{"id":"https://openalex.org/W7126031968","doi":"https://doi.org/10.1109/wpmc67460.2025.11351198","title":"Towards Secure Microservices in 6G Multi-Connectivity Networks: Graph-Aware Anomaly Detection Against DoS Attacks","display_name":"Towards Secure Microservices in 6G Multi-Connectivity Networks: Graph-Aware Anomaly Detection Against DoS Attacks","publication_year":2025,"publication_date":"2025-11-09","ids":{"openalex":"https://openalex.org/W7126031968","doi":"https://doi.org/10.1109/wpmc67460.2025.11351198"},"language":null,"primary_location":{"id":"doi:10.1109/wpmc67460.2025.11351198","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wpmc67460.2025.11351198","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 28th International Symposium on Wireless Personal Multimedia Communications (WPMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081253819","display_name":"Seyed Salar Sefati","orcid":"https://orcid.org/0000-0002-7208-3576"},"institutions":[{"id":"https://openalex.org/I61641377","display_name":"Universitatea Na\u021bional\u0103 de \u0218tiin\u021b\u0103 \u0219i Tehnologie Politehnica Bucure\u0219ti","ror":"https://ror.org/0558j5q12","country_code":"RO","type":"education","lineage":["https://openalex.org/I61641377"]}],"countries":["RO"],"is_corresponding":true,"raw_author_name":"Seyed Salar Sefati","raw_affiliation_strings":["National University for Science and Technology POLITEHNICA Bucharest,Telecommunications Department,Bucharest,Romania"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"National University for Science and Technology POLITEHNICA Bucharest,Telecommunications Department,Bucharest,Romania","institution_ids":["https://openalex.org/I61641377"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005099916","display_name":"Albena Mihovska","orcid":"https://orcid.org/0000-0002-4919-3101"},"institutions":[{"id":"https://openalex.org/I55106644","display_name":"Amsterdam University of Applied Sciences","ror":"https://ror.org/00y2z2s03","country_code":"NL","type":"education","lineage":["https://openalex.org/I55106644"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Albena Mihovska","raw_affiliation_strings":["SmartAvatar B.V,Amsterdam,Netherlands"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"SmartAvatar B.V,Amsterdam,Netherlands","institution_ids":["https://openalex.org/I55106644"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072602284","display_name":"Octavian Fratu","orcid":"https://orcid.org/0000-0001-5679-9307"},"institutions":[{"id":"https://openalex.org/I61641377","display_name":"Universitatea Na\u021bional\u0103 de \u0218tiin\u021b\u0103 \u0219i Tehnologie Politehnica Bucure\u0219ti","ror":"https://ror.org/0558j5q12","country_code":"RO","type":"education","lineage":["https://openalex.org/I61641377"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Octavian Fratu","raw_affiliation_strings":["National University for Science and Technology POLITEHNICA Bucharest,Telecommunications Department,Bucharest,Romania"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"National University for Science and Technology POLITEHNICA Bucharest,Telecommunications Department,Bucharest,Romania","institution_ids":["https://openalex.org/I61641377"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057547358","display_name":"Simona Halunga","orcid":"https://orcid.org/0000-0001-7028-3921"},"institutions":[{"id":"https://openalex.org/I61641377","display_name":"Universitatea Na\u021bional\u0103 de \u0218tiin\u021b\u0103 \u0219i Tehnologie Politehnica Bucure\u0219ti","ror":"https://ror.org/0558j5q12","country_code":"RO","type":"education","lineage":["https://openalex.org/I61641377"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Simona Halunga","raw_affiliation_strings":["National University for Science and Technology POLITEHNICA Bucharest,Telecommunications Department,Bucharest,Romania"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"National University for Science and Technology POLITEHNICA Bucharest,Telecommunications Department,Bucharest,