<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462024000301597</article-id>
<article-id pub-id-type="doi">10.13053/cys-28-3-5169</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[DDoS Attacks in Traffic Flow Streams Using Ensemble Classifiers]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Eswari]]></surname>
<given-names><![CDATA[Dutta Sai]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Lakshmi]]></surname>
<given-names><![CDATA[Panga V.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,GITAM University Department of CSE ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>India</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>09</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>09</month>
<year>2024</year>
</pub-date>
<volume>28</volume>
<numero>3</numero>
<fpage>1597</fpage>
<lpage>1612</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462024000301597&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462024000301597&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462024000301597&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: The failure of internet networking systems, which can happen in various methods, may negatively impact contemporary information and communication technologies. In these circumstances, DDoS attacks have targeted a growing number of organizations. These attacks use a deluge of demands for computation and communication resources to order a service unavailable to genuine users. Distributed denial-of-service (DDoS) attacks must be prevented on vital resources. This manuscript's most important new development is the DDoS attack defence ensemble classifier model. The suggested model uses these specifications to enable a drift detection feature and includes defining streaming properties for service requests. Additionally, an ensemble classifier is used to detect changes in the pattern of service request traffic. Statistical metrics like true negative rate, positive predictive value, and accuracy were used to test and analyze the service request stream synthesis results. Comparing the model to other benchmark models discussed in recent academic works would have been another tactic that could have been used to increase the model's importance.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Distributed denial of service (DDoS) attacks]]></kwd>
<kwd lng="en"><![CDATA[ensemble classifier]]></kwd>
<kwd lng="en"><![CDATA[drift detection]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Patil]]></surname>
<given-names><![CDATA[N. V.]]></given-names>
</name>
<name>
<surname><![CDATA[Krishna]]></surname>
<given-names><![CDATA[C. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[K. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[SSK-DDoS: distributed stream processing framework based classification system for DDoS attacks]]></article-title>
<source><![CDATA[Cluster Computing]]></source>
<year>2022</year>
<volume>25</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>1355-72</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jain]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Kaur]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Distributed anomaly detection using concept drift detection based hybrid ensemble techniques in streamed network data]]></article-title>
<source><![CDATA[Cluster Computing]]></source>
<year>2021</year>
<volume>24</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>2099-114</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Granato]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Martino]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Baldini]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Rizzi]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Intrusion detection in wi-fi networks by modular and optimized ensemble of classifiers: an extended analysis]]></article-title>
<source><![CDATA[SN Computer Science]]></source>
<year>2022</year>
<volume>3</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>310</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Munivara-Prasad]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Rama-Mohan-Reddy]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Venugopal-Rao]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[BIFAD: Bio-inspired anomaly based HTTP-flood attack detection]]></article-title>
<source><![CDATA[Wireless Personal Communications]]></source>
<year>2017</year>
<volume>97</volume>
<page-range>281-308</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[VivinSandar]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Shenai]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Economic denial of sustainability (EDoS) in cloud services using HTTP and XML based DDoS attacks]]></article-title>
<source><![CDATA[International Journal of Computer Applications]]></source>
<year>2012</year>
<volume>41</volume>
<numero>20</numero>
<issue>20</issue>
<page-range>11-6</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Loukas]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Öke]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Protection against denial of service attacks: A survey]]></article-title>
<source><![CDATA[The Computer Journal]]></source>
<year>2010</year>
<volume>53</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>1020-37</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Linda]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Vollmer]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Manic]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Neural network based intrusion detection system for critical infrastructures]]></source>
<year>2009</year>
<conf-name><![CDATA[ international joint conference on neural networks]]></conf-name>
<conf-date>2009</conf-date>
<conf-loc> </conf-loc>
<page-range>1827-34</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Apale]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kamble]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Ghodekar]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Nemade]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Waghmode]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Defense mechanism for DDoS attack through machine learning]]></article-title>
<source><![CDATA[International Journal of Research in Engineering and Technology]]></source>
<year>2014</year>
<volume>3</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>291-4</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vijayasarathy]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Raghavan]]></surname>
<given-names><![CDATA[S. V.]]></given-names>
</name>
<name>
<surname><![CDATA[Ravindran]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[A system approach to network modeling for DDoS detection using a Naive Bayesian classifier]]></source>
<year>2011</year>
<conf-name><![CDATA[ Third International Conference on Communication Systems and Networks]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-10</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lu]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Fan]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Todorovic]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Nucci]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Robust and efficient detection of DDoS attacks for large-scale internet]]></article-title>
