{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:31:47Z","timestamp":1730208707292,"version":"3.28.0"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,1]]},"DOI":"10.1109\/cloudnet59005.2023.10490030","type":"proceedings-article","created":{"date-parts":[[2024,4,9]],"date-time":"2024-04-09T17:51:58Z","timestamp":1712685118000},"page":"27-35","source":"Crossref","is-referenced-by-count":0,"title":["Scale matters: a Comparative Study of Datasets for DDoS Attack Detection in CSP Infrastructure"],"prefix":"10.1109","author":[{"given":"Cl\u00e9ment","family":"Boin","sequence":"first","affiliation":[{"name":"OVHcloud,Roubaix,France"}]},{"given":"Tristan","family":"Grol\u00e9at","sequence":"additional","affiliation":[{"name":"OVHcloud,Brest,France"}]},{"given":"Xavier","family":"Guillaume","sequence":"additional","affiliation":[{"name":"OVHcloud,Roubaix,France"}]},{"given":"Gilles","family":"Grimaud","sequence":"additional","affiliation":[{"name":"Univ. Lille,CNRS, Centrale Lille, UMR 9189 CRIStAL,Lille,France,F-59000"}]},{"given":"Micha\u00ebl","family":"Hauspie","sequence":"additional","affiliation":[{"name":"Univ. Lille,CNRS, Centrale Lille, UMR 9189 CRIStAL,Lille,France,F-59000"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.03.010"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2019.2919886"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIS.2018.00026"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10665-1_63"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1126\/science.1250475"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.05.170"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.005"},{"article-title":"Network intrusion detection: Half a kingdom for a good dataset","volume-title":"Proceedings of NATO STO SAS-139 Workshop, Portugal","author":"Ma\u0142owidzki","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-016-2317-5"},{"article-title":"Azure ddos protection\u20142021 q3 and q4 ddos attack trends","year":"2022","author":"Toh","key":"ref10"},{"article-title":"How microsoft builds its fast and reliable global network","year":"2017","author":"Khalidi","key":"ref11"},{"key":"ref12","first-page":"67","article-title":"Cloud-based ddos attacks and defenses","volume-title":"International Conference on Information Society (i-Society 2013)","author":"Darwish"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1117\/12.777341"},{"issue":"6","key":"ref14","first-page":"446","article-title":"A study on nsl-kdd dataset for intrusion detection system based on classification algorithms","volume":"4","author":"Dhanabal","year":"2015","journal-title":"International journal of advanced research in computer and communication engineering"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICISSEC.2016.7885840"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3424155"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9050800"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.11.004"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3229345.3229394"},{"key":"ref21","article-title":"1999 DARPA Intrusion Detection Evaluation Dataset | MIT Lincoln Laboratory \u2014 ll.mit.edu"},{"volume-title":"The CAIDA \u201dDDoS Attack 2007\" Dataset \u2014 caida.org","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.15837\/ijccc.2015.3.1924"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.03.018"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2000.821506"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"article-title":"A new attack composition for network security","volume-title":"10. DFN-Forum Kommunikationstechnologien","author":"Beer","key":"ref28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1978672.1978676"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/BIBE.2014.72"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/AHICI.2011.6113948"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/Eco-friendly.2014.100"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32129-0_34"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2016.070159"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2019.8888419"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2015.7275756"},{"key":"ref40","article-title":"Cisco systems netflow services export version 9","author":"Claise","year":"2004","journal-title":"Tech. Rep."},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3176"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2006.302407"},{"key":"ref43","doi-asserted-by":"crossref","DOI":"10.1109\/CTISC54888.2022.9849755","article-title":"One Year of DDoS Attacks Against a Cloud Provider: an Overview","volume-title":"4th International Conference on Advances in Computer Technology, Information Science and Communications","author":"Boin"}],"event":{"name":"2023 IEEE 12th International Conference on Cloud Networking (CloudNet)","start":{"date-parts":[[2023,11,1]]},"location":"Hoboken, NJ, USA","end":{"date-parts":[[2023,11,3]]}},"container-title":["2023 IEEE 12th International Conference on Cloud Networking (CloudNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10490006\/10490015\/10490030.pdf?arnumber=10490030","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,10]],"date-time":"2024-04-10T05:46:04Z","timestamp":1712727964000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10490030\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,1]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/cloudnet59005.2023.10490030","relation":{},"subject":[],"published":{"date-parts":[[2023,11,1]]}}}