{"id":"https://openalex.org/W4390401798","doi":"https://doi.org/10.1109/itnac59571.2023.10368543","title":"An RF-based Low Rate DDoS Attack Real-time Detection System","display_name":"An RF-based Low Rate DDoS Attack Real-time Detection System","publication_year":2023,"publication_date":"2023-11-29","ids":{"openalex":"https://openalex.org/W4390401798","doi":"https://doi.org/10.1109/itnac59571.2023.10368543"},"language":"en","primary_location":{"id":"doi:10.1109/itnac59571.2023.10368543","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/itnac59571.2023.10368543","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 33rd International Telecommunication Networks and Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063225042","display_name":"Shijin Liu","orcid":"https://orcid.org/0000-0002-6194-9557"},"institutions":[{"id":"https://openalex.org/I171481255","display_name":"Shibaura Institute of Technology","ror":"https://ror.org/020wjcq07","country_code":"JP","type":"education","lineage":["https://openalex.org/I171481255"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Shijin Liu","raw_affiliation_strings":["Shibaura Institute of Technology,Department of Computer Science and Engineering,Tokyo,Japan","Department of Computer Science and Engineering, Shibaura Institute of Technology, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Shibaura Institute of Technology,Department of Computer Science and Engineering,Tokyo,Japan","institution_ids":["https://openalex.org/I171481255"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Shibaura Institute of Technology, Tokyo, Japan","institution_ids":["https://openalex.org/I171481255"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047716888","display_name":"Hiroaki Fukuda","orcid":"https://orcid.org/0000-0003-1228-3186"},"institutions":[{"id":"https://openalex.org/I171481255","display_name":"Shibaura Institute of Technology","ror":"https://ror.org/020wjcq07","country_code":"JP","type":"education","lineage":["https://openalex.org/I171481255"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hiroaki Fukuda","raw_affiliation_strings":["Shibaura Institute of Technology,Department of Computer Science and Engineering,Tokyo,Japan","Department of Computer Science and Engineering, Shibaura Institute of Technology, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Shibaura Institute of Technology,Department of Computer Science and Engineering,Tokyo,Japan","institution_ids":["https://openalex.org/I171481255"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Shibaura Institute of Technology, Tokyo, Japan","institution_ids":["https://openalex.org/I171481255"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037617485","display_name":"Paul Leger","orcid":"https://orcid.org/0000-0003-0969-5139"},"institutions":[{"id":"https://openalex.org/I2802166871","display_name":"Universidad Cat\u00f3lica del Norte","ror":"https://ror.org/02akpm128","country_code":"CL","type":"education","lineage":["https://openalex.org/I2802166871"]}],"countries":["CL"],"is_corresponding":false,"raw_author_name":"Paul Leger","raw_affiliation_strings":["Universidad Cat&#x00F3;lica del Norte,Escuela de Ingenier&#x00ED;a,Coquimbo,Chile"],"affiliations":[{"raw_affiliation_string":"Universidad Cat&#x00F3;lica del Norte,Escuela de Ingenier&#x00ED;a,Coquimbo,Chile","institution_ids":["https://openalex.org/I2802166871"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5063225042"],"corresponding_institution_ids":["https://openalex.org/I171481255"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21498822,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"304","last_page":"309"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.9089294672012329},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.82962965965271},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7148193717002869},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.6290865540504456},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6114494800567627},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6078996062278748},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.5954962372779846},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4787011444568634},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4475991725921631},{"id":"https://openalex.org/keywords/network-traffic-control","display_name":"Network traffic