{"id":"https://openalex.org/W3049549227","doi":"https://doi.org/10.1007/978-3-030-51992-6_17","title":"DDoS Attack Prevention Protocol Through Support Vector Machine and Fuzzy Clustering Mechanism on Traffic Flow with Harmonic Homogeneity Validation Technique","display_name":"DDoS Attack Prevention Protocol Through Support Vector Machine and Fuzzy Clustering Mechanism on Traffic Flow with Harmonic Homogeneity Validation Technique","publication_year":2020,"publication_date":"2020-08-14","ids":{"openalex":"https://openalex.org/W3049549227","doi":"https://doi.org/10.1007/978-3-030-51992-6_17","mag":"3049549227"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-51992-6_17","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-51992-6_17","pdf_url":null,"source":{"id":"https://openalex.org/S2764905038","display_name":"Advances in intelligent systems and computing","issn_l":"2194-5357","issn":["2194-5357","2194-5365"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Advances in Intelligent Systems and Computing","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019548275","display_name":"Kirti Joon","orcid":null},"institutions":[{"id":"https://openalex.org/I102117144","display_name":"Banasthali University","ror":"https://ror.org/05ycegt40","country_code":"IN","type":"education","lineage":["https://openalex.org/I102117144"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Kirti Joon","raw_affiliation_strings":["Department of Computer Science and Engineering, Banasthali Vidyapith, Vanasthali, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Banasthali Vidyapith, Vanasthali, India","institution_ids":["https://openalex.org/I102117144"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033756344","display_name":"Namrata Agrawal","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Namrata Agrawal","raw_affiliation_strings":["Computer Science and Engineering, NIFM, Faridabad, India"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, NIFM, Faridabad, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058285799","display_name":"Hifzan Ahmad","orcid":"https://orcid.org/0000-0002-5105-4813"},"institutions":[{"id":"https://openalex.org/I4210093800","display_name":"Voluntary Health Association Of India","ror":"https://ror.org/00nezvm77","country_code":"IN","type":"nonprofit","lineage":["https://openalex.org/I4210093800"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Hifzan Ahmad","raw_affiliation_strings":["K.N.I.T., Sultanpur, India"],"affiliations":[{"raw_affiliation_string":"K.N.I.T., Sultanpur, India","institution_ids":["https://openalex.org/I4210093800"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064089724","display_name":"Vikash Yadav","orcid":"https://orcid.org/0000-0003-1348-1379"},"institutions":[{"id":"https://openalex.org/I166533956","display_name":"Institute of Management Technology","ror":"https://ror.org/05k0kb696","country_code":"IN","type":"education","lineage":["https://openalex.org/I166533956"]},{"id":"https://openalex.org/I4387154809","display_name":"ABES Engineering College","ror":"https://ror.org/04hp0cf98","country_code":null,"type":"education","lineage":["https://openalex.org/I4387154809"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Vikash Yadav","raw_affiliation_strings":["ABES Engineering College, Ghaziabad, India"],"affiliations":[{"raw_affiliation_string":"ABES Engineering College, Ghaziabad, India","institution_ids":["https://openalex.org/I166533956","https://openalex.org/I4387154809"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Dinesh Kumar Sah","orcid":null},"institutions":[{"id":"https://openalex.org/I189109744","display_name":"Indian Institute of Technology Dhanbad","ror":"https://ror.org/013v3cc28","country_code":"IN","type":"education","lineage":["https://openalex.org/I189109744"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Dinesh Kumar Sah","raw_affiliation_strings":["Indian Institute of Technology (Indian School of Mines), Dhanbad, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology (Indian School of Mines), Dhanbad, India","institution_ids":["https://openalex.org/I189109744"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005083082","display_name":"Cornel Barna","orcid":"https://orcid.org/0009-0005-3392-5442"},"institutions":[{"id":"https://openalex.org/I64956957","display_name":"Aurel Vlaicu University of Arad","ror":"https://ror.org/05w5rsy15","country_code":"RO","type":"education","lineage":["https://openalex.org/I64956957"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Cornel Barna","raw_affiliation_strings":["Aurel Vlaicu University of Arad, Arad, Romania"],"affiliations":[{"raw_affiliation_string":"Aurel Vlaicu University of Arad, Arad, Romania","institution_ids":["https://openalex.org/I64956957"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5064089724"],"corresponding_institution_ids":["https://openalex.org/I166533956","https://openalex.org/I4387154809"],"apc_list":null,"apc_paid":null,"fwci":1.1463,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.78348604,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"197","last_page":"214"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9860000014305115,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8032488822937012},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7877952456474304},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5604441165924072},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.49262577295303345},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4921261668205261},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.4778834879398346},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.45938944816589355},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4477986693382263},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.42720022797584534},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.41287803649902344},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3617590069770813},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.20350295305252075},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09748890995979309}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8032488822937012},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7877952456474304},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5604441165924072},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.49262577295303345},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4921261668205261},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.4778834879398346},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.45938944816589355},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4477986693382263},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.42720022797584534},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.41287803649902344},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3617590069770813},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.20350295305252075},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09748890995979309}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-030-51992-6_17","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-51992-6_17","pdf_url":null,"source":{"id":"https://openalex.org/S2764905038","display_name":"Advances in intelligent systems and computing","issn_l":"2194-5357","issn":["2194-5357","2194-5365"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Advances in Intelligent Systems and Computing","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6200000047683716,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W176406781","https://openalex.org/W1507464753","https://openalex.org/W1548923938","https://openalex.org/W1573828605","https://openalex.org/W1605539377","https://openalex.org/W1645641307","https://openalex.org/W1992356551","https://openalex.org/W1994807229","https://openalex.org/W2000209534","https://openalex.org/W2018901966","https://openalex.org/W2037515642","https://openalex.org/W2041658608","https://openalex.org/W2070586534","https://openalex.org/W2119821739","https://openalex.org/W2120077409","https://openalex.org/W2129204133","https://openalex.org/W2131087864","https://openalex.org/W2146648348","https://openalex.org/W2469292055","https://openalex.org/W2743775608","https://openalex.org/W2782102157","https://openalex.org/W2810098607","https://openalex.org/W2810518439","https://openalex.org/W2909465592"],"related_works":["https://openalex.org/W4230824443","https://openalex.org/W2038807247","https://openalex.org/W2360429410","https://openalex.org/W2559738661","https://openalex.org/W2204131204","https://openalex.org/W2383770723","https://openalex.org/W2898696280","https://openalex.org/W2958385475","https://openalex.org/W2921433547","https://openalex.org/W2097156747"],"abstract_inverted_index":null,"counts_by_year":[{"year":2022,"cited_by_count":2}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
