{"id":"https://openalex.org/W7140298408","doi":"https://doi.org/10.1016/j.array.2026.100789","title":"Strengthening network security with advanced defense strategies for robust protection against DoS attacks in complex environments","display_name":"Strengthening network security with advanced defense strategies for robust protection against DoS attacks in complex environments","publication_year":2026,"publication_date":"2026-03-26","ids":{"openalex":"https://openalex.org/W7140298408","doi":"https://doi.org/10.1016/j.array.2026.100789"},"language":"en","primary_location":{"id":"doi:10.1016/j.array.2026.100789","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.array.2026.100789","pdf_url":null,"source":{"id":"https://openalex.org/S4210194039","display_name":"Array","issn_l":"2590-0056","issn":["2590-0056"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Array","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1016/j.array.2026.100789","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5130545165","display_name":"Premkumar M","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"M. Premkumar","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130583417","display_name":"Ashokkumar S.R","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"S.R. Ashokkumar","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071131604","display_name":"Dhamodharan Srinivasan","orcid":"https://orcid.org/0000-0001-8811-7980"},"institutions":[{"id":"https://openalex.org/I4387155381","display_name":"Sri Eshwar College of Engineering","ror":"https://ror.org/02f1z8215","country_code":null,"type":"education","lineage":["https://openalex.org/I4387155381"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Dhamodharan Srinivasan","raw_affiliation_strings":["Department of CCE, Sri Eshwar College of Engineering, Coimbatore, Tamil Nadu, India"],"affiliations":[{"raw_affiliation_string":"Department of CCE, Sri Eshwar College of Engineering, Coimbatore, Tamil Nadu, India","institution_ids":["https://openalex.org/I4387155381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130623028","display_name":"Anupallavi S","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"S. Anupallavi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130591967","display_name":"Rajendran A","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"A. Rajendran","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5119761632","display_name":"Ajmeera Kiran","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ajmeera Kiran","raw_affiliation_strings":["Department of CSE, MLR Institute of Technology, Dundigal, Hyderabad, India"],"affiliations":[{"raw_affiliation_string":"Department of CSE, MLR Institute of Technology, Dundigal, Hyderabad, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5130545165"],"corresponding_institution_ids":[],"apc_list":{"value":1350,"currency":"USD","value_usd":1350},"apc_paid":{"value":1350,"currency":"USD","value_usd":1350},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.84243808,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"30","issue":null,"first_page":"100789","last_page":"100789"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.33329999446868896,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.33329999446868896,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.15620000660419464,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.07190000265836716,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.33640000224113464},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.32330000400543213},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.3165999948978424},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3091999888420105},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.26930001378059387}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5672000050544739},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5598999857902527},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.33640000224113464},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.32330000400543213},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.3165999948978424},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3091999888420105},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.26930001378059387},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.2623000144958496},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.25940001010894775},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2533999979496002},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2524000108242035}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1016/j.array.2026.100789","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.array.2026.100789","pdf_url":null,"source":{"id":"https://openalex.org/S4210194039","display_name":"Array","issn_l":"2590-0056","issn":["2590-0056"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Array","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