{"id":"https://openalex.org/W4415968793","doi":"https://doi.org/10.1109/tc.2025.3625385","title":"DNSGreen: A Comprehensive Defense System Against Bounce-Style DNS DDoS Attacks With P4","display_name":"DNSGreen: A Comprehensive Defense System Against Bounce-Style DNS DDoS Attacks With P4","publication_year":2025,"publication_date":"2025-11-06","ids":{"openalex":"https://openalex.org/W4415968793","doi":"https://doi.org/10.1109/tc.2025.3625385"},"language":null,"primary_location":{"id":"doi:10.1109/tc.2025.3625385","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2025.3625385","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100712290","display_name":"Dan Tang","orcid":"https://orcid.org/0000-0002-0062-0213"},"institutions":[{"id":"https://openalex.org/I4210156400","display_name":"Department of Science and Technology of Hunan Province","ror":"https://ror.org/04qgr7x96","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210156400"]},{"id":"https://openalex.org/I56934997","display_name":"Changsha University of Science and Technology","ror":"https://ror.org/03yph8055","country_code":"CN","type":"education","lineage":["https://openalex.org/I56934997"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dan Tang","raw_affiliation_strings":["College of Cyber Science and Technology, Hunan University (HNU), Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Science and Technology, Hunan University (HNU), Changsha, China","institution_ids":["https://openalex.org/I56934997","https://openalex.org/I4210156400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053447561","display_name":"Xiaocai Wang","orcid":"https://orcid.org/0009-0006-7435-5367"},"institutions":[{"id":"https://openalex.org/I4210156400","display_name":"Department of Science and Technology of Hunan Province","ror":"https://ror.org/04qgr7x96","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210156400"]},{"id":"https://openalex.org/I56934997","display_name":"Changsha University of Science and Technology","ror":"https://ror.org/03yph8055","country_code":"CN","type":"education","lineage":["https://openalex.org/I56934997"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaocai Wang","raw_affiliation_strings":["College of Cyber Science and Technology, Hunan University (HNU), Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Science and Technology, Hunan University (HNU), Changsha, China","institution_ids":["https://openalex.org/I56934997","https://openalex.org/I4210156400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076080294","display_name":"Pei Tan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156400","display_name":"Department of Science and Technology of Hunan Province","ror":"https://ror.org/04qgr7x96","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210156400"]},{"id":"https://openalex.org/I56934997","display_name":"Changsha University of Science and Technology","ror":"https://ror.org/03yph8055","country_code":"CN","type":"education","lineage":["https://openalex.org/I56934997"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pei Tan","raw_affiliation_strings":["College of Cyber Science and Technology, Hunan University (HNU), Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Science and Technology, Hunan University (HNU), Changsha, China","institution_ids":["https://openalex.org/I56934997","https://openalex.org/I4210156400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035491991","display_name":"Zheng Qin","orcid":"https://orcid.org/0000-0003-0877-3887"},"institutions":[{"id":"https://openalex.org/I4210156400","display_name":"Department of Science and Technology of Hunan Province","ror":"https://ror.org/04qgr7x96","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210156400"]},{"id":"https://openalex.org/I56934997","display_name":"Changsha University of Science and Technology","ror":"https://ror.org/03yph8055","country_code":"CN","type":"education","lineage":["https://openalex.org/I56934997"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zheng Qin","raw_affiliation_strings":["College of Cyber Science and Technology, Hunan University (HNU), Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Science and Technology, Hunan University (HNU), Changsha, China","institution_ids":["https://openalex.org/I56934997","https://openalex.org/I4210156400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087894632","display_name":"Keqin Li","orcid":"https://orcid.org/0000-0001-5224-4048"},"institutions":[{"id":"https://openalex.org/I157455823","display_name":"SUNY New Paltz","ror":"https://ror.org/03j3dv688","country_code":"US","type":"education","lineage":["https://openalex.org/I157455823"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Keqin Li","raw_affiliation_strings":["Department of Computer Science, State University of New York, New Paltz, NY, USA","Department of Computer Science, State University of New York, New Paltz, New York, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, State University of New York, New Paltz, NY, USA","institution_ids":["https://openalex.org/I157455823"]},{"raw_affiliation_string":"Department of Computer Science, State University of New York, New Paltz, New York, USA","institution_ids":["https://openalex.org/I157455823"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100680951","display_name":"Jiliang Zhang","orcid":"https://orcid.org/0000-0001-8712-2964"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiliang Zhang","raw_affiliation_strings":["College of Integrated Circuit Science and Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Integrated Circuit Science and Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100712290"],"corresponding_institution_ids":["https://openalex.org/I4210156400","https://openalex.org/I56934997"],"apc_list":null,"apc_paid":null,"fwci":8.5176,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.97633103,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"75","issue":"1","first_page":"247","last_page":"260"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.777999997138977,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.777999997138977,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.09849999845027924,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.03460000082850456,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.777400016784668},{"id":"https://openalex.org/keywords/domain-name-system","display_name":"Domain Name