{"id":"https://openalex.org/W4399619747","doi":"https://doi.org/10.1109/tnsm.2024.3413685","title":"Resource-Efficient Low-Rate DDoS Mitigation With Moving Target Defense in Edge Clouds","display_name":"Resource-Efficient Low-Rate DDoS Mitigation With Moving Target Defense in Edge Clouds","publication_year":2024,"publication_date":"2024-06-13","ids":{"openalex":"https://openalex.org/W4399619747","doi":"https://doi.org/10.1109/tnsm.2024.3413685"},"language":"en","primary_location":{"id":"doi:10.1109/tnsm.2024.3413685","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2024.3413685","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077862885","display_name":"Yuyang Zhou","orcid":"https://orcid.org/0000-0001-8626-0468"},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuyang Zhou","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China","School of Cyber Science and Engineering, Southeast University, Purple Mountain Laboratories, and Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Purple Mountain Laboratories, and Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing, China","institution_ids":["https://openalex.org/I4210155350","https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043707940","display_name":"Guang Cheng","orcid":"https://orcid.org/0000-0001-8642-4362"},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guang Cheng","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China","School of Cyber Science and Engineering, Southeast University, Purple Mountain Laboratories, and Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Purple Mountain Laboratories, and Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing, China","institution_ids":["https://openalex.org/I4210155350","https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104326725","display_name":"Zhi Ouyang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhi Ouyang","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China","School of Cyber Science and Engineering, Southeast University, Purple Mountain Laboratories, and Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Purple Mountain Laboratories, and Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing, China","institution_ids":["https://openalex.org/I4210155350","https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103032123","display_name":"Zongyao Chen","orcid":"https://orcid.org/0000-0002-8589-8096"},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zongyao Chen","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China","School of Cyber Science and Engineering, Southeast University, Purple Mountain Laboratories, and Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Purple Mountain Laboratories, and Jiangsu Province Engineering Research Center of Security for Ubiquitous Network, Nanjing, China","institution_ids":["https://openalex.org/I4210155350","https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5077862885"],"corresponding_institution_ids":["https://openalex.org/I4210155350","https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":4.1206,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.94446925,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"22","issue":"1","first_page":"168","last_page":"186"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9510999917984009,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.933899998664856,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6867956519126892},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.6476454138755798},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5431153178215027},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3509601652622223},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.181033194065094},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09684810042381287},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.09606361389160156}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6867956519126892},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.6476454138755798},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5431153178215027},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3509601652622223},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.181033194065094},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09684810042381287},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.09606361389160156}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnsm.2024.3413685","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2024.3413685","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5899999737739563,"display_name":"Climate action","id":"https://metadata.un.org/sdg/13"}],"awards":[{"id":"https://openalex.org/G1052238065","display_name":null,"funder_award_id":"2024T170143","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G1793682622","display_name":null,"funder_award_id":"62072100","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G498661955","display_name":null,"funder_award_id":"2022M710677","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G6188450572","display_name":null,"funder_award_id":"62202097","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":67,"referenced_works":["https://openalex.org/W2508641173","https://openalex.org/W2567642374","https://openalex.org/W2613345295","https://openalex.org/W2620934568","https://openalex.org/W2758836598","https://openalex.org/W2791875802","https://openalex.org/W2804070368","https://openalex.org/W2875475762","https://openalex.org/W2883594698","https://openalex.org