6","key":"9_CR24","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1109\/JSACOCN.2008.033508","volume":"26","author":"A Jayaraj","year":"2008","unstructured":"Jayaraj, A., Venkatesh, T., Murthy, C.: Loss classification in optical burst switching networks using machine learning techniques: improving the performance of TCP. IEEE J. Sel. Areas Commun. 26(6), 45\u201354 (2008)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"L\u00e9vesque, M., Elbiaze, H.: Graphical probabilistic routing model for OBS networks with realistic traffic scenario. In: IEEE Global Telecommunications Conference, GLOBECOM, pp. 1\u20136 (2009)","DOI":"10.1109\/GLOCOM.2009.5425570"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Rajab, A., Huang, C.T., Alshargabi, M., Cobb, J.: Countering burst header packet flooding attack in optical burst switching network. In: International Conference on Information Security Practice and Experience, 16 November 2016, pp. 315\u2013329. Springer International Publishing (2016)","DOI":"10.1007\/978-3-319-49151-6_22"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Yang, X.S.: Flower pollination algorithm for global optimization. In: Unconventional Computation and Natural Computation. Lecture Notes in Computer Science, vol. 7445, pp. 240\u2013249 (2012)","DOI":"10.1007\/978-3-642-32894-7_27"},{"key":"9_CR28","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1016\/j.eswa.2016.03.047","volume":"57","author":"E Nabil","year":"2016","unstructured":"Nabil, E.: A modified flower pollination algorithm for global optimization. Expert Syst. Appl. 57, 192\u2013203 (2016)","journal-title":"Expert Syst. Appl."},{"issue":"2","key":"9_CR29","first-page":"83","volume":"3","author":"IM Hezam","year":"2015","unstructured":"Hezam, I.M., Abdel-Baset, M.: An improved flower pollination algorithm for ratios optimization problems. Appl. Math. Inf. Sci. Lett. Int. J. 3(2), 83\u201391 (2015)","journal-title":"Appl. Math. Inf. Sci. Lett. Int. J."},{"key":"9_CR30","doi-asserted-by":"publisher","unstructured":"Nasim Adnan, Md., Zahidul Islam, Md.: Forest PA: constructing a decision forest by penalizing attributes used in previous trees. Expert Syst. Appl. (2017). https:\/\/doi.org\/10.1016\/j.eswa.2017.08.002","DOI":"10.1016\/j.eswa.2017.08.002"},{"issue":"1","key":"9_CR31","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1080\/22797254.2019.1565418","volume":"52","author":"A Samat","year":"2019","unstructured":"Samat, A., Liu, S., Persello, C., Li, E., Miao, Z., Abuduwaili, J.: Evaluation of ForestPA for VHR RS image classification using spectral and superpixel-guided morphological profiles. Eur. J. Remote Sens. 52(1), 107\u2013121 (2019). https:\/\/doi.org\/10.1080\/22797254.2019.1565418","journal-title":"Eur. J. Remote Sens."},{"key":"9_CR32","unstructured":"Uzel, V.N., E\u015fsiz, E.S.: Classification BHP flooding attack in OBS network with data mining techniques. In: International Conference on Cyber Security and Computer Science (ICONCS 2018), Safranbolu, Turkey, 18\u201320 October 2018, pp. 1\u20134 (2018)"}],"container-title":["Advances in Intelligent Systems and Computing","Innovations in Bio-Inspired Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-49339-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,5]],"date-time":"2022-11-05T20:28:42Z","timestamp":1667680122000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-49339-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,6]]},"ISBN":["9783030493387","9783030493394"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-49339-4_9","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,6]]},"assertion":[{"value":"6 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IBICA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovations in Bio-Inspired Computing and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gunupu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ibica2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/ibica19\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}