System","score":0.64410001039505},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6341000199317932},{"id":"https://openalex.org/keywords/flooding","display_name":"Flooding (psychology)","score":0.5771999955177307},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5238000154495239},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.3750999867916107},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.34299999475479126}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8513000011444092},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.777400016784668},{"id":"https://openalex.org/C35026560","wikidata":"https://www.wikidata.org/wiki/Q8767","display_name":"Domain Name System","level":3,"score":0.64410001039505},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6367999911308289},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6341000199317932},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.5771999955177307},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5318999886512756},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5238000154495239},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.3750999867916107},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.34299999475479126},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.3327000141143799},{"id":"https://openalex.org/C2985371682","wikidata":"https://www.wikidata.org/wiki/Q11135","display_name":"Ip address","level":2,"score":0.31119999289512634},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.3082999885082245},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.3000999987125397},{"id":"https://openalex.org/C2780741293","wikidata":"https://www.wikidata.org/wiki/Q4818019","display_name":"Attack patterns","level":3,"score":0.298799991607666},{"id":"https://openalex.org/C10597312","wikidata":"https://www.wikidata.org/wiki/Q5473302","display_name":"Forwarding plane","level":3,"score":0.2935999929904938},{"id":"https://openalex.org/C113328881","wikidata":"https://www.wikidata.org/wiki/Q599809","display_name":"Dictionary attack","level":3,"score":0.28279998898506165},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.26089999079704285}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tc.2025.3625385","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2025.3625385","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1381523679","display_name":null,"funder_award_id":"2025JJ50350","funder_id":"https://openalex.org/F4320322843","funder_display_name":"Natural Science Foundation of\u00a0Hunan Province"},{"id":"https://openalex.org/G3797785422","display_name":null,"funder_award_id":"62472153","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322843","display_name":"Natural Science Foundation of\u00a0Hunan Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W2050326248","https://openalex.org/W2111542531","https://openalex.org/W2123659539","https://openalex.org/W2396855773","https://openalex.org/W2754471018","https://openalex.org/W2886805663","https://openalex.org/W2898549860","https://openalex.org/W2919984289","https://openalex.org/W2982682021","https://openalex.org/W2983123278","https://openalex.org/W2985576788","https://openalex.org/W3008207353","https://openalex.org/W3046351827","https://openalex.org/W3048313681","https://openalex.org/W3125745247","https://openalex.org/W3136284412","https://openalex.org/W3196285162","https://openalex.org/W3212017873","https://openalex.org/W3214071552","https://openalex.org/W4213060442","https://openalex.org/W4220760624","https://openalex.org/W4249081347","https://openalex.org/W4285184946","https://openalex.org/W4302362674","https://openalex.org/W4313399242","https://openalex.org/W4321383469","https://openalex.org/W4327930462","https://openalex.org/W4376481072","https://openalex.org/W4387880556","https://openalex.org/W4390970373","https://openalex.org/W4391069753","https://openalex.org/W4401367971","https://openalex.org/W4404884150","https://openalex.org/W4405181991","https://openalex.org/W4405800338","https://openalex.org/W4407361734"],"related_works":[],"abstract_inverted_index":{"DNS":[0,20,42,69],"recursive":[1],"resolver":[2],"plays":[3],"the":[4,73,116,128,136,140,145],"role":[5],"of":[6,130,139,147],"intermediary":[7],"agent":[8],"in":[9,31,72,122,159],"domain":[10],"name":[11],"query":[12],"service,":[13],"making":[14],"it":[15],"easy":[16],"to":[17,92,100,118,143],"observe":[18],"various":[19],"flooding":[21],"attack":[22,33,161,179],"behaviors.":[23],"The":[24],"programmable":[25,74],"data":[26,75],"plane":[27],"has":[28,38],"promoted":[29],"innovation":[30],"in-band":[32],"detection,":[34],"but":[35],"previous":[36],"work":[37],"not":[39],"concentrated":[40],"on":[41,153],"services,":[43],"and":[44,53,80,89,125,156],"there":[45],"are":[46],"concerns":[47],"with":[48,169],"mistakenly":[49],"killing":[50],"benign":[51,98],"traffic":[52,99],"low":[54],"classification":[55],"accuracy.":[56],"In":[57],"this":[58],"paper,":[59],"we":[60],"propose":[61],"DNSGreen,":[62],"a":[63,87,110],"comprehensive":[64],"defense":[65,95],"system":[66,148],"against":[67],"bounce-style":[68],"DDoS":[70],"attacks":[71],"plane.":[76],"DNSGreen":[77,108,134,152,165],"discusses":[78],"flow":[79],"packet":[81],"characteristics":[82],"under":[83],"anomalous":[84],"behavior,":[85],"employing":[86],"\u201cflow-detection":[88],"packet-filtering\u201d":[90],"pattern":[91],"ensure":[93],"effective":[94],"while":[96,177],"allowing":[97],"pass":[101],"through":[102],"as":[103,105],"much":[104],"possible.":[106],"Furthermore,":[107],"designs":[109],"whitelist":[111],"collection":[112],"module,":[113],"which":[114],"eliminates":[115],"need":[117],"inspect":[119],"trusted":[120],"streams":[121],"subsequent":[123],"filtering":[124,178],"thereby":[126],"reducing":[127],"occurrence":[129],"false":[131],"positives.":[132],"Finally,":[133],"improves":[135],"allocation":[137],"method":[138],"statistical":[141],"structure":[142],"enhance":[144],"accuracy":[146],"alarms.":[149],"We":[150],"deploy":[151],"BMv2":[154],"switches":[155],"conduct":[157],"tests":[158],"three":[160],"scenarios,":[162],"demonstrating":[163],"that":[164],"safeguards":[166],"normal":[167],"users":[168],"excellent":[170],"<italic":[171],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[172,174],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">F</i><sub":[173],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">0:5</sub>":[175],"score":[176],"traffic.":[180]},"counts_by_year":[{"year":2026,"cited_by_count":6}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-11-06T00:00:00"}