1016/j.array.2026.100789","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.array.2026.100789","pdf_url":null,"source":{"id":"https://openalex.org/S4210194039","display_name":"Array","issn_l":"2590-0056","issn":["2590-0056"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Array","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W2063046703","https://openalex.org/W2102671922","https://openalex.org/W2104692292","https://openalex.org/W2275015310","https://openalex.org/W2789828921","https://openalex.org/W2939125753","https://openalex.org/W3037346268","https://openalex.org/W3044855437","https://openalex.org/W3080610273","https://openalex.org/W3120644841","https://openalex.org/W3134770171","https://openalex.org/W3137041917","https://openalex.org/W3157859045","https://openalex.org/W3158658439","https://openalex.org/W3163844753","https://openalex.org/W3179017527","https://openalex.org/W3182020042","https://openalex.org/W3193027989","https://openalex.org/W3198147008","https://openalex.org/W3200617211","https://openalex.org/W3209257685","https://openalex.org/W4206043797","https://openalex.org/W4210630286","https://openalex.org/W4210671315","https://openalex.org/W4213076869","https://openalex.org/W4220744793","https://openalex.org/W4225910711","https://openalex.org/W4231039975","https://openalex.org/W4281735057","https://openalex.org/W4281959693","https://openalex.org/W4285212633","https://openalex.org/W4292567366","https://openalex.org/W4296500957","https://openalex.org/W4313038208","https://openalex.org/W4313555233","https://openalex.org/W4323306692","https://openalex.org/W4367598443","https://openalex.org/W4367680686","https://openalex.org/W4388140423","https://openalex.org/W4388229168","https://openalex.org/W4389893882","https://openalex.org/W4414809575"],"related_works":[],"abstract_inverted_index":{"The":[0,101,120],"increasing":[1],"complexity":[2],"of":[3,15,28,83,94,97,181],"network":[4,162,185],"environments":[5,163],"poses":[6],"significant":[7],"security":[8,20,175],"challenges,":[9],"particularly":[10],"in":[11,61,66,160,183,201,209],"defending":[12],"against":[13],"Denial":[14,96],"Service":[16,98],"(DoS)":[17],"attacks.":[18,100],"Traditional":[19],"solutions":[21],"are":[22,79],"often":[23],"inadequate,":[24],"necessitating":[25],"the":[26,81,92,153,171,179],"development":[27],"intelligent":[29],"procedures.":[30],"This":[31,168],"paper":[32],"explores":[33],"innovative":[34],"approaches":[35],"using":[36,114,192],"deep":[37,189],"learning-based":[38],"Intrusion":[39],"Detection":[40],"Systems":[41],"(IDS),":[42],"specifically":[43],"Bidirectional":[44],"Long":[45],"Short-Term":[46],"Memory":[47],"(BiLSTM)":[48],"models,":[49],"for":[50,76,139,142,146,173],"enhanced":[51],"attack":[52,214],"detection.":[53],"Our":[54],"findings":[55],"demonstrate":[56],"that":[57,152],"BiLSTM":[58,106,195],"models":[59],"excel":[60],"binary":[62,211],"classification":[63],"and":[64,91,110,118,130,144,177,212,225,232,244],"outperform":[65],"identifying":[67],"sophisticated":[68],"attacks":[69,200],"within":[70],"multiclass":[71,213],"settings.":[72],"Two":[73],"key":[74],"areas":[75],"future":[77],"research":[78],"highlighted:":[80],"impact":[82],"advanced":[84,174],"data":[85],"processing":[86],"techniques":[87,124],"on":[88,229],"IDS":[89,108,191,250],"effectiveness":[90,180],"evaluation":[93],"Distributed":[95],"(DDoS)":[99],"study":[102,169],"introduces":[103],"a":[104,193],"refined":[105,194],"(RLSTM)-based":[107],"approach":[109],"evaluates":[111],"its":[112],"performance":[113,208],"datasets":[115,234],"CICIDS-2019,":[116],"CICIDS-2017,":[117,143,231],"NSL-KDD.":[119],"method":[121],"incorporates":[122],"preprocessing":[123,219],"such":[125],"as":[126],"encoding,":[127,222],"dimensionality":[128,223],"reduction,":[129,224],"normalization.":[131,226],"Experimental":[132],"results":[133,150],"indicate":[134],"high":[135,206],"accuracy,":[136],"with":[137,235],"99.2%":[138],"NSL-KDD,":[140,230],"99.4%":[141],"99.7%":[145],"CICIDS-2019":[147,233],"datasets.":[148],"These":[149],"illustrate":[151],"proposed":[154],"technique":[155],"provides":[156],"superior":[157,242],"detection":[158,207,245],"capabilities":[159],"complex":[161,202],"compared":[164,247],"to":[165,197,238,248],"existing":[166,249],"methods.":[167],"emphasizes":[170],"necessity":[172],"measures":[176],"highlights":[178],"model":[182],"enhancing":[184],"protection.":[186],"\u2022":[187,204,216,227,240],"Proposes":[188],"learning\u2013based":[190],"(RLSTM)":[196],"counter":[198],"DoS":[199],"networks.":[203],"Achieves":[205],"both":[210],"scenarios.":[215],"Integrates":[217],"effective":[218],"techniques,":[220],"including":[221],"Validated":[228],"accuracies":[236],"up":[237],"99.6%.":[239],"Demonstrates":[241],"robustness":[243],"capability":[246],"approaches.":[251]},"counts_by_year":[],"updated_date":"2026-04-02T13:48:15.688549","created_date":"2026-03-26T00:00:00"}
