{"id":"https://openalex.org/W3196085846","doi":"https://doi.org/10.1109/lwc.2021.3097391","title":"Detection of Hijacking DDoS Attack Based on Air Interface Traffic","display_name":"Detection of Hijacking DDoS Attack Based on Air Interface Traffic","publication_year":2021,"publication_date":"2021-08-24","ids":{"openalex":"https://openalex.org/W3196085846","doi":"https://doi.org/10.1109/lwc.2021.3097391","mag":"3196085846"},"language":"en","primary_location":{"id":"doi:10.1109/lwc.2021.3097391","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lwc.2021.3097391","pdf_url":null,"source":{"id":"https://openalex.org/S2500830676","display_name":"IEEE Wireless Communications Letters","issn_l":"2162-2337","issn":["2162-2337","2162-2345"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Wireless Communications Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061610341","display_name":"Qing-Yi Fu","orcid":"https://orcid.org/0000-0002-5483-4145"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qing-Yi Fu","raw_affiliation_strings":["School of Information and Communications Engineering and the Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi\u2019an Jiaotong University, Xi\u2019an, Shaanxi, China","School of Information and Communications Engineering and the Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communications Engineering and the Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi\u2019an Jiaotong University, Xi\u2019an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"School of Information and Communications Engineering and the Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100630996","display_name":"Hui\u2010Ming Wang","orcid":"https://orcid.org/0000-0003-4107-9512"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui-Ming Wang","raw_affiliation_strings":["School of Information and Communications Engineering and the Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi\u2019an Jiaotong University, Xi\u2019an, Shaanxi, China","School of Information and Communications Engineering and the Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communications Engineering and the Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi\u2019an Jiaotong University, Xi\u2019an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"School of Information and Communications Engineering and the Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5061610341"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":0.6112,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.699739,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"10","issue":"10","first_page":"2225","last_page":"2229"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.9187411069869995},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8406076431274414},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6483256816864014},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6295744180679321},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.6105130910873413},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.5337691307067871},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5019004344940186},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5013198852539062},{"id":"https://openalex.org/keywords/traffic-analysis","display_name":"Traffic analysis","score":0.4314742386341095},{"id":"https://openalex.org/keywords/interface","display_name":"Interface (matter)","score":0.4264417290687561},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12101408839225769},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.09954500198364258}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.9187411069869995},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8406076431274414},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6483256816864014},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6295744180679321},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.6105130910873413},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.5337691307067871},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5019004344940186},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5013198852539062},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.4314742386341095},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.4264417290687561},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12101408839225769},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.09954500198364258},{"id":"https://openalex.org/C157915830","wikidata":"https://www.wikidata.org/wiki/Q2928001","display_name":"Bubble","level":2,"score":0.0},{"id":"https://openalex.org/C129307140","wikidata":"https://www.wikidata.org/wiki/Q6795880","display_name":"Maximum bubble pressure method","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lwc.2021.3097391","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lwc.2021.3097391","pdf_url":null,"source":{"id":"https://openalex.org/S2500830676","display_name":"IEEE Wireless Communications Letters","issn_l":"2162-2337","issn":["2162-2337","2162-2345"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Wireless Communications Letters","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2379865914","display_name":null,"funder_award_id":"61941105","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5135885775","display_name":null,"funder_award_id":"61941118","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1546020435","https://openalex.org/W2049753993","https://openalex.org/W2182464523","https://openalex.org/W2342932645","https://openalex.org/W2527704468","https://openalex.org/W2768718335","https://openalex.org/W2819211778","https://openalex.org/W2921453769","https://openalex.org/W3006912911"],"related_works":["https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W1968168724","https://openalex.org/W2204131204","https://openalex.org/W2754163055","https://openalex.org/W4322008378","https://openalex.org/W2383770723","https://openalex.org/W2186749541","https://openalex.org/W2360429410","https://openalex.org/W4256682929"],"abstract_inverted_index":{"Massive":[0],"machine":[1],"type":[2],"communication":[3],"(mMTC)":[4],"network":[5],"contains":[6],"massive":[7],"access":[8,54,79,90],"devices,":[9],"which":[10],"increases":[11],"the":[12,22,38,51,57,70,76,88,122,127,133],"risk":[13],"of":[14,17,53,64,78,135],"distributed":[15],"denial":[16],"service":[18],"(DDoS)":[19],"attacks.":[20],"Especially,":[21],"DDoS":[23,65],"attack":[24],"launched":[25],"by":[26,93],"hijacked":[27,39,123],"devices":[28,40,124],"cannot":[29],"be":[30],"detected":[31],"through":[32],"traditional":[33],"cryptography-based":[34],"authentication":[35],"because":[36],"that":[37],"have":[41],"legitimate":[42],"identities.":[43],"In":[44],"this":[45,62],"letter,":[46],"we":[47,120],"propose":[48,100],"to":[49,60,95,108],"exploit":[50],"characteristics":[52,77],"traffic":[55,80,84],"at":[56],"air":[58],"interface":[59],"detect":[61],"kind":[63],"attack,":[66],"and":[67,87,99],"then":[68],"identify":[69,121],"suspicious":[71],"devices.":[72],"We":[73],"analyze":[74],"both":[75],"based":[81,125],"on":[82,126],"MTC":[83],"arrival":[85],"model":[86],"random":[89],"mechanism":[91],"proposed":[92],"3GPP":[94],"construct":[96],"test":[97,109],"statistics,":[98],"a":[101],"sequential":[102],"change":[103],"point":[104],"detection":[105,137],"(SCPD)":[106],"scheme":[107],"whether":[110],"there":[111],"are":[112],"anomalies":[113],"as":[114,116],"quickly":[115],"possible.":[117],"After":[118],"that,":[119],"abnormal":[128],"traffic.":[129],"Simulation":[130],"experiments":[131],"confirm":[132],"effectiveness":[134],"our":[136],"scheme.":[138]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
