{"id":"https://openalex.org/W7156316022","doi":"https://doi.org/10.1109/icin69025.2026.11481839","title":"SOM-based Continuous XGBoost Approach for DDoS Attack Detection and Mitigation in Edge SDN","display_name":"SOM-based Continuous XGBoost Approach for DDoS Attack Detection and Mitigation in Edge SDN","publication_year":2026,"publication_date":"2026-03-30","ids":{"openalex":"https://openalex.org/W7156316022","doi":"https://doi.org/10.1109/icin69025.2026.11481839"},"language":null,"primary_location":{"id":"doi:10.1109/icin69025.2026.11481839","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icin69025.2026.11481839","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 29th Conference on Innovation in Clouds, Internet and Networks (ICIN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063225042","display_name":"Shijin Liu","orcid":"https://orcid.org/0000-0002-6194-9557"},"institutions":[{"id":"https://openalex.org/I171481255","display_name":"Shibaura Institute of Technology","ror":"https://ror.org/020wjcq07","country_code":"JP","type":"education","lineage":["https://openalex.org/I171481255"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Shijin Liu","raw_affiliation_strings":["Shibaura Institute of Technology,Department of Computer Science and Engineering,Tokyo,Japan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Shibaura Institute of Technology,Department of Computer Science and Engineering,Tokyo,Japan","institution_ids":["https://openalex.org/I171481255"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047716888","display_name":"Hiroaki Fukuda","orcid":"https://orcid.org/0000-0003-1228-3186"},"institutions":[{"id":"https://openalex.org/I171481255","display_name":"Shibaura Institute of Technology","ror":"https://ror.org/020wjcq07","country_code":"JP","type":"education","lineage":["https://openalex.org/I171481255"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hiroaki Fukuda","raw_affiliation_strings":["Shibaura Institute of Technology,Department of Computer Science and Engineering,Tokyo,Japan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Shibaura Institute of Technology,Department of Computer Science and Engineering,Tokyo,Japan","institution_ids":["https://openalex.org/I171481255"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5134699370","display_name":"Paul Leger","orcid":null},"institutions":[{"id":"https://openalex.org/I2802166871","display_name":"Universidad Cat\u00f3lica del Norte","ror":"https://ror.org/02akpm128","country_code":"CL","type":"education","lineage":["https://openalex.org/I2802166871"]}],"countries":["CL"],"is_corresponding":false,"raw_author_name":"Paul Leger","raw_affiliation_strings":["Escuela de Ingenier&#x00ED;a, Universidad Cat&#x00F3;lica del Norte,Coquimbo,Chile"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Escuela de Ingenier&#x00ED;a, Universidad Cat&#x00F3;lica del Norte,Coquimbo,Chile","institution_ids":["https://openalex.org/I2802166871"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5063225042"],"corresponding_institution_ids":["https://openalex.org/I171481255"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.9628336,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.2913999855518341,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.2913999855518341,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.1509999930858612,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.13680000603199005,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.675000011920929},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.44350001215934753},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.29789999127388},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.2903999984264374},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.28459998965263367},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.2815999984741211}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.675000011920929},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6330000162124634},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.47519999742507935},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.44350001215934753},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3783999979496002},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.29789999127388},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.2903999984264374},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.28459998965263367},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2815999984741211},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2752000093460083},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2563000023365021},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.25270000100135803},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.2513999938964844},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.25099998712539673}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icin69025.2026.11481839","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icin69025.2026.11481839","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 29th Conference on Innovation in Clouds, Internet and Networks (ICIN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Climate action","id":"https://metadata.un.org/sdg/13","score":0.8203556537628174}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1990517717","https://openalex.org/W2147118406","https://openalex.org/W2155883880","https://openalex.org/W2189113631","https://openalex.org/W2938258273","https://openalex.org/W2961939060","https://openalex.org/W2964059111","https://openalex.org/W3020857852","https://openalex.org/W3129233628","https://openalex.org/W4200196661","https://openalex.org/W4206814597","https://openalex.org/W4224278516","https://openalex.org/W4289313645","https://openalex.org/W4312889780","https://openalex.org/W4353046631","https://openalex.org/W4393906152","https://openalex.org/W4399647672","https://openalex.org/W4403544805","https://openalex.org/W4406137977","https://openalex.org/W4411205861","https://openalex.org/W4413036065","https://openalex.org/W7133221443"],"related_works":[],"abstract_inverted_index":{"Software-Defined":[0],"Networking":[1],"(SDN)":[2],"significantly":[3],"enhances":[4],"network":[5,144],"programmability":[6],"and":[7,61,95,140,146,167],"configuration":[8],"flexibility":[9],"by":[10],"separating":[11],"the":[12,16,30,148,168],"control":[13,22],"plane":[14],"from":[15,90],"data":[17,94],"plane.":[18],"However,":[19],"its":[20],"centralized":[21],"architecture":[23],"also":[24],"introduces":[25],"new":[26],"security":[27],"vulnerabilities,":[28],"making":[29],"controller":[31],"a":[32,121],"prime":[33],"target":[34],"for":[35],"Distributed":[36],"Denial-of-Service":[37],"(DDoS)":[38],"attacks.":[39],"Although":[40],"machine":[41],"learning":[42,127,139],"(ML)-based":[43],"approaches":[44],"demonstrate":[45],"outstanding":[46,56],"performance":[47,149],"in":[48,58,190],"enhancing":[49],"attack":[50,101],"detection":[51,77,97,181,191],"accuracy-especially":[52],"XGBoost,":[53],"which":[54],"shows":[55],"capabilities":[57,98],"both":[59],"accuracy":[60,162],"computational":[62,81],"overhead,":[63,82],"they":[64],"often":[65],"face":[66],"critical":[67],"challenges:":[68],"deploying":[69],"models":[70,84,189],"on":[71,86,133],"controllers":[72],"or":[73,79],"switches":[74],"can":[75,177],"introduce":[76],"latency":[78],"significant":[80],"while":[83],"deployed":[85,132],"edge":[87,134],"devices":[88],"suffer":[89],"insufficient":[91,154],"labeled":[92],"training":[93,111,155],"weak":[96],"against":[99],"emerging":[100],"patterns,":[102],"finally":[103],"XGBoost":[104,126,152],"does":[105],"not":[106],"perform":[107],"well":[108],"with":[109,153],"small":[110],"dataset":[112],"size.":[113],"To":[114],"address":[115],"these":[116],"issues,":[117],"this":[118],"paper":[119],"proposes":[120],"Self-Organizing":[122],"Map":[123],"(SOM)-based":[124],"continuous":[125],"approach":[128],"(SCX).":[129],"SCX":[130,176,185],"is":[131,163,171],"devices,":[135],"enabling":[136],"real-time":[137],"model":[138],"updates":[141],"using":[142],"unlabeled":[143],"traffic":[145],"addressing":[147],"decline":[150],"of":[151],"data.":[156],"Experimental":[157],"results":[158],"show":[159],"that":[160],"SCX's":[161],"improved":[164,172],"to":[165,173],"99.91%":[166],"F1":[169],"score":[170],"99.93%,":[174],"proving":[175],"effectively":[178],"achieve":[179],"optimal":[180],"performance.":[182],"Through":[183],"comparison,":[184],"outperforms":[186],"existing":[187],"mainstream":[188],"accuracy.":[192]},"counts_by_year":[],"updated_date":"2026-04-29T06:10:49.150238","created_date":"2026-04-28T00:00:00"}
