{"id":"https://openalex.org/W4285149515","doi":"https://doi.org/10.1109/tetci.2022.3170515","title":"A Deep 1-D CNN and Bidirectional LSTM Ensemble Model With Arbitration Mechanism for LDDoS Attack Detection","display_name":"A Deep 1-D CNN and Bidirectional LSTM Ensemble Model With Arbitration Mechanism for LDDoS Attack Detection","publication_year":2022,"publication_date":"2022-05-05","ids":{"openalex":"https://openalex.org/W4285149515","doi":"https://doi.org/10.1109/tetci.2022.3170515"},"language":"en","primary_location":{"id":"doi:10.1109/tetci.2022.3170515","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tetci.2022.3170515","pdf_url":null,"source":{"id":"https://openalex.org/S4210210251","display_name":"IEEE Transactions on Emerging Topics in Computational Intelligence","issn_l":"2471-285X","issn":["2471-285X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Emerging Topics in Computational Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102950166","display_name":"Zengguang Liu","orcid":"https://orcid.org/0000-0002-7099-8393"},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zengguang Liu","raw_affiliation_strings":["College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, Shandong, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, Shandong, China","institution_ids":["https://openalex.org/I80143920"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100624236","display_name":"Jiguo Yu","orcid":"https://orcid.org/0000-0001-6451-1158"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiguo Yu","raw_affiliation_strings":["Big Data Institute, Qilu University of Technology, Jinan, Shandong, China","Shandong Laboratory of Computer Networks, Jinan, China"],"affiliations":[{"raw_affiliation_string":"Big Data Institute, Qilu University of Technology, Jinan, Shandong, China","institution_ids":["https://openalex.org/I152269853"]},{"raw_affiliation_string":"Shandong Laboratory of Computer Networks, Jinan, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012646469","display_name":"Biwei Yan","orcid":"https://orcid.org/0000-0002-9081-0773"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Biwei Yan","raw_affiliation_strings":["School of Computer Science and Technology, Qilu University of Technology, Jinan, Shandong, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Qilu University of Technology, Jinan, Shandong, China","institution_ids":["https://openalex.org/I152269853"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003735433","display_name":"Guijuan Wang","orcid":"https://orcid.org/0000-0002-5930-9809"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guijuan Wang","raw_affiliation_strings":["School of Mathematics and Statistics, Qilu University of Technology, Jinan, Shandong, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Statistics, Qilu University of Technology, Jinan, Shandong, China","institution_ids":["https://openalex.org/I152269853"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5102950166"],"corresponding_institution_ids":["https://openalex.org/I80143920"],"apc_list":null,"apc_paid":null,"fwci":2.2787,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.8833885,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"6","issue":"6","first_page":"1396","last_page":"1410"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7338478565216064},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5688003897666931},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5286571979522705},{"id":"https://openalex.org/keywords/padding","display_name":"Padding","score":0.4763526916503906},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.47356951236724854},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.4502522051334381},{"id":"https://openalex.org/keywords/hyperparameter","display_name":"Hyperparameter","score":0.44407573342323303},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.38921183347702026},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.34361594915390015},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3271934390068054},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3266417980194092}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7338478565216064},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5688003897666931},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5286571979522705},{"id":"https://openalex.org/C165435473","wikidata":"https://www.wikidata.org/wiki/Q1509884","display_name":"Padding","level":2,"score":0.4763526916503906},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.47356951236724854},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.4502522051334381},{"id":"https://openalex.org/C8642999","wikidata":"https://www.wikidata.org/wiki/Q4171168","display_name":"Hyperparameter","level":2,"score":0.44407573342323303},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.38921183347702026},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.34361594915390015},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3271934390068054},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3266417980194092},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tetci.2022.3170515","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tetci.2022.3170515","pdf_url":null,"source":{"id":"https://openalex.org/S4210210251","display_name":"IEEE Transactions on Emerging Topics in Computational Intelligence","issn_l":"2471-285X","issn":["2471-285X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Emerging Topics in Computational