{"id":"https://openalex.org/W3126956508","doi":"https://doi.org/10.1109/tdsc.2021.3055559","title":"A Game-Theoretical Approach for Mitigating Edge DDoS Attack","display_name":"A Game-Theoretical Approach for Mitigating Edge DDoS Attack","publication_year":2021,"publication_date":"2021-01-29","ids":{"openalex":"https://openalex.org/W3126956508","doi":"https://doi.org/10.1109/tdsc.2021.3055559","mag":"3126956508"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2021.3055559","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2021.3055559","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023499987","display_name":"Qiang He","orcid":"https://orcid.org/0000-0002-2607-4556"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Qiang He","raw_affiliation_strings":["School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia"],"raw_orcid":"https://orcid.org/0000-0002-2607-4556","affiliations":[{"raw_affiliation_string":"School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100717278","display_name":"Cheng Wang","orcid":"https://orcid.org/0000-0002-7181-4939"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cheng Wang","raw_affiliation_strings":["Intelligent and Distributed Computing Laboratory, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, Hubei, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Intelligent and Distributed Computing Laboratory, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057042576","display_name":"Guangming Cui","orcid":"https://orcid.org/0000-0002-8334-6263"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Guangming Cui","raw_affiliation_strings":["School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia"],"raw_orcid":"https://orcid.org/0000-0002-8334-6263","affiliations":[{"raw_affiliation_string":"School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100374415","display_name":"Bo Li","orcid":"https://orcid.org/0000-0002-3226-388X"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Bo Li","raw_affiliation_strings":["School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia"],"raw_orcid":"https://orcid.org/0000-0002-3226-388X","affiliations":[{"raw_affiliation_string":"School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114549552","display_name":"Rui Zhou","orcid":"https://orcid.org/0000-0002-9968-6190"},"institutions":[{"id":"https://openalex.org/I76214153","display_name":"Lanzhou University","ror":"https://ror.org/01mkqqe32","country_code":"CN","type":"education","lineage":["https://openalex.org/I76214153"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rui Zhou","raw_affiliation_strings":["School of Information Science &amp; Engineering, Lanzhou University, Lanzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Information Science &amp; Engineering, Lanzhou University, Lanzhou, China","institution_ids":["https://openalex.org/I76214153"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100604365","display_name":"Qingguo Zhou","orcid":"https://orcid.org/0000-0001-8054-5446"},"institutions":[{"id":"https://openalex.org/I76214153","display_name":"Lanzhou University","ror":"https://ror.org/01mkqqe32","country_code":"CN","type":"education","lineage":["https://openalex.org/I76214153"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingguo Zhou","raw_affiliation_strings":["School of Information Science &amp; Engineering, Lanzhou University, Lanzhou, China"],"raw_orcid":"https://orcid.org/0000-0001-8054-5446","affiliations":[{"raw_affiliation_string":"School of Information Science &amp; Engineering, Lanzhou University, Lanzhou, China","institution_ids":["https://openalex.org/I76214153"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100666554","display_name":"Yang Xiang","orcid":"https://orcid.org/0000-0001-5252-0831"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yang Xiang","raw_affiliation_strings":["School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia"],"raw_orcid":"https://orcid.org/0000-0001-5252-0831","affiliations":[{"raw_affiliation_string":"School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022262922","display_name":"Hai Jin","orcid":"https://orcid.org/0000-0002-3934-7605"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hai Jin","raw_affiliation_strings":["Services Computing Technology and System Lab, Big Data Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, Hubei, China"],"raw_orcid":"https://orcid.org/0000-0002-3934-7605","affiliations":[{"raw_affiliation_string":"Services Computing Technology and System Lab, Big Data Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035343733","display_name":"Yun Yang","orcid":"https://orcid.org/0000-0002-7868-5471"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yun Yang","raw_affiliation_strings":["School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia"],"raw_orcid":"https://orcid.org/0000-0002-7868-5471","affiliations":[{"raw_affiliation_string":"School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5023499987"],"corresponding_institution_ids":["https://openalex.org/I57093077"],"apc_list":null,"apc_paid":null,"fwci":17.941,"has_fulltext":false,"cited_by_count":140,"citation_normalized_percentile":{"value":0.99538373,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"19","issue":"4","first_page":"2333","last_page":"2348"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7690971493721008},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7285316586494446},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.6571758389472961},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5317196846008301},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.5019984245300293},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4830080270767212},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.4544660151004791},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.38481664657592773},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.22238844633102417},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1550707221031189},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12771716713905334}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7690971493721008},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7285316586494446},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.6571758389472961},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5317196846008301},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.5019984245300293},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4830080270767212},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.4544660151004791},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.38481664657592773},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.22238844633102417},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1550707221031189},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12771716713905334},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tdsc.2021.3055559","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2021.3055559","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},{"id":"pmh:oai:ir.lzu.edu.cn/:262010/451909","is_oa":false,"landing_page_url":"http://ir.lzu.edu.cn/handle/262010/451909","pdf_url":null,"source":{"id":"https://openalex.org/S4406923049","display_name":"Lanzhou