{"id":"https://openalex.org/W2889811061","doi":"https://doi.org/10.1109/ict.2018.8464855","title":"AsIDPS: Auto-Scaling Intrusion Detection and Prevention System for Cloud","display_name":"AsIDPS: Auto-Scaling Intrusion Detection and Prevention System for Cloud","publication_year":2018,"publication_date":"2018-06-01","ids":{"openalex":"https://openalex.org/W2889811061","doi":"https://doi.org/10.1109/ict.2018.8464855","mag":"2889811061"},"language":"en","primary_location":{"id":"doi:10.1109/ict.2018.8464855","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ict.2018.8464855","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 25th International Conference on Telecommunications (ICT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049670126","display_name":"Junchi Xing","orcid":null},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Junchi Xing","raw_affiliation_strings":["College of Computer Science and Technology, Zhejiang University"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Zhejiang University","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101602014","display_name":"Haifeng Zhou","orcid":"https://orcid.org/0000-0002-8008-2805"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haifeng Zhou","raw_affiliation_strings":["College of Computer Science and Technology, Zhejiang University"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Zhejiang University","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064995317","display_name":"Jinfan Shen","orcid":null},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinfan Shen","raw_affiliation_strings":["College of Computer Science and Technology, Zhejiang University"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Zhejiang University","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101772788","display_name":"Kai Zhu","orcid":"https://orcid.org/0000-0002-3189-038X"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kai Zhu","raw_affiliation_strings":["College of Computer Science and Technology, Zhejiang University"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Zhejiang University","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025673170","display_name":"Yansong Wangt","orcid":null},"institutions":[{"id":"https://openalex.org/I75746372","display_name":"ZTE (United States)","ror":"https://ror.org/0518yg160","country_code":"US","type":"company","lineage":["https://openalex.org/I4210098582","https://openalex.org/I75746372"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yansong Wangt","raw_affiliation_strings":["ZTE Corporation"],"affiliations":[{"raw_affiliation_string":"ZTE Corporation","institution_ids":["https://openalex.org/I75746372"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078198240","display_name":"Chunming Wu","orcid":"https://orcid.org/0000-0001-7958-9687"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunming Wu","raw_affiliation_strings":["College of Computer Science and Technology, Zhejiang University"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Zhejiang University","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079717297","display_name":"Wei Ruan","orcid":"https://orcid.org/0000-0002-2718-7923"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wei Ruan","raw_affiliation_strings":["College of Control Science and Engineering"],"affiliations":[{"raw_affiliation_string":"College of Control Science and Engineering","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5049670126"],"corresponding_institution_ids":["https://openalex.org/I168879160"],"apc_list":null,"apc_paid":null,"fwci":1.2917,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.82637998,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"207","last_page":"212"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8386974334716797},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8087579011917114},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7986346483230591},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6576611995697021},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.5746763944625854},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5544070601463318},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.5111199021339417},{"id":"https://openalex.org/keywords/container","display_name":"Container (type theory)","score":0.49035191535949707},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.47517603635787964},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.45616796612739563},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4497407376766205},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.25141414999961853},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.2455868422985077},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09455043077468872}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8386974334716797},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8087579011917114},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7986346483230591},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6576611995697021},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.5746763944625854},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5544070601463318},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.5111199021339417},{"id":"https://openalex.org/C2781018962","wikidata":"https://www.wikidata.org/wiki/Q5164884","display_name":"Container (type theory)","level":2,"score":0.49035191535949707},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.47517603635787964},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.45616796612739563},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4497407376766205},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.25141414999961853},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2455868422985077},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09455043077468872},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ict.2018.8464855","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ict.2018.8464855","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 25th International Conference on Telecommunications (ICT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.41999998688697815}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W51022818","https://openalex.org/W1969711610","https://openalex.org/W1976188373","https://openalex.org/W1984712701","https://openalex.org/W1993072051","https://openalex.org/W1998493381","https://openalex.org/W2031175798","https://openalex.org/W2036685675","https://openalex.org/W2054746462","https://openalex.org/W2063955498","https://openalex.org/W2081357650","https://openalex.org/W2154350082","https://openalex.org/W2155614937","https://openalex.org/W2181936530","https://openalex.org/W2185115480","https://openalex.org/W2275530856","https://openalex.org/W2276629685","https://openalex.org/W2291943985","https://openalex.org/W2402147878","https://openalex.org/W2765585063","https://openalex.org/W6646575588","https://openalex.org/W6659506418","https://openalex.org/W6666341770","https://openalex.org/W6685871065","https://openalex.org/W6686579617","https://openalex.org/W6694821995","https://openalex.org/W6713083578","https://openalex.org/W6745076307"],"related_works":["https://openalex.org/W4230824443","https://openalex.org/W2038807247","https://openalex.org/W2097156747","https://openalex.org/W2559738661","https://openalex.org/W2147314218","https://openalex.org/W2006319822","https://openalex.org/W2767068794","https://openalex.org/W2735897973","https://openalex.org/W3114854705","https://openalex.org/W4229489764"],"abstract_inverted_index":{"Distributed":[0],"Denial-of-Service":[1],"(DDoS)":[2],"attack":[3,140,176],"has":[4],"been":[5],"a":[6,35,45,146,169],"\u201cnightmare\u201d":[7],"for":[8,22,50,107],"cloud.":[9,23,178],"A":[10],"countermeasure":[11,147],"is":[12,61,165],"to":[13,28,97,133,144,167],"establish":[14],"an":[15,131],"Intrusion":[16],"Detection":[17],"and":[18,32,37,67,110,159,171,194,199],"Prevention":[19],"System":[20],"(IDPS)":[21],"Nevertheless,":[24],"current":[25],"IDPSes":[26],"fail":[27],"achieve":[29],"the":[30,52,78,88,91,98,113,134,152,160,186],"detection":[31,109],"prevention":[33],"in":[34,82,85,177,190],"flexible":[36,153,170],"lightweight":[38,161,172],"way.":[39],"In":[40],"this":[41],"paper,":[42],"we":[43,184],"propose":[44],"novel":[46],"scheme":[47],"of":[48,188],"IDPS":[49,58],"overcoming":[51],"above":[53],"problem,":[54],"termed":[55],"as":[56,143],"Auto-scaling":[57],"(AsIDPS).":[59],"AsIDPS":[60,164,189],"based":[62,76],"on":[63,77,105,124,180],"Software-Defined":[64],"Networking":[65],"(SDN)":[66],"Docker":[68,100,114,162],"container":[69],"technologies.":[70],"It":[71],"first":[72],"detects":[73,139],"abnormal":[74,92],"traffic":[75,93,141],"flow":[79],"statistics":[80],"collected":[81],"SDN":[83,89,135,158],"switches":[84],"real-time.":[86],"By":[87],"controller,":[90],"will":[94,128],"be":[95,117],"directed":[96],"created":[99],"containers":[101,115],"with":[102],"Snort":[103,127],"running":[104],"them":[106],"further":[108],"clean-up.":[111],"Particularly,":[112],"can":[116],"automatically":[118],"scaled":[119,122],"out":[120],"or":[121],"down":[123],"demand.":[125],"The":[126],"also":[129,195],"deliver":[130],"alert":[132],"controller":[136],"if":[137,148],"it":[138],"so":[142],"perform":[145],"necessary.":[149],"Benefitting":[150],"from":[151],"network":[154],"management":[155],"offered":[156],"by":[157],"container,":[163],"able":[166],"build":[168],"defense":[173],"against":[174],"DDoS":[175,192],"Based":[179],"our":[181],"prototype":[182],"implementation,":[183],"validate":[185],"effectiveness":[187],"defending":[191],"attack,":[193],"verify":[196],"its":[197],"flexibility":[198],"lightweight.":[200]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
