{"id":"https://openalex.org/W4312369036","doi":"https://doi.org/10.1109/tce.2022.3213872","title":"IEEE P2668-Compliant Multi-Layer IoT-DDoS Defense System Using Deep Reinforcement Learning","display_name":"IEEE P2668-Compliant Multi-Layer IoT-DDoS Defense System Using Deep Reinforcement Learning","publication_year":2022,"publication_date":"2022-10-12","ids":{"openalex":"https://openalex.org/W4312369036","doi":"https://doi.org/10.1109/tce.2022.3213872"},"language":"en","primary_location":{"id":"doi:10.1109/tce.2022.3213872","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2022.3213872","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020423899","display_name":"Yucheng Liu","orcid":"https://orcid.org/0000-0001-8135-4510"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Yucheng Liu","raw_affiliation_strings":["Department of Electrical Engineering, City University of Hong Kong, Kowloon Tong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, City University of Hong Kong, Kowloon Tong, Hong Kong","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037894365","display_name":"Kim Fung Tsang","orcid":"https://orcid.org/0000-0002-8332-227X"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Kim-Fung Tsang","raw_affiliation_strings":["Department of Electrical Engineering, City University of Hong Kong, Kowloon Tong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, City University of Hong Kong, Kowloon Tong, Hong Kong","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021393970","display_name":"Chung Kit Wu","orcid":"https://orcid.org/0000-0002-8230-6294"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Chung Kit Wu","raw_affiliation_strings":["Department of Electrical Engineering, City University of Hong Kong, Kowloon Tong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, City University of Hong Kong, Kowloon Tong, Hong Kong","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017156321","display_name":"Yang Wei","orcid":"https://orcid.org/0000-0003-3393-6211"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Yang Wei","raw_affiliation_strings":["Department of Electrical Engineering, City University of Hong Kong, Kowloon Tong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, City University of Hong Kong, Kowloon Tong, Hong Kong","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015014802","display_name":"Hao Wang","orcid":"https://orcid.org/0000-0001-9499-8446"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Hao Wang","raw_affiliation_strings":["Department of Electrical Engineering, City University of Hong Kong, Kowloon Tong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, City University of Hong Kong, Kowloon Tong, Hong Kong","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057187503","display_name":"Hongxu Zhu","orcid":"https://orcid.org/0000-0001-6257-7065"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Hongxu Zhu","raw_affiliation_strings":["Department of Electrical and Computer Engineering, National University of Singapore, Queenstown, Singapore"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, National University of Singapore, Queenstown, Singapore","institution_ids":["https://openalex.org/I165932596"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5020423899"],"corresponding_institution_ids":["https://openalex.org/I168719708"],"apc_list":null,"apc_paid":null,"fwci":6.8132,"has_fulltext":false,"cited_by_count":49,"citation_normalized_percentile":{"value":0.97356058,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":"69","issue":"1","first_page":"49","last_page":"64"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.9575766324996948},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7257050275802612},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.6804565787315369},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.668276309967041},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.5752037763595581},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5705458521842957},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5696960091590881},{"id":"https://openalex.org/keywords/application-layer","display_name":"Application layer","score":0.5390850901603699},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.5375262498855591},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5128552913665771},{"id":"https://openalex.org/keywords/blocking","display_name":"Blocking (statistics)","score":0.44296756386756897},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3224959969520569},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.27038389444351196},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07883861660957336}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.9575766324996948},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7257050275802612},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.6804565787315369},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.668276309967041},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.5752037763595581},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5705458521842957},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5696960091590881},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.5390850901603699},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.5375262498855591},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5128552913665771},{"id":"https://openalex.org/C144745244","wikidata":"https://www.wikidata.org/wiki/Q4927286","display_name":"Blocking (statistics)","level":2,"score":0.44296756386756897},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3224959969520569},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27038389444351196},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07883861660957336},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tce.2022.3213872","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2022.3213872","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7400000095367432,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W2503226345","https://openalex.org/W2591686746","https://openalex.org/W2733765803","https://openalex.org/W2799843691","https://openalex.org/W2883531421","https://openalex.org/W2899478246","https://openalex.org/W2900067643","https://openalex.org/W2921019731","https://openalex.org/W2928995393","https://openalex.org/W2969664776","https://openalex.org/W2969933174","https://openalex.org/W2981791596","https://openalex.org/W2991221038","https://openalex.org/W3003885457","https://openalex.org/W3005097670","https://openalex.org/W3028492904","https://openalex.org/W3092450653","https://openalex.org/W3093545418","https://openalex.org/W3097443174","https://openalex.org/W3102091066","https://openalex.org/W3122213525","https://openalex.org/W3126855403","https://openalex.org/W3159885303","https://openalex.org/W3162781113","https://openalex.org/W4210256263","https://openalex.org/W4214717370","https://openalex.org/W4226330261","https://openalex.org/W4285155245"],"related_works":["https://openalex.org/W2360429410","https://openalex.org/W2754163055","https://openalex.org/W4377970398","https://openalex.org/W3026018975","https://openalex.org/W2954653956","https://openalex.org/W2076705113","https://openalex.org/W4376486703","https://openalex.org/W4213239404","https://openalex.org/W589950749","https://openalex.org/W3088372203"],"abstract_inverted_index":{"The":[0,148,231],"Internet":[1],"of":[2,21,35,59,120,204,216],"Things":[3],"(IoT)":[4],"has":[5],"been":[6],"attracting":[7],"people":[8],"to":[9,12,27,41,44,52,125,143,211,236],"its":[10,121],"capability":[11],"deal":[13],"with":[14,18,108,114,145],"smart":[15],"applications.":[16,240],"However,":[17],"the":[19,32,48,57,65,70,109,118,146,152,156,195,200,214],"development":[20],"IoT,":[22],"there":[23],"are":[24],"more":[25,161],"attacks":[26,86],"threaten":[28],"IoT":[29,45,50,75,170,228],"systems.":[30],"Especially,":[31],"distributed":[33],"denial":[34],"service":[36],"(DDoS)":[37],"attack":[38],"can":[39,154,206,233],"lead":[40],"mighty":[42],"destruction":[43],"servers,":[46],"causing":[47],"whole":[49],"network":[51],"be":[53,207,234],"out-of-service.":[54],"Hitherto,":[55],"given":[56],"lack":[58],"a":[60,97,127,135],"common":[61],"standard":[62],"for":[63,74,132],"defining":[64],"IoT-driven":[66],"DDoS":[67,71,171],"(IoT-DDoS)":[68],"attack,":[69,172,184],"defense":[72,82,103,179],"system":[73,104],"is":[76,87,106,141],"developed":[77,142],"without":[78],"accurate":[79],"guidance.":[80],"Additionally,":[81,192],"against":[83],"multi-layer":[84,101,182],"IoT-DDoS":[85,102,183],"rarely":[88,187],"covered":[89],"by":[90,193],"previous":[91,165,190],"works.":[92,191],"To":[93],"address":[94],"these":[95],"issues,":[96],"deep":[98],"reinforcement":[99],"learning-based":[100],"(DRL-MLDS)":[105],"proposed":[107],"reward":[110,198],"metrics":[111],"in":[112,189],"compliance":[113],"IEEE":[115,196],"P2668":[116],"\u2013":[117],"first":[119],"kind.":[122],"In":[123],"addition,":[124],"provide":[126],"resilient":[128],"blocking":[129,138],"time":[130,139],"configuration":[131],"false-positive":[133],"samples,":[134],"new":[136],"power-law-based":[137],"mechanism":[140],"cooperate":[144],"DRL-MLDS.":[147],"outcome":[149],"reveals":[150],"that":[151],"DRL-MLDS":[153,205,232],"reach":[155],"same":[157],"accuracy":[158,180],"level":[159],"(i.e.,":[160],"than":[162],"96%)":[163],"as":[164,173,175],"works":[166],"under":[167],"single":[168],"protocol-based":[169],"well":[174],"providing":[176],"around":[177],"97%":[178],"on":[181],"which":[185],"was":[186],"discussed":[188],"applying":[194],"P2668-compliant":[197],"metrics,":[199],"applicability":[201],"index":[202],"(ADex)":[203],"improved":[208],"from":[209],"3.2":[210],"4.4,":[212],"fulfilling":[213],"recommendation":[215],"ADex":[217],"(e.g.,":[218],"<inline-formula":[219],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[220],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">":[221],"<tex-math":[222],"notation=\"LaTeX\">$\\mathbf":[223],"{&gt;}3.5$":[224],"</tex-math></inline-formula>":[225],")":[226],"toward":[227],"best":[229],"practices.":[230],"extended":[235],"Metaverse":[237],"design":[238],"and":[239]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":14},{"year":2024,"cited_by_count":21},{"year":2023,"cited_by_count":12},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
