{"id":"https://openalex.org/W4402674150","doi":"https://doi.org/10.1109/tnsm.2024.3464729","title":"BDIP: An Efficient Big Data-Driven Information Processing Framework and Its Application in DDoS Attack Detection","display_name":"BDIP: An Efficient Big Data-Driven Information Processing Framework and Its Application in DDoS Attack Detection","publication_year":2024,"publication_date":"2024-09-20","ids":{"openalex":"https://openalex.org/W4402674150","doi":"https://doi.org/10.1109/tnsm.2024.3464729"},"language":"en","primary_location":{"id":"doi:10.1109/tnsm.2024.3464729","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2024.3464729","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5114430051","display_name":"Qiyuan Fan","orcid":"https://orcid.org/0009-0000-6489-8161"},"institutions":[{"id":"https://openalex.org/I189210763","display_name":"Yunnan University","ror":"https://ror.org/0040axw97","country_code":"CN","type":"education","lineage":["https://openalex.org/I189210763"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qiyuan Fan","raw_affiliation_strings":["School of Software, Yunnan University, Kunming, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Yunnan University, Kunming, China","institution_ids":["https://openalex.org/I189210763"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114889379","display_name":"Xue Li","orcid":"https://orcid.org/0009-0006-2626-3038"},"institutions":[{"id":"https://openalex.org/I4210114043","display_name":"Henan Institute of Technology","ror":"https://ror.org/024f5m737","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210114043"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xue Li","raw_affiliation_strings":["School of Electronic Information Engineering, Henan Institute of Technology, Xinxiang, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information Engineering, Henan Institute of Technology, Xinxiang, China","institution_ids":["https://openalex.org/I4210114043"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037347113","display_name":"Puming Wang","orcid":"https://orcid.org/0000-0003-1261-8687"},"institutions":[{"id":"https://openalex.org/I189210763","display_name":"Yunnan University","ror":"https://ror.org/0040axw97","country_code":"CN","type":"education","lineage":["https://openalex.org/I189210763"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Puming Wang","raw_affiliation_strings":["School of Software, Yunnan University, Kunming, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Yunnan University, Kunming, China","institution_ids":["https://openalex.org/I189210763"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023283530","display_name":"Xin Jin","orcid":"https://orcid.org/0000-0002-1904-9424"},"institutions":[{"id":"https://openalex.org/I189210763","display_name":"Yunnan University","ror":"https://ror.org/0040axw97","country_code":"CN","type":"education","lineage":["https://openalex.org/I189210763"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Jin","raw_affiliation_strings":["School of Software, Yunnan University, Kunming, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Yunnan University, Kunming, China","institution_ids":["https://openalex.org/I189210763"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000436275","display_name":"Shaowen Yao","orcid":"https://orcid.org/0000-0003-1516-4246"},"institutions":[{"id":"https://openalex.org/I189210763","display_name":"Yunnan University","ror":"https://ror.org/0040axw97","country_code":"CN","type":"education","lineage":["https://openalex.org/I189210763"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shaowen Yao","raw_affiliation_strings":["School of Software, Yunnan University, Kunming, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Yunnan University, Kunming, China","institution_ids":["https://openalex.org/I189210763"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087257806","display_name":"Shengfa Miao","orcid":"https://orcid.org/0000-0003-1210-1135"},"institutions":[{"id":"https://openalex.org/I189210763","display_name":"Yunnan University","ror":"https://ror.org/0040axw97","country_code":"CN","type":"education","lineage":["https://openalex.org/I189210763"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shengfa Miao","raw_affiliation_strings":["School of Software, Yunnan University, Kunming, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Yunnan University, Kunming, China","institution_ids":["https://openalex.org/I189210763"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044275791","display_name":"Sizhang Li","orcid":"https://orcid.org/0009-0002-1284-4457"},"institutions":[{"id":"https://openalex.org/I189210763","display_name":"Yunnan University","ror":"https://ror.org/0040axw97","country_code":"CN","type":"education","lineage":["https://openalex.org/I189210763"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sizhang Li","raw_affiliation_strings":["School of Software, Yunnan University, Kunming, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Yunnan University, Kunming, China","institution_ids":["https://openalex.org/I189210763"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033737553","display_name":"Min An","orcid":"https://orcid.org/0000-0002-1069-7492"},"institutions":[{"id":"https://openalex.org/I189210763","display_name":"Yunnan University","ror":"https://ror.org/0040axw97","country_code":"CN","type":"education","lineage":["https://openalex.org/I189210763"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Min An","raw_affiliation_strings":["School of Software, Yunnan University, Kunming, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Yunnan University, Kunming, China","institution_ids":["https://openalex.org/I189210763"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017604391","display_name":"Jing Xu","orcid":"https://orcid.org/0000-0001-8084-5609"},"institutions":[{"id":"https://openalex.org/I189210763","display_name":"Yunnan University","ror":"https://ror.org/0040axw97","country_code":"CN","type":"education","lineage":["https://openalex.org/I189210763"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Xu","raw_affiliation_strings":["School