{"id":"https://openalex.org/W4402897110","doi":"https://doi.org/10.1109/iwqos61813.2024.10682921","title":"An MTD-driven Hybrid Defense Method Against DDoS Based on Markov Game in Multi-controller SDN-enabled IoT Networks","display_name":"An MTD-driven Hybrid Defense Method Against DDoS Based on Markov Game in Multi-controller SDN-enabled IoT Networks","publication_year":2024,"publication_date":"2024-06-19","ids":{"openalex":"https://openalex.org/W4402897110","doi":"https://doi.org/10.1109/iwqos61813.2024.10682921"},"language":"en","primary_location":{"id":"doi:10.1109/iwqos61813.2024.10682921","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwqos61813.2024.10682921","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE/ACM 32nd International Symposium on Quality of Service (IWQoS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102009762","display_name":"Yuming Feng","orcid":"https://orcid.org/0000-0001-8922-0496"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]},{"id":"https://openalex.org/I158809036","display_name":"Shenzhen Institute of Information Technology","ror":"https://ror.org/03wrf9427","country_code":"CN","type":"education","lineage":["https://openalex.org/I158809036"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuming Feng","raw_affiliation_strings":["Harbin Institute of Technology (Shenzhen),School of Computer Science and Technology,Shenzhen,China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology (Shenzhen),School of Computer Science and Technology,Shenzhen,China","institution_ids":["https://openalex.org/I158809036","https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085221201","display_name":"Weizhe Zhang","orcid":"https://orcid.org/0000-0003-4783-876X"},"institutions":[{"id":"https://openalex.org/I158809036","display_name":"Shenzhen Institute of Information Technology","ror":"https://ror.org/03wrf9427","country_code":"CN","type":"education","lineage":["https://openalex.org/I158809036"]},{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weizhe Zhang","raw_affiliation_strings":["Harbin Institute of Technology (Shenzhen),School of Computer Science and Technology,Shenzhen,China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology (Shenzhen),School of Computer Science and Technology,Shenzhen,China","institution_ids":["https://openalex.org/I158809036","https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101647282","display_name":"Zijun Feng","orcid":"https://orcid.org/0009-0001-1910-5297"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zijun Feng","raw_affiliation_strings":["Harbin Institute of Technology,School of Cyberspace Science,Harbin,China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology,School of Cyberspace Science,Harbin,China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017352161","display_name":"Xiaoxiong Zhong","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoxiong Zhong","raw_affiliation_strings":["Peng Cheng Laboratory,Department of New Networks,Shenzhen,China"],"affiliations":[{"raw_affiliation_string":"Peng Cheng Laboratory,Department of New Networks,Shenzhen,China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048398271","display_name":"Fangming Liu","orcid":"https://orcid.org/0000-0002-8570-1345"},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fangming Liu","raw_affiliation_strings":["Peng Cheng Laboratory,Department of Intelligent Computing,Shenzhen,China"],"affiliations":[{"raw_affiliation_string":"Peng Cheng Laboratory,Department of Intelligent Computing,Shenzhen,China","institution_ids":["https://openalex.org/I4210136793"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5102009762"],"corresponding_institution_ids":["https://openalex.org/I158809036","https://openalex.org/I204983213"],"apc_list":null,"apc_paid":null,"fwci":2.7745,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.91193913,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9848999977111816,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9650999903678894,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7487493753433228},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7266558408737183},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.5534670948982239},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.487193763256073},{"id":"https://openalex.org/keywords/markov-chain","display_name":"Markov chain","score":0.4534074366092682},{"id":"https://openalex.org/keywords/hidden-markov-model","display_name":"Hidden Markov model","score":0.4333485960960388},{"id":"https://openalex.org/keywords/markov-process","display_name":"Markov