{"id":"https://openalex.org/W3151470781","doi":"https://doi.org/10.1109/icin51074.2021.9385540","title":"SYN Flood Attack Detection and Mitigation using Machine Learning Traffic Classification and Programmable Data Plane Filtering","display_name":"SYN Flood Attack Detection and Mitigation using Machine Learning Traffic Classification and Programmable Data Plane Filtering","publication_year":2021,"publication_date":"2021-03-01","ids":{"openalex":"https://openalex.org/W3151470781","doi":"https://doi.org/10.1109/icin51074.2021.9385540","mag":"3151470781"},"language":"en","primary_location":{"id":"doi:10.1109/icin51074.2021.9385540","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icin51074.2021.9385540","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 24th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009541202","display_name":"Marinos Dimolianis","orcid":"https://orcid.org/0000-0003-1118-0804"},"institutions":[{"id":"https://openalex.org/I174458059","display_name":"National Technical University of Athens","ror":"https://ror.org/03cx6bg69","country_code":"GR","type":"education","lineage":["https://openalex.org/I174458059"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Marinos Dimolianis","raw_affiliation_strings":["Network Management & Optimal Design Laboratory (NETMODE), School of Electrical & Computer Engineering, National Technical University of Athens (NTUA), Greece"],"affiliations":[{"raw_affiliation_string":"Network Management & Optimal Design Laboratory (NETMODE), School of Electrical & Computer Engineering, National Technical University of Athens (NTUA), Greece","institution_ids":["https://openalex.org/I174458059"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012963451","display_name":"Adam Pavlidis","orcid":"https://orcid.org/0000-0002-3803-2804"},"institutions":[{"id":"https://openalex.org/I174458059","display_name":"National Technical University of Athens","ror":"https://ror.org/03cx6bg69","country_code":"GR","type":"education","lineage":["https://openalex.org/I174458059"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Adam Pavlidis","raw_affiliation_strings":["Network Management & Optimal Design Laboratory (NETMODE), School of Electrical & Computer Engineering, National Technical University of Athens (NTUA), Greece"],"affiliations":[{"raw_affiliation_string":"Network Management & Optimal Design Laboratory (NETMODE), School of Electrical & Computer Engineering, National Technical University of Athens (NTUA), Greece","institution_ids":["https://openalex.org/I174458059"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072274800","display_name":"Vasilis Maglaris","orcid":"https://orcid.org/0000-0002-0352-5713"},"institutions":[{"id":"https://openalex.org/I174458059","display_name":"National Technical University of Athens","ror":"https://ror.org/03cx6bg69","country_code":"GR","type":"education","lineage":["https://openalex.org/I174458059"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Vasilis Maglaris","raw_affiliation_strings":["Network Management & Optimal Design Laboratory (NETMODE), School of Electrical & Computer Engineering, National Technical University of Athens (NTUA), Greece"],"affiliations":[{"raw_affiliation_string":"Network Management & Optimal Design Laboratory (NETMODE), School of Electrical & Computer Engineering, National Technical University of Athens (NTUA), Greece","institution_ids":["https://openalex.org/I174458059"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5009541202"],"corresponding_institution_ids":["https://openalex.org/I174458059"],"apc_list":null,"apc_paid":null,"fwci":2.5978,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.89733127,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"126","last_page":"133"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.79175865650177},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6790132522583008},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6025367379188538},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.46204185485839844},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.44206273555755615},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4206300377845764},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3569340109825134},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.21433773636817932}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.79175865650177},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6790132522583008},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6025367379188538},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.46204185485839844},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.44206273555755615},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4206300377845764},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3569340109825134},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.21433773636817932},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icin51074.2021.9385540","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icin51074.2021.9385540","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 