{"id":"https://openalex.org/W4407130045","doi":"https://doi.org/10.1109/icnp61940.2024.10858549","title":"A Novel DDoS Detection Model for SDN Using Single-Class Cluster Oversampling and Weighted Ensemble Method","display_name":"A Novel DDoS Detection Model for SDN Using Single-Class Cluster Oversampling and Weighted Ensemble Method","publication_year":2024,"publication_date":"2024-10-28","ids":{"openalex":"https://openalex.org/W4407130045","doi":"https://doi.org/10.1109/icnp61940.2024.10858549"},"language":"en","primary_location":{"id":"doi:10.1109/icnp61940.2024.10858549","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnp61940.2024.10858549","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 32nd International Conference on Network Protocols (ICNP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100396895","display_name":"Hao Zhang","orcid":"https://orcid.org/0000-0002-3525-2318"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hao Zhang","raw_affiliation_strings":["Fuzhou University,College of Computer and Data Science,Fuzhou,China,350116"],"affiliations":[{"raw_affiliation_string":"Fuzhou University,College of Computer and Data Science,Fuzhou,China,350116","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079019171","display_name":"Shu\u2010Qi Wu","orcid":"https://orcid.org/0000-0003-4148-6409"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuqi Wu","raw_affiliation_strings":["Fuzhou University,College of Computer and Data Science,Fuzhou,China,350116"],"affiliations":[{"raw_affiliation_string":"Fuzhou University,College of Computer and Data Science,Fuzhou,China,350116","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091453336","display_name":"Jie Pan","orcid":"https://orcid.org/0000-0002-6229-6842"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Pan","raw_affiliation_strings":["Fuzhou University,College of Computer and Data Science,Fuzhou,China,350116"],"affiliations":[{"raw_affiliation_string":"Fuzhou University,College of Computer and Data Science,Fuzhou,China,350116","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063862503","display_name":"Zhi Wang","orcid":"https://orcid.org/0000-0002-8207-776X"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhi Wang","raw_affiliation_strings":["Fuzhou University,College of Computer and Data Science,Fuzhou,China,350116"],"affiliations":[{"raw_affiliation_string":"Fuzhou University,College of Computer and Data Science,Fuzhou,China,350116","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110935861","display_name":"Xiaolong Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaolong Sun","raw_affiliation_strings":["Fuzhou University,College of Computer and Data Science,Fuzhou,China,350116"],"affiliations":[{"raw_affiliation_string":"Fuzhou University,College of Computer and Data Science,Fuzhou,China,350116","institution_ids":["https://openalex.org/I80947539"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100396895"],"corresponding_institution_ids":["https://openalex.org/I80947539"],"apc_list":null,"apc_paid":null,"fwci":0.7326,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.75449729,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9236999750137329,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13693","display_name":"Smart Systems and Machine Learning","score":0.9110999703407288,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/oversampling","display_name":"Oversampling","score":0.837777853012085},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6831243634223938},{"id":"https://openalex.org/keywords/cluster","display_name":"Cluster (spacecraft)","score":0.647793173789978},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.5036892294883728},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4987666606903076},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.4581971764564514},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3291122317314148},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.20549404621124268},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.118939608335495}],"concepts":[{"id":"https://openalex.org/C197323446","wikidata":"https://www.wikidata.org/wiki/Q331222","display_name":"Oversampling","level":3,"score":0.837777853012085},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6831243634223938},{"id":"https://openalex.org/C164866538","wikidata":"https://www.wikidata.org/wiki/Q367351","display_name":"Cluster (spacecraft)","level":2,"score":0.647793173789978},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.5036892294883728},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4987666606903076},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.4581971764564514},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3291122317314148},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.20549404621124268},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.118939608335495},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icnp61940.2024.10858549","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnp61940.2024.10858549","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 32nd International Conference on Network Protocols (ICNP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W2271643717","https://openalex.org/W2758509082","https://openalex.org/W2805697719","https://openalex.org/W2990692206","https://openalex.org/W3020886002","https://openalex.org/W3092041085","https://openalex.org/W3099995948","https://openalex.org/W3161554626","https://openalex.org/W4200464085","https://openalex.org/W4206709449","https://openalex.org/W4210878212","https://openalex.org/W4225010642","https://openalex.org/W4282003105","https://openalex.org/W4285274733","https://openalex.org/W4290991228","https://openalex.org/W4311118514","https://openalex.org/W4315798510","https://openalex.org/W4363647970","https://openalex.org/W4383346073","https://openalex.org/W4398250081","https://openalex.org/W4399734362"],"related_works":["https://openalex.org/W2766503024","https://openalex.org/W2781247653","https://openalex.org/W4206637278","https://openalex.org/W4386005305","https://openalex.org/W4386214543","https://openalex.org/W3082051559","https://openalex.org/W1969988626","https://openalex.org/W1682621979","https://openalex.org/W2141301039","https://openalex.org/W2300921526"],"abstract_inverted_index":{"The":[0,117],"centralized":[1],"control":[2],"plane":[3],"characteristic":[4],"of":[5,18,39,90,110,127],"Software":[6],"Defined":[7],"Networking":[8],"(SDN)":[9],"makes":[10],"it":[11],"a":[12,49,66,81],"prime":[13],"target":[14],"for":[15],"Distributed":[16],"Denial":[17],"Service":[19],"(DDoS)":[20],"attacks.":[21],"A":[22],"significant":[23],"issue":[24],"in":[25,114,132,148],"network":[26],"traffic":[27,35],"data":[28],"is":[29,123],"the":[30,87,107,140],"severe":[31],"imbalance":[32],"between":[33],"background":[34],"and":[36,59,74,92,151],"various":[37,128],"types":[38],"DDoS":[40,51,119,129],"attack":[41,130],"traffic.":[42],"To":[43],"address":[44],"this":[45],"challenge,":[46],"we":[47,64,79],"propose":[48],"novel":[50],"detection":[52,102,120],"model":[53,84],"based":[54,85],"on":[55,86],"single-class":[56,82],"cluster":[57,83],"oversampling":[58],"weighted":[60],"ensemble":[61,115],"method.":[62],"Initially,":[63],"design":[65],"multi-strategy":[67],"feature":[68,76],"selection":[69],"using":[70,106],"variance":[71],"inflation":[72],"factor":[73],"recursive":[75],"elimination.":[77],"Next,":[78],"construct":[80],"spatial":[88],"distribution":[89],"samples,":[91],"create":[93],"minority":[94],"class":[95],"samples":[96],"independently":[97],"within":[98],"each":[99,111],"cluster.":[100],"Finally,":[101],"results":[103,137],"are":[104],"determined":[105],"weight":[108],"vector":[109],"base":[112],"classifier":[113],"learning.":[116],"proposed":[118,141],"model's":[121],"performance":[122],"validated":[124],"through":[125],"simulations":[126],"scenarios":[131],"an":[133],"SDN":[134],"environment.":[135],"Experimental":[136],"indicate":[138],"that":[139],"strategy":[142],"exhibits":[143],"superior":[144],"performance,":[145],"showing":[146],"improvements":[147],"precision,":[149],"recall,":[150],"F1":[152],"score":[153],"compared":[154],"to":[155],"state-of-the-art":[156],"techniques.":[157]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
