{"entities":{"Q2249310":{"pageid":2260053,"ns":120,"title":"Item:Q2249310","lastrevid":57379668,"modified":"2026-03-30T17:55:48Z","type":"item","id":"Q2249310","labels":{"en":{"language":"en","value":"Real-time detection of application-layer DDoS attack using time series analysis"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 6312040"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2249310$B78CC267-F311-486B-9460-41F48D83430C","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"a4a812db97ea135b34db95fa0bbadef950e9cc06","datavalue":{"value":{"text":"Real-time detection of application-layer DDoS attack using time series analysis","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q2249310$EC4045B0-BBA7-4749-995C-10EC181E43F1","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"c09d542327835b4a92eb455d1591ddcb4e72e6b3","datavalue":{"value":"1291.93205","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2249310$B973AB2A-795C-4693-9FE8-9A8527719A71","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"65edde5aafb2ef9870a543d3143b2f21810af82e","datavalue":{"value":"10.1155/2013/821315","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2249310$371D2DE2-45E1-4820-B2B6-252ADE234DDA","rank":"normal"}],"P16":[{"mainsnak":{"snaktype":"value","property":"P16","hash":"d178db9b599ec4e369fb2ad02b53b3c00f49ff05","datavalue":{"value":{"entity-type":"item","numeric-id":526694,"id":"Q526694"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2249310$67650514-5983-443A-BA17-57E2F81285B8","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P16","hash":"9abbdf33ff07a2299af56e3ab671691af39086fd","datavalue":{"value":{"entity-type":"item","numeric-id":2249309,"id":"Q2249309"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2249310$E1BBE89D-9B32-4BC4-81EF-02FEE6520C06","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P16","hash":"8881f955eec142db42fa5f8a6b2bd793f336a6ea","datavalue":{"value":{"entity-type":"item","numeric-id":839065,"id":"Q839065"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2249310$5D4E4E6D-E326-4E21-8D35-8F89A9FE5B10","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P16","hash":"a293cebf41e6c98611082b2b9d46605cc90d6e36","datavalue":{"value":{"entity-type":"item","numeric-id":821158,"id":"Q821158"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2249310$4BE2C2A5-00AB-4166-A1EA-35D071897C76","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"a03aeadf0815a5a2a7f7c33a59472e3aac592cd9","datavalue":{"value":{"entity-type":"item","numeric-id":249794,"id":"Q249794"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2249310$C68070F7-CA11-459D-BD44-40CE1DB8C211","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"1e60bf630f2383f14de32b8ca35633600a7b19ea","datavalue":{"value":{"time":"+2014-07-01T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q2249310$84BFB352-82B8-4B73-848A-0F95AEF29C6A","rank":"normal"}],"P1448":[{"mainsnak":{"snaktype":"value","property":"P1448","hash":"b8ccec74b00ff8b0bea8e01ca53421a248636c07","datavalue":{"value":"Summary: Distributed Denial of Service (DDoS) attacks are one of the major threats to the current Internet, and application-layer DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. Consequently, neither Intrusion Detection Systems (IDS) nor victim server can detect malicious packets. In this paper, a novel approach to detect application-layer DDoS attack is proposed based on entropy of HTTP GET requests per source IP address (HRPI). By approximating the Adaptive AutoRegressive (AAR) model, the HRPI time series is transformed into a multidimensional vector series. Then, a trained Support Vector Machine (SVM) classifier is applied to identify the attacks. The experiments with several databases are performed and results show that this approach can detect application-layer DDoS attacks effectively.","type":"string"},"datatype":"string"},"type":"statement","id":"Q2249310$CF6D2AEE-ADB7-450B-ADFC-290E17831151","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"4621ee6da9f1d0767cb7f99b0b9ecc8ac86abaee","datavalue":{"value":"93C83","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2249310$050D6AC3-8ADD-4702-A75B-E2A638A3CFC2","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"bb3685facee6981d0664afe5afbdc986c78292cb","datavalue":{"value":"68M11","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2249310$34A92868-9012-492C-A65A-5E4736FC307D","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"b1a9a20c16e14977aabce86aca077afc2aca3644","datavalue":{"value":"93E03","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2249310$77DF4D19-0B19-45D8-948E-DD8486F1BD81","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"48a59f52dcfcc38cd6697e0ef07319031311895b","datavalue":{"value":"62H30","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2249310$19C8900B-78B5-407B-AC41-CBAF98AA83C6","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"2bdb8dff331e6b7cf3ae18a714d088d631627428","datavalue":{"value":"6312040","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2249310$23D3EA5B-8777-4FFF-8E12-1D7CC10C4E5A","rank":"normal"}],"P1450":[{"mainsnak":{"snaktype":"value","property":"P1450","hash":"7a8cccf1bff6542ab8a4693d396ad5e27076b7b4","datavalue":{"value":"distributed