/W2894413690","https://openalex.org/W2907753699","https://openalex.org/W2912120213","https://openalex.org/W2915115515","https://openalex.org/W2932313271","https://openalex.org/W2935788212","https://openalex.org/W2942653132","https://openalex.org/W2945639270","https://openalex.org/W2967136126","https://openalex.org/W2973528622","https://openalex.org/W2982103411","https://openalex.org/W2996903041","https://openalex.org/W3009378792","https://openalex.org/W3013219028","https://openalex.org/W3013536937","https://openalex.org/W3014732532","https://openalex.org/W3024476475","https://openalex.org/W3032966393","https://openalex.org/W3038406707","https://openalex.org/W3044900311","https://openalex.org/W3048258432","https://openalex.org/W3097813637","https://openalex.org/W3120598853","https://openalex.org/W3126956508","https://openalex.org/W3129452367","https://openalex.org/W3169649651","https://openalex.org/W3173170122","https://openalex.org/W3174208623","https://openalex.org/W3176269432","https://openalex.org/W3187528790","https://openalex.org/W3196273218","https://openalex.org/W3203260681","https://openalex.org/W3212789951","https://openalex.org/W3214071552","https://openalex.org/W3215657732","https://openalex.org/W4205739822","https://openalex.org/W4206657397","https://openalex.org/W4223992650","https://openalex.org/W4285148832","https://openalex.org/W4285270847","https://openalex.org/W4285305737","https://openalex.org/W4285507209","https://openalex.org/W4292825803","https://openalex.org/W4309676776","https://openalex.org/W4311623176","https://openalex.org/W4312854158","https://openalex.org/W4313174306","https://openalex.org/W4315630208","https://openalex.org/W4320005729","https://openalex.org/W4320492391","https://openalex.org/W4321490422","https://openalex.org/W4376481072","https://openalex.org/W4376607515","https://openalex.org/W4386275697","https://openalex.org/W4386596944","https://openalex.org/W4389542742","https://openalex.org/W6780559895","https://openalex.org/W6795076093"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W4386482731","https://openalex.org/W2765763546","https://openalex.org/W4230824443","https://openalex.org/W4377970398","https://openalex.org/W3026018975","https://openalex.org/W2185673024","https://openalex.org/W1484565796","https://openalex.org/W2142794587"],"abstract_inverted_index":{"Edge":[0],"computing":[1,15],"(EC)":[2],"and":[3,17,60,65,91,112,122,153,162,176,200,211,230],"container":[4],"technology":[5],"have":[6],"been":[7,28],"widely":[8],"used":[9],"to":[10,49,169,196],"increase":[11],"the":[12,19,53,61,73,76,98,118,136,149,171,181,184,212,221,231,251],"flexibility":[13],"of":[14,75,100,139,183,194,227,236],"resources":[16],"meet":[18],"real-time":[20],"requirements":[21],"for":[22,96],"delay-sensitive":[23],"applications.":[24,141],"However,":[25],"it":[26],"has":[27],"shown":[29],"that":[30,116,217],"edge":[31],"clouds":[32],"suffer":[33],"from":[34],"distributed":[35],"denial-of-service":[36],"(DDoS)":[37],"attacks,":[38,43],"especially":[39],"low-rate":[40],"DDoS":[41],"(LDDoS)":[42],"which":[44],"can":[45],"be":[46],"stealthily":[47],"crafted":[48],"evade":[50],"detection.":[51],"Unfortunately,":[52],"existing":[54],"techniques":[55,90],"cannot":[56],"provide":[57],"effective":[58],"protection,":[59],"amplifying":[62],"resource":[63,145],"consumption":[64],"service":[66,203],"delay":[67],"incurred":[68],"by":[69,107,134],"defense":[70],"greatly":[71],"diminish":[72],"efficiency":[74],"security":[77,121,199],"system.":[78],"To":[79,142],"tackle":[80],"these":[81],"problems,":[82],"this":[83],"paper":[84],"exploits":[85],"Moving":[86],"Target":[87],"Defense":[88],"(MTD)":[89],"deep":[92,165],"reinforcement":[93],"learning":[94],"(DRL)":[95],"mitigating":[97],"impact":[99],"LDDoS":[101,188],"attacks":[102,152],"in":[103,187,198,202,245,250],"a":[104,157,164,191],"resource-efficient":[105],"way":[106],"effectively":[108],"partially":[109],"invalidating,":[110],"avoiding,":[111],"tolerating":[113],"malicious":[114],"traffic":[115],"improves":[117],"Web":[119],"services\u2019":[120],"quality":[123,204],"with":[124,190,207,239,247],"lower":[125],"overhead.":[126,177],"We":[127],"first":[128],"design":[129],"several":[130],"lightweight":[131],"MTD":[132,154],"mechanisms":[133],"utilizing":[135],"built-in":[137],"functionalities":[138],"container-based":[140],"further":[143],"optimize":[144],"utilization,":[146],"we":[147],"formulate":[148],"interaction":[150],"between":[151,174],"deployment":[155],"as":[156],"Markov":[158],"decision":[159],"process":[160],"(MDP),":[161],"adopt":[163],"Q-network":[166],"(DQN)":[167],"algorithm":[168],"achieve":[170],"best":[172],"trade-off":[173],"effectiveness":[175,182],"The":[178],"simulations":[179],"prove":[180],"proposed":[185],"approach":[186],"mitigation,":[189],"significant":[192],"improvement":[193],"up":[195],"31.7%":[197],"26.95%":[201],"when":[205],"compared":[206],"other":[208],"practical":[209],"strategies,":[210],"experimental":[213],"results":[214],"also":[215],"demonstrate":[216],"our":[218],"method":[219],"exhibits":[220],"lowest":[222,232],"response":[223],"time":[224,235],"per":[225],"request":[226],"276.66":[228],"ms":[229],"webpage":[233],"load":[234],"1.413":[237],"s":[238],"only":[240],"2.44%":[241],"additional":[242],"memory":[243],"usage":[244],"comparison":[246],"previous":[248],"works":[249],"high":[252],"workload":[253],"scenario.":[254]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":4}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