University Institutional Repository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article in Press"},{"id":"pmh:oai:researchbank.swinburne.edu.au:4daa697c-ee98-4dce-a961-7389d0bf516c/1","is_oa":false,"landing_page_url":"http://hdl.handle.net/1959.3/459932","pdf_url":null,"source":{"id":"https://openalex.org/S4306401157","display_name":"Swinburne Research Bank (Swinburne University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I57093077","host_organization_name":"Swinburne University of Technology","host_organization_lineage":["https://openalex.org/I57093077"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing (2021), pp. 1-1","raw_type":""}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4905308571","display_name":null,"funder_award_id":"61402210","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W1967438932","https://openalex.org/W1978502884","https://openalex.org/W1990818816","https://openalex.org/W2080346852","https://openalex.org/W2103151730","https://openalex.org/W2112684840","https://openalex.org/W2114623221","https://openalex.org/W2148542372","https://openalex.org/W2154350082","https://openalex.org/W2162969618","https://openalex.org/W2170874246","https://openalex.org/W2191948661","https://openalex.org/W2195423816","https://openalex.org/W2262390119","https://openalex.org/W2299450638","https://openalex.org/W2327409318","https://openalex.org/W2416799949","https://openalex.org/W2493746814","https://openalex.org/W2594560857","https://openalex.org/W2604119386","https://openalex.org/W2608659040","https://openalex.org/W2624989916","https://openalex.org/W2733765803","https://openalex.org/W2751904527","https://openalex.org/W2755021152","https://openalex.org/W2761278203","https://openalex.org/W2763827256","https://openalex.org/W2799758613","https://openalex.org/W2800992211","https://openalex.org/W2801812796","https://openalex.org/W2810102121","https://openalex.org/W2875475762","https://openalex.org/W2890928364","https://openalex.org/W2899670782","https://openalex.org/W2900394813","https://openalex.org/W2972268941","https://openalex.org/W2982190547","https://openalex.org/W3022321359","https://openalex.org/W3040873268","https://openalex.org/W3043084201","https://openalex.org/W3044837503","https://openalex.org/W3048409550","https://openalex.org/W3049290327","https://openalex.org/W3114636122","https://openalex.org/W3117810553","https://openalex.org/W3122864121","https://openalex.org/W3131302676","https://openalex.org/W4236158019","https://openalex.org/W4297563113","https://openalex.org/W6753981864"],"related_works":["https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W1968168724","https://openalex.org/W2204131204","https://openalex.org/W2754163055","https://openalex.org/W4322008378","https://openalex.org/W2383770723","https://openalex.org/W2186749541","https://openalex.org/W2360429410","https://openalex.org/W4256682929"],"abstract_inverted_index":{"Edge":[0],"computing":[1,10,13],"(EC)":[2],"is":[3,47],"an":[4,138],"emerging":[5],"paradigm":[6,46],"that":[7,18,165,195],"extends":[8],"cloud":[9,32],"by":[11,49],"pushing":[12],"resources":[14],"onto":[15],"edge":[16,29,40,65,112,152],"servers":[17,66],"are":[19,79],"attached":[20],"to":[21,39,73,82,109,175,183],"base":[22],"stations":[23],"or":[24],"access":[25],"points":[26],"at":[27],"the":[28,31,44,55,62,88,106,111,157,177,181,184,200],"of":[30],"in":[33,87],"close":[34],"proximity":[35],"with":[36,97],"end-users.":[37],"Due":[38],"servers\u2019":[41],"geographic":[42],"distribution,":[43],"EC":[45,63,89],"challenged":[48],"many":[50],"new":[51,99],"security":[52],"threats,":[53],"including":[54],"notorious":[56],"distributed":[57],"Denial-of-Service":[58],"(DDoS)":[59],"attack.":[60],"In":[61,101],"environment,":[64],"usually":[67],"have":[68],"constrained":[69],"processing":[70],"capacities":[71],"due":[72],"their":[74],"limited":[75],"sizes.":[76],"Thus,":[77],"they":[78],"particularly":[80],"vulnerable":[81],"DDoS":[83,85,93,113,153],"attacks.":[84,154],"attacks":[86],"environment":[90],"render":[91],"existing":[92],"mitigation":[94,114],"approaches":[95,197],"obsolete":[96],"its":[98,127],"characteristics.":[100],"this":[102,134],"article,":[103],"we":[104,136,193],"make":[105],"first":[107],"attempt":[108],"tackle":[110],"(EDM)":[115],"problem.":[116,186],"We":[117],"model":[118],"it":[119],"as":[120,160,180],"a":[121,144,161,167,172],"constraint":[122],"optimization":[123],"problem":[124,159,202],"and":[125,143,170,190,204],"prove":[126],"<inline-formula><tex-math":[128],"notation=\"LaTeX\">$\\mathcal":[129],"{NP}$</tex-math></inline-formula>":[130],"-hardness.":[131],"To":[132],"solve":[133,199],"problem,":[135],"propose":[137],"optimal":[139],"approach":[140,147],"named":[141,148],"EDMOpti":[142],"novel":[145],"game-theoretical":[146],"EDMGame":[149,155],"for":[150],"mitigating":[151],"formulates":[156],"EDM":[158,163,185,201],"potential":[162],"Game":[164],"admits":[166],"Nash":[168,178],"equilibrium":[169,179],"employs":[171],"decentralized":[173],"algorithm":[174],"find":[176],"solution":[182],"Through":[187],"theoretical":[188],"analysis":[189],"experimental":[191],"evaluation,":[192],"demonstrate":[194],"our":[196],"can":[198],"effectively":[203],"efficiently.":[205]},"counts_by_year":[{"year":2026,"cited_by_count":7},{"year":2025,"cited_by_count":21},{"year":2024,"cited_by_count":28},{"year":2023,"cited_by_count":28},{"year":2022,"cited_by_count":33},{"year":2021,"cited_by_count":23}],"updated_date":"2026-05-09T13:55:54.758798","created_date":"2025-10-10T00:00:00"}
