{"id":"https://openalex.org/W4391128882","doi":"https://doi.org/10.1109/tnsm.2024.3357660","title":"Credible Link Flooding Attack Detection and Mitigation: A Blockchain-Based Approach","display_name":"Credible Link Flooding Attack Detection and Mitigation: A Blockchain-Based Approach","publication_year":2024,"publication_date":"2024-01-23","ids":{"openalex":"https://openalex.org/W4391128882","doi":"https://doi.org/10.1109/tnsm.2024.3357660"},"language":"en","primary_location":{"id":"doi:10.1109/tnsm.2024.3357660","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2024.3357660","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088416755","display_name":"Xiaofeng Jiang","orcid":"https://orcid.org/0000-0001-7595-2397"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaofeng Jiang","raw_affiliation_strings":["Department of Automation, University of Science and Technology of China, Hefei, China","Institute of Artificial Intelligence, Hefei Comprehensive National Science Center, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Department of Automation, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]},{"raw_affiliation_string":"Institute of Artificial Intelligence, Hefei Comprehensive National Science Center, Hefei, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042765844","display_name":"Qianbao Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qianbao Shi","raw_affiliation_strings":["Department of Automation, University of Science and Technology of China, Hefei, China","Institute of Artificial Intelligence, Hefei Comprehensive National Science Center, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Department of Automation, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]},{"raw_affiliation_string":"Institute of Artificial Intelligence, Hefei Comprehensive National Science Center, Hefei, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113146315","display_name":"Hengkun Miao","orcid":null},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hengkun Miao","raw_affiliation_strings":["Department of Automation, University of Science and Technology of China, Hefei, China","Institute of Artificial Intelligence, Hefei Comprehensive National Science Center, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Department of Automation, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]},{"raw_affiliation_string":"Institute of Artificial Intelligence, Hefei Comprehensive National Science Center, Hefei, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042222942","display_name":"Wanqin Cao","orcid":"https://orcid.org/0009-0009-4030-8417"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wanqin Cao","raw_affiliation_strings":["Department of Automation, University of Science and Technology of China, Hefei, China","Institute of Artificial Intelligence, Hefei Comprehensive National Science Center, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Department of Automation, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]},{"raw_affiliation_string":"Institute of Artificial Intelligence, Hefei Comprehensive National Science Center, Hefei, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047787436","display_name":"Huasen He","orcid":"https://orcid.org/0000-0001-9963-019X"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huasen He","raw_affiliation_strings":["Department of Automation, University of Science and Technology of China, Hefei, China","Institute of Artificial Intelligence, Hefei Comprehensive National Science Center, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Department of Automation, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]},{"raw_affiliation_string":"Institute of Artificial Intelligence, Hefei Comprehensive National Science Center, Hefei, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045720734","display_name":"Shuangwu Chen","orcid":"https://orcid.org/0000-0003-2817-9738"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuangwu Chen","raw_affiliation_strings":["Department of Automation, University of Science and Technology of China, Hefei, China","Institute of Artificial Intelligence, Hefei Comprehensive National Science Center, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Department of Automation, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]},{"raw_affiliation_string":"Institute of Artificial Intelligence, Hefei Comprehensive National Science Center, Hefei, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083577000","display_name":"Jian Yang","orcid":"https://orcid.org/0000-0002-7329-4738"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Yang","raw_affiliation_strings":["Department of Automation, University of Science and Technology of China, Hefei, China","Institute of Artificial Intelligence, Hefei Comprehensive National Science Center, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Department of Automation, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]},{"raw_affiliation_string":"Institute of Artificial Intelligence, Hefei Comprehensive National Science Center, Hefei, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5088416755"],"corresponding_institution_ids":["https://openalex.org/I126520041"],"apc_list":null,"apc_paid":null,"fwci":3.8389,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.93548188,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"21","issue":"3","first_page":"3537","last_page":"3554"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8553139567375183},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7609241604804993},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6311530470848083},{"id":"https://openalex.org/keywords/flooding","display_name":"Flooding (psychology)","score":0.6298274993896484},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6259053945541382},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.5254836678504944},{"id":"https://openalex.org/keywords/arp-spoofing","display_name":"ARP spoofing","score":0.49738577008247375},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.42911723256111145},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.4209873080253601},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.4161924123764038},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.41358888149261475},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.41025274991989136},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.40732717514038086},{"id":"https://openalex.org/keywords/internet-protocol","display_name":"Internet Protocol","score":0.13040727376937866},{"id":"https://openalex.org/keywords/network-address-translation","display_name":"Network address translation","score":0.10890132188796997}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8553139567375183},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7609241604804993},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6311530470848083},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.6298274993896484},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6259053945541382},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.5254836678504944},{"id":"https://openalex.org/C86255107","wikidata":"https://www.wikidata.org/wiki/Q296847","display_name":"ARP