denial of service (DDoS) attacks","type":"string"},"datatype":"string"},"type":"statement","id":"Q2249310$EAD0A53E-5798-4A9F-A126-820AA9D1F049","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"190018c172f95b47cdf15a9304e663745eeac5b0","datavalue":{"value":"intrusion detection systems (IDS)","type":"string"},"datatype":"string"},"type":"statement","id":"Q2249310$0787A7AD-4DEA-4582-B68F-C4DA96275878","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"91dbd3eb55821b53765e0a31d8de16ea3a7c9f00","datavalue":{"value":"victim server","type":"string"},"datatype":"string"},"type":"statement","id":"Q2249310$FB82EB14-4E6C-4A7F-B156-910F84CD7BF3","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"2f3965f85124e1beefd7f296ce600992b6474d28","datavalue":{"value":"entropy approach","type":"string"},"datatype":"string"},"type":"statement","id":"Q2249310$2488AFC9-1AAB-4A9E-AAC5-D67C4E93B5E2","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"2f60d1b620a87f5c6cb2e03f7bb1b55112b756e3","datavalue":{"value":"multidimensional vector series","type":"string"},"datatype":"string"},"type":"statement","id":"Q2249310$8C42A75F-AC61-4E01-8B5C-6E9EE4FF45A9","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"3e0c66f22f22c194a379a353f10051d96a2917d5","datavalue":{"value":"support vector machine (SVM) classifier","type":"string"},"datatype":"string"},"type":"statement","id":"Q2249310$803CF002-8C97-4D52-8B68-FF4C5A5B1966","rank":"normal"}],"P12":[{"mainsnak":{"snaktype":"value","property":"P12","hash":"1deb84f00b7e4001c17c3020de114280c7cbe1ff","datavalue":{"value":"Q59012475","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2249310$D8275EC6-0FCA-447A-831B-5C086F4FE3EA","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2249310$A99923E2-CE0B-43BF-A441-2E47CDB5448F","rank":"normal"}],"P205":[{"mainsnak":{"snaktype":"value","property":"P205","hash":"2c936a5af26489f201cc9aa9264ca1210ced0a99","datavalue":{"value":"https://doi.org/10.1155/2013/821315","type":"string"},"datatype":"url"},"type":"statement","id":"Q2249310$30B7C480-2566-4203-B3BB-FF08958435B8","rank":"normal"}],"P388":[{"mainsnak":{"snaktype":"value","property":"P388","hash":"0f2642c379ff90c9ec5ec15160fb04d2b19c6605","datavalue":{"value":"W1964921349","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2249310$E4D93F86-AA41-442C-BFBB-5DBD7526822B","rank":"normal"}],"P1643":[{"mainsnak":{"snaktype":"value","property":"P1643","hash":"7e2874bab4980452c02c2745582a483d73568195","datavalue":{"value":{"entity-type":"item","numeric-id":445392,"id":"Q445392"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"74a62bc8c41219f95a2e2d7e87d5883b049d24d2","datavalue":{"value":{"amount":"+0.8592217","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"ac3c626774dcd0d16f89557f66586245841a01db","datavalue":{"value":{"entity-type":"item","numeric-id":6767936,"id":"Q6767936"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q2249310$7CC4F3BA-E884-46EC-8A9C-D623E806BDFF","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"626a44840da6815b05d08907d2201b02fdcde773","datavalue":{"value":{"entity-type":"item","numeric-id":967021,"id":"Q967021"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"57023da52b44256f302b37cad0ba5d266a90ce4c","datavalue":{"value":{"amount":"+0.8526936","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"ac3c626774dcd0d16f89557f66586245841a01db","datavalue":{"value":{"entity-type":"item","numeric-id":6767936,"id":"Q6767936"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q2249310$09B518B0-D3ED-4587-B17A-28AE33165E80","rank":"normal"}],"P163":[{"mainsnak":{"snaktype":"value","property":"P163","hash":"daf5f856a5d861312ad309ab567540337a5f61d6","datavalue":{"value":{"entity-type":"item","numeric-id":57050,"id":"Q57050"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2249310$78F03819-2A89-443E-880A-68D4C0F8D143","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Publication:2249310","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Publication:2249310"}}}}}