<source><![CDATA[Computer Networks]]></source>
<year>2007</year>
<volume>51</volume>
<numero>18</numero>
<issue>18</issue>
<page-range>5036-56</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pan]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<source><![CDATA[A hybrid neural network approach to the classification of novel attacks for intrusion detection]]></source>
<year>2005</year>
<conf-name><![CDATA[ International Symposium on Parallel and Distributed Processing and Applications]]></conf-name>
<conf-loc> </conf-loc>
<page-range>564-75</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pacheco]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Benitez]]></surname>
<given-names><![CDATA[V. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Felix-Herran]]></surname>
<given-names><![CDATA[L. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Satam]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Artificial neural networks-based intrusion detection system for internet of things fog nodes]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2020</year>
<volume>8</volume>
<page-range>73907-18</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Haddadi]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Khanchi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Shetabi]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Derhami]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<source><![CDATA[Intrusion detection and attack classification using feed-forward neural network]]></source>
<year>2010</year>
<conf-name><![CDATA[ Second International Conference on Computer and Network Technology]]></conf-name>
<conf-date>2010</conf-date>
<conf-loc>Washington DC </conf-loc>
<page-range>262-6</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mendonça]]></surname>
<given-names><![CDATA[R. V.]]></given-names>
</name>
<name>
<surname><![CDATA[Teodoro]]></surname>
<given-names><![CDATA[A. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Rosa]]></surname>
<given-names><![CDATA[R. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Saadi]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Melgarejo]]></surname>
<given-names><![CDATA[D. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Nardelli]]></surname>
<given-names><![CDATA[P. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[D. Z.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Intrusion detection system based on fast hierarchical deep convolutional neural network]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2021</year>
<volume>9</volume>
<page-range>61024-34</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lopez-Martin]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Sanchez-Esguevillas]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Arribas]]></surname>
<given-names><![CDATA[J. I.]]></given-names>
</name>
<name>
<surname><![CDATA[Carro]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Network intrusion detection based on extended RBF neural network with offline reinforcement learning]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2021</year>
<volume>9</volume>
<page-range>153153-70</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Albahar]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Binsawad]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Almalki]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[El-etriby]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Karali]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Improving intrusion detection system using artificial neural network]]></article-title>
<source><![CDATA[International Journal of Advanced Computer Science and Applications]]></source>
<year>2020</year>
<volume>11</volume>
<numero>6</numero>
<issue>6</issue>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gupta]]></surname>
<given-names><![CDATA[B. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Badve]]></surname>
<given-names><![CDATA[O. P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment]]></article-title>
<source><![CDATA[Neural Computing and Applications]]></source>
<year>2017</year>
<volume>28</volume>
<numero>12</numero>
<issue>12</issue>
<page-range>3655-82</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Mao]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Insight of the protection for data security under selective opening attacks]]></article-title>
<source><![CDATA[Information Sciences]]></source>
<year>2017</year>
<volume>412</volume>
<page-range>223-41</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gangadharan]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Kumari]]></surname>
<given-names><![CDATA[G. R. N.]]></given-names>
</name>
<name>
<surname><![CDATA[Dhanasekaran]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Malathi]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Detection and classification of various pest attacks and infection on plants using RBPN with GA based PSO algorithm]]></article-title>
<source><![CDATA[Indonesian Journal of Electrical Engineering and Computer Science (IJEECS)]]></source>
<year>2020</year>
<volume>20</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>1278-88</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Ma]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Lou]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Wong]]></surname>
<given-names><![CDATA[D. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[New algorithms for secure outsourcing of large-scale systems of linear equations]]></article-title>
<source><![CDATA[IEEE Transactions on Information Forensics and Security]]></source>
<year>2015</year>
<volume>10</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>38</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Barford]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Plonka]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Characteristics of network traffic flow anomalies]]></source>
<year>2001</year>
<conf-name><![CDATA[ 1st ACM SIGCOMM Workshop on Internet Measurement]]></conf-name>
<conf-loc> </conf-loc>
<page-range>69-73</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kalliola]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Aura]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Flooding DDoS mitigation and traffic management with software defined networking]]></source>
<year>2015</year>
<conf-name><![CDATA[ IEEE 4th International Conference on Cloud Networking]]></conf-name>
<conf-date>2015</conf-date>
<conf-loc> </conf-loc>
<page-range>248-54</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Seufert]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[O&#8217;Brien]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Machine learning for automatic defence against distributed denial of service attacks]]></source>
<year>2007</year>
