{"id":"https://openalex.org/W3193240076","doi":"https://doi.org/10.1109/access.2021.3104115","title":"Signature-Based Traffic Classification and Mitigation for DDoS Attacks Using Programmable Network Data Planes","display_name":"Signature-Based Traffic Classification and Mitigation for DDoS Attacks Using Programmable Network Data Planes","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3193240076","doi":"https://doi.org/10.1109/access.2021.3104115","mag":"3193240076"},"language":"en","primary_location":{"id":"doi:10.1109/access.2021.3104115","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3104115","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09511420.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09511420.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009541202","display_name":"Marinos Dimolianis","orcid":"https://orcid.org/0000-0003-1118-0804"},"institutions":[{"id":"https://openalex.org/I174458059","display_name":"National Technical University of Athens","ror":"https://ror.org/03cx6bg69","country_code":"GR","type":"education","lineage":["https://openalex.org/I174458059"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Marinos Dimolianis","raw_affiliation_strings":["School of Electrical and Computer Engineering, National Technical University of Athens, Athens, Greece"],"raw_orcid":"https://orcid.org/0000-0003-1118-0804","affiliations":[{"raw_affiliation_string":"School of Electrical and Computer Engineering, National Technical University of Athens, Athens, Greece","institution_ids":["https://openalex.org/I174458059"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012963451","display_name":"Adam Pavlidis","orcid":"https://orcid.org/0000-0002-3803-2804"},"institutions":[{"id":"https://openalex.org/I174458059","display_name":"National Technical University of Athens","ror":"https://ror.org/03cx6bg69","country_code":"GR","type":"education","lineage":["https://openalex.org/I174458059"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Adam Pavlidis","raw_affiliation_strings":["School of Electrical and Computer Engineering, National Technical University of Athens, Athens, Greece"],"raw_orcid":"https://orcid.org/0000-0002-3803-2804","affiliations":[{"raw_affiliation_string":"School of Electrical and Computer Engineering, National Technical University of Athens, Athens, Greece","institution_ids":["https://openalex.org/I174458059"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072274800","display_name":"Vasilis Maglaris","orcid":"https://orcid.org/0000-0002-0352-5713"},"institutions":[{"id":"https://openalex.org/I174458059","display_name":"National Technical University of Athens","ror":"https://ror.org/03cx6bg69","country_code":"GR","type":"education","lineage":["https://openalex.org/I174458059"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Vasilis Maglaris","raw_affiliation_strings":["School of Electrical and Computer Engineering, National Technical University of Athens, Athens, Greece"],"raw_orcid":"https://orcid.org/0000-0002-0352-5713","affiliations":[{"raw_affiliation_string":"School of Electrical and Computer Engineering, National Technical University of Athens, Athens, Greece","institution_ids":["https://openalex.org/I174458059"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5009541202"],"corresponding_institution_ids":["https://openalex.org/I174458059"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":4.3244,"has_fulltext":true,"cited_by_count":43,"citation_normalized_percentile":{"value":0.94394893,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"9","issue":null,"first_page":"113061","last_page":"113076"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8712630271911621},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7224660515785217},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6525042057037354},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.6264933347702026},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep packet inspection","score":0.5690223574638367},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.47077083587646484},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4458153247833252},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.433494508266449},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3637852668762207},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.2249414026737213}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8712630271911621},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7224660515785217},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6525042057037354},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.6264933347702026},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.5690223574638367},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.47077083587646484},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4458153247833252},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.433494508266449},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3637852668762207},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2249414026737213},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2021.3104115","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3104115","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09511420.