{"id":"https://openalex.org/W2912370732","doi":"https://doi.org/10.1109/i-span.2018.00036","title":"DDoS Attack Identification and Defense Using SDN Based on Machine Learning Method","display_name":"DDoS Attack Identification and Defense Using SDN Based on Machine Learning Method","publication_year":2018,"publication_date":"2018-10-01","ids":{"openalex":"https://openalex.org/W2912370732","doi":"https://doi.org/10.1109/i-span.2018.00036","mag":"2912370732"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/i-span.2018.00036","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100604251","display_name":"Lingfeng Yang","orcid":"https://orcid.org/0000-0002-2725-8947"},"institutions":[{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"funder","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lingfeng Yang","raw_affiliation_strings":["East China Normal University, Shanghai, CN"],"affiliations":[{"raw_affiliation_string":"East China Normal University, Shanghai, CN","institution_ids":["https://openalex.org/I66867065"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101850062","display_name":"Zhao Hui","orcid":"https://orcid.org/0000-0002-4309-8795"},"institutions":[{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"funder","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Zhao","raw_affiliation_strings":["East China Normal University, Shanghai, CN"],"affiliations":[{"raw_affiliation_string":"East China Normal University, Shanghai, CN","institution_ids":["https://openalex.org/I66867065"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":5.682,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":92,"citation_normalized_percentile":{"value":0.854419,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"174","last_page":"178"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9992,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identification","display_name":"Identification","score":0.56859124},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.53366065},{"id":"https://openalex.org/keywords/table","display_name":"Table (database)","score":0.43204656}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.94700265},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8195589},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.61995876},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.5764232},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.56859124},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5636001},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.53366065},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5127645},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.46542093},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.45173958},{"id":"https://openalex.org/C45235069","wikidata":"https://www.wikidata.org/wiki/Q278425","display_name":"Table (database)","level":2,"score":0.43204656},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4073677},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19233337},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.17821947},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.11206487},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/i-span.2018.00036","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.41,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":9,"referenced_works":["https://openalex.org/W2197538184","https://openalex.org/W2276629685","https://openalex.org/W2336023257","https://openalex.org/W2497362092","https://openalex.org/W2738679187","https://openalex.org/W2765623246","https://openalex.org/W2774112487","https://openalex.org/W2783146946","https://openalex.org/W3123463689"],"related_works":["https://openalex.org/W4322008378","https://openalex.org/W4286539397","https://openalex.org/W4256682929","https://openalex.org/W2783466926","https://openalex.org/W2754163055","https://openalex.org/W2383770723","https://openalex.org/W2360429410","https://openalex.org/W2204131204","https://openalex.org/W2186749541","https://openalex.org/W1968168724"],"abstract_inverted_index":{"SDN":[0,19,41,63,113],"(Software":[1],"Defined":[2],"Network)":[3],"has":[4,27],"attracted":[5],"great":[6],"interests":[7],"as":[8,45],"a":[9,37],"new":[10],"paradigm":[11],"in":[12,39,56,116],"the":[13,16,29,32,46,53,57,107,122,125,136,144,148,155,164,179,182],"network.":[14,48],"Thus,":[15],"security":[17],"of":[18,31,78,112,181],"is":[20,36,170],"important.":[21],"Distributed":[22],"Denial":[23],"Service":[24],"(DDoS)":[25],"attack":[26,55,87,119,145,184],"been":[28],"plague":[30],"Internet.":[33],"Now,":[34],"it":[35],"threat":[38],"some":[40],"applied":[42],"scenarios,":[43],"such":[44],"campus":[47,58],"In":[49],"order":[50],"to":[51,65,101,142,158,163],"alleviate":[52],"DDoS":[54,69,86,118,160,183],"network,":[59],"we":[60],"propose":[61],"an":[62],"framework":[64,76],"identify":[66,143],"and":[67,90,109,134],"defend":[68],"attacks":[70,161],"based":[71],"on":[72],"machine":[73],"learning.":[74],"This":[75],"consists":[77],"3":[79],"parts":[80],"which":[81],"are":[82],"traffic":[83,99,104,127,165],"collection":[84,96],"module,":[85],"identification":[88,166,185],"module":[89,97,152],"flow":[91,131,149],"table":[92,132,150],"delivery":[93,151],"module.":[94],"Traffic":[95],"extracts":[98,124],"characteristics":[100,128],"prepare":[102],"for":[103],"identification.":[105],"Utilizing":[106],"flexible":[108],"multi-dimensional":[110],"features":[111],"network":[114,126],"architecture":[115],"deploying":[117],"detection":[120],"system,":[121],"controller":[123],"through":[129],"statistical":[130],"information":[133],"uses":[135],"support":[137],"vector":[138],"machines":[139],"(SVM)":[140],"method":[141],"traffic.":[146],"Then":[147],"dynamically":[153],"adjusts":[154],"forwarding":[156],"policy":[157],"resist":[159],"according":[162],"result.":[167],"The":[168,175],"experiment":[169,176],"conducted":[171],"using":[172],"KDD99":[173],"dataset.":[174],"results":[177],"show":[178],"effectiveness":[180],"method.":[186]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2912370732","counts_by_year":[{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":34},{"year":2022,"cited_by_count":16},{"year":2021,"cited_by_count":18},{"year":2020,"cited_by_count":9},{"year":2019,"cited_by_count":4}],"updated_date":"2025-04-20T03:19:26.083929","created_date":"2019-02-21"}