{"id":"https://openalex.org/W4408092144","doi":"https://doi.org/10.1109/ants63515.2024.10898752","title":"Early Detection of DoS Attacks in 5G Core Networks","display_name":"Early Detection of DoS Attacks in 5G Core Networks","publication_year":2024,"publication_date":"2024-12-15","ids":{"openalex":"https://openalex.org/W4408092144","doi":"https://doi.org/10.1109/ants63515.2024.10898752"},"language":"en","primary_location":{"id":"doi:10.1109/ants63515.2024.10898752","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ants63515.2024.10898752","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061809454","display_name":"Meenu Rani Dey","orcid":"https://orcid.org/0000-0001-8357-033X"},"institutions":[{"id":"https://openalex.org/I1317621060","display_name":"Indian Institute of Technology Guwahati","ror":"https://ror.org/0022nd079","country_code":"IN","type":"education","lineage":["https://openalex.org/I1317621060"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Meenu Rani Dey","raw_affiliation_strings":["Indian Institute of Technology,Guwahati,Assam,India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology,Guwahati,Assam,India","institution_ids":["https://openalex.org/I1317621060"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116479353","display_name":"P Nithiyasri","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"P Nithiyasri","raw_affiliation_strings":["VIT,Andra Pradesh,India"],"affiliations":[{"raw_affiliation_string":"VIT,Andra Pradesh,India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029885901","display_name":"Moumita Patra","orcid":"https://orcid.org/0000-0002-3635-0809"},"institutions":[{"id":"https://openalex.org/I1317621060","display_name":"Indian Institute of Technology Guwahati","ror":"https://ror.org/0022nd079","country_code":"IN","type":"education","lineage":["https://openalex.org/I1317621060"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Moumita Patra","raw_affiliation_strings":["Indian Institute of Technology,Guwahati,Assam,India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology,Guwahati,Assam,India","institution_ids":["https://openalex.org/I1317621060"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5061809454"],"corresponding_institution_ids":["https://openalex.org/I1317621060"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.33068943,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9818999767303467,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9674999713897705,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5728532075881958},{"id":"https://openalex.org/keywords/core","display_name":"Core (optical fiber)","score":0.5128540992736816},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.40604937076568604},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.17823326587677002}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5728532075881958},{"id":"https://openalex.org/C2164484","wikidata":"https://www.wikidata.org/wiki/Q5170150","display_name":"Core (optical fiber)","level":2,"score":0.5128540992736816},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.40604937076568604},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.17823326587677002}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ants63515.2024.10898752","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ants63515.2024.10898752","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.4399999976158142}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"5G":[0,117],"introduces":[1],"various":[2,37,113,176],"innovations":[3],"and":[4,12,26,44,64,101,126,142,153,180],"opportunities":[5],"across":[6,175],"network":[7,10,33,52,114],"infrastructures,":[8],"with":[9],"slicing":[11],"Network":[13],"Function":[14,67],"Virtualization":[15],"(NFV)":[16],"being":[17],"significant":[18],"contributions.":[19],"These":[20],"technologies":[21],"support":[22],"diverse":[23],"applications,":[24],"infrastructure,":[25],"connectivity.":[27],"NFV,":[28],"in":[29,55],"particular,":[30],"enables":[31],"different":[32],"functions":[34,53,115],"to":[35],"serve":[36],"user":[38],"requests":[39],"via":[40,47],"the":[41,48,62,86,92,110,136,159],"control":[42,57],"plane":[43,58],"handle":[45],"traffic":[46,179],"data":[49],"plane.":[50],"However,":[51],"involved":[54],"handling":[56],"requests,":[59],"such":[60],"as":[61],"Access":[63],"Mobility":[65],"Management":[66],"(AMF),":[68],"are":[69],"targeted":[70],"by":[71,158],"attackers,":[72],"particularly":[73],"through":[74],"Denial":[75],"of":[76,94,116,178,183],"Service":[77],"(DoS)":[78],"attacks.":[79],"This":[80],"work":[81],"addresses":[82],"DoS":[83],"attacks":[84],"during":[85],"slice":[87],"synchronization":[88],"process.":[89],"To":[90,149],"assess":[91],"impact":[93,111],"these":[95],"attacks,":[96],"we":[97,134,162],"analyzed":[98],"their":[99],"effects":[100],"conducted":[102],"a":[103],"vulnerability":[104],"assessment":[105],"using":[106],"attack":[107],"graphs,":[108],"demonstrating":[109],"on":[112],"Core":[118],"(5GC)":[119],"networks.":[120],"Our":[121,169],"approach":[122],"leverages":[123],"dynamic":[124,146],"thresholding":[125],"ensemble":[127,165],"learning":[128],"techniques":[129],"for":[130],"effective":[131],"mitigation.":[132],"Initially,":[133],"compute":[135],"Power":[137],"Spectral":[138],"Density":[139],"(PSD)-based":[140],"entropy":[141],"compare":[143],"it":[144],"against":[145],"threshold":[147],"values.":[148],"enhance":[150],"detection":[151],"accuracy":[152,174],"address":[154],"instances":[155],"not":[156],"covered":[157],"PSD-entropy":[160],"method,":[161],"employ":[163],"an":[164],"learning-based":[166],"classification":[167],"algorithm.":[168],"proposed":[170],"method":[171],"achieves":[172],"better":[173],"types":[177],"differing":[181],"numbers":[182],"attackers.":[184]},"counts_by_year":[],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
