{"id":"https://openalex.org/W4407130529","doi":"https://doi.org/10.1109/icnp61940.2024.10858563","title":"DoS-Dam: a Hierarchical Method for Identifying and Mitigating DDoS Attacks in High-Speed Network Traffic","display_name":"DoS-Dam: a Hierarchical Method for Identifying and Mitigating DDoS Attacks in High-Speed Network Traffic","publication_year":2024,"publication_date":"2024-10-28","ids":{"openalex":"https://openalex.org/W4407130529","doi":"https://doi.org/10.1109/icnp61940.2024.10858563"},"language":"en","primary_location":{"id":"doi:10.1109/icnp61940.2024.10858563","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnp61940.2024.10858563","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 32nd International Conference on Network Protocols (ICNP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5114161425","display_name":"Yihang Hao","orcid":null},"institutions":[{"id":"https://openalex.org/I4387153335","display_name":"China Telecom","ror":"https://ror.org/05p67dv18","country_code":null,"type":"company","lineage":["https://openalex.org/I4387153335"]},{"id":"https://openalex.org/I4210136246","display_name":"China Telecom (China)","ror":"https://ror.org/03jgnzt20","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136246"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yihang Hao","raw_affiliation_strings":["China Telecom Network Security Technology Co. Ltd,Beijing,China"],"affiliations":[{"raw_affiliation_string":"China Telecom Network Security Technology Co. Ltd,Beijing,China","institution_ids":["https://openalex.org/I4210136246","https://openalex.org/I4387153335"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071487079","display_name":"Liyuan Chang","orcid":"https://orcid.org/0000-0002-6729-1450"},"institutions":[{"id":"https://openalex.org/I4210136246","display_name":"China Telecom (China)","ror":"https://ror.org/03jgnzt20","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136246"]},{"id":"https://openalex.org/I4387153335","display_name":"China Telecom","ror":"https://ror.org/05p67dv18","country_code":null,"type":"company","lineage":["https://openalex.org/I4387153335"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liyuan Chang","raw_affiliation_strings":["China Telecom Network Security Technology Co. Ltd,Beijing,China"],"affiliations":[{"raw_affiliation_string":"China Telecom Network Security Technology Co. Ltd,Beijing,China","institution_ids":["https://openalex.org/I4210136246","https://openalex.org/I4387153335"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065266245","display_name":"Guo Wei","orcid":"https://orcid.org/0000-0002-3522-8924"},"institutions":[{"id":"https://openalex.org/I4387153335","display_name":"China Telecom","ror":"https://ror.org/05p67dv18","country_code":null,"type":"company","lineage":["https://openalex.org/I4387153335"]},{"id":"https://openalex.org/I4210136246","display_name":"China Telecom (China)","ror":"https://ror.org/03jgnzt20","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136246"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Guo","raw_affiliation_strings":["China Telecom Network Security Technology Co. Ltd,Beijing,China"],"affiliations":[{"raw_affiliation_string":"China Telecom Network Security Technology Co. Ltd,Beijing,China","institution_ids":["https://openalex.org/I4210136246","https://openalex.org/I4387153335"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022927272","display_name":"H. Qi","orcid":"https://orcid.org/0000-0001-6339-1537"},"institutions":[{"id":"https://openalex.org/I4210136246","display_name":"China Telecom (China)","ror":"https://ror.org/03jgnzt20","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136246"]},{"id":"https://openalex.org/I4387153335","display_name":"China Telecom","ror":"https://ror.org/05p67dv18","country_code":null,"type":"company","lineage":["https://openalex.org/I4387153335"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haizhen Qi","raw_affiliation_strings":["China Telecom Network Security Technology Co. Ltd,Beijing,China"],"affiliations":[{"raw_affiliation_string":"China Telecom Network Security Technology Co. Ltd,Beijing,China","institution_ids":["https://openalex.org/I4210136246","https://openalex.org/I4387153335"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059058463","display_name":"Gang Yang","orcid":"https://orcid.org/0000-0003-2576-013X"},"institutions":[{"id":"https://openalex.org/I4387153335","display_name":"China Telecom","ror":"https://ror.org/05p67dv18","country_code":null,"type":"company","lineage":["https://openalex.org/I4387153335"]},{"id":"https://openalex.org/I4210136246","display_name":"China Telecom (China)","ror":"https://ror.org/03jgnzt20","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136246"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gang Yang","raw_affiliation_strings":["China Telecom Network Security Technology Co. Ltd,Beijing,China"],"affiliations":[{"raw_affiliation_string":"China Telecom Network Security Technology Co. Ltd,Beijing,China","institution_ids":["https://openalex.org/I4210136246","https://openalex.org/I4387153335"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116144881","display_name":"Jin\u2019ao Cuil","orcid":null},"institutions":[{"id":"https://openalex.org/I4387153335","display_name":"China Telecom","ror":"https://ror.org/05p67dv18","country_code":null,"type":"company","lineage":["https://openalex.org/I4387153335"]},{"id":"https://openalex.org/I4210136246","display_name":"China Telecom (China)","ror":"https://ror.org/03jgnzt20","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136246"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jin\u2019ao Cuil","raw_affiliation_strings":["China Telecom Network Security Technology Co. Ltd,Beijing,China"],"affiliations":[{"raw_affiliation_string":"China Telecom Network Security Technology Co. Ltd,Beijing,China","institution_ids":["https://openalex.org/I4210136246","https://openalex.org/I4387153335"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100357028","display_name":"Gen Li","orcid":"https://orcid.org/0000-0002-4183-4242"},"institutions":[{"id":"https://openalex.org/I4210136246","display_name":"China Telecom (China)","ror":"https://ror.org/03jgnzt20","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136246"]},{"id":"https://openalex.org/I4387153335","display_name":"China