{"id":"https://openalex.org/W4368227575","doi":"https://doi.org/10.1109/iccae56788.2023.10111178","title":"Classifying DDoS Attack in Industrial Internet of Services Using Machine Learning","display_name":"Classifying DDoS Attack in Industrial Internet of Services Using Machine Learning","publication_year":2023,"publication_date":"2023-03-03","ids":{"openalex":"https://openalex.org/W4368227575","doi":"https://doi.org/10.1109/iccae56788.2023.10111178"},"language":"en","primary_location":{"id":"doi:10.1109/iccae56788.2023.10111178","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccae56788.2023.10111178","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 15th International Conference on Computer and Automation Engineering (ICCAE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000128347","display_name":"Ghazia Qaiser","orcid":null},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Ghazia Qaiser","raw_affiliation_strings":["Swinburne University of Technology,Melbourne,Australia","Swinburne University of Technology, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"Swinburne University of Technology,Melbourne,Australia","institution_ids":["https://openalex.org/I57093077"]},{"raw_affiliation_string":"Swinburne University of Technology, Melbourne, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063103978","display_name":"Sivachandran Chandrasekaran","orcid":"https://orcid.org/0000-0003-2871-880X"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Siva Chandrasekaran","raw_affiliation_strings":["Swinburne University of Technology,Melbourne,Australia","Swinburne University of Technology, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"Swinburne University of Technology,Melbourne,Australia","institution_ids":["https://openalex.org/I57093077"]},{"raw_affiliation_string":"Swinburne University of Technology, Melbourne, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018877662","display_name":"Rifai Chai","orcid":"https://orcid.org/0000-0002-1922-7024"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Rifai Chai","raw_affiliation_strings":["Swinburne University of Technology,Melbourne,Australia","Swinburne University of Technology, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"Swinburne University of Technology,Melbourne,Australia","institution_ids":["https://openalex.org/I57093077"]},{"raw_affiliation_string":"Swinburne University of Technology, Melbourne, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045517884","display_name":"Jinchuan Zheng","orcid":"https://orcid.org/0000-0002-0550-9223"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jinchuan Zheng","raw_affiliation_strings":["Swinburne University of Technology,Melbourne,Australia","Swinburne University of Technology, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"Swinburne University of Technology,Melbourne,Australia","institution_ids":["https://openalex.org/I57093077"]},{"raw_affiliation_string":"Swinburne University of Technology, Melbourne, Australia","institution_ids":["https://openalex.org/I57093077"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5000128347"],"corresponding_institution_ids":["https://openalex.org/I57093077"],"apc_list":null,"apc_paid":null,"fwci":2.0091,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.86887103,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"546","last_page":"550"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8655462861061096},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6498097777366638},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5710411667823792},{"id":"https://openalex.org/keywords/industrial-internet","display_name":"Industrial Internet","score":0.4522743821144104},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.4435785412788391},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4228725731372833},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.397602379322052},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.34504708647727966},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.19502422213554382}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8655462861061096},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6498097777366638},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5710411667823792},{"id":"https://openalex.org/C202839342","wikidata":"https://www.wikidata.org/wiki/Q60740481","display_name":"Industrial Internet","level":3,"score":0.4522743821144104},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.4435785412788391},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4228725731372833},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.397602379322052},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.34504708647727966},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.19502422213554382}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccae56788.2023.10111178","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccae56788.2023.10111178","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 15th International Conference on Computer and Automation Engineering (ICCAE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6299999952316284,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2150326814","https://openalex.org/W2157019484","https://openalex.org/W2733212611","https://openalex.org/W2887236809","https://openalex.org/W2890600598","https://openalex.org/W3113717894","https://openalex.org/W3120536062","https://openalex.org/W3139597027","https://openalex.org/W4200327928","https://openalex.org/W4206951909","https://openalex.org/W4210437295","https://openalex.org/W4212990994","https://openalex.org/W4232497677","https://openalex.org/W4290717392","https://openalex.org/W4312064608","https://openalex.org/W4316039105","https://openalex.org/W4316813246","https://openalex.org/W6740856321"],"related_works":["https://openalex.org/W2360429410","https://openalex.org/W2898696280","https://openalex.org/W2204131204","https://openalex.org/W2383770723","https://openalex.org/W2921433547","https://openalex.org/W2958385475","https://openalex.org/W4377970398","https://openalex.org/W1484565796","https://openalex.org/W2185673024","https://openalex.org/W3026018975"],"abstract_inverted_index":{"There":[0],"were":[1],"various":[2],"research":[3,113,157],"articles":[4],"proposed":[5],"different":[6,77],"IIoT":[7,37],"and":[8,166],"Industrial":[9],"Internet":[10,64],"of":[11,26,106,134],"Services":[12],"(IIoS)":[13],"techniques":[14],"for":[15,33,72,87,147],"Industry":[16],"4.0":[17],"innovative":[18],"practices.":[19],"At":[20],"the":[21,24,63,73,89,95,98,152],"same":[22,96],"time,":[23,97],"concept":[25],"IIoS":[27,58,80],"is":[28,59,81,114],"considered":[29],"a":[30,66,82],"critical":[31],"enabler":[32],"smart":[34],"industries.":[35,78],"Therefore,":[36],"has":[38],"evolved":[39],"over":[40],"time":[41],"into":[42],"an":[43],"IIoS,":[44],"which":[45],"introduces":[46],"servitization":[47],"processes":[48],"to":[49,60,68,85,137],"measure":[50],"product":[51],"or":[52],"service":[53],"quality.":[54],"The":[55,79,125,141],"idea":[56],"behind":[57],"strategically":[61],"use":[62],"as":[65],"platform":[67],"assemble":[69],"new":[70],"value":[71],"services":[74],"sector":[75],"in":[76,132,161],"vital":[83],"aspect":[84],"consider":[86],"improving":[88],"final":[90],"production":[91,168],"line.":[92],"However,":[93],"at":[94,104],"internet\u2019s":[99],"inherent":[100],"vulnerability":[101],"puts":[102],"it":[103],"risk":[105],"cyber":[107],"security":[108],"attacks,":[109],"particularly":[110],"DDoS":[111,118,139,164],"attacks.This":[112],"focused":[115],"on":[116],"investigating":[117],"vulnerabilities":[119],"that":[120],"can":[121,158],"negatively":[122],"impact":[123],"IIoS.":[124],"study":[126],"evaluates":[127],"six":[128],"machine":[129],"learning":[130],"algorithms":[131,144],"terms":[133],"their":[135],"ability":[136],"detect":[138],"attacks.":[140],"mentioned":[142],"ML":[143],"are":[145],"renowned":[146],"data":[148],"traffic":[149],"classification":[150],"within":[151],"existing":[153],"literature.":[154],"Moreover,":[155],"this":[156],"assist":[159],"users":[160],"diagnosing":[162],"potential":[163],"threats":[165],"optimizing":[167],"lines.":[169]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
