Jabbar, M. A., Aluvalu, R., and Reddy, S. S. S. (2017).
Cluster based ensemble classification for intrusion de-
tection system. New York, NY, USA. Association for
Computing Machinery.
Jakobsson, M. and Juels, A. (1999). Proofs of work and
bread pudding protocols (extended abstract).
Juels, A. and Brainard, J. (1999). Client puzzles: A cryp-
tographic countermeasure against connection deple-
tion attacks. In Proceedings of the Network and Dis-
tributed System Security Symposium (NDSS), pages
151–165.
Kaiser, E. and Feng, W.-c. (2008). mod kapow: Protect-
ing the web with transparent proof-of-work. In IEEE
INFOCOM Workshops 2008, pages 1–6. IEEE.
Laurie, B. and Clayton, R. (2004). Proof-of-work” proves
not to work.
Le, T., Dua, A., and Feng, W.-c. (2012). kapow plu-
gins: protecting web applications using reputation-
based proof-of-work. In 2nd Joint WICOW/AIRWeb
Workshop on Web Quality, pages 60–63.
Lynch, V. (2017). Everything you ever
wanted to know about dos/ddos attacks.
https://www.thesslstore.com/blog/everything-you-
ever-wanted-to-know-about-dosddos-attacks/.
Mankins, D., Krishnan, R., Boyd, C., Zao, J., and Frentz,
M. (2001). Mitigating distributed denial of service at-
tacks with dynamic resource pricing. In Proceedings
of the Seventeenth Annual Computer Security Appli-
cations Conference, pages 411–421. IEEE.
Mienye, I. D. and Sun, Y. (2022). A survey of ensem-
ble learning: Concepts, algorithms, applications, and
prospects. IEEE Access, 10:99129–99149.
Ndibwile, J. D., Govardhan, A., Okada, K., and
Kadobayashi, Y. (2015a). Web server protection
against application layer DDoS attacks using machine
learning and traffic authentication. In Proceedings of
the 39th IEEE Annual Computer Software and Appli-
cations Conference, pages 261–267.
Ndibwile, J. D., Govardhan, A., Okada, K., and
Kadobayashi, Y. (2015b). Web server protection
against application layer ddos attacks using machine
learning and traffic authentication. In 2015 IEEE 39th
Annual Computer Software and Applications Confer-
ence, volume 3, pages 261–267.
Noureddine, M. A., Fawaz, A. M., Hsu, A., Guldner,
C., Vijay, S., Bas¸ar, T., and Sanders, W. H. (2019).
Revisiting client puzzles for state exhaustion at-
tacks resilience. In Proceedings of the 49th Annual
IEEE/IFIP International Conference on Dependable
Systems and Networks (DSN), pages 617–629.
of New Brunswick, U. (2017). Intrusion detection evalu-
ation dataset (cic-ids2017). Online Website. https:
//www.unb.ca/cic/datasets/ids-2017.html.
Orlowski, A. (2016). Meet ddosaas: Distributed
denial of service-as-a-service. Online Web-
site. https://www.theregister.com/2016/09/12/
denial of service as a service/.
Ozdel, S., Damla Ates, P., Ates, C., Koca, M., and An-
arm, E. (2022). Network anomaly detection with
payload-based analysis. In 2022 30th Signal Pro-
cessing and Communications Applications Confer-
ence (SIU), pages 1–4.
Pandey, A. K. and Pandu Rangan, C. (2011). Mitigating
denial of service attack using proof of work and to-
ken bucket algorithm. In IEEE Technology Students’
Symposium, pages 43–47.
Parno, B., Wendlandt, D., Shi, E., Perrig, A., Maggs, B.,
and Hu, Y.-C. (2007). Portcullis: Protecting con-
nection setup from denial-of-capability attacks. SIG-
COMM ’07, page 289300, New York, NY, USA. As-
sociation for Computing Machinery.
Paulauskas, N. and Auskalnis, J. (2017). Analysis of data
pre-processing influence on intrusion detection using
nsl-kdd dataset. In 2017 Open Conference of Electri-
cal, Electronic and Information Sciences (eStream),
pages 1–5.
Polikar, R. (2006). Ensemble based systems in deci-
sion making. IEEE Circuits and Systems Magazine,
6(3):21–45.
Renjan, A., Joshi, K. P., Narayanan, S. N., and Joshi, A.
(2018). Dabr: Dynamic attribute-based reputation
scoring for malicious ip address detection. In 2018
IEEE International Conference on Intelligence and
Security Informatics (ISI), pages 64–69. IEEE.
Rivest, R. L. and Shamir, A. (1996). Payword and mi-
cromint: Two simple micropayment schemes. In Se-
curity Protocols Workshop.
Talos, C. (2022). Talos threat source. https://www.
talosintelligence.com/.
Walfish, M., Vutukuru, M., Balakrishnan, H., Karger, D.,
and Shenker, S. (2006). DDoS Defense by Offense.
In Proceedings of the 2006 Conference on Applica-
tions, Technologies, Architectures, and Protocols for
Computer Communications (SIGCOMM), pages 303–
314.
Wang, X. and Reiter, M. K. (2003). Defending against
denial-of-service attacks with puzzle auctions. In Pro-
ceedings of the 2003 IEEE Symposium on Security
and Privacy, pages 78–92.
Waters, B., Juels, A., Halderman, A., and Felten, E. (2004).
New client puzzle outsourcing techniques for DoS re-
sistance. In Proceedings of the 11th ACM Conference
on Computer and Communications Security (CCS),
pages 246–256.
Wood, P., Gutierrez, C., and Bagchi, S. (2015). Denial of
service elusion (dose): Keeping clients connected for
less. In 2015 IEEE 34th Symposium on Reliable Dis-
tributed Systems (SRDS), pages 94–103.
Wu, Y., Zhao, Z., Bao, F., and Deng, R. H. (2015). Software
puzzle: A countermeasure to resource-inflated denial-
of-service attacks. IEEE Transactions on Information
Forensics and Security, 10(1):168–177.
Yang, X.-S. (2010). A new metaheuristic bat-inspired algo-
rithm.
Yuan, X., Li, C., and Li, X. (2017). DeepDefense: Identi-
fying DDoS attack via deep learning. In Proceedings
of the IEEE International Conference on Smart Com-
puting (SMARTCOMP), pages 1–8.
SECRYPT 2023 - 20th International Conference on Security and Cryptography
72