{"id":"https://openalex.org/W4410563245","doi":"https://doi.org/10.1093/comjnl/bxaf068","title":"Design of an autonomous multi-agent-based defense system against DDoS attacks in the Industrial Internet of Things (IIoT) environment","display_name":"Design of an autonomous multi-agent-based defense system against DDoS attacks in the Industrial Internet of Things (IIoT) environment","publication_year":2025,"publication_date":"2025-05-03","ids":{"openalex":"https://openalex.org/W4410563245","doi":"https://doi.org/10.1093/comjnl/bxaf068"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxaf068","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxaf068","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057010979","display_name":"Hakan Ayd\u0131n","orcid":"https://orcid.org/0000-0002-0122-8512"},"institutions":[{"id":"https://openalex.org/I67581229","display_name":"Istanbul University","ror":"https://ror.org/03a5qrr21","country_code":"TR","type":"education","lineage":["https://openalex.org/I67581229"]},{"id":"https://openalex.org/I4210112471","display_name":"Istanbul University-Cerrahpa\u015fa","ror":"https://ror.org/01dzn5f42","country_code":"TR","type":"education","lineage":["https://openalex.org/I4210112471"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Hakan Aydin","raw_affiliation_strings":["Department of Computer Engineering, Faculty of Engineering, \u0130stanbul Topkap\u0131 University , \u0130stanbul 34310 ,","Department of Computer Engineering, Faculty of Engineering, \u0130stanbul University-Cerrahpasa , \u0130stanbul 34320 ,"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Faculty of Engineering, \u0130stanbul Topkap\u0131 University , \u0130stanbul 34310 ,","institution_ids":["https://openalex.org/I67581229"]},{"raw_affiliation_string":"Department of Computer Engineering, Faculty of Engineering, \u0130stanbul University-Cerrahpasa , \u0130stanbul 34320 ,","institution_ids":["https://openalex.org/I4210112471"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028787853","display_name":"Zeynep Ayd\u0131n","orcid":"https://orcid.org/0000-0002-4125-0589"},"institutions":[{"id":"https://openalex.org/I4210112471","display_name":"Istanbul University-Cerrahpa\u015fa","ror":"https://ror.org/01dzn5f42","country_code":"TR","type":"education","lineage":["https://openalex.org/I4210112471"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"G\u00fcls\u00fcm Zeynep G\u00fcrka\u015f Aydin","raw_affiliation_strings":["Department of Computer Engineering, Faculty of Engineering, \u0130stanbul University-Cerrahpasa , \u0130stanbul 34320 ,"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Faculty of Engineering, \u0130stanbul University-Cerrahpasa , \u0130stanbul 34320 ,","institution_ids":["https://openalex.org/I4210112471"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065102655","display_name":"Ahmet Sertba\u015f","orcid":"https://orcid.org/0000-0001-8166-1211"},"institutions":[{"id":"https://openalex.org/I4210112471","display_name":"Istanbul University-Cerrahpa\u015fa","ror":"https://ror.org/01dzn5f42","country_code":"TR","type":"education","lineage":["https://openalex.org/I4210112471"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Ahmet Sertba\u015f","raw_affiliation_strings":["Department of Computer Engineering, Faculty of Engineering, \u0130stanbul University-Cerrahpasa , \u0130stanbul 34320 ,"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Faculty of Engineering, \u0130stanbul University-Cerrahpasa , \u0130stanbul 34320 ,","institution_ids":["https://openalex.org/I4210112471"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013726817","display_name":"Muhammed Ali Ayd\u0131n","orcid":"https://orcid.org/0000-0002-1846-6090"},"institutions":[{"id":"https://openalex.org/I4210112471","display_name":"Istanbul University-Cerrahpa\u015fa","ror":"https://ror.org/01dzn5f42","country_code":"TR","type":"education","lineage":["https://openalex.org/I4210112471"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Muhammed Ali Aydin","raw_affiliation_strings":["Department of Computer Engineering, Faculty of Engineering, \u0130stanbul University-Cerrahpasa , \u0130stanbul 34320 ,"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Faculty of Engineering, \u0130stanbul University-Cerrahpasa , \u0130stanbul 34320 ,","institution_ids":["https://openalex.org/I4210112471"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5057010979"],"corresponding_institution_ids":["https://openalex.org/I4210112471","https://openalex.org/I67581229"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13542407,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"68","issue":"11","first_page":"1711","last_page":"1731"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8807815313339233},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6856477856636047},{"id":"https://openalex.org/keywords/industrial-internet","display_name":"Industrial Internet","score":0.6854397058486938},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.654589056968689},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6063056588172913},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.4525222182273865},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.4206188917160034},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.41375425457954407},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1895521581172943}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8807815313339233},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6856477856636047},{"id":"https://openalex.org/C202839342","wikidata":"https://www.wikidata.org/wiki/Q60740481","display_name":"Industrial