{"id":"https://openalex.org/W4408258122","doi":"https://doi.org/10.1109/tencon61640.2024.10902992","title":"Identification of DDoS Attacks Through SHAP-Based Feature Analysis and Transformer Models: A Multivariate Time Series Data Approach","display_name":"Identification of DDoS Attacks Through SHAP-Based Feature Analysis and Transformer Models: A Multivariate Time Series Data Approach","publication_year":2024,"publication_date":"2024-12-01","ids":{"openalex":"https://openalex.org/W4408258122","doi":"https://doi.org/10.1109/tencon61640.2024.10902992"},"language":"en","primary_location":{"id":"doi:10.1109/tencon61640.2024.10902992","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tencon61640.2024.10902992","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"TENCON 2024 - 2024 IEEE Region 10 Conference (TENCON)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015303799","display_name":"Derek S. Hernandez","orcid":"https://orcid.org/0000-0002-0290-2855"},"institutions":[{"id":"https://openalex.org/I151221077","display_name":"Chung Yuan Christian University","ror":"https://ror.org/02w8ws377","country_code":"TW","type":"education","lineage":["https://openalex.org/I151221077"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Drixter Velayo Hernandez","raw_affiliation_strings":["Chung Yuan Christian University,Department of Electrical Engineering,Taoyuan,Taiwan"],"affiliations":[{"raw_affiliation_string":"Chung Yuan Christian University,Department of Electrical Engineering,Taoyuan,Taiwan","institution_ids":["https://openalex.org/I151221077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101515649","display_name":"Mengting Chen","orcid":"https://orcid.org/0000-0002-3894-8281"},"institutions":[{"id":"https://openalex.org/I151221077","display_name":"Chung Yuan Christian University","ror":"https://ror.org/02w8ws377","country_code":"TW","type":"education","lineage":["https://openalex.org/I151221077"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Meng-Ting Chen","raw_affiliation_strings":["Chung Yuan Christian University,Department of Electrical Engineering,Taoyuan,Taiwan"],"affiliations":[{"raw_affiliation_string":"Chung Yuan Christian University,Department of Electrical Engineering,Taoyuan,Taiwan","institution_ids":["https://openalex.org/I151221077"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029640870","display_name":"Yu\u2010Kuen Lai","orcid":"https://orcid.org/0000-0002-7064-523X"},"institutions":[{"id":"https://openalex.org/I151221077","display_name":"Chung Yuan Christian University","ror":"https://ror.org/02w8ws377","country_code":"TW","type":"education","lineage":["https://openalex.org/I151221077"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Yu-Kuen Lai","raw_affiliation_strings":["Chung Yuan Christian University,Department of Electrical Engineering,Taoyuan,Taiwan"],"affiliations":[{"raw_affiliation_string":"Chung Yuan Christian University,Department of Electrical Engineering,Taoyuan,Taiwan","institution_ids":["https://openalex.org/I151221077"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5015303799"],"corresponding_institution_ids":["https://openalex.org/I151221077"],"apc_list":null,"apc_paid":null,"fwci":0.3663,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.67007202,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"632","last_page":"635"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9743000268936157,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/time-series","display_name":"Time series","score":0.6553267240524292},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6473333239555359},{"id":"https://openalex.org/keywords/multivariate-statistics","display_name":"Multivariate statistics","score":0.6450100541114807},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6395162343978882},{"id":"https://openalex.org/keywords/series","display_name":"Series (stratigraphy)","score":0.5093863606452942},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4630368649959564},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4309566020965576},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.42159345746040344},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.33395150303840637},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.17456811666488647},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06683936715126038},{"id":"https://openalex.org/keywords/geology","display_name":"Geology","score":0.05963858962059021}],"concepts":[{"id":"https://openalex.org/C151406439","wikidata":"https://www.wikidata.org/wiki/Q186588","display_name":"Time series","level":2,"score":0.6553267240524292},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6473333239555359},{"id":"https://openalex.org/C161584116","wikidata":"https://www.wikidata.org/wiki/Q1952580","display_name":"Multivariate statistics","level":2,"score":0.6450100541114807},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6395162343978882},{"id":"https://openalex.org/C143724316","wikidata":"https://www.wikidata.org/wiki/Q312468","display_name":"Series (stratigraphy)","level":2,"score":0.5093863606452942},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4630368649959564},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4309566020965576},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.42159345746040344},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.33395150303840637},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.17456811666488647},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06683936715126038},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.05963858962059021},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tencon61640.2024.10902992","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tencon61640.2024.10902992","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"TENCON 2024 - 2024 IEEE Region 10 Conference (TENCON)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4761499686","display_name":null,"funder_award_id":"111-2221-E-033-032-MY2,113-2221-E-033-056","funder_id":"https://openalex.org/F4320322795","funder_display_name":"Ministry of Science and Technology, Taiwan"}],"funders":[{"id":"https://openalex.org/F4320322795","display_name":"Ministry of Science and Technology, Taiwan","ror":"https://ror.org/02kv4zf79"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W2962862931","https://openalex.org/W3080616619","https://openalex.org/W3083616926","https://openalex.org/W3207577269","https://openalex.org/W4246271490","https://openalex.org/W4285196496","https://openalex.org/W4285784386","https://openalex.org/W4313531834","https://openalex.org/W4382446893","https://openalex.org/W4385245566","https://openalex.org/W4386566012","https://openalex.org/W4388923662","https://openalex.org/W6683742744","https://openalex.org/W6737947904","https://openalex.org/W6739901393","https://openalex.org/W6769694850","https://openalex.org/W6782339462","https://openalex.org/W6783331958","https://openalex.org/W6853757192","https://openalex.org/W6853834026","https://openalex.org/W6856272751"],"related_works":["https://openalex.org/W2765763546","https://openalex.org/W4386482731","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W4390188535","https://openalex.org/W2118640767","https://openalex.org/W2119012848","https://openalex.org/W2622688551","https://openalex.org/W1550175370","https://openalex.org/W1990205660"],"abstract_inverted_index":{"DDoS":[0,35,50],"attacks":[1,36,51,96],"are":[2,12],"pervasive":[3],"and":[4,14,47,57],"lead":[5],"to":[6,29,66,83],"significant":[7],"economic":[8],"losses":[9],"because":[10],"they":[11,99],"cost-effective":[13],"rely":[15],"on":[16],"readily":[17],"available":[18],"resources.":[19],"This":[20,85],"study":[21],"introduces":[22],"crucial":[23],"features":[24,54,68],"identified":[25],"through":[26],"SHAP-based":[27],"analysis":[28],"capture":[30],"the":[31,38],"temporal":[32],"characteristics":[33],"of":[34,49,81],"within":[37],"Transformer":[39],"model.":[40],"The":[41,60],"potential":[42],"for":[43],"improving":[44],"online":[45],"detection":[46],"classification":[48],"using":[52],"reduced":[53],"is":[55],"evident":[56],"thoroughly":[58],"discussed.":[59],"simulation":[61],"results":[62],"demonstrate":[63],"that":[64],"reducing":[65],"20":[67],"with":[69],"selected":[70],"input":[71],"window":[72],"sizes":[73],"yields":[74],"optimal":[75],"performance,":[76],"reaching":[77],"an":[78],"F1":[79],"Score":[80],"up":[82],"99.58%.":[84],"improvement":[86],"could":[87],"greatly":[88],"enhance":[89],"real-time":[90],"defense":[91],"mechanisms,":[92],"particularly":[93],"in":[94,101],"identifying":[95],"promptly":[97],"when":[98],"occur":[100],"a":[102],"streaming":[103],"fashion.":[104]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