control","score":0.4241520166397095},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.18765735626220703},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10143771767616272}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.9089294672012329},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.82962965965271},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7148193717002869},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.6290865540504456},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6114494800567627},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6078996062278748},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.5954962372779846},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4787011444568634},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4475991725921631},{"id":"https://openalex.org/C201100257","wikidata":"https://www.wikidata.org/wiki/Q393287","display_name":"Network traffic control","level":3,"score":0.4241520166397095},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.18765735626220703},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10143771767616272}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/itnac59571.2023.10368543","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/itnac59571.2023.10368543","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 33rd International Telecommunication Networks and Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.46000000834465027,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1573161722","https://openalex.org/W2035536878","https://openalex.org/W2143481518","https://openalex.org/W2147118406","https://openalex.org/W2150093579","https://openalex.org/W2155883880","https://openalex.org/W2167101736","https://openalex.org/W2189113631","https://openalex.org/W2271171620","https://openalex.org/W2508641173","https://openalex.org/W2584217814","https://openalex.org/W2610817200","https://openalex.org/W2803414046","https://openalex.org/W2906883204","https://openalex.org/W2938258273","https://openalex.org/W2946445608","https://openalex.org/W2961939060","https://openalex.org/W2999113954","https://openalex.org/W3005215764","https://openalex.org/W3081430061","https://openalex.org/W3132301129","https://openalex.org/W3167979994","https://openalex.org/W3182280563","https://openalex.org/W4282042832","https://openalex.org/W4285261197","https://openalex.org/W4289530011","https://openalex.org/W4353046631"],"related_works":["https://openalex.org/W2360429410","https://openalex.org/W2898696280","https://openalex.org/W2204131204","https://openalex.org/W2383770723","https://openalex.org/W2921433547","https://openalex.org/W2958385475","https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W2370216173","https://openalex.org/W4256682929"],"abstract_inverted_index":{"Software-Defined":[0],"Networking":[1],"(SDN)":[2],"is":[3,100,107,131,175],"a":[4,38,101,123,140,171,191,195],"new":[5,50],"network":[6,17,70,81,89,118],"architecture":[7],"paradigm.":[8],"It":[9],"improves":[10],"flexibility,":[11],"scalability":[12],"and":[13,22,36,88,106],"management":[14],"of":[15,41,59,66,96,103,110,127,197],"the":[16,28,42,111,166],"by":[18,120],"separating":[19],"forwarding":[20,34],"logic":[21],"control":[23],"logic.":[24],"SDN":[25,47],"controllers":[26],"offer":[27],"ability":[29],"to":[30,52,133,153,180],"dynamically":[31],"modify":[32],"traffic":[33,74,79],"rules":[35],"have":[37],"comprehensive":[39],"view":[40],"entire":[43],"network.":[44],"However,":[45],"Introducing":[46],"brings":[48],"some":[49],"vulnerabilities":[51],"DDoS":[53,104],"attacks,":[54],"such":[55],"as":[56,63,160],"single":[57],"point":[58],"failure.":[60],"Attacks":[61],"known":[62],"Distributed":[64,94],"Denial":[65,95],"Service":[67,97],"(DDoS)":[68],"overload":[69],"links":[71],"with":[72,194],"illegal":[73],"at":[75],"high":[76],"speeds.":[77],"Illegal":[78],"consumes":[80],"bandwidth,":[82],"resulting":[83],"in":[84,146],"legal":[85],"packets":[86],"lost":[87],"services":[90],"unavailable.":[91],"Low":[92],"Rate":[93],"(LRDDoS)":[98],"attack":[99],"variant":[102],"attacks":[105,116],"becoming":[108],"one":[109],"most":[112,176],"serious":[113],"vulnerabilities.":[114],"LRDDoS":[115,135,144],"consume":[117],"resources":[119],"periodically":[121],"sending":[122],"relatively":[124],"small":[125],"number":[126],"packets.":[128],"Consequently,":[129],"it":[130],"harder":[132],"detect":[134,154],"attacks.":[136,155],"This":[137],"paper":[138],"proposes":[139],"real-time":[141],"system":[142,149,159],"for":[143,178],"defense":[145],"SDN.":[147],"The":[148,184],"uses":[150],"Random":[151],"Forest(RF)":[152],"We":[156],"call":[157],"this":[158],"RFLRS.":[161],"In":[162],"addition,":[163],"based":[164],"on":[165],"CIC":[167],"dataset,":[168],"we":[169],"suggest":[170],"feature":[172],"subset":[173],"that":[174,188],"suitable":[177],"RFLRS":[179],"speed":[181],"up":[182],"classification.":[183],"experimental":[185],"results":[186],"show":[187],"RF":[189],"performs":[190],"99.8%":[192],"accuracy":[193],"reduction":[196],"28%":[198],"classification":[199],"time.":[200]},"counts_by_year":[],"updated_date":"2025-12-25T23:11:45.687758","created_date":"2025-10-10T00:00:00"}