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:3ce6182254f046228cfaf2b607f547de","is_oa":true,"landing_page_url":"https://doaj.org/article/3ce6182254f046228cfaf2b607f547de","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 9, Pp 113061-113076 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2021.3104115","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3104115","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09511420.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6707449129","display_name":null,"funder_award_id":"2014-2020","funder_id":"https://openalex.org/F4320338080","funder_display_name":"European Social Fund"},{"id":"https://openalex.org/G6870533126","display_name":null,"funder_award_id":"2014-2020","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320338080","display_name":"European Social Fund","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3193240076.pdf","grobid_xml":"https://content.openalex.org/works/W3193240076.grobid-xml"},"referenced_works_count":37,"referenced_works":["https://openalex.org/W149523093","https://openalex.org/W1522301498","https://openalex.org/W1989454965","https://openalex.org/W1994926493","https://openalex.org/W2041849429","https://openalex.org/W2111542531","https://openalex.org/W2126105956","https://openalex.org/W2131068602","https://openalex.org/W2155261478","https://openalex.org/W2159262496","https://openalex.org/W2163375756","https://openalex.org/W2172413739","https://openalex.org/W2469255646","https://openalex.org/W2519428799","https://openalex.org/W2625013748","https://openalex.org/W2903038868","https://openalex.org/W2911964244","https://openalex.org/W2912386632","https://openalex.org/W2919493784","https://openalex.org/W2921135734","https://openalex.org/W2940715617","https://openalex.org/W2945429816","https://openalex.org/W2964121744","https://openalex.org/W2964502576","https://openalex.org/W3005097670","https://openalex.org/W3015773798","https://openalex.org/W3017134229","https://openalex.org/W3029652632","https://openalex.org/W3098576337","https://openalex.org/W3102091066","https://openalex.org/W3151470781","https://openalex.org/W3153432701","https://openalex.org/W3156998341","https://openalex.org/W6606098666","https://openalex.org/W6631190155","https://openalex.org/W6762132567","https://openalex.org/W6785369343"],"related_works":["https://openalex.org/W2039821316","https://openalex.org/W2041550843","https://openalex.org/W2388081684","https://openalex.org/W2537489883","https://openalex.org/W1976515580","https://openalex.org/W2017644937","https://openalex.org/W2917586021","https://openalex.org/W2012465643","https://openalex.org/W3011161512","https://openalex.org/W2928278548"],"abstract_inverted_index":{"Distributed":[0],"Denial":[1],"of":[2,24,80,120,142,173],"Service":[3],"(DDoS)":[4],"attacks":[5,139],"mitigation":[6,125],"typically":[7],"relies":[8],"on":[9,153],"source":[10,32],"IP-based":[11,202],"filtering":[12,38,54,121,148,179],"rules;":[13],"these":[14,86],"may":[15],"present":[16],"scaling":[17],"issues":[18],"due":[19],"to":[20,90,109,115,168],"the":[21,81,110],"vast":[22],"amount":[23],"involved":[25],"sources.":[26],"By":[27],"contrast,":[28],"we":[29],"propose":[30],"a":[31,105,117,132],"IP-agnostic":[33],"DDoS":[34],"traffic":[35,76,157,176],"classification":[36,144],"and":[37,50,134,146,155,182,208],"schema":[39,61,128],"that":[40,95,197],"identifies":[41],"malicious":[42,99,156,175],"packet":[43,58,84,147,184],"signatures":[44,103],"via":[45],"supervised":[46,91],"Machine":[47,92],"Learning":[48,93],"methods":[49],"subsequently":[51,88],"generates":[52],"signature-based":[53,199],"rules.":[55],"To":[56],"accelerate":[57],"processing,":[59],"our":[60,198],"utilizes":[62],"XDP":[63],"middleboxes":[64],"operating":[65],"as":[66,77,98,131],"programmable":[67],"Deep":[68],"Packet":[69],"Inspectors.":[70],"Signatures":[71],"are":[72,87],"extracted":[73],"from":[74],"network":[75,162],"unique":[78],"combinations":[79],"most":[82],"significant":[83,209],"features;":[85],"fed":[89],"algorithms":[94],"classify":[96],"them":[97],"or":[100],"benign.":[101],"Malicious":[102],"undergo":[104],"reduction":[106],"process":[107],"tailored":[108],"attack":[111],"vector":[112],"in":[113,140,160,171,188],"order":[114],"generate":[116],"concise":[118],"set":[119],"rules,":[122],"thus":[123],"expediting":[124],"performance.":[126],"Our":[127,164],"was":[129,166],"implemented":[130],"proof-of-concept":[133],"evaluated":[135],"for":[136],"DNS":[137],"volumetric":[138],"terms":[141,172],"signature":[143],"accuracy":[145,207],"throughput.":[149],"Experiments":[150],"were":[151],"based":[152],"benign":[154],"datasets":[158],"recorded":[159],"production":[161],"environments.":[163],"approach":[165,200],"compared":[167],"source-based":[169],"mechanisms":[170],"(i)":[174],"identification,":[177],"(ii)":[178],"rules":[180],"cardinality,":[181],"(iii)":[183],"processing":[185],"throughput":[186],"required":[187],"modern":[189],"high":[190,205],"speed":[191],"networks.":[192],"The":[193],"experimental":[194],"results":[195],"demonstrate":[196],"outperforms":[201],"alternatives,":[203],"achieving":[204],"detection":[206],"generalization":[210],"capabilities.":[211]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":15},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":14},{"year":2022,"cited_by_count":4}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
