{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T13:26:26Z","timestamp":1725801986601},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,27]]},"DOI":"10.1145\/1456377.1456389","type":"proceedings-article","created":{"date-parts":[[2008,11,6]],"date-time":"2008-11-06T13:49:50Z","timestamp":1225979390000},"page":"43-50","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Adaptive distributed mechanism against flooding network attacks based on machine learning"],"prefix":"10.1145","author":[{"given":"Josep L.","family":"Berral","sequence":"first","affiliation":[{"name":"Technical University of Catalonia (UPC), Barcelona, Spain"}]},{"given":"Nicolas","family":"Poggi","sequence":"additional","affiliation":[{"name":"Technical University of Catalonia (UPC), Barcelona, Spain"}]},{"given":"Javier","family":"Alonso","sequence":"additional","affiliation":[{"name":"Barcelona Supercomputing Center (BSC) - Technical University of Catalonia (UPC), Barcelona, Spain"}]},{"given":"Ricard","family":"Gavald\u00e0","sequence":"additional","affiliation":[{"name":"Technical University of Catalonia (UPC), Barcelona, Spain"}]},{"given":"Jordi","family":"Torres","sequence":"additional","affiliation":[{"name":"Barcelona Supercomputing Center (BSC) - Technical University of Catalonia (UPC), Barcelona, Spain"}]},{"given":"Manish","family":"Parashar","sequence":"additional","affiliation":[{"name":"Rutgers University, New Jersey, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"2006","article-title":"Decentralized clustering analysis and online anomaly detection for peer grid systems. Technical Report","author":"Quiroz N. S. A.","year":"2006","unstructured":"N. S. A. Quiroz , M. Parashar . Decentralized clustering analysis and online anomaly detection for peer grid systems. Technical Report , CAIP Rutgers , 2006 , 2006 . N. S. A. Quiroz, M. Parashar. Decentralized clustering analysis and online anomaly detection for peer grid systems. Technical Report, CAIP Rutgers, 2006, 2006.","journal-title":"CAIP Rutgers"},{"key":"e_1_3_2_1_2_1","volume-title":"October","author":"Dittrich D.","year":"1999","unstructured":"D. Dittrich . The dos project's trinoo distributed denial of service attack tool , October 1999 . D. Dittrich. The dos project's trinoo distributed denial of service attack tool, October 1999."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251327.1251330"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the IEEE International Conference on Network Protocols10 2002","author":"Jelena P.","year":"2002","unstructured":"P. Jelena and M. Greg . Attacking ddos at the source . In Proceedings of the IEEE International Conference on Network Protocols10 2002 , 2002 . P. Jelena and M. Greg. Attacking ddos at the source. In Proceedings of the IEEE International Conference on Network Protocols10 2002, 2002."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/371920.372148"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of SPIE ITCom Conference on Scalability and Traffic Control in IP Networks II 2002","author":"Keromytis A.","year":"2002","unstructured":"A. Keromytis , V. Misra , and D. Rubenstein . Using overlays to improve network security . In Proceedings of SPIE ITCom Conference on Scalability and Traffic Control in IP Networks II 2002 , 2002 . A. Keromytis, V. Misra, and D. Rubenstein. Using overlays to improve network security. In Proceedings of SPIE ITCom Conference on Scalability and Traffic Control in IP Networks II 2002, 2002."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176349142"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45080-1_38"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 16th Paralelism Meeting 2005","author":"Nou R.","year":"2005","unstructured":"R. Nou , J. Guitart , V. Beltran , D. Carrera , L. Montero , J. Torres , and E. Ayguade . Simulating complex systems with a low-detail model . In Proceedings of the 16th Paralelism Meeting 2005 , Spain , 2005 . R. Nou, J. Guitart, V. Beltran, D. Carrera, L. Montero, J. Torres, and E. Ayguade. Simulating complex systems with a low-detail model. In Proceedings of the 16th Paralelism Meeting 2005, Spain, 2005."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73078-1_63"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0030-0"},{"key":"e_1_3_2_1_12_1","volume-title":"Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection","author":"Streilein W. W.","year":"2003","unstructured":"W. W. Streilein , D. J. Fried , and R. K. Cunningham . Detecting flood-based denial-of-service attacks with snmp\/rmon . In Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection , Fairfax, Virginia, USA , 2003 . W. W. Streilein, D. J. Fried, and R. K. Cunningham. Detecting flood-based denial-of-service attacks with snmp\/rmon. In Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection, Fairfax, Virginia, USA, 2003."},{"key":"e_1_3_2_1_13_1","first-page":"319","volume-title":"Proceedings of the European Simulation Multiconference","author":"Varga A.","year":"2001","unstructured":"A. Varga . The omnet++ discrete event simulation system . In Proceedings of the European Simulation Multiconference , pages 319 -- 324 , Prague, Czech Republic , June 2001 . SCS -European Publishing House. A. Varga. The omnet++ discrete event simulation system. In Proceedings of the European Simulation Multiconference, pages 319--324, Prague, Czech Republic, June 2001. SCS -European Publishing House."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of IEEE INFOCOM 2002","author":"Wang H.","year":"2002","unstructured":"H. Wang , D. Zhang , and K. Shin . Detecting SYN flooding attacks . In Proceedings of IEEE INFOCOM 2002 , 2002 . H. Wang, D. Zhang, and K. Shin. Detecting SYN flooding attacks. In Proceedings of IEEE INFOCOM 2002, 2002."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.304.6838.1359"},{"key":"e_1_3_2_1_16_1","volume-title":"Australian Computer Society Inc.","author":"Zhang G.","year":"2006","unstructured":"G. Zhang and M. Parashar . Cooperative defense against ddos attacks. Journal of Research and Practice in Information Technology (JRPIT) , Australian Computer Society Inc. , February 2006 G. Zhang and M. Parashar. Cooperative defense against ddos attacks. Journal of Research and Practice in Information Technology (JRPIT), Australian Computer Society Inc., February 2006"}],"event":{"name":"CCS08: 15th ACM Conference on Computer and Communications Security 2008","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS08"},"container-title":["Proceedings of the 1st ACM workshop on Workshop on AISec"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1456377.1456389","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T20:40:50Z","timestamp":1673296850000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456377.1456389"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10,27]]},"references-count":16,"alternative-id":["10.1145\/1456377.1456389","10.1145\/1456377"],"URL":"https:\/\/doi.org\/10.1145\/1456377.1456389","relation":{},"subject":[],"published":{"date-parts":[[2008,10,27]]},"assertion":[{"value":"2008-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}