Class information for:
Level 1: IP TRACEBACK//DDOS//DDOS ATTACKS

Basic class information

Class id #P Avg. number of
references
Database coverage
of references
15358 717 28.4 27%



Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
9 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS 1247339
20 3       COMPUTER SCIENCE, INFORMATION SYSTEMS//COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, SOFTWARE ENGINEERING 118625
1591 2             COMPUTERS & SECURITY//DIGITAL INVESTIGATION//INTRUSION DETECTION 7195
15358 1                   IP TRACEBACK//DDOS//DDOS ATTACKS 717

Terms with highest relevance score



rank Term termType Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 IP TRACEBACK authKW 1851291 7% 91% 48
2 DDOS authKW 1685741 9% 65% 61
3 DDOS ATTACKS authKW 1663506 7% 78% 50
4 DENIAL OF SERVICE authKW 902300 8% 38% 56
5 DISTRIBUTED DENIAL OF SERVICE DDOS authKW 644104 3% 69% 22
6 DISTRIBUTED DENIAL OF SERVICE authKW 614937 3% 76% 19
7 DISTRIBUTED DENIAL OF SERVICE ATTACKS authKW 586062 2% 81% 17
8 IP SPOOFING authKW 567804 3% 67% 20
9 SYN FLOODING authKW 471724 2% 92% 12
10 NETWORK SECURITY authKW 367370 12% 10% 86

Web of Science journal categories



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 Computer Science, Information Systems 25540 49% 0% 350
2 Telecommunications 19917 44% 0% 316
3 Computer Science, Hardware & Architecture 10617 22% 0% 156
4 Computer Science, Theory & Methods 8245 30% 0% 213
5 Computer Science, Software Engineering 3031 15% 0% 110
6 Engineering, Electrical & Electronic 2202 33% 0% 240
7 Computer Science, Artificial Intelligence 434 7% 0% 50
8 Computer Science, Interdisciplinary Applications 156 5% 0% 33
9 Operations Research & Management Science 15 2% 0% 11
10 Engineering, General 12 2% 0% 11

Address terms



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 COMP SCI IND 113561 1% 67% 4
2 CDBR SSE PROJECT 85173 0% 100% 2
3 COMMPUTER SCI TECHNOL 85173 0% 100% 2
4 ELECT SIGNAL IMAGES 85173 0% 100% 2
5 NETWORK SOFTWARE SECT 85173 0% 100% 2
6 OPT INTERNET MOBILE INFORMAT NETWORK 56780 0% 67% 2
7 AD T COMMUN NETWORKS GRP 42586 0% 100% 1
8 COMP COMMUN CB10 04 442 42586 0% 100% 1
9 COMP SCI TUNIS 42586 0% 100% 1
10 CONVERGENCE SECUR SECT 42586 0% 100% 1

Journals



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 SECURITY AND COMMUNICATION NETWORKS 39808 5% 3% 36
2 COMPUTERS & SECURITY 29964 4% 2% 29
3 ACM SIGCOMM COMPUTER COMMUNICATION REVIEW 18589 3% 2% 23
4 COMPUTER NETWORKS 17331 5% 1% 39
5 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 17326 2% 3% 14
6 IEEE-ACM TRANSACTIONS ON NETWORKING 11810 4% 1% 27
7 COMPUTER COMMUNICATIONS 9202 4% 1% 31
8 KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS 4894 2% 1% 13
9 IEEE SECURITY & PRIVACY 4297 1% 1% 8
10 IEEE COMMUNICATIONS LETTERS 4093 3% 0% 25

Author Key Words



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
LCSH search Wikipedia search
1 IP TRACEBACK 1851291 7% 91% 48 Search IP+TRACEBACK Search IP+TRACEBACK
2 DDOS 1685741 9% 65% 61 Search DDOS Search DDOS
3 DDOS ATTACKS 1663506 7% 78% 50 Search DDOS+ATTACKS Search DDOS+ATTACKS
4 DENIAL OF SERVICE 902300 8% 38% 56 Search DENIAL+OF+SERVICE Search DENIAL+OF+SERVICE
5 DISTRIBUTED DENIAL OF SERVICE DDOS 644104 3% 69% 22 Search DISTRIBUTED+DENIAL+OF+SERVICE+DDOS Search DISTRIBUTED+DENIAL+OF+SERVICE+DDOS
6 DISTRIBUTED DENIAL OF SERVICE 614937 3% 76% 19 Search DISTRIBUTED+DENIAL+OF+SERVICE Search DISTRIBUTED+DENIAL+OF+SERVICE
7 DISTRIBUTED DENIAL OF SERVICE ATTACKS 586062 2% 81% 17 Search DISTRIBUTED+DENIAL+OF+SERVICE+ATTACKS Search DISTRIBUTED+DENIAL+OF+SERVICE+ATTACKS
8 IP SPOOFING 567804 3% 67% 20 Search IP+SPOOFING Search IP+SPOOFING
9 SYN FLOODING 471724 2% 92% 12 Search SYN+FLOODING Search SYN+FLOODING
10 NETWORK SECURITY 367370 12% 10% 86 Search NETWORK+SECURITY Search NETWORK+SECURITY

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.