Telecom","ror":"https://ror.org/05p67dv18","country_code":null,"type":"company","lineage":["https://openalex.org/I4387153335"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gen Li","raw_affiliation_strings":["China Telecom Network Security Technology Co. Ltd,Beijing,China"],"affiliations":[{"raw_affiliation_string":"China Telecom Network Security Technology Co. Ltd,Beijing,China","institution_ids":["https://openalex.org/I4210136246","https://openalex.org/I4387153335"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102693961","display_name":"Yue Song","orcid":"https://orcid.org/0009-0003-4648-6464"},"institutions":[{"id":"https://openalex.org/I4387153335","display_name":"China Telecom","ror":"https://ror.org/05p67dv18","country_code":null,"type":"company","lineage":["https://openalex.org/I4387153335"]},{"id":"https://openalex.org/I4210136246","display_name":"China Telecom (China)","ror":"https://ror.org/03jgnzt20","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136246"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yue Song","raw_affiliation_strings":["China Telecom Network Security Technology Co. Ltd,Beijing,China"],"affiliations":[{"raw_affiliation_string":"China Telecom Network Security Technology Co. Ltd,Beijing,China","institution_ids":["https://openalex.org/I4210136246","https://openalex.org/I4387153335"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5114161425"],"corresponding_institution_ids":["https://openalex.org/I4210136246","https://openalex.org/I4387153335"],"apc_list":null,"apc_paid":null,"fwci":0.3653,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.66475813,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9786999821662903,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9722999930381775,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8241097331047058},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7156229019165039},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6657209396362305},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.505870521068573},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.11251160502433777},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09453621506690979}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8241097331047058},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7156229019165039},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6657209396362305},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.505870521068573},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.11251160502433777},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09453621506690979}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icnp61940.2024.10858563","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnp61940.2024.10858563","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 32nd International Conference on Network Protocols (ICNP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5400000214576721,"display_name":"Climate action","id":"https://metadata.un.org/sdg/13"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1968574530","https://openalex.org/W2021132518","https://openalex.org/W2123583026","https://openalex.org/W2162969618","https://openalex.org/W2398297630","https://openalex.org/W2951886488","https://openalex.org/W2982682021","https://openalex.org/W3005372859","https://openalex.org/W3024476475","https://openalex.org/W3036012999","https://openalex.org/W3102275150","https://openalex.org/W3115944121","https://openalex.org/W3140267912","https://openalex.org/W4200585372","https://openalex.org/W4210401924","https://openalex.org/W4385455576","https://openalex.org/W4387848603","https://openalex.org/W4393186423","https://openalex.org/W6750729320"],"related_works":["https://openalex.org/W2360429410","https://openalex.org/W2898696280","https://openalex.org/W2204131204","https://openalex.org/W2383770723","https://openalex.org/W2921433547","https://openalex.org/W2958385475","https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W2370216173","https://openalex.org/W2754163055"],"abstract_inverted_index":{"As":[0],"the":[1,11,21,38,50,63,66,70,114,121,130,133,137,152,157],"prevalence":[2],"of":[3,33,55,65,72,116,124,132,154,162],"high-speed":[4,166],"networks":[5,18],"with":[6,30,52,107],"augmented":[7],"transmission":[8],"capacities":[9],"expands,":[10],"security":[12],"technologies":[13],"devised":[14],"to":[15,27,48,62,82,140],"shield":[16],"these":[17],"lag":[19],"behind":[20],"rapid":[22],"advancements.":[23],"This":[24,110],"disparity":[25],"leads":[26],"many":[28],"issues,":[29],"Distributed":[31],"Denial":[32],"Service":[34],"(DDoS)":[35],"attacks":[36,80,118,164],"representing":[37],"most":[39],"harmful.":[40],"In":[41],"such":[42],"attacks,":[43],"hackers":[44],"exploit":[45],"numerous":[46],"bots":[47],"flood":[49],"target":[51],"a":[53,98],"torrent":[54],"vicious":[56],"traffic":[57,126],"or":[58],"spurious":[59],"requests,":[60],"leading":[61],"paralysis":[64],"communication":[67],"framework":[68],"and":[69,88,119,127,160],"interruption":[71],"essential":[73],"services.":[74],"Existing":[75],"defense":[76],"mechanisms":[77],"against":[78],"DDoS":[79,117,163],"struggle":[81],"reconcile":[83],"detection":[84,159],"speed,":[85],"lead":[86],"time,":[87],"accuracy,":[89],"revealing":[90],"several":[91],"deficiencies.":[92],"Our":[93],"method":[94],"begins":[95],"by":[96,102],"employing":[97],"sketch-based":[99],"algorithm":[100],"characterized":[101],"minimal":[103],"computational":[104],"demands":[105],"paired":[106],"considerable":[108],"swiftness.":[109],"strategy":[111],"significantly":[112],"mitigates":[113],"intensity":[115],"reduces":[120],"imbalance":[122],"rate":[123],"benign":[125],"attacks.":[128],"Subsequently,":[129],"deployment":[131],"CatBoost":[134],"classifier":[135],"augments":[136],"detection's":[138],"F1-score":[139],"<tex":[141],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[142],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$9":[143],"9.":[144],"6":[145],"4":[146],"\\%$</tex>.":[147],"The":[148],"experimental":[149],"findings":[150],"corroborate":[151],"efficacy":[153],"DDoS-Dam":[155],"in":[156,165],"expeditious":[158],"mitigation":[161],"networks.":[167]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