Intelligence","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7300000190734863,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1504478148","display_name":null,"funder_award_id":"61771289","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1973360331","display_name":null,"funder_award_id":"2019JZZY020124","funder_id":"https://openalex.org/F4320333596","funder_display_name":"Key Technology Research and Development Program of Shandong"},{"id":"https://openalex.org/G2132590075","display_name":null,"funder_award_id":"ZR2021QF079","funder_id":"https://openalex.org/F4320338074","funder_display_name":"Government of Shandong Province"},{"id":"https://openalex.org/G7163822104","display_name":null,"funder_award_id":"61832012","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320333596","display_name":"Key Technology Research and Development Program of Shandong","ror":null},{"id":"https://openalex.org/F4320338074","display_name":"Government of Shandong Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W2047408376","https://openalex.org/W2095705004","https://openalex.org/W2517975492","https://openalex.org/W2597472767","https://openalex.org/W2598525681","https://openalex.org/W2753352458","https://openalex.org/W2783741806","https://openalex.org/W2784741323","https://openalex.org/W2787296320","https://openalex.org/W2791443493","https://openalex.org/W2796273481","https://openalex.org/W2903452648","https://openalex.org/W2925327970","https://openalex.org/W2946361217","https://openalex.org/W2978116063","https://openalex.org/W3005476017","https://openalex.org/W3008243670","https://openalex.org/W3008535060","https://openalex.org/W3015586532","https://openalex.org/W3022516843","https://openalex.org/W3040516461","https://openalex.org/W3040552057","https://openalex.org/W3082065751","https://openalex.org/W3086419524","https://openalex.org/W3087368271","https://openalex.org/W3119316801","https://openalex.org/W3120190980","https://openalex.org/W3120795858","https://openalex.org/W3134108515","https://openalex.org/W3136367749","https://openalex.org/W3136683205","https://openalex.org/W3155650995","https://openalex.org/W3170127175","https://openalex.org/W3196273218","https://openalex.org/W3198728103","https://openalex.org/W3209492459","https://openalex.org/W4213107800","https://openalex.org/W4240437018","https://openalex.org/W4385245566","https://openalex.org/W6674330103","https://openalex.org/W6676707958","https://openalex.org/W6739901393","https://openalex.org/W6780307038","https://openalex.org/W6783283322","https://openalex.org/W6788630057","https://openalex.org/W6796211265"],"related_works":["https://openalex.org/W2142641794","https://openalex.org/W4384947563","https://openalex.org/W2946726629","https://openalex.org/W4231428344","https://openalex.org/W4322753435","https://openalex.org/W4243974052","https://openalex.org/W4206951940","https://openalex.org/W4293868382","https://openalex.org/W4382602594","https://openalex.org/W4387850423"],"abstract_inverted_index":{"Low-rate":[0],"Distributed":[1],"Denial":[2],"of":[3,18,41,97,122,151,161,177],"Service":[4],"(LDDoS)":[5],"attacks":[6,37],"are":[7,29],"complex":[8],"and":[9,21,43,47,58,104,119,139,185],"common":[10],"security":[11],"issues,":[12],"which":[13],"disrupt":[14],"the":[15,19,25,39,65,69,131,149,152,165,174,178,186],"essential":[16],"services":[17],"varied":[20],"emerging":[22],"networks.":[23],"However,":[24],"traditional":[26],"detection":[27,175],"models":[28,156],"normally":[30],"in":[31,45,164],"a":[32,55,71,93,105,159],"dilemma":[33],"condition":[34],"since":[35],"LDDoS":[36,66,145],"have":[38],"characteristics":[40],"concealment":[42],"persistence":[44],"space":[46],"time":[48,187],"dimensions.":[49],"In":[50,68],"this":[51],"paper,":[52],"we":[53],"propose":[54],"novel,":[56],"practical":[57],"fast":[59],"ensemble":[60],"model":[61],"(FastCBLA-EM)":[62],"to":[63,115,137,183],"detect":[64],"attacks.":[67,146],"FastCBLA-EM,":[70],"dilated":[72],"padding-based":[73],"dual":[74],"sliding":[75],"method":[76,134],"is":[77,113,135,189],"worked":[78],"out":[79],"for":[80,143],"producing":[81],"fixed-length":[82],"chronological":[83],"order":[84],"samples":[85],"from":[86],"flows":[87],"per":[88],"well-tuned":[89,162],"packet":[90],"step.":[91],"Next,":[92],"competitive":[94],"network":[95,112],"composed":[96],"1-D":[98],"Convolutional":[99],"Neural":[100],"Network":[101],"(1-D":[102],"CNN)":[103],"bidirectional":[106],"Long":[107],"Short":[108],"Term":[109],"Memory":[110],"(bi-LSTM)":[111],"employed":[114],"learn":[116],"both":[117],"spatial":[118],"temporal":[120],"representations":[121,142],"samples,":[123],"parallelly.":[124],"Finally,":[125],"an":[126],"arbitration":[127],"mechanism":[128],"based":[129],"on":[130],"enhanced":[132],"attention":[133],"used":[136],"assemble":[138],"weigh":[140],"these":[141],"detecting":[144],"We":[147],"compare":[148],"performances":[150],"FastCBLA-EM":[153,179],"with":[154],"other":[155],"by":[157],"obtaining":[158],"group":[160],"hyperparameters":[163],"revised":[166],"ISCX-2016-SlowDos":[167],"flow-based":[168],"dataset.":[169],"Experimental":[170],"results":[171],"demonstrate":[172],"that":[173],"accuracy":[176],"can":[180],"be":[181],"up":[182],"99.7%":[184],"complexity":[188],"<inline-formula":[190],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[191],"xmlns:xlink=\"http://www.w3.org/1999/xlink\"><tex-math":[192],"notation=\"LaTeX\">$O(n)$</tex-math></inline-formula>":[193],".":[194]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":2}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