Rank Reference # ref.
in cl.
Shr. of ref. in
cl.
Citations
1 SINGH, K , SINGH, P , KUMAR, K , (2016) A SYSTEMATIC REVIEW OF IP TRACEBACK SCHEMES FOR DENIAL OF SERVICE ATTACKS.COMPUTERS & SECURITY. VOL. 56. ISSUE . P. 111 -139 34 81% 0
2 YU, S , ZHOU, WL , DOSS, R , JIA, WJ , (2011) TRACEBACK OF DDOS ATTACKS USING ENTROPY VARIATIONS.IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS. VOL. 22. ISSUE 3. P. 412 -425 27 100% 30
3 LOUKAS, G , OKE, G , (2010) PROTECTION AGAINST DENIAL OF SERVICE ATTACKS: A SURVEY.COMPUTER JOURNAL. VOL. 53. ISSUE 7. P. 1020 -1037 38 69% 22
4 BHUYAN, MH , BHATTACHARYYA, DK , KALITA, JK , (2016) E-LDAT: A LIGHTWEIGHT SYSTEM FOR DDOS FLOODING ATTACK DETECTION AND IP TRACEBACK USING EXTENDED ENTROPY METRIC.SECURITY AND COMMUNICATION NETWORKS. VOL. 9. ISSUE 16. P. 3251 -3270 26 93% 0
5 ZARGAR, ST , JOSHI, J , TIPPER, D , (2013) A SURVEY OF DEFENSE MECHANISMS AGAINST DISTRIBUTED DENIAL OF SERVICE (DDOS) FLOODING ATTACKS.IEEE COMMUNICATIONS SURVEYS AND TUTORIALS. VOL. 15. ISSUE 4. P. 2046 -2069 21 78% 76
6 BEITOLLAHI, H , DECONINCK, G , (2012) ANALYZING WELL-KNOWN COUNTERMEASURES AGAINST DISTRIBUTED DENIAL OF SERVICE ATTACKS.COMPUTER COMMUNICATIONS. VOL. 35. ISSUE 11. P. 1312 -1332 25 81% 21
7 MURUGESAN, V , SHALINIE, M , NEETHIMANI, N , (2014) A BRIEF SURVEY OF IP TRACEBACK METHODOLOGIES.ACTA POLYTECHNICA HUNGARICA. VOL. 11. ISSUE 9. P. 197 -216 20 100% 2
8 KAHANI, N , FALLAH, MS , (2014) TDPF: A TRACEBACK-BASED DISTRIBUTED PACKET FILTER TO MITIGATE SPOOFED DDOS ATTACKS.SECURITY AND COMMUNICATION NETWORKS. VOL. 7. ISSUE 2. P. 245 -264 20 91% 4
9 HOQUE, N , BHATTACHARYYA, DK , KALITA, JK , (2015) BOTNET IN DDOS ATTACKS: TRENDS AND CHALLENGES.IEEE COMMUNICATIONS SURVEYS AND TUTORIALS. VOL. 17. ISSUE 4. P. 2242 -2270 28 55% 1
10 BHUYAN, MH , KASHYAP, HJ , BHATTACHARYYA, DK , KALITA, JK , (2014) DETECTING DISTRIBUTED DENIAL OF SERVICE ATTACKS: METHODS, TOOLS AND FUTURE DIRECTIONS.COMPUTER JOURNAL. VOL. 57. ISSUE 4. P. 537 -556 20 74% 8

Classes with closest relation at Level 1



Rank Class id link
1 7457 INTRUSION DETECTION//INTRUSION DETECTION SYSTEM//ALERT CORRELATION
2 35245 DOMAIN NAME SYSTEM DNS//DOMAIN NAME SYSTEM//MALICIOUS DOMAIN DETECTION
3 20229 COMPUTER VIRUS//MALWARE PROPAGATION//WORM PROPAGATION
4 35852 CAPTCHA//HUMAN INTERACTIVE PROOFS//ABUSE OF WEB SITES AND SERVICES
5 18831 BGP//INTER DOMAIN ROUTING//BORDER GATEWAY PROTOCOL BGP
6 25803 HARMONIC WAVELETS//POTENTIAL MEMBRANE//PHARMACEUT SCI DIFARMA
7 20510 TRAFFIC CLASSIFICATION//TRAFFIC IDENTIFICATION//APPLICATION IDENTIFICATION
8 34697 SOCIAL NETWORK SECURITY//INTERACTION ORIENTED//SOCIAL BOT
9 21011 MALWARE DETECTION//MALWARE//ANDROID SECURITY
10 27112 ATTACK GRAPH//SECURITY METRICS//MTTSF

Go to start page