{"id":"https://openalex.org/W3109975393","doi":"https://doi.org/10.1109/mnet.021.1900614","title":"Countermeasure Based on Smart Contracts and AI against DoS/DDoS Attack in 5G Circumstances","display_name":"Countermeasure Based on Smart Contracts and AI against DoS/DDoS Attack in 5G Circumstances","publication_year":2020,"publication_date":"2020-11-01","ids":{"openalex":"https://openalex.org/W3109975393","doi":"https://doi.org/10.1109/mnet.021.1900614","mag":"3109975393"},"language":"en","primary_location":{"id":"doi:10.1109/mnet.021.1900614","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mnet.021.1900614","pdf_url":null,"source":{"id":"https://openalex.org/S186584794","display_name":"IEEE Network","issn_l":"0890-8044","issn":["0890-8044","1558-156X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Network","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025551938","display_name":"Liming Fang","orcid":"https://orcid.org/0000-0002-1420-2047"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Liming Fang","raw_affiliation_strings":["Nanjing University of Aeronautics and Collaborative Innovation Center of Novel Software Technology and Industrialization, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Aeronautics and Collaborative Innovation Center of Novel Software Technology and Industrialization, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051279196","display_name":"Bo Zhao","orcid":"https://orcid.org/0000-0002-2565-8752"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Zhao","raw_affiliation_strings":["Nanjing University of Aeronautics and Astronautics, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Aeronautics and Astronautics, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008822438","display_name":"Li Yang","orcid":"https://orcid.org/0000-0001-9383-1097"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Li","raw_affiliation_strings":["Nanjing University of Aeronautics and Astronautics, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Aeronautics and Astronautics, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100462347","display_name":"Zhe Liu","orcid":"https://orcid.org/0000-0001-8578-2635"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhe Liu","raw_affiliation_strings":["Nanjing University of Aeronautics and Astronautics and State Key Laboratory of Cryptology, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Aeronautics and Astronautics and State Key Laboratory of Cryptology, China","institution_ids":["https://openalex.org/I9842412","https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058584916","display_name":"Chunpeng Ge","orcid":"https://orcid.org/0000-0003-2629-7220"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunpeng Ge","raw_affiliation_strings":["Nanjing University of Aeronautics and Astronautics, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Aeronautics and Astronautics, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085755018","display_name":"Weizhi Meng","orcid":"https://orcid.org/0000-0003-4384-5786"},"institutions":[{"id":"https://openalex.org/I96673099","display_name":"Technical University of Denmark","ror":"https://ror.org/04qtj9h94","country_code":"DK","type":"education","lineage":["https://openalex.org/I96673099"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Weizhi Meng","raw_affiliation_strings":["Technical University of Denmark, Denmark"],"affiliations":[{"raw_affiliation_string":"Technical University of Denmark, Denmark","institution_ids":["https://openalex.org/I96673099"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5025551938"],"corresponding_institution_ids":["https://openalex.org/I9842412"],"apc_list":null,"apc_paid":null,"fwci":4.7288,"has_fulltext":false,"cited_by_count":31,"citation_normalized_percentile":{"value":0.95559371,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"34","issue":"6","first_page":"54","last_page":"61"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.9004337787628174},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.8504107594490051},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.827340841293335},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8262574672698975},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7373011708259583},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.4958523213863373},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.43251651525497437},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4187101423740387},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.35721009969711304},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.18795454502105713},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.0957510769367218}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.9004337787628174},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.8504107594490051},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.827340841293335},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8262574672698975},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7373011708259583},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.4958523213863373},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.43251651525497437},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4187101423740387},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.35721009969711304},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.18795454502105713},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0957510769367218},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/mnet.021.1900614","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mnet.021.1900614","pdf_url":null,"source":{"id":"https://openalex.org/S186584794","display_name":"IEEE