<conf-name><![CDATA[ International Conference on Communications]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1217-22</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Berral]]></surname>
<given-names><![CDATA[J. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Poggi]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Alonso]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Gavalda]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Torres]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Parashar]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Adaptive distributed mechanism against flooding network attacks based on machine learning]]></source>
<year>2008</year>
<conf-name><![CDATA[ 1st ACM workshop on Workshop on AISec]]></conf-name>
<conf-loc> </conf-loc>
<page-range>43-50</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[G. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhou]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Ding]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Extreme learning machine for regression and multiclass classification]]></article-title>
<source><![CDATA[IEEE Transactions on Systems, Man, and Cybernetics]]></source>
<year>2012</year>
<volume>42</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>513-29</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Srimuang]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Intarasothonchun]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Classification model of network intrusion using weighted extreme learning machine]]></source>
<year>2015</year>
<conf-name><![CDATA[ 12th International Joint Conference on Computer Science and Software Engineering]]></conf-name>
<conf-date>2015</conf-date>
<conf-loc> </conf-loc>
<page-range>190-4</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fossaceca]]></surname>
<given-names><![CDATA[J. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Mazzuchi]]></surname>
<given-names><![CDATA[T. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Sarkani]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[MARK-ELM: application of a novel multiple Kernel learning framework for improving the robustness of network intrusion detection]]></article-title>
<source><![CDATA[Expert Systems with Applications]]></source>
<year>2015</year>
<volume>42</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>4062-80</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Raj-Kumar]]></surname>
<given-names><![CDATA[P. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Selvakumar]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neurofuzzy systems]]></article-title>
<source><![CDATA[Computer Communications]]></source>
<year>2013</year>
<volume>36</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>303-19</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Revathi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Malathi]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection]]></article-title>
<source><![CDATA[International Journal of Engineering Research and Technology]]></source>
<year>2013</year>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nazario]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[DDoS attack evolution]]></article-title>
<source><![CDATA[Network Security]]></source>
<year>2008</year>
<volume>2008</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>7-10</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shin]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Gu]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Reddy]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[C. P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A large-scale empirical study of conficker]]></article-title>
<source><![CDATA[IEEE Transactions on Information Forensics and Security]]></source>
<year>2011</year>
<volume>7</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>676-90</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sommer]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Paxson]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<source><![CDATA[Outside the closed world: On using machine learning for network intrusion detection]]></source>
<year>2010</year>
<conf-name><![CDATA[ Security and Privacy (SP), 2010 IEEE Symposium on]]></conf-name>
<conf-loc> </conf-loc>
<page-range>305-16</page-range></nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Behal]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Characterization and comparison of DDoS attack tools and traffic generators: A review]]></article-title>
<source><![CDATA[International Journal of Network Security]]></source>
<year>2017</year>
<volume>19</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>383-93</page-range></nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Badve]]></surname>
<given-names><![CDATA[O. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Gupta]]></surname>
<given-names><![CDATA[B. B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Taxonomy of recent DDoS attack prevention, detection, and response schemes in cloud environment]]></source>
<year>2016</year>
<conf-name><![CDATA[ International Conference on Recent Cognizance in Wireless Communication &amp; Image Processing: ICRCWIP-2014]]></conf-name>
<conf-loc>India </conf-loc>
<page-range>683-93</page-range></nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Saikam]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Ch]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An ensemble approach-based intrusion detection system utilizing ISHO-HBA and SE-ResNet152]]></article-title>
<source><![CDATA[International Journal of Information Security]]></source>
<year>2024</year>
<volume>23</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>1037-54</page-range></nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[González]]></surname>
<given-names><![CDATA[F. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Aguirre-Anaya]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Salinas-Rosales]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Miyaji]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Identification of static and dynamic security controls using machine learning]]></article-title>
<source><![CDATA[Computación y Sistemas]]></source>
<year>2023</year>
<volume>27</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>581-92</page-range></nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chaparro-Amaro]]></surname>
<given-names><![CDATA[O. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Martínez-Felipe]]></surname>
<given-names><![CDATA[M. D. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Martínez-Castro]]></surname>
<given-names><![CDATA[J. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Performance of the classification of critical residues at the interface of BMPs complexes pondered with the ground-state energy feature using random forest classifier]]></article-title>
<source><![CDATA[Computación y Sistemas]]></source>
<year>2023</year>
<volume>27</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>257-67</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
