{"id":"https://openalex.org/W4392905182","doi":"https://doi.org/10.1109/acit58888.2023.10453879","title":"Mitigating Distributed Denial of Service Attacks Through IP Spoofing Detection","display_name":"Mitigating Distributed Denial of Service Attacks Through IP Spoofing Detection","publication_year":2023,"publication_date":"2023-12-06","ids":{"openalex":"https://openalex.org/W4392905182","doi":"https://doi.org/10.1109/acit58888.2023.10453879"},"language":"en","primary_location":{"id":"doi:10.1109/acit58888.2023.10453879","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/acit58888.2023.10453879","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 24th International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039065536","display_name":"Yasir Abdelgadir Mohamed","orcid":"https://orcid.org/0000-0002-9337-7688"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yasir Abdelgadir Mohamed","raw_affiliation_strings":["MIS, College of Business Adminstration, A&#x0027;Sharqyiah University,Ibra,Oman"],"raw_orcid":"https://orcid.org/0000-0002-9337-7688","affiliations":[{"raw_affiliation_string":"MIS, College of Business Adminstration, A&#x0027;Sharqyiah University,Ibra,Oman","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5039065536"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.2573143,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8888579607009888},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.6973350048065186},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6673306226730347},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.596602737903595},{"id":"https://openalex.org/keywords/ip-address-spoofing","display_name":"IP address spoofing","score":0.5342613458633423},{"id":"https://openalex.org/keywords/ip-traceback","display_name":"IP traceback","score":0.48696693778038025},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4379284381866455},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.11835166811943054},{"id":"https://openalex.org/keywords/internet-protocol","display_name":"Internet Protocol","score":0.07088619470596313},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.06985005736351013},{"id":"https://openalex.org/keywords/ip-address-management","display_name":"IP address management","score":0.06541934609413147}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8888579607009888},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.6973350048065186},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6673306226730347},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.596602737903595},{"id":"https://openalex.org/C111814575","wikidata":"https://www.wikidata.org/wiki/Q550893","display_name":"IP address spoofing","level":5,"score":0.5342613458633423},{"id":"https://openalex.org/C2776059407","wikidata":"https://www.wikidata.org/wiki/Q5973212","display_name":"IP traceback","level":4,"score":0.48696693778038025},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4379284381866455},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.11835166811943054},{"id":"https://openalex.org/C35341882","wikidata":"https://www.wikidata.org/wiki/Q8795","display_name":"Internet Protocol","level":3,"score":0.07088619470596313},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.06985005736351013},{"id":"https://openalex.org/C201980515","wikidata":"https://www.wikidata.org/wiki/Q13219707","display_name":"IP address management","level":4,"score":0.06541934609413147}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acit58888.2023.10453879","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/acit58888.2023.10453879","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 24th International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W2000155568","https://openalex.org/W2028730002","https://openalex.org/W2087853663","https://openalex.org/W2093386557","https://openalex.org/W2101206686","https://openalex.org/W2102683561","https://openalex.org/W2403459574","https://openalex.org/W2775195841","https://openalex.org/W2792705209","https://openalex.org/W2888402752","https://openalex.org/W2898935358","https://openalex.org/W2899439128","https://openalex.org/W2958285686","https://openalex.org/W2982532604","https://openalex.org/W3022640892","https://openalex.org/W3096099559","https://openalex.org/W4249470667","https://openalex.org/W4280630885","https://openalex.org/W4282929449","https://openalex.org/W4313415951","https://openalex.org/W4381735918","https://openalex.org/W4385201715","https://openalex.org/W4386157204","https://openalex.org/W6713047218"],"related_works":["https://openalex.org/W2170470865","https://openalex.org/W2167302331","https://openalex.org/W1493760256","https://openalex.org/W2359167911","https://openalex.org/W2122974298","https://openalex.org/W2342208107","https://openalex.org/W2151002785","https://openalex.org/W2791075267","https://openalex.org/W2290771989","https://openalex.org/W2127772962"],"abstract_inverted_index":{"Distributed":[0,78,116],"denial":[1],"of":[2,16,29,68,80,86,92,115,118,148,155,163],"service":[3,12],"(DDoS)":[4,82],"attacks":[5,25],"pose":[6],"a":[7,27,45,74,152],"significant":[8],"threat":[9,62],"to":[10,22,31,43,54,72,76,108,126,130,142],"network-based":[11],"providers.":[13],"The":[14,66,84,104,121,146],"utilization":[15],"numerous":[17],"compromised":[18],"devices":[19],"by":[20],"attackers":[21,41,53],"launch":[23],"these":[24],"adds":[26],"layer":[28],"complexity":[30,35],"their":[32],"management.":[33],"This":[34],"can":[36],"further":[37],"escalate":[38],"when":[39],"multiple":[40],"collaborate":[42],"target":[44],"single":[46],"victim.":[47],"Moreover,":[48],"the":[49,61,90,96,113,128,144,149,156,161],"proficiency":[50],"required":[51],"for":[52,112],"execute":[55],"such":[56],"assaults":[57],"has":[58],"diminished,":[59],"making":[60],"landscape":[63],"more":[64],"widespread.":[65],"focus":[67],"this":[69],"research":[70],"is":[71,107,124],"devise":[73],"solution":[75],"counter":[77],"Denial":[79,117],"Service":[81,119],"attacks.":[83,120,165],"presence":[85],"IP":[87],"spoofing":[88],"complicates":[89],"identification":[91],"malicious":[93],"traffic,":[94,134],"blurring":[95],"line":[97],"between":[98],"genuine":[99],"connections":[100],"and":[101,137],"malevolent":[102],"activities.":[103],"primary":[105],"aim":[106],"introduce":[109],"an":[110],"approach":[111],"prevention":[114],"proposed":[122,157],"system":[123],"designed":[125],"possess":[127],"capability":[129],"actively":[131],"monitor":[132],"network":[133],"promptly":[135],"detecting":[136],"thwarting":[138],"any":[139],"unauthorized":[140],"attempts":[141],"breach":[143],"network.":[145],"outcomes":[147],"investigation":[150],"reveal":[151],"favorable":[153],"impact":[154,162],"strategy":[158],"in":[159],"mitigating":[160],"DDoS":[164]},"counts_by_year":[],"updated_date":"2025-12-25T23:11:45.687758","created_date":"2025-10-10T00:00:00"}
