{"id":"https://openalex.org/W2887235364","doi":"https://doi.org/10.1109/icc.2018.8422448","title":"A Novel Distributed Denial-of-Service Attack Detection Scheme for Software Defined Networking Environments","display_name":"A Novel Distributed Denial-of-Service Attack Detection Scheme for Software Defined Networking Environments","publication_year":2018,"publication_date":"2018-05-01","ids":{"openalex":"https://openalex.org/W2887235364","doi":"https://doi.org/10.1109/icc.2018.8422448","mag":"2887235364"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2018.8422448","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2018.8422448","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061391892","display_name":"Di Wu","orcid":"https://orcid.org/0000-0001-8697-1817"},"institutions":[{"id":"https://openalex.org/I146399215","display_name":"University of Tsukuba","ror":"https://ror.org/02956yf07","country_code":"JP","type":"education","lineage":["https://openalex.org/I146399215"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Di Wu","raw_affiliation_strings":["Department of Computer Science, University of Tsukuba, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Tsukuba, Japan","institution_ids":["https://openalex.org/I146399215"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100679241","display_name":"Jie Li","orcid":"https://orcid.org/0000-0002-4974-6116"},"institutions":[{"id":"https://openalex.org/I146399215","display_name":"University of Tsukuba","ror":"https://ror.org/02956yf07","country_code":"JP","type":"education","lineage":["https://openalex.org/I146399215"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Jie Li","raw_affiliation_strings":["Department of Computer Science, University of Tsukuba, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Tsukuba, Japan","institution_ids":["https://openalex.org/I146399215"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050881965","display_name":"Sajal K. Das","orcid":"https://orcid.org/0000-0002-9471-0868"},"institutions":[{"id":"https://openalex.org/I20382870","display_name":"Missouri University of Science and Technology","ror":"https://ror.org/00scwqd12","country_code":"US","type":"education","lineage":["https://openalex.org/I20382870"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sajal K. Das","raw_affiliation_strings":["Department of Computer Science, Missouri University of Science and Technology, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Missouri University of Science and Technology, USA","institution_ids":["https://openalex.org/I20382870"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029265765","display_name":"Jinsong Wu","orcid":"https://orcid.org/0000-0003-4720-5946"},"institutions":[{"id":"https://openalex.org/I69737025","display_name":"University of Chile","ror":"https://ror.org/047gc3g35","country_code":"CL","type":"education","lineage":["https://openalex.org/I69737025"]}],"countries":["CL"],"is_corresponding":false,"raw_author_name":"Jinsong Wu","raw_affiliation_strings":["Department of Electrical Engineering, University of Chile, Chile"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, University of Chile, Chile","institution_ids":["https://openalex.org/I69737025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037098061","display_name":"Yusheng Ji","orcid":"https://orcid.org/0000-0003-4364-8491"},"institutions":[{"id":"https://openalex.org/I184597095","display_name":"National Institute of Informatics","ror":"https://ror.org/04ksd4g47","country_code":"JP","type":"facility","lineage":["https://openalex.org/I1319490839","https://openalex.org/I184597095","https://openalex.org/I4210158934"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yusheng Ji","raw_affiliation_strings":["Information Systems Architecture Research Division, National Institute of Informatics, Japan"],"affiliations":[{"raw_affiliation_string":"Information Systems Architecture Research Division, National Institute of Informatics, Japan","institution_ids":["https://openalex.org/I184597095"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081827896","display_name":"Zhetao Li","orcid":"https://orcid.org/0000-0002-7804-0286"},"institutions":[{"id":"https://openalex.org/I4610292","display_name":"Xiangtan University","ror":"https://ror.org/00xsfaz62","country_code":"CN","type":"education","lineage":["https://openalex.org/I4610292"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhetao Li","raw_affiliation_strings":["College of Information Engineering, Xiangtan University, China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Xiangtan University, China","institution_ids":["https://openalex.org/I4610292"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5061391892"],"corresponding_institution_ids":["https://openalex.org/I146399215"],"apc_list":null,"apc_paid":null,"fwci":3.1371,"has_fulltext":false,"cited_by_count":26,"citation_normalized_percentile":{"value":0.92461298,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.9314383268356323},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.8804900646209717},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8199343681335449},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.8136144280433655},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.7836399078369141},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5533900260925293},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5445289015769958},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5192144513130188},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.44782131910324097},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4467047154903412},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40651223063468933},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.18687039613723755},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10958781838417053}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.9314383268356323},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.8804900646209717},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8199343681335449},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.8136144280433655},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.7836399078369141},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5533900260925293},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5445289015769958},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5192144513130188},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.44782131910324097},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4467047154903412},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40651223063468933},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.18687039613723755},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10958781838417053},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2018.8422448","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2018.8422448","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W158224344","https://openalex.org/W1577498723","https://openalex.org/W1675033504","https://openalex.org/W1829787244","https://openalex.org/W1984451560","https://openalex.org/W1997299558","https://openalex.org/W1999935041","https://openalex.org/W2036235750","https://openalex.org/W2095228834","https://openalex.org/W2107573120","https://openalex.org/W2113044782","https://openalex.org/W2122695394","https://openalex.org/W2137845741","https://openalex.org/W2157578436","https://openalex.org/W2163375756","https://openalex.org/W2164210932","https://openalex.org/W2305050221","https://openalex.org/W2485966427","https://openalex.org/W2784153305","https://openalex.org/W2792264521","https://openalex.org/W2798915702","https://openalex.org/W6606536520","https://openalex.org/W6638835209","https://openalex.org/W6676773706","https://openalex.org/W6750886310"],"related_works":["https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W1968168724","https://openalex.org/W2204131204","https://openalex.org/W2754163055","https://openalex.org/W4322008378","https://openalex.org/W2383770723","https://openalex.org/W2186749541","https://openalex.org/W2360429410","https://openalex.org/W2276629685"],"abstract_inverted_index":{"Software-Defined":[0],"networking":[1],"(SDN),":[2],"as":[3,34],"a":[4,87,104],"new":[5,88],"paradigm,":[6],"fixes":[7],"the":[8,16,122,131,138],"shortage":[9],"that":[10],"traditional":[11],"network":[12,123,132],"does":[13],"not":[14,67],"support":[15],"dynamic,":[17],"scalable":[18],"computing":[19,25],"and":[20,43,48],"storage":[21],"needs":[22],"of":[23],"more":[24],"environments.":[26],"SDN,":[27],"however,":[28],"also":[29,75],"faces":[30],"security":[31],"problems":[32],"such":[33],"vulnerable":[35],"to":[36,71,99,120,136],"DDoS":[37,39,46,49,61,90,107,157],"attacks.":[38,45,158],"attacks":[40,62],"are":[41,55],"well-known":[42],"powerful":[44],"detection":[47,108],"traffic":[50,126],"separation":[51],"for":[52,110,156],"SDN":[53,64,80,94,111],"environments":[54,65],"still":[56],"an":[57],"open":[58],"research":[59],"issue.":[60],"in":[63],"will":[66],"only":[68],"bring":[69],"damage":[70],"target":[72],"server,":[73],"but":[74],"takes":[76],"exact":[77],"impact":[78],"on":[79,125],"system.":[81],"In":[82],"this":[83],"paper,":[84],"we":[85],"identify":[86],"type":[89],"attack,":[91],"specifically":[92],"aiming":[93],"environment,":[95,112],"which":[96],"is":[97],"harder":[98],"be":[100],"detected.":[101],"We":[102,129,142],"propose":[103],"novel":[105],"real-time":[106],"scheme":[109,119,145,151],"by":[113],"using":[114],"Principal":[115],"Component":[116],"Analysis":[117],"(PCA)":[118],"analyze":[121],"status":[124],"packets":[127],"data.":[128],"separate":[130],"into":[133],"different":[134],"parts,":[135],"reduce":[137],"total":[139],"calculation":[140],"burden.":[141],"compare":[143],"our":[144,150],"with":[146],"sample":[147],"entropy,":[148],"showed":[149],"achieves":[152],"better":[153],"detecting":[154],"ability":[155]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
