{"id":"https://openalex.org/W4402157175","doi":"https://doi.org/10.1109/icc51166.2024.10622381","title":"Game-Theoretic Modeling of Hybrid Defense Strategies Against DRDoS Traffic in 5G Networks","display_name":"Game-Theoretic Modeling of Hybrid Defense Strategies Against DRDoS Traffic in 5G Networks","publication_year":2024,"publication_date":"2024-06-09","ids":{"openalex":"https://openalex.org/W4402157175","doi":"https://doi.org/10.1109/icc51166.2024.10622381"},"language":"en","primary_location":{"id":"doi:10.1109/icc51166.2024.10622381","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc51166.2024.10622381","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2024 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101391829","display_name":"Chaojie Guo","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chaojie Guo","raw_affiliation_strings":["Beijing University of Posts and Telecommunications,National Engineering Research Center of Mobile Network Technologies,Beijing,China,100876"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications,National Engineering Research Center of Mobile Network Technologies,Beijing,China,100876","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100377066","display_name":"Shen Wang","orcid":"https://orcid.org/0000-0002-4197-4501"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shen Wang","raw_affiliation_strings":["Beijing University of Posts and Telecommunications,National Engineering Research Center of Mobile Network Technologies,Beijing,China,100876"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications,National Engineering Research Center of Mobile Network Technologies,Beijing,China,100876","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100617163","display_name":"Xin Rong","orcid":"https://orcid.org/0000-0003-3631-6675"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Rong","raw_affiliation_strings":["Beijing University of Posts and Telecommunications,National Engineering Research Center of Mobile Network Technologies,Beijing,China,100876"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications,National Engineering Research Center of Mobile Network Technologies,Beijing,China,100876","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100624765","display_name":"Xiaofeng Tao","orcid":"https://orcid.org/0000-0001-9518-1622"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaofeng Tao","raw_affiliation_strings":["Beijing University of Posts and Telecommunications,National Engineering Research Center of Mobile Network Technologies,Beijing,China,100876"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications,National Engineering Research Center of Mobile Network Technologies,Beijing,China,100876","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101391829"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":0.7326,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.72415051,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"4650","last_page":"4655"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6832399368286133},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.6628663539886475},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4468640685081482},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.37972715497016907},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11856776475906372},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.08628305792808533}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6832399368286133},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.6628663539886475},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4468640685081482},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.37972715497016907},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11856776475906372},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.08628305792808533}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc51166.2024.10622381","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc51166.2024.10622381","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2024 - IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1989454965","https://openalex.org/W2088562872","https://openalex.org/W2510348142","https://openalex.org/W2592006715","https://openalex.org/W2613740561","https://openalex.org/W2733765803","https://openalex.org/W2741182468","https://openalex.org/W2789860114","https://openalex.org/W2889592383","https://openalex.org/W2920437306","https://openalex.org/W2969526048","https://openalex.org/W3006503311","https://openalex.org/W3030941702","https://openalex.org/W3046687504","https://openalex.org/W3123520636","https://openalex.org/W3173190309","https://openalex.org/W3210896474","https://openalex.org/W4205510190","https://openalex.org/W4206281848","https://openalex.org/W4364302703","https://openalex.org/W4375787811","https://openalex.org/W4376480592"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278","https://openalex.org/W4395014643"],"abstract_inverted_index":{"The":[0,110],"proliferation":[1],"of":[2,10,16,138],"Distributed":[3,20],"Denial-of-Service":[4,22],"(DDoS)":[5],"attacks":[6,24,133],"in":[7],"the":[8,14,27,50,79,87,93,100,105,114,136,140],"Internet":[9],"Things":[11],"(IoT)":[12],"and":[13,59,76,103,121,123,134],"emergence":[15],"variants":[17],"such":[18],"as":[19,33],"Reflection":[21],"(DRDoS)":[23],"severely":[25],"threaten":[26],"fifth-generation":[28],"(5G)":[29],"networks.":[30],"More":[31],"importantly,":[32],"attack":[34],"methods":[35],"continue":[36],"to":[37,72,98,129],"escalate,":[38],"attackers":[39],"can":[40,124],"obtain":[41],"deployed":[42],"critical":[43],"defense":[44,51,70,91],"strategies":[45,71],"through":[46],"continuous":[47],"probing,":[48],"increasing":[49],"difficulty.":[52],"We":[53],"propose":[54],"a":[55,126],"hybrid":[56,89,101],"strategy":[57,102],"model":[58,99],"corresponding":[60],"Software":[61],"Defined":[62],"Network":[63],"(SDN)":[64],"paradigm-based":[65],"framework":[66],"based":[67],"on":[68],"existing":[69],"deploy":[73],"it":[74],"flexibly":[75],"conveniently":[77],"into":[78],"3GPP-defined":[80],"5G":[81],"architecture.":[82],"In":[83],"addition,":[84],"after":[85],"quantifying":[86],"proposed":[88],"strategy's":[90],"capacity,":[92],"Stackelberg":[94],"game":[95],"is":[96,119],"employed":[97],"solve":[104],"optimal":[106,115],"packet":[107,116],"sampling":[108,117],"rate.":[109],"simulation":[111],"shows":[112],"that":[113],"rate":[118],"effective":[120],"robust":[122],"force":[125],"rational":[127],"attacker":[128],"give":[130],"up":[131],"DRDoS":[132],"achieve":[135],"effect":[137],"subduing":[139],"enemy":[141],"without":[142],"fighting.":[143]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