24th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5600000023841858,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320338080","display_name":"European Social Fund","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W149523093","https://openalex.org/W1522301498","https://openalex.org/W1994926493","https://openalex.org/W2102189605","https://openalex.org/W2126105956","https://openalex.org/W2171377901","https://openalex.org/W2535838896","https://openalex.org/W2612104483","https://openalex.org/W2903038868","https://openalex.org/W2904333952","https://openalex.org/W2940715617","https://openalex.org/W3010538733","https://openalex.org/W3015773798","https://openalex.org/W3017134229","https://openalex.org/W4297687186","https://openalex.org/W6606098666","https://openalex.org/W6631190155","https://openalex.org/W6762132567","https://openalex.org/W6775236627"],"related_works":["https://openalex.org/W4386482731","https://openalex.org/W2765763546","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W4256682929","https://openalex.org/W335511927","https://openalex.org/W2471811227","https://openalex.org/W2039821316","https://openalex.org/W2388081684","https://openalex.org/W2150112053"],"abstract_inverted_index":{"Distributed":[0],"Denial":[1],"of":[2,45,88,159,175,206],"Service":[3],"(DDoS)":[4],"attacks":[5],"are":[6,80,93,141,155],"widely":[7],"used":[8],"by":[9],"malicious":[10,139,160],"actors":[11],"to":[12,25,48,82,95,102,107,115,119,130,143],"disrupt":[13],"network":[14,72],"infrastructures/services.":[15],"A":[16],"common":[17],"attack":[18,191],"is":[19,74,117],"TCP":[20,113],"SYN":[21,35,212],"Flood":[22],"that":[23,61,70,99,124,195],"attempts":[24],"exhaust":[26],"memory":[27],"and":[28,41,58,65,76,162,178,187,209],"processing":[29,39],"resources.":[30],"Typical":[31],"mitigation":[32,59,137],"mechanisms,":[33],"i.e.":[34,85],"cookies":[36,213],"require":[37],"significant":[38],"resources":[40],"generate":[42],"large":[43],"rates":[44],"backscatter":[46],"traffic":[47,73,114,128,217],"block":[49],"them.":[50],"In":[51],"this":[52],"paper,":[53],"we":[54],"propose":[55],"a":[56,144,149],"detection":[57,176,200],"schema":[60],"focuses":[62],"on":[63,166],"generating":[64],"optimizing":[66],"signature-based":[67],"rules.":[68],"To":[69,135],"end,":[71],"monitored":[75],"appropriate":[77],"packet-level":[78],"data":[79],"processed":[81],"form":[83],"signatures":[84,105,131,140,161],"unique":[86],"combinations":[87],"packet":[89,179],"field":[90],"values.":[91],"These":[92],"fed":[94],"machine":[96],"learning":[97],"models":[98],"classify":[100],"them":[101],"malicious/benign.":[103],"Malicious":[104],"corresponding":[106],"specific":[108],"destinations":[109],"identify":[110],"potential":[111],"victims.":[112],"victims":[116],"redirected":[118],"high-performance":[120],"programmable":[121],"XDPenabled":[122],"firewalls":[123],"filter":[125],"off":[126],"ending":[127],"according":[129],"classified":[132],"as":[133,148],"malicious.":[134],"enhance":[136],"performance":[138,181],"subjected":[142],"reduction":[145],"process,":[146],"formulated":[147],"multi-objective":[150],"optimization":[151],"problem.":[152],"Minimization":[153],"objectives":[154],"(i)":[156],"the":[157,204,211],"number":[158,205],"(ii)":[163],"collateral":[164],"damage":[165],"benign":[167],"traffic.":[168,192],"We":[169,193],"evaluate":[170],"our":[171,196],"approach":[172,197],"in":[173,215],"terms":[174],"accuracy":[177],"filtering":[180,207],"employing":[182],"traces":[183],"from":[184],"production":[185],"environments":[186],"high":[188,199],"rate":[189],"generated":[190],"showcase":[194],"achieves":[198],"accuracy,":[201],"significantly":[202],"reduces":[203],"rules":[208],"outperforms":[210],"mechanism":[214],"high-speed":[216],"scenarios.":[218]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
