{"id":"https://openalex.org/W4390188670","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361494","title":"Software-Defined Intrusion Detection System for DDoS Attacks in IoT Edge Networks","display_name":"Software-Defined Intrusion Detection System for DDoS Attacks in IoT Edge Networks","publication_year":2023,"publication_date":"2023-11-14","ids":{"openalex":"https://openalex.org/W4390188670","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361494"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361494","pdf_url":null,"source":{"id":"https://openalex.org/S4363605881","display_name":"2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093577205","display_name":"Burcu Bolat-Ak\u00e7a","orcid":null},"institutions":[{"id":"https://openalex.org/I4210098942","display_name":"Milli Savunma \u00dcniversitesi","ror":"https://ror.org/010t24d82","country_code":"TR","type":"education","lineage":["https://openalex.org/I4210098942"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Burcu Bolat-Ak\u00e7a","raw_affiliation_strings":["Department of Computer Engineering, National Defence University, Istanbul, Turkey"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, National Defence University, Istanbul, Turkey","institution_ids":["https://openalex.org/I4210098942"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036229988","display_name":"Elif Bozkaya","orcid":"https://orcid.org/0000-0001-6960-2585"},"institutions":[{"id":"https://openalex.org/I157637111","display_name":"Naval Academy","ror":"https://ror.org/05syseh24","country_code":"TR","type":"education","lineage":["https://openalex.org/I157637111"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Elif Bozkaya","raw_affiliation_strings":["Department of Computer Engineering, National Defence University Turkish Naval Academy, Istanbul, Turkey"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, National Defence University Turkish Naval Academy, Istanbul, Turkey","institution_ids":["https://openalex.org/I157637111"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.628,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.548494,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":77,"max":83},"biblio":{"volume":null,"issue":null,"first_page":"0672","last_page":"0677"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9992,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9912,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.4218793}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.85718536},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.84868},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.6964337},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.58712196},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.57922304},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5778304},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.49653846},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.48744965},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4384393},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4309365},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.4218793},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.40996158},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34205195},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.31171447},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2915061},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12910914},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11254898}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361494","pdf_url":null,"source":{"id":"https://openalex.org/S4363605881","display_name":"2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":16,"referenced_works":["https://openalex.org/W2568680725","https://openalex.org/W2789828921","https://openalex.org/W2979371270","https://openalex.org/W3003811274","https://openalex.org/W3025061635","https://openalex.org/W3037997326","https://openalex.org/W3047609445","https://openalex.org/W3112441600","https://openalex.org/W4285167041","https://openalex.org/W4290996323","https://openalex.org/W4321368124","https://openalex.org/W4376142240","https://openalex.org/W4379380034","https://openalex.org/W4382793227","https://openalex.org/W4383740951","https://openalex.org/W4385146779"],"related_works":["https://openalex.org/W4308272253","https://openalex.org/W4229489764","https://openalex.org/W3195575042","https://openalex.org/W3114854705","https://openalex.org/W3036366741","https://openalex.org/W3020967770","https://openalex.org/W2898113880","https://openalex.org/W2793567886","https://openalex.org/W2767068794","https://openalex.org/W2735897973"],"abstract_inverted_index":{"The":[0],"rapid":[1],"advance":[2],"of":[3,6,14,30,51,72,79,130,165,197,220],"the":[4,12,43,52,64,67,76,94,139,154,194,218],"Internet":[5,95],"Things":[7],"(IoT)":[8],"has":[9],"led":[10],"to":[11,55,98,114,184,212],"emergence":[13],"various":[15],"applications,":[16],"such":[17],"as":[18,49],"smart":[19,21,23,32],"healthcare,":[20],"transportation,":[22],"grid,":[24],"and":[25,37,69,118,157,168,179,216],"more.":[26],"However,":[27],"IoT":[28,65,73,135,221],"consists":[29],"resource-constrained":[31],"devices":[33],"with":[34,63],"limited":[35],"storage":[36],"processing":[38,70],"capabilities.":[39],"Against":[40],"this":[41,80,106,116],"backdrop,":[42],"edge":[44,61,136,158,222],"computing":[45,62],"paradigm":[46],"is":[47,112],"considered":[48],"one":[50],"promising":[53],"technologies":[54],"improve":[56],"system":[57,147],"performance;":[58],"here":[59],"integrating":[60],"solves":[66],"computational":[68],"problems":[71],"devices.":[74],"Despite":[75],"wide":[77],"usage":[78],"integration,":[81],"new":[82],"challenges":[83],"have":[84],"emerged":[85],"in":[86,105,134],"security":[87,91,219],"provisioning":[88],"since":[89],"traditional":[90],"schemes":[92],"for":[93,100],"are":[96],"difficult":[97],"apply":[99],"different":[101,163,198],"IoT-based":[102],"applications.":[103],"Thus,":[104],"paper,":[107],"software-defined":[108,123],"networking":[109],"(SDN)":[110],"technology":[111],"adopted":[113],"address":[115],"issue":[117],"we":[119,143,161,173,191],"propose":[120,174],"a":[121,145,181],"novel":[122],"intrusion":[124,176],"detection":[125,177],"framework":[126,206],"against":[127],"Distributed":[128],"Denial":[129],"Service":[131],"(DDoS)":[132],"attacks":[133,167,215],"networks.":[137,223],"In":[138],"proposed":[140,205],"framework,":[141],"first,":[142],"introduce":[144],"three-layer":[146],"architecture":[148],"through":[149],"an":[150,175],"efficient":[151],"collaboration":[152],"between":[153],"SDN":[155],"controller":[156],"servers.":[159],"Second,":[160],"define":[162,193],"types":[164],"DDoS":[166,214],"analyze":[169],"their":[170],"characteristics.":[171],"Third,":[172],"algorithm":[178],"provide":[180],"comparative":[182],"analysis":[183],"enhance":[185,217],"accuracy":[186,210],"performance.":[187],"By":[188],"doing":[189],"this,":[190],"also":[192],"best":[195],"parameters":[196],"classifiers.":[199],"Experimental":[200],"results":[201],"show":[202],"that":[203],"our":[204],"can":[207],"achieve":[208],"superior":[209],"performance":[211],"identify":[213]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4390188670","counts_by_year":[{"year":2024,"cited_by_count":2}],"updated_date":"2025-02-19T14:01:05.738448","created_date":"2023-12-26"}