Internet","level":3,"score":0.6854397058486938},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.654589056968689},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6063056588172913},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.4525222182273865},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.4206188917160034},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.41375425457954407},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1895521581172943}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/comjnl/bxaf068","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxaf068","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W32403112","https://openalex.org/W1785492489","https://openalex.org/W1883667914","https://openalex.org/W2009429512","https://openalex.org/W2104692292","https://openalex.org/W2107726111","https://openalex.org/W2110531057","https://openalex.org/W2120839938","https://openalex.org/W2145339207","https://openalex.org/W2580175322","https://openalex.org/W2733765803","https://openalex.org/W2737940375","https://openalex.org/W2784028699","https://openalex.org/W2791168136","https://openalex.org/W2796215551","https://openalex.org/W2805611890","https://openalex.org/W2811266402","https://openalex.org/W2983008824","https://openalex.org/W2991722918","https://openalex.org/W3012066402","https://openalex.org/W3025038642","https://openalex.org/W3044855437","https://openalex.org/W3085854806","https://openalex.org/W3095347656","https://openalex.org/W3115101267","https://openalex.org/W3127179122","https://openalex.org/W3155081803","https://openalex.org/W3169649651","https://openalex.org/W3176269432","https://openalex.org/W3176850402","https://openalex.org/W3184395191","https://openalex.org/W3217115371","https://openalex.org/W4224213267","https://openalex.org/W4281686974","https://openalex.org/W4289107400","https://openalex.org/W4313546724","https://openalex.org/W4360837775","https://openalex.org/W4366133297","https://openalex.org/W4376273653","https://openalex.org/W4381952972","https://openalex.org/W4386781412","https://openalex.org/W4386920816","https://openalex.org/W4387587680","https://openalex.org/W4387834972","https://openalex.org/W4388142553","https://openalex.org/W4389976242","https://openalex.org/W6757285400","https://openalex.org/W6857539385"],"related_works":["https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W1968168724","https://openalex.org/W2204131204","https://openalex.org/W2754163055","https://openalex.org/W4322008378","https://openalex.org/W2383770723","https://openalex.org/W2186749541","https://openalex.org/W2360429410","https://openalex.org/W4256682929"],"abstract_inverted_index":{"Abstract":[0],"With":[1],"widespread":[2],"adoption":[3],"across":[4],"industries,":[5],"Industrial":[6],"Internet":[7],"of":[8,23,76,84,95,103],"Things":[9],"(IIoT)":[10],"environments":[11],"have":[12],"become":[13],"prime":[14],"targets":[15],"for":[16,92,152],"cyberattacks.":[17],"Moreover,":[18],"the":[19,74,82,110,144,163,173,183,195],"complexity":[20],"and":[21,33,41,56,61,107,149,169,175],"scale":[22],"these":[24,180],"attacks":[25,59,159],"can":[26],"involve":[27],"highly":[28],"sophisticated,":[29],"artificial":[30],"intelligence":[31],"(AI)\u2013enabled,":[32],"even":[34],"autonomous":[35,89,204],"capabilities,":[36],"occurring":[37],"at":[38],"machine":[39],"speeds":[40],"making":[42],"conventional":[43],"defensive":[44,48],"mechanisms":[45],"insufficient.":[46],"Therefore,":[47,194],"systems":[49],"must":[50],"possess":[51],"considerable":[52],"autonomy":[53],"to":[54,121,130,140],"detect":[55,122],"mitigate":[57],"such":[58],"effectively":[60],"promptly.":[62],"This":[63,125],"work":[64],"presents":[65],"an":[66,88],"IIoT":[67],"cyber":[68],"defense":[69,90],"system":[70,101,198],"(NS-IoT)":[71],"that":[72],"integrates":[73],"sensitivity":[75],"Deep":[77,114],"Reinforcement":[78],"Learning":[79],"(DRL)":[80],"with":[81,202],"agility":[83],"multi-agent":[85,205],"systems,":[86],"providing":[87],"solution":[91],"distributed":[93],"denial":[94],"service":[96],"(DDoS)":[97],"attacks.":[98,124],"The":[99],"NS-IoT":[100,197],"consists":[102],"two":[104],"modules:":[105],"detection":[106,111],"defense.":[108],"For":[109],"module,":[112],"a":[113,135],"Q-Network":[115],"(DQN)-based":[116],"agent":[117,126],"(DQN-IoT)":[118],"was":[119],"developed":[120],"DDoS":[123,158],"employs":[127],"DRL":[128],"techniques":[129],"treat":[131],"attack":[132],"classification":[133],"like":[134],"guessing":[136],"game,":[137],"leverages":[138],"feedback":[139],"improve":[141],"decision-making":[142],"within":[143],"Markov":[145],"Decision":[146],"Process":[147],"(MDP),":[148],"combines":[150],"rewards":[151],"enhanced":[153],"performance.":[154],"In":[155],"this":[156,200],"study,":[157],"were":[160],"detected":[161],"using":[162],"proposed":[164,196],"DQN-IoT":[165],"model,":[166],"achieving":[167],"98.43%":[168],"98.05%":[170],"accuracy":[171],"on":[172],"CIC-IoT-2022":[174],"CIC-IoT-2023":[176],"datasets,":[177],"respectively.":[178],"While":[179],"results":[181],"highlight":[182],"model\u2019s":[184],"effectiveness,":[185],"real-time":[186,192],"response":[187],"speed":[188],"is":[189],"crucial":[190],"in":[191],"events.":[193],"addresses":[199],"need":[201],"its":[203],"structure,":[206],"which":[207],"minimizes":[208],"human":[209],"intervention.":[210]},"counts_by_year":[],"updated_date":"2025-11-20T23:13:51.555489","created_date":"2025-10-10T00:00:00"}