process","score":0.42255860567092896},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.41762053966522217},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3590947985649109},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3550146222114563},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3215942084789276},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2966761589050293},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.2072868049144745},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.12109375},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07776331901550293},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07671374082565308}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7487493753433228},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7266558408737183},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.5534670948982239},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.487193763256073},{"id":"https://openalex.org/C98763669","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov chain","level":2,"score":0.4534074366092682},{"id":"https://openalex.org/C23224414","wikidata":"https://www.wikidata.org/wiki/Q176769","display_name":"Hidden Markov model","level":2,"score":0.4333485960960388},{"id":"https://openalex.org/C159886148","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov process","level":2,"score":0.42255860567092896},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.41762053966522217},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3590947985649109},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3550146222114563},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3215942084789276},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2966761589050293},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2072868049144745},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.12109375},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07776331901550293},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07671374082565308},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwqos61813.2024.10682921","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwqos61813.2024.10682921","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE/ACM 32nd International Symposium on Quality of Service (IWQoS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2293888960","https://openalex.org/W2917630062","https://openalex.org/W3006144347","https://openalex.org/W3009349173","https://openalex.org/W3022636966","https://openalex.org/W3024476475","https://openalex.org/W3027366335","https://openalex.org/W3090737719","https://openalex.org/W3110979110","https://openalex.org/W3130205713","https://openalex.org/W3136130468","https://openalex.org/W3176269432","https://openalex.org/W3212789951","https://openalex.org/W4308081644","https://openalex.org/W4312191386","https://openalex.org/W4316039105","https://openalex.org/W4320015848","https://openalex.org/W4320029495"],"related_works":["https://openalex.org/W4386482731","https://openalex.org/W2765763546","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W4256682929","https://openalex.org/W2379651310","https://openalex.org/W2113019827","https://openalex.org/W1541249122","https://openalex.org/W2413828414","https://openalex.org/W2367222340"],"abstract_inverted_index":{"The":[0,162],"widespread":[1],"deployment":[2],"of":[3,32,95,113,137],"low-cost,":[4],"vulnerable":[5],"IoT":[6,66,180],"devices":[7],"allows":[8],"attackers":[9,151],"to":[10,13,58,78],"exploit":[11],"them":[12],"generate":[14],"botnets":[15],"and":[16,54,88,99,121,175],"launch":[17,153],"distributed":[18],"denial-of-service":[19],"(DDoS)":[20],"attacks,":[21],"which":[22],"has":[23],"become":[24],"a":[25,42,73,83,110],"serious":[26],"security":[27,56],"challenge":[28],"for":[29,91],"ensuring":[30],"quality":[31],"service":[33],"(QoS).":[34],"For":[35],"cost-effective":[36],"defense":[37,45,52,103,139],"against":[38,172],"DDoS,":[39],"we":[40,108],"propose":[41],"novel":[43],"hybrid":[44],"method":[46,169],"that":[47,131,149,166],"includes":[48],"proactive":[49],"moving":[50],"target":[51],"(MTD)":[53],"passive":[55],"control":[57,93],"resist":[59],"DDoS":[60,154,173],"threats":[61],"at":[62],"different":[63],"stages":[64],"in":[65,68,118,126,159,179],"networks":[67,181],"this":[69],"paper.":[70],"We":[71,144],"construct":[72],"multi-stage":[74],"Markov":[75],"game":[76,81,120],"model":[77],"portray":[79],"the":[80,86,89,92,96,119,127,132,147,156,160,177],"as":[82],"competition":[84],"between":[85],"attacker":[87],"defender":[90],"duration":[94],"attack":[97],"surface,":[98],"design":[100],"an":[101],"optimal":[102,133],"strategy":[104],"algorithm.":[105],"In":[106],"particular,":[107],"introduce":[109],"new":[111],"parameter":[112],"action":[114,134],"execution":[115,135],"interval":[116,136],"expectation":[117],"add":[122],"node":[123],"importance":[124],"evaluation":[125],"reward":[128],"quantification":[129],"so":[130],"each":[138],"technique":[140],"can":[141,170],"be":[142],"output.":[143],"also":[145],"consider":[146],"possibility":[148],"advanced":[150],"may":[152],"on":[155],"SDN":[157],"controller":[158],"game.":[161],"experimental":[163],"results":[164],"demonstrate":[165],"our":[167],"proposed":[168],"defend":[171],"cost-effectively":[174],"ensure":[176],"QoS":[178],"with":[182],"acceptable":[183],"overhead.":[184]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
