{"id":"https://openalex.org/W4392910476","doi":"https://doi.org/10.1109/ccnc51664.2024.10454798","title":"Detecting DDoS Attacks Through AI driven SDN Intrusion Detection System","display_name":"Detecting DDoS Attacks Through AI driven SDN Intrusion Detection System","publication_year":2024,"publication_date":"2024-01-06","ids":{"openalex":"https://openalex.org/W4392910476","doi":"https://doi.org/10.1109/ccnc51664.2024.10454798"},"language":"en","primary_location":{"id":"doi:10.1109/ccnc51664.2024.10454798","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc51664.2024.10454798","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 21st Consumer Communications &amp; Networking Conference (CCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5094180442","display_name":"Francesco Salatino","orcid":null},"institutions":[{"id":"https://openalex.org/I45204951","display_name":"University of Calabria","ror":"https://ror.org/02rc97e94","country_code":"IT","type":"education","lineage":["https://openalex.org/I45204951"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Francesco Salatino","raw_affiliation_strings":["University of Calabria,DIMES department,Rende,Italy,87036"],"affiliations":[{"raw_affiliation_string":"University of Calabria,DIMES department,Rende,Italy,87036","institution_ids":["https://openalex.org/I45204951"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074855296","display_name":"Mattia Giovanni Spina","orcid":"https://orcid.org/0009-0000-8407-2551"},"institutions":[{"id":"https://openalex.org/I45204951","display_name":"University of Calabria","ror":"https://ror.org/02rc97e94","country_code":"IT","type":"education","lineage":["https://openalex.org/I45204951"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Mattia Giovanni Spina","raw_affiliation_strings":["University of Calabria,DIMES department,Rende,Italy,87036"],"affiliations":[{"raw_affiliation_string":"University of Calabria,DIMES department,Rende,Italy,87036","institution_ids":["https://openalex.org/I45204951"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040192664","display_name":"Mauro Tropea","orcid":"https://orcid.org/0000-0003-0593-5254"},"institutions":[{"id":"https://openalex.org/I45204951","display_name":"University of Calabria","ror":"https://ror.org/02rc97e94","country_code":"IT","type":"education","lineage":["https://openalex.org/I45204951"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Mauro Tropea","raw_affiliation_strings":["University of Calabria,DIMES department,Rende,Italy,87036"],"affiliations":[{"raw_affiliation_string":"University of Calabria,DIMES department,Rende,Italy,87036","institution_ids":["https://openalex.org/I45204951"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075581736","display_name":"Floriano De Rango","orcid":"https://orcid.org/0000-0003-4901-6233"},"institutions":[{"id":"https://openalex.org/I45204951","display_name":"University of Calabria","ror":"https://ror.org/02rc97e94","country_code":"IT","type":"education","lineage":["https://openalex.org/I45204951"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Floriano De Rango","raw_affiliation_strings":["University of Calabria,DIMES department,Rende,Italy,87036"],"affiliations":[{"raw_affiliation_string":"University of Calabria,DIMES department,Rende,Italy,87036","institution_ids":["https://openalex.org/I45204951"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5094180442"],"corresponding_institution_ids":["https://openalex.org/I45204951"],"apc_list":null,"apc_paid":null,"fwci":5.8612,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.96448174,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"990","last_page":"993"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8529742360115051},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7532349824905396},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6885488033294678},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.6231231689453125},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.4576811194419861},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.4400709271430969},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42532479763031006},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4234102964401245},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14476493000984192},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.12141713500022888}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8529742360115051},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7532349824905396},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6885488033294678},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.6231231689453125},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.4576811194419861},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.4400709271430969},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42532479763031006},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4234102964401245},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14476493000984192},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.12141713500022888}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccnc51664.2024.10454798","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc51664.2024.10454798","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 21st Consumer Communications &amp; Networking Conference (CCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5199999809265137,"display_name":"Climate action","id":"https://metadata.un.org/sdg/13"}],"awards":[{"id":"https://openalex.org/G507880695","display_name":null,"funder_award_id":"PE00000014","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2772373517","https://openalex.org/W3003577032","https://openalex.org/W3006251424","https://openalex.org/W3081430061","https://openalex.org/W3126276480","https://openalex.org/W4213070773","https://openalex.org/W4281725433","https://openalex.org/W4327767769","https://openalex.org/W4387913061","https://openalex.org/W6746347257"],"related_works":["https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W1968168724","https://openalex.org/W2204131204","https://openalex.org/W4322008378","https://openalex.org/W2383770723","https://openalex.org/W2754163055","https://openalex.org/W2186749541","https://openalex.org/W2360429410","https://openalex.org/W4256682929"],"abstract_inverted_index":{"In":[0,26],"this":[1],"paper,":[2],"an":[3,10],"AI-driven":[4],"Intrusion":[5],"Detection":[6],"System":[7],"(IDS)":[8],"in":[9,94,114],"SDN":[11,21],"environment":[12],"is":[13,73],"proposed":[14,33],"exploiting":[15],"the":[16,20,24,32,71,78,89,98,104],"holist":[17],"view":[18],"of":[19,23,37,70,77,116],"controller":[22],"network.":[25],"order":[27,95],"to":[28,96],"detect":[29],"malicious":[30],"traffic,":[31],"system":[34,112],"makes":[35],"use":[36],"Machine":[38],"and":[39,61,88,102,107],"Deep":[40,62],"Learning":[41],"(ML/DL)":[42],"techniques":[43],"and,":[44],"based":[45],"on":[46],"a":[47,74],"well-known":[48],"network":[49,79],"dataset":[50,105],"called":[51],"CSE-CIC-IDS2018,":[52],"it":[53],"trains":[54],"Decision":[55],"Tree":[56],"(DT),":[57],"Random":[58],"Forest":[59],"(RF),":[60],"Neural":[63],"Network":[64],"(DNN)":[65],"models.":[66],"The":[67],"main":[68],"task":[69],"proposal":[72],"deep":[75],"analysis":[76],"traffic":[80],"features":[81,101],"using":[82],"two":[83],"techniques,":[84],"Pearson's":[85],"correlation":[86],"coefficient":[87],"Mean":[90],"Decrease":[91],"Impurity":[92],"(MDI),":[93],"find":[97],"most":[99],"important":[100],"reduce":[103],"size":[106],"model":[108],"complexity":[109],"guaranteeing":[110],"optimal":[111],"performance":[113],"terms":[115],"server's":[117],"response":[118],"time.":[119]},"counts_by_year":[{"year":2025,"cited_by_count":13},{"year":2024,"cited_by_count":3}],"updated_date":"2026-01-25T23:04:38.658462","created_date":"2025-10-10T00:00:00"}
