{"id":"https://openalex.org/W4406046965","doi":"https://doi.org/10.1109/ton.2024.3520512","title":"Defending Against Link-Flooding Attacks With Adversary Interest Prediction and Grouped Online Load Balancing","display_name":"Defending Against Link-Flooding Attacks With Adversary Interest Prediction and Grouped Online Load Balancing","publication_year":2025,"publication_date":"2025-01-03","ids":{"openalex":"https://openalex.org/W4406046965","doi":"https://doi.org/10.1109/ton.2024.3520512"},"language":"en","primary_location":{"id":"doi:10.1109/ton.2024.3520512","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ton.2024.3520512","pdf_url":null,"source":{"id":"https://openalex.org/S5407042750","display_name":"IEEE Transactions on Networking","issn_l":"2998-4157","issn":["2998-4157"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102487066","display_name":"Zixu Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zixu Huang","raw_affiliation_strings":["School of Cyber Science and Technology, University of Science and Technology of China, Hefei, Anhui, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, University of Science and Technology of China, Hefei, Anhui, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014927773","display_name":"Xuanbo Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuanbo Huang","raw_affiliation_strings":["School of Cyber Science and Technology, University of Science and Technology of China, Hefei, Anhui, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, University of Science and Technology of China, Hefei, Anhui, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100688242","display_name":"Kaiping Xue","orcid":"https://orcid.org/0000-0003-2095-7523"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kaiping Xue","raw_affiliation_strings":["School of Cyber Science and Technology, University of Science and Technology of China, Hefei, Anhui, China"],"raw_orcid":"https://orcid.org/0000-0003-2095-7523","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, University of Science and Technology of China, Hefei, Anhui, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034871054","display_name":"Jiangping Han","orcid":"https://orcid.org/0000-0003-1674-8884"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiangping Han","raw_affiliation_strings":["School of Cyber Science and Technology, University of Science and Technology of China, Hefei, Anhui, China"],"raw_orcid":"https://orcid.org/0000-0003-1674-8884","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, University of Science and Technology of China, Hefei, Anhui, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004027189","display_name":"Lutong Chen","orcid":"https://orcid.org/0000-0001-6044-9457"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lutong Chen","raw_affiliation_strings":["School of Cyber Science and Technology, University of Science and Technology of China, Hefei, Anhui, China"],"raw_orcid":"https://orcid.org/0000-0001-6044-9457","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, University of Science and Technology of China, Hefei, Anhui, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102908901","display_name":"Qibin Sun","orcid":"https://orcid.org/0000-0002-6789-7460"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qibin Sun","raw_affiliation_strings":["School of Cyber Science and Technology, University of Science and Technology of China, Hefei, Anhui, China"],"raw_orcid":"https://orcid.org/0000-0002-6789-7460","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, University of Science and Technology of China, Hefei, Anhui, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"last","author":{"id":null,"display_name":"Jun Lu","orcid":"https://orcid.org/0009-0006-0303-4208"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210092870","display_name":"Jiaxing University","ror":"https://ror.org/00j2a7k55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210092870"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Lu","raw_affiliation_strings":["School of Cyber Science and Technology, University of Science and Technology of China, Hefei, Anhui, China","Key Laboratory of Medical Electronics and Digital Health of Zhejiang Province and the Engineering Research Center of Intelligent Human Health Situation Awareness of Zhejiang Province, Jiaxing University, Jiaxing, Zhejiang, China"],"raw_orcid":"https://orcid.org/0009-0006-0303-4208","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, University of Science and Technology of China, Hefei, Anhui, China","institution_ids":["https://openalex.org/I126520041"]},{"raw_affiliation_string":"Key Laboratory of Medical Electronics and Digital Health of Zhejiang Province and the Engineering Research Center of Intelligent Human Health Situation Awareness of Zhejiang Province, Jiaxing University, Jiaxing, Zhejiang, China","institution_ids":["https://openalex.org/I4210092870"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5102487066"],"corresponding_institution_ids":["https://openalex.org/I126520041"],"apc_list":null,"apc_paid":null,"fwci":6.7583,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.96113997,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"33","issue":"3","first_page":"1056","last_page":"1069"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9897000193595886,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/flooding","display_name":"Flooding (psychology)","score":0.6838670372962952},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6414363980293274},{"id":"https://openalex.org/keywords/link","display_name":"Link (geometry)","score":0.6174308657646179},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6149117350578308},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5855203866958618},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.46667587757110596},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.11747410893440247}],"concepts":[{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.6838670372962952},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6414363980293274},{"id":"https://openalex.org/C2778753846","wikidata":"https://www.wikidata.org/wiki/Q6554239","display_name":"Link (geometry)","level":2,"score":0.6174308657646179},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6149117350578308},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5855203866958618},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.46667587757110596},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.11747410893440247},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ton.2024.3520512","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ton.2024.3520512","pdf_url":null,"source":{"id":"https://openalex.org/S5407042750","display_name":"IEEE Transactions on Networking","issn_l":"2998-4157","issn":["2998-4157"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Networking","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Climate action","score":0.699999988079071,"id":"https://metadata.un.org/sdg/13"}],"awards":[{"id":"https://openalex.org/G211408582","display_name":null,"funder_award_id":"62302472","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2243160804","display_name":null,"funder_award_id":"U19B2023","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3978876333","display_name":null,"funder_award_id":"Y202093","funder_id":"https://openalex.org/F4320322847","funder_display_name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences"},{"id":"https://openalex.org/G4649595597","display_name":null,"funder_award_id":"Y202093","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8507748785","display_name":null,"funder_award_id":"61972371","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322847","display_name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences","ror":"https://ror.org/031141b54"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1869854851","https://openalex.org/W1990545893","https://openalex.org/W1994926493","https://openalex.org/W2033637032","https://openalex.org/W2052768371","https://openalex.org/W2111942706","https://openalex.org/W2136451165","https://openalex.org/W2147118406","https://openalex.org/W2160824842","https://openalex.org/W2207058899","https://openalex.org/W2505895234","https://openalex.org/W2536759866","https://openalex.org/W2573541888","https://openalex.org/W2762715230","https://openalex.org/W2789780249","https://openalex.org/W2794568842","https://openalex.org/W2795660709","https://openalex.org/W2925381967","https://openalex.org/W3008207353","https://openalex.org/W3130205713","https://openalex.org/W3159310286","https://openalex.org/W3203160225","https://openalex.org/W4225604009","https://openalex.org/W4385080328","https://openalex.org/W6628906117","https://openalex.org/W6754585813","https://openalex.org/W6794627463"],"related_works":["https://openalex.org/W4388150944","https://openalex.org/W1518185400","https://openalex.org/W3200586296","https://openalex.org/W4242235492","https://openalex.org/W4237162029","https://openalex.org/W4230332972","https://openalex.org/W4387985143","https://openalex.org/W4362599004","https://openalex.org/W2808242528","https://openalex.org/W1567638270"],"abstract_inverted_index":{"A":[0],"Link":[1],"Flooding":[2],"Attack":[3],"(LFA)":[4],"is":[5,64,95],"a":[6,39,121,142,158,163,197],"type":[7],"of":[8,12,29,68,86,99,136,151,166],"link-aimed":[9],"Distributed":[10],"Denial":[11],"Service":[13],"(DDoS)":[14],"attack":[15,45,80,202],"that":[16,188],"can":[17],"overwhelm":[18],"the":[19,44,65,77,84,90,96,104,149,181],"Internet":[20],"critical":[21],"links":[22,101],"to":[23,56,102,147,201,205],"cut":[24],"off":[25],"connections":[26],"with":[27],"lots":[28],"low-rate,":[30],"seemingly":[31],"benign":[32],"traffic.":[33],"To":[34,111],"defend":[35],"against":[36,133],"such":[37],"threats,":[38],"promising":[40],"solution":[41],"involves":[42],"mitigating":[43],"through":[46],"load":[47,59,87,108,144],"balancing.":[48],"However,":[49],"adaptive":[50],"attacks":[51,75],"employ":[52],"two":[53],"effective":[54],"means":[55],"circumvent":[57],"existing":[58],"balancing":[60,109,145],"strategies.":[61],"The":[62,93,184],"first":[63],"frequent":[66],"changing":[67],"targets,":[69],"known":[70],"as":[71],"rolling":[72,137],"attacks.":[73,138],"Rolling":[74],"exploit":[76],"delay":[78],"between":[79],"detection":[81],"feedback":[82],"and":[83,126,195],"mitigation":[85],"balancing,":[88],"depleting":[89],"defender\u2019s":[91],"resources.":[92],"second":[94],"strategical":[97],"selection":[98],"target":[100],"create":[103],"worst-case":[105],"scenario":[106],"for":[107],"algorithms.":[110],"address":[112],"these":[113],"challenges,":[114],"we":[115,140],"propose":[116],"LinkDam.":[117],"Specifically,":[118],"LinkDam":[119,156,189],"adopts":[120],"proactive":[122],"approach":[123],"by":[124],"tracking":[125],"predicting":[127],"potential":[128],"victim":[129],"links,":[130],"providing":[131],"defense":[132],"all":[134],"targets":[135],"Subsequently,":[139],"introduce":[141],"robust":[143],"strategy":[146],"prevent":[148],"exploitation":[150],"selected":[152],"link":[153],"combinations.":[154],"Additionally,":[155],"introduces":[157],"partial":[159],"deployment":[160],"approach,":[161],"demanding":[162],"mere":[164],"40%":[165],"nodes":[167],"be":[168],"programmable":[169],"(i.e.,":[170],"SDN":[171],"nodes)":[172],"while":[173],"maintaining":[174],"an":[175,191],"acceptable":[176],"10%":[177],"performance":[178],"reduction":[179],"from":[180],"maximum":[182],"achievable.":[183],"experimental":[185],"results":[186],"indicate":[187],"surpasses":[190],"80%":[192],"accuracy":[193],"threshold,":[194],"exhibits":[196],"57%":[198],"higher":[199],"tolerance":[200],"budgets":[203],"compared":[204],"state-of-the-art":[206],"solutions.":[207]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