spoofing","level":5,"score":0.49738577008247375},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.42911723256111145},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.4209873080253601},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.4161924123764038},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.41358888149261475},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.41025274991989136},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.40732717514038086},{"id":"https://openalex.org/C35341882","wikidata":"https://www.wikidata.org/wiki/Q8795","display_name":"Internet Protocol","level":3,"score":0.13040727376937866},{"id":"https://openalex.org/C147873670","wikidata":"https://www.wikidata.org/wiki/Q11182","display_name":"Network address translation","level":4,"score":0.10890132188796997},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnsm.2024.3357660","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2024.3357660","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8600000143051147,"display_name":"Climate action","id":"https://metadata.un.org/sdg/13"}],"awards":[{"id":"https://openalex.org/G1347616826","display_name":null,"funder_award_id":"62341113","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3692048513","display_name":null,"funder_award_id":"62173315","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4736320777","display_name":null,"funder_award_id":"U23A20275","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4835101305","display_name":null,"funder_award_id":"62101525","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G490917651","display_name":null,"funder_award_id":"2020450","funder_id":"https://openalex.org/F4320321133","funder_display_name":"Chinese Academy of Sciences"},{"id":"https://openalex.org/G5400343601","display_name":null,"funder_award_id":"2023M733422","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G6308808780","display_name":null,"funder_award_id":"62021001","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7553321691","display_name":null,"funder_award_id":"62201543","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321133","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W1869854851","https://openalex.org/W2033637032","https://openalex.org/W2051808222","https://openalex.org/W2066943848","https://openalex.org/W2111942706","https://openalex.org/W2128153632","https://openalex.org/W2143022364","https://openalex.org/W2162969618","https://openalex.org/W2505895234","https://openalex.org/W2517220266","https://openalex.org/W2537501410","https://openalex.org/W2567541028","https://openalex.org/W2567699270","https://openalex.org/W2573541888","https://openalex.org/W2586630065","https://openalex.org/W2624744148","https://openalex.org/W2789780249","https://openalex.org/W2791826644","https://openalex.org/W2792850657","https://openalex.org/W2795660709","https://openalex.org/W2807979099","https://openalex.org/W2890263200","https://openalex.org/W2891366441","https://openalex.org/W2893388915","https://openalex.org/W2910441382","https://openalex.org/W2920725526","https://openalex.org/W2963129815","https://openalex.org/W2964159515","https://openalex.org/W2978930055","https://openalex.org/W2983833474","https://openalex.org/W2987595184","https://openalex.org/W2989565817","https://openalex.org/W2997517858","https://openalex.org/W3002652184","https://openalex.org/W3003599067","https://openalex.org/W3010495106","https://openalex.org/W3013579010","https://openalex.org/W3027095011","https://openalex.org/W3031737714","https://openalex.org/W3151748982","https://openalex.org/W3156129242","https://openalex.org/W3194617420","https://openalex.org/W3204280976","https://openalex.org/W4200629745","https://openalex.org/W4210636637","https://openalex.org/W4220853208","https://openalex.org/W4238201623","https://openalex.org/W4248175462","https://openalex.org/W4300127641","https://openalex.org/W4389509728","https://openalex.org/W6678832241"],"related_works":["https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W1968168724","https://openalex.org/W2204131204","https://openalex.org/W4322008378","https://openalex.org/W2383770723","https://openalex.org/W2754163055","https://openalex.org/W2186749541","https://openalex.org/W2360429410","https://openalex.org/W4256682929"],"abstract_inverted_index":{"Due":[0],"to":[1,13,29,48,80,95,108,119,139,171,187],"the":[2,8,24,31,50,61,70,97,110,123,136,142,150,154,196],"concentrated":[3],"distribution":[4],"of":[5,76,99,113,125,144,156,199],"network":[6,33,63],"traffic,":[7],"Internet":[9],"is":[10,169,181],"highly":[11],"vulnerable":[12],"link":[14,57,157],"flooding":[15],"attack":[16,27,179,209],"in":[17,60,129,135],"Distributed":[18],"Denial-of-Service":[19],"attacks":[20],"(DDoS-LFA),":[21],"which":[22,132],"utilizes":[23],"legitimate":[25,74],"low-rate":[26],"traffic":[28,193],"block":[30],"selected":[32,167],"area.":[34],"In":[35,78],"recent":[36],"years,":[37],"building":[38],"trusted":[39,56],"networks":[40],"has":[41],"been":[42],"considered":[43],"as":[44],"a":[45,55,86,159],"promising":[46],"strategy":[47],"address":[49],"security":[51,98],"issues.":[52],"Nevertheless,":[53],"deploying":[54],"defense":[58,223],"mechanism":[59],"attacked":[62,100],"area":[64,138],"faces":[65],"many":[66],"challenges":[67],"imposed":[68],"by":[69,213],"smart":[71],"scheme":[72],"and":[73,90,121,127,148,190,208],"disguise":[75],"DDoS-LFA.":[77],"order":[79],"overcome":[81],"these":[82],"challenges,":[83],"we":[84],"propose":[85],"blockchain-based":[87],"DDoS-LFA":[88,173,222],"detection":[89,111],"mitigation":[91],"scheme,":[92],"named":[93],"CREDIT,":[94],"guarantee":[96],"area,":[101],"while":[102],"existing":[103],"works":[104],"only":[105],"use":[106],"blockchain":[107,118],"share":[109,122],"results":[112,203],"traditional":[114,220],"solutions.":[115],"CREDIT":[116,183,216],"uses":[117],"record":[120],"information":[124],"links":[126],"flows":[128,147],"real":[130,206],"time,":[131],"enables":[133],"routers":[134],"protected":[137],"easily":[140],"trace":[141],"paths":[143],"all":[145],"active":[146],"capture":[149],"fragile":[151],"links.":[152,201],"On":[153],"basis":[155],"features,":[158],"credible":[160],"deep":[161],"learning":[162],"method":[163],"performed":[164],"on":[165,195,205],"randomly":[166],"nodes":[168],"proposed":[170],"detect":[172],"against":[174],"data":[175,228],"spoofing.":[176],"When":[177],"an":[178],"alarm":[180,200],"raised,":[182],"performs":[184,217],"similarity":[185],"analysis":[186],"locate":[188],"attackers":[189],"migrate":[191],"suspicious":[192],"based":[194,204],"flow":[197],"features":[198],"Experimental":[202],"implementation":[207],"testbed":[210],"show":[211],"that,":[212],"integrating":[214],"blockchain,":[215],"better":[218],"than":[219],"non-blockchain-based":[221],"methods":[224],"when":[225],"faced":[226],"with":[227],"tampering.":[229]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