Network","issn_l":"0890-8044","issn":["0890-8044","1558-156X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Network","raw_type":"journal-article"},{"id":"pmh:oai:pure.atira.dk:publications/b12ef9ab-2d58-449c-8c40-3974d747e2f5","is_oa":false,"landing_page_url":"https://orbit.dtu.dk/en/publications/b12ef9ab-2d58-449c-8c40-3974d747e2f5","pdf_url":null,"source":{"id":"https://openalex.org/S4306400705","display_name":"Technical University of Denmark, DTU Orbit (Technical University of Denmark, DTU)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I96673099","host_organization_name":"Technical University of Denmark","host_organization_lineage":["https://openalex.org/I96673099"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Fang , L , Zhao , B , Li , Y , Liu , Z , Ge , C &amp; Meng , W 2020 , ' Countermeasure Based on Smart Contracts and AI against DoS/DDoS Attack in 5G Circumstances ' , IEEE Network , vol. 34 , no. 6 , 9277902 . https://doi.org/10.1109/MNET.021.1900614","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7799999713897705,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G4662432107","display_name":null,"funder_award_id":"61872181,61702236,61802180","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6041177949","display_name":null,"funder_award_id":"2017YFC1201200,2019YFA0803000","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G7120789399","display_name":null,"funder_award_id":"NE2018106","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G8059687813","display_name":null,"funder_award_id":"MMJJ20180105","funder_id":"https://openalex.org/F4320322769","funder_display_name":"Natural Science Foundation of Jiangsu Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322769","display_name":"Natural Science Foundation of Jiangsu Province","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2074623901","https://openalex.org/W2132172731","https://openalex.org/W2394050630","https://openalex.org/W2589002696","https://openalex.org/W2797742547","https://openalex.org/W2892236004","https://openalex.org/W2892940874","https://openalex.org/W2901337680","https://openalex.org/W2945639270","https://openalex.org/W2963647498","https://openalex.org/W2964303100","https://openalex.org/W2979323854","https://openalex.org/W3102661748","https://openalex.org/W3105750153","https://openalex.org/W4300127641"],"related_works":["https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W1968168724","https://openalex.org/W2204131204","https://openalex.org/W2754163055","https://openalex.org/W4322008378","https://openalex.org/W2383770723","https://openalex.org/W2186749541","https://openalex.org/W2360429410","https://openalex.org/W4256682929"],"abstract_inverted_index":{"The":[0],"development":[1],"of":[2,9,17,64,75,116,125,132,198],"5G":[3,44,73,100],"has":[4,19],"substantially":[5],"increased":[6],"the":[7,13,62,99,114,195],"destructiveness":[8],"DoS/DDoS":[10,65,70,96,117,146,154,159,178,188,216],"attacks":[11,97,147,179],"because":[12],"data":[14,40,58],"processing":[15],"capability":[16],"computers":[18],"not":[20],"been":[21],"accordingly":[22],"enhanced,":[23],"and":[24,55,89,111,134,150,176,201],"this":[25,79],"contradiction":[26],"creates":[27],"a":[28,34,38,83,93,104,108],"vulnerability":[29],"for":[30],"attackers":[31],"to":[32,49,157,186,204,214],"compromise":[33,211],"server":[35,106],"by":[36,102],"sending":[37],"massive":[39,57,145],"flow.":[41],"in":[42,72,78,98,107,148,161],"practical":[43],"circumstances,":[45],"it":[46],"is":[47],"difficult":[48],"extract":[50],"distinct":[51],"features":[52],"between":[53],"malicious":[54,130],"benign":[56,170],"flows.":[59],"This":[60],"amplifies":[61],"difficulties":[63],"detection.":[66],"Thus,":[67],"precautions":[68],"against":[69,95],"attack":[71],"are":[74,182],"great":[76],"importance.":[77],"article,":[80],"we":[81,193],"present":[82],"solution":[84],"based":[85,190],"on":[86,191],"smart":[87,126,138],"contracts":[88],"machine":[90],"learning":[91],"as":[92],"countermeasure":[94],"background":[101],"hiding":[103],"protected":[105],"blockchain":[109],"network":[110],"flexibly":[112],"restricting":[113],"scale":[115],"via":[118,137],"transaction":[119],"fees.":[120],"We":[121],"also":[122],"leverage":[123],"non-repudiation":[124],"contracts,":[127],"analyzing":[128],"users'":[129],"behavior":[131],"communication":[133,171],"executing":[135],"punishment":[136],"contracts.":[139],"Our":[140],"scheme":[141,164],"could":[142],"effectively":[143],"mitigate":[144],"advance":[149],"dynamically":[151],"punitively":[152],"charge":[153],"attacks.":[155,217],"Compared":[156],"existing":[158],"defense":[160],"4G,":[162],"our":[163],"offers":[165],"numerous":[166],"benefits,":[167],"including":[168],"making":[169],"always":[172],"dominate":[173],"rational":[174],"users":[175],"countering":[177],"before":[180],"they":[181],"launched.":[183],"Moreover,":[184],"compared":[185],"common":[187],"detection":[189],"Ai,":[192],"consider":[194],"source":[196],"trustworthiness":[197],"training":[199],"samples":[200],"take":[202],"measures":[203],"avoid":[205],"backdoors":[206],"where":[207],"model":[208],"trainers":[209],"may":[210],"Ai":[212],"models":[213],"launch":[215]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
