{"id":"https://openalex.org/W2547278109","doi":"https://doi.org/10.1145/2980258.2980431","title":"Detection of DDoS DNS Amplification Attack Using Classification Algorithm","display_name":"Detection of DDoS DNS Amplification Attack Using Classification Algorithm","publication_year":2016,"publication_date":"2016-08-25","ids":{"openalex":"https://openalex.org/W2547278109","doi":"https://doi.org/10.1145/2980258.2980431","mag":"2547278109"},"language":"en","primary_location":{"id":"doi:10.1145/2980258.2980431","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2980258.2980431","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Informatics and Analytics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018050110","display_name":"Irom Lalit Meitei","orcid":null},"institutions":[{"id":"https://openalex.org/I265627732","display_name":"National Institute of Technology Manipur","ror":"https://ror.org/00aazk693","country_code":"IN","type":"education","lineage":["https://openalex.org/I265627732"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Irom Lalit Meitei","raw_affiliation_strings":["Department of CSE, NIT, Manipur"],"affiliations":[{"raw_affiliation_string":"Department of CSE, NIT, Manipur","institution_ids":["https://openalex.org/I265627732"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027816445","display_name":"Khundrakpam Johnson Singh","orcid":"https://orcid.org/0000-0001-9722-0592"},"institutions":[{"id":"https://openalex.org/I265627732","display_name":"National Institute of Technology Manipur","ror":"https://ror.org/00aazk693","country_code":"IN","type":"education","lineage":["https://openalex.org/I265627732"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Khundrakpam Johnson Singh","raw_affiliation_strings":["Department of CSE, NIT, Manipur"],"affiliations":[{"raw_affiliation_string":"Department of CSE, NIT, Manipur","institution_ids":["https://openalex.org/I265627732"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113629902","display_name":"Tanmay De","orcid":"https://orcid.org/0000-0003-1923-8361"},"institutions":[{"id":"https://openalex.org/I155837530","display_name":"National Institute of Technology Durgapur","ror":"https://ror.org/04ds0jm32","country_code":"IN","type":"education","lineage":["https://openalex.org/I155837530"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Tanmay De","raw_affiliation_strings":["Department of CSE, NIT, Durgapur"],"affiliations":[{"raw_affiliation_string":"Department of CSE, NIT, Durgapur","institution_ids":["https://openalex.org/I155837530"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5018050110"],"corresponding_institution_ids":["https://openalex.org/I265627732"],"apc_list":null,"apc_paid":null,"fwci":1.4477,"has_fulltext":false,"cited_by_count":31,"citation_normalized_percentile":{"value":0.84599653,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/domain-name-system","display_name":"Domain Name System","score":0.8041281700134277},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.79929119348526},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.793960452079773},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.6467338800430298},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.6010597348213196},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.493585467338562},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.4779624938964844},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.44064295291900635},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4391306936740875},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4241904616355896},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4187484383583069},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.41749250888824463},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.37950390577316284},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3638850450515747},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3419073224067688},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11494612693786621}],"concepts":[{"id":"https://openalex.org/C35026560","wikidata":"https://www.wikidata.org/wiki/Q8767","display_name":"Domain Name System","level":3,"score":0.8041281700134277},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.79929119348526},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.793960452079773},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6467338800430298},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.6010597348213196},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.493585467338562},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.4779624938964844},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.44064295291900635},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4391306936740875},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4241904616355896},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4187484383583069},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.41749250888824463},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.37950390577316284},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3638850450515747},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3419073224067688},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11494612693786621}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2980258.2980431","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2980258.2980431","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Informatics and Analytics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8100000023841858,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1152223117","https://openalex.org/W1848712724","https://openalex.org/W1945672328","https://openalex.org/W1982559074","https://openalex.org/W2022350629","https://openalex.org/W2050326248","https://openalex.org/W2069181578","https://openalex.org/W2096118443","https://openalex.org/W2109293916","https://openalex.org/W2148323889","https://openalex.org/W2155653793","https://openalex.org/W2167531746","https://openalex.org/W2168248885","https://openalex.org/W2210387432","https://openalex.org/W2298955082","https://openalex.org/W2545348723","https://openalex.org/W3150719513","https://openalex.org/W4235654656","https://openalex.org/W4239225082","https://openalex.org/W6631046466","https://openalex.org/W6674851815","https://openalex.org/W6750171640"],"related_works":["https://openalex.org/W2183899684","https://openalex.org/W4389954502","https://openalex.org/W2771255398","https://openalex.org/W2930428186","https://openalex.org/W3200027047","https://openalex.org/W4385770464","https://openalex.org/W3125536479","https://openalex.org/W3120363735","https://openalex.org/W4214820172","https://openalex.org/W2394323384"],"abstract_inverted_index":{"The":[0,23,61],"Domain":[1],"Name":[2],"System":[3],"(DNS)":[4],"is":[5,48,84],"a":[6,82],"critically":[7],"fundamental":[8],"element":[9],"in":[10,59],"the":[11,51,77,92,103,127,157,163],"internet":[12],"technology":[13],"as":[14,109,141,176],"it":[15,160],"translates":[16],"domain":[17],"names":[18],"into":[19,130],"corresponding":[20],"IP":[21],"addresses.":[22],"DNS":[24,34,42,45,62,97,128],"queries":[25],"and":[26,68,71,120,132,146,174],"responses":[27],"are":[28,37,149],"UDP":[29],"(User":[30],"Datagram":[31],"Protocol)":[32],"based.":[33],"name":[35],"servers":[36],"constantly":[38],"facing":[39],"threats":[40],"of":[41,50,55],"amplification":[43,46,63],"attacks.":[44],"attack":[47,64],"one":[49],"major":[52],"Distributed":[53],"Denial":[54],"Service":[56],"(DDoS)":[57],"attacks,":[58],"DNS.":[60],"victimized":[65],"huge":[66],"business":[67],"financial":[69],"companies":[70],"organizations":[72],"by":[73],"giving":[74],"disturbance":[75],"to":[76,86,125,151,178],"customers.":[78],"In":[79,134,156],"this":[80,135],"paper,":[81],"mechanism":[83],"proposed":[85],"detect":[87],"such":[88,108,140],"attacks":[89],"coming":[90],"from":[91],"compromised":[93],"machines.":[94],"We":[95],"analysed":[96],"traffic":[98],"packet":[99],"comparatively":[100],"based":[101],"on":[102],"Machine":[104,123,180],"Learning":[105,181],"Classification":[106],"algorithms":[107,139],"Decision":[110,164],"Tree":[111,165],"(TREE),":[112],"Multi":[113],"Layer":[114],"Perceptron":[115],"(MLP),":[116],"Na\u00efve":[117],"Bayes":[118],"(NB)":[119],"Support":[121],"Vector":[122],"(SVM)":[124],"classify":[126],"traffics":[129],"normal":[131],"abnormal.":[133],"approach":[136],"attribute":[137],"selection":[138],"Information":[142],"Gain,":[143],"Gain":[144],"Ratio":[145],"Chi":[147],"Square":[148],"used":[150],"achieve":[152],"optimal":[153],"feature":[154],"subset.":[155],"experimental":[158],"result":[159],"shows":[161],"that":[162],"achieved":[166],"99.3%":[167],"accuracy.":[168],"This":[169],"model":[170],"gives":[171],"highest":[172],"accuracy":[173],"performance":[175],"compared":[177],"other":[179],"algorithms.":[182]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