of Software, Yunnan University, Kunming, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Yunnan University, Kunming, China","institution_ids":["https://openalex.org/I189210763"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5114430051"],"corresponding_institution_ids":["https://openalex.org/I189210763"],"apc_list":null,"apc_paid":null,"fwci":1.0302,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.78460473,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"22","issue":"1","first_page":"284","last_page":"298"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9843000173568726,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9627000093460083,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8687607049942017},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7690842747688293},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.5189654231071472},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.44489848613739014},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.4352337718009949},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.43353503942489624},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3451007604598999},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2652605175971985},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.18616542220115662},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1698947250843048}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8687607049942017},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7690842747688293},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.5189654231071472},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.44489848613739014},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.4352337718009949},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.43353503942489624},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3451007604598999},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2652605175971985},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.18616542220115662},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1698947250843048}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnsm.2024.3464729","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2024.3464729","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4519396454","display_name":null,"funder_award_id":"62166047","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1680354096","https://openalex.org/W1993482030","https://openalex.org/W2024165284","https://openalex.org/W2035149165","https://openalex.org/W2096710051","https://openalex.org/W2099940443","https://openalex.org/W2136274821","https://openalex.org/W2150847526","https://openalex.org/W2154011501","https://openalex.org/W2295598076","https://openalex.org/W2324298973","https://openalex.org/W2341871820","https://openalex.org/W2798603998","https://openalex.org/W2979998718","https://openalex.org/W2982682021","https://openalex.org/W3005097670","https://openalex.org/W3036749504","https://openalex.org/W3043187969","https://openalex.org/W3095854260","https://openalex.org/W3109803760","https://openalex.org/W3136284412","https://openalex.org/W4213060442","https://openalex.org/W4290991228","https://openalex.org/W4295308370","https://openalex.org/W4311136095","https://openalex.org/W4327930462","https://openalex.org/W4360997893","https://openalex.org/W4385412220","https://openalex.org/W4400913214","https://openalex.org/W4401650574","https://openalex.org/W6745609711","https://openalex.org/W6750729320"],"related_works":["https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W1968168724","https://openalex.org/W2204131204","https://openalex.org/W4322008378","https://openalex.org/W2383770723","https://openalex.org/W2754163055","https://openalex.org/W2186749541","https://openalex.org/W2360429410","https://openalex.org/W4256682929"],"abstract_inverted_index":{"With":[0],"the":[1,9,19,24,41,47,152,163,175],"rapid":[2],"advancement":[3],"of":[4,11,26,32,43,89,158],"5G":[5],"communication":[6],"technology":[7],"in":[8,46,108,147],"era":[10],"big":[12,64,132],"data,":[13],"massive":[14],"terminal":[15],"devices":[16],"connected":[17],"to":[18,55,67,86,104,184],"Internet":[20],"have":[21],"dramatically":[22],"increased":[23],"scale":[25],"network,":[27,48],"generating":[28],"a":[29,52,63],"large":[30],"amount":[31],"high-dimensional":[33],"and":[34,58,83,128,144,170],"heterogeneous":[35],"information.":[36],"This":[37],"not":[38],"only":[39],"enhances":[40],"difficulty":[42],"information":[44,80,107,134,141],"processing":[45,81,135,188],"but":[49],"also":[50,181],"poses":[51],"severe":[53],"challenge":[54],"data":[56,65,187],"storage":[57,165],"calculation,":[59],"which":[60,139],"has":[61],"become":[62],"problem":[66],"be":[68,182],"solved":[69],"urgently.":[70],"To":[71],"cope":[72],"with":[73],"it,":[74],"this":[75],"paper":[76],"proposes":[77],"an":[78,156],"efficient":[79],"framework":[82,136,153],"applies":[84],"it":[85],"Distributed":[87],"Denial":[88],"Service":[90],"(DDoS)":[91],"attack":[92],"detection.":[93],"Overall,":[94],"three":[95],"major":[96],"highlights":[97],"are":[98],"made:":[99],"(i)":[100],"Tensor":[101],"is":[102,121,137],"used":[103],"represent":[105],"multi-modal":[106],"large-scale":[109],"networks;":[110],"(ii)":[111],"A":[112,131],"novel":[113],"denoising":[114,143],"algorithm":[115],"based":[116],"on":[117,124],"tensor":[118],"train(TT)":[119],"decomposition":[120],"proposed,":[122],"focused":[123],"optimizing":[125],"both":[126],"computation":[127],"correlation;":[129],"(iii)":[130],"data-driven":[133],"developed,":[138],"includes":[140],"preprocessing,":[142],"classification.":[145],"Results":[146],"case":[148],"study":[149],"indicate":[150],"that":[151],"can":[154,180],"achieve":[155],"accuracy":[157],"99.19%,":[159],"all":[160],"while":[161],"maintaining":[162],"great":[164],"advantage,":[166],"well":[167],"speedup":[168],"ratio":[169],"strong":[171],"computing":[172],"capabilities":[173],"under":[174],"same":[176],"computational":[177],"complexity.":[178],"It":[179],"generalized":[183],"other":[185],"network":[186],"scenarios.":[189]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
