{"id":"https://openalex.org/W3173190309","doi":"https://doi.org/10.1109/jiot.2021.3093538","title":"Defending Against Link Flooding Attacks in Internet of Things: A Bayesian Game Approach","display_name":"Defending Against Link Flooding Attacks in Internet of Things: A Bayesian Game Approach","publication_year":2021,"publication_date":"2021-06-30","ids":{"openalex":"https://openalex.org/W3173190309","doi":"https://doi.org/10.1109/jiot.2021.3093538","mag":"3173190309"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2021.3093538","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3093538","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019766178","display_name":"Xu Chen","orcid":"https://orcid.org/0000-0002-7073-147X"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xu Chen","raw_affiliation_strings":["Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021320552","display_name":"Wei Feng","orcid":"https://orcid.org/0000-0001-5147-2145"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Feng","raw_affiliation_strings":["Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079396775","display_name":"Yantian Luo","orcid":"https://orcid.org/0000-0001-6947-6486"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yantian Luo","raw_affiliation_strings":["Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047030842","display_name":"Meng Shen","orcid":"https://orcid.org/0000-0002-1867-0972"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Meng Shen","raw_affiliation_strings":["School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053547427","display_name":"Ning Ge","orcid":"https://orcid.org/0000-0002-4922-7025"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ning Ge","raw_affiliation_strings":["Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100733413","display_name":"Xianbin Wang","orcid":"https://orcid.org/0000-0003-4890-0748"},"institutions":[{"id":"https://openalex.org/I125749732","display_name":"Western University","ror":"https://ror.org/02grkyz14","country_code":"CA","type":"education","lineage":["https://openalex.org/I125749732"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Xianbin Wang","raw_affiliation_strings":["Western University, London, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Western University, London, ON, Canada","institution_ids":["https://openalex.org/I125749732"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5019766178"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":2.5487,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.89633019,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"9","issue":"1","first_page":"117","last_page":"128"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8034635782241821},{"id":"https://openalex.org/keywords/flooding","display_name":"Flooding (psychology)","score":0.6621155738830566},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.602502703666687},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5765103101730347},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.5225027203559875},{"id":"https://openalex.org/keywords/link","display_name":"Link (geometry)","score":0.5209559202194214},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.516337513923645},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4758721888065338},{"id":"https://openalex.org/keywords/link-level","display_name":"Link level","score":0.4308113753795624},{"id":"https://openalex.org/keywords/bayesian-probability","display_name":"Bayesian probability","score":0.4110743999481201},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.20747318863868713},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17235949635505676},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.07290470600128174}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8034635782241821},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.6621155738830566},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.602502703666687},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5765103101730347},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.5225027203559875},{"id":"https://openalex.org/C2778753846","wikidata":"https://www.wikidata.org/wiki/Q6554239","display_name":"Link (geometry)","level":2,"score":0.5209559202194214},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.516337513923645},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4758721888065338},{"id":"https://openalex.org/C2779609627","wikidata":"https://www.wikidata.org/wiki/Q6554308","display_name":"Link level","level":2,"score":0.4308113753795624},{"id":"https://openalex.org/C107673813","wikidata":"https://www.wikidata.org/wiki/Q812534","display_name":"Bayesian probability","level":2,"score":0.4110743999481201},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.20747318863868713},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17235949635505676},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.07290470600128174},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2021.3093538","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3093538","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1288812995","display_name":null,"funder_award_id":"61771286","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1392091062","display_name":null,"funder_award_id":"2018YFA0701601","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G1500623155","display_name":null,"funder_award_id":"61941104","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5358367525","display_name":null,"funder_award_id":"61922049","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1517532457","https://openalex.org/W1978136502","https://openalex.org/W2049837000","https://openalex.org/W2111942706","https://openalex.org/W2160502705","https://openalex.org/W2170852315","https://openalex.org/W2346075874","https://openalex.org/W2505895234","https://openalex.org/W2537501410","https://openalex.org/W2612172766","https://openalex.org/W2789388342","https://openalex.org/W2791826644","https://openalex.org/W2795660709","https://openalex.org/W2808451423","https://openalex.org/W2877214426","https://openalex.org/W2885505758","https://openalex.org/W2893388915","https://openalex.org/W2910024167","https://openalex.org/W2921237497","https://openalex.org/W3003997330","https://openalex.org/W3045737482"],"related_works":["https://openalex.org/W2936228184","https://openalex.org/W1550959577","https://openalex.org/W2744785613","https://openalex.org/W59064024","https://openalex.org/W2463650873","https://openalex.org/W2052961964","https://openalex.org/W2808994160","https://openalex.org/W1965617705","https://openalex.org/W3150377341","https://openalex.org/W2183172389"],"abstract_inverted_index":{"The":[0],"link":[1],"flooding":[2],"attack":[3,149,173],"(LFA)":[4],"has":[5],"emerged":[6],"as":[7,55,75],"a":[8,76,119],"new":[9],"category":[10],"of":[11,14,26,35,42,88,95,102,138,167,188,194],"distributed":[12],"denial":[13],"service":[15],"(DDoS)":[16],"attacks":[17],"in":[18,51,80,165,182],"recent":[19],"years.":[20],"Along":[21],"with":[22],"the":[23,32,40,65,72,86,92,96,99,103,109,116,126,136,140,156,168,180,186,192],"massive":[24],"deployment":[25],"low-cost":[27],"insecure":[28],"Internet-of-Things":[29],"(IoT)":[30],"devices,":[31],"fast":[33],"proliferation":[34],"IoT":[36,52],"botnets":[37],"dramatically":[38],"increases":[39],"risk":[41],"LFAs.":[43],"However,":[44],"how":[45],"to":[46,83,128,147,179],"efficiently":[47],"defend":[48],"against":[49],"LFAs":[50],"still":[53],"remains":[54],"an":[56,68],"open":[57],"problem.":[58],"To":[59],"overcome":[60],"this":[61,81],"challenge,":[62],"we":[63,133],"model":[64],"interaction":[66],"between":[67],"LFA":[69],"attacker":[70,97],"and":[71,98,143,191],"network":[73],"manager":[74],"two-person":[77],"Bayesian":[78,110],"game":[79],"article":[82],"precisely":[84],"characterize":[85],"behaviors":[87,94],"both":[89],"sides.":[90],"Then,":[91],"rational":[93],"optimal":[100],"strategies":[101],"defender":[104,127],"are":[105],"unveiled":[106],"by":[107,115],"deriving":[108],"Nash":[111],"equilibrium":[112],"(BNE).":[113],"Inspired":[114],"obtained":[117],"BNEs,":[118],"cost-effective":[120],"decision":[121],"framework":[122],"is":[123,177],"proposed":[124,157],"for":[125],"make":[129],"defense":[130],"decisions.":[131],"Furthermore,":[132],"numerically":[134],"analyze":[135],"effect":[137],"all":[139],"related":[141],"factors":[142],"present":[144],"feasible":[145],"suggestions":[146],"deter":[148],"motivations":[150],"fundamentally.":[151],"Experimental":[152],"results":[153],"demonstrate":[154],"that":[155],"method":[158],"not":[159],"only":[160],"consistently":[161],"outperforms":[162],"baseline":[163],"methods":[164],"terms":[166],"defender\u2019s":[169],"utilities":[170],"under":[171],"different":[172],"intensities,":[174],"but":[175],"also":[176],"robust":[178],"changes":[181],"important":[183],"parameters,":[184],"including":[185],"value":[187],"benign":[189],"traffic":[190,195],"latency":[193],"scrubbing.":[196]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":5}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
