{"id":"https://openalex.org/W4403390979","doi":"https://doi.org/10.1109/iotsms62296.2024.10710230","title":"DUDE-IDS: A Framework for Efficiently Detecting Network-Related Drone Cyberattacks","display_name":"DUDE-IDS: A Framework for Efficiently Detecting Network-Related Drone Cyberattacks","publication_year":2024,"publication_date":"2024-09-02","ids":{"openalex":"https://openalex.org/W4403390979","doi":"https://doi.org/10.1109/iotsms62296.2024.10710230"},"language":"en","primary_location":{"id":"doi:10.1109/iotsms62296.2024.10710230","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iotsms62296.2024.10710230","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073993990","display_name":"Burak T\u00fcfek\u00e7i","orcid":"https://orcid.org/0000-0001-6266-5081"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Burak Tufekci","raw_affiliation_strings":["The University of North Texas,Department of Computer Science and Engineering,Denton,TX,USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"The University of North Texas,Department of Computer Science and Engineering,Denton,TX,USA","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106011286","display_name":"Vinh Quach","orcid":null},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vinh Quach","raw_affiliation_strings":["The University of North Texas,Department of Computer Science and Engineering,Denton,TX,USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"The University of North Texas,Department of Computer Science and Engineering,Denton,TX,USA","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007796269","display_name":"Cihan Tunc","orcid":"https://orcid.org/0000-0001-5200-1097"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Cihan Tunc","raw_affiliation_strings":["The University of North Texas,Department of Computer Science and Engineering,Denton,TX,USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"The University of North Texas,Department of Computer Science and Engineering,Denton,TX,USA","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077121598","display_name":"Ram Dantu","orcid":"https://orcid.org/0000-0001-9362-1559"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ram Dantu","raw_affiliation_strings":["The University of North Texas,Department of Computer Science and Engineering,Denton,TX,USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"The University of North Texas,Department of Computer Science and Engineering,Denton,TX,USA","institution_ids":["https://openalex.org/I123534392"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5073993990"],"corresponding_institution_ids":["https://openalex.org/I123534392"],"apc_list":null,"apc_paid":null,"fwci":1.3392,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.82575606,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"240","last_page":"247"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10994","display_name":"Terrorism, Counterterrorism, and Political Violence","score":0.9729999899864197,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9710999727249146,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7842720746994019},{"id":"https://openalex.org/keywords/drone","display_name":"Drone","score":0.7097662091255188},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4835945963859558},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4572559893131256},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.44802531599998474}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7842720746994019},{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.7097662091255188},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4835945963859558},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4572559893131256},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.44802531599998474},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iotsms62296.2024.10710230","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iotsms62296.2024.10710230","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320311089","display_name":"National Security Agency","ror":"https://ror.org/0047bvr32"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W2343828539","https://openalex.org/W2571907764","https://openalex.org/W2591712613","https://openalex.org/W2789828921","https://openalex.org/W2887277584","https://openalex.org/W2902739487","https://openalex.org/W2914596661","https://openalex.org/W2952066300","https://openalex.org/W2970604727","https://openalex.org/W2971044318","https://openalex.org/W3003685271","https://openalex.org/W3005624724","https://openalex.org/W3005805195","https://openalex.org/W3006543328","https://openalex.org/W3015650859","https://openalex.org/W3017346274","https://openalex.org/W3018143107","https://openalex.org/W3018495625","https://openalex.org/W3129273143","https://openalex.org/W3164321464","https://openalex.org/W3170348203","https://openalex.org/W4319965142","https://openalex.org/W4322710662","https://openalex.org/W4367052462","https://openalex.org/W4380630221","https://openalex.org/W4386960783"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W4229448053","https://openalex.org/W4247925126","https://openalex.org/W4327774218","https://openalex.org/W2059768187","https://openalex.org/W4312858960","https://openalex.org/W4386036939","https://openalex.org/W4379143281","https://openalex.org/W2605096541"],"abstract_inverted_index":{"Drones":[0],"have":[1],"become":[2],"essential":[3],"to":[4,8,31,111,120,174],"various":[5,180],"industries":[6],"due":[7],"their":[9],"capabilities":[10],"in":[11,70,155],"inspections,":[12],"transportation,":[13],"mapping,":[14],"and":[15,104,124,138,177,194],"delivery.":[16],"As":[17],"the":[18,25,77,87,100,105,151,167,170],"drone":[19,71],"market":[20],"expands":[21],"rapidly,":[22],"so":[23],"does":[24],"need":[26],"for":[27,47,56],"robust":[28],"security":[29],"measures":[30],"safeguard":[32],"against":[33],"cyberattacks.":[34],"This":[35,74],"paper":[36,168],"introduces":[37],"DUDE-IDS,":[38],"a":[39,52,83,163],"novel":[40],"intrusion":[41],"detection":[42,113],"system":[43],"(IDS)":[44],"specifically":[45],"designed":[46],"drones.":[48],"Firstly,":[49],"we":[50,61],"introduce":[51],"time":[53,101],"interval":[54,102],"approach":[55,75,103],"generating":[57],"labeled":[58],"data.":[59,73],"Then,":[60],"propose":[62],"new":[63],"features":[64],"that":[65],"can":[66],"capture":[67],"time-related":[68],"patterns":[69],"network":[72,80,122],"enriches":[76],"representation":[78],"of":[79,86,89,96,153,165,172],"flows,":[81],"providing":[82],"better":[84],"understanding":[85],"dynamics":[88],"cyberattacks":[90],"over":[91],"time.":[92],"DUDE-IDS":[93,154,173],"takes":[94],"advantage":[95],"knowledge":[97],"derived":[98],"from":[99],"augmented":[106],"feature":[107],"set,":[108],"which":[109],"leads":[110],"improved":[112],"capabilities.":[114],"It":[115],"utilizes":[116],"supervised":[117],"machine":[118],"learning":[119],"analyze":[121],"traffic":[123],"detect":[125,176],"anomalies,":[126],"achieving":[127],"high":[128],"accuracy":[129],"($95.84":[130,136],"\\%$),":[131,134,137],"precision":[132],"($96.18":[133],"recall":[135],"F1":[139],"scores":[140],"$\\mathbf{(}":[141],"\\mathbf{9":[142],"5.":[143],"6":[144],"2":[145],"\\%}$).":[146],"Experimental":[147],"results":[148],"also":[149],"demonstrate":[150],"efficiency":[152],"real-time":[156],"analysis,":[157],"utilizing":[158],"minimal":[159],"memory":[160],"resources.":[161],"Through":[162],"series":[164],"experiments,":[166],"showcases":[169],"capability":[171],"successfully":[175],"differentiate":[178],"between":[179],"attack":[181],"scenarios":[182],"such":[183],"as":[184],"TCP":[185,190],"SYN":[186],"flood,":[187,193],"Man-in-the-Middle":[188],"(MITM),":[189],"reset,":[191],"UDP":[192],"deauthentication.":[195]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-28T14:05:53.105641","created_date":"2025-10-10T00:00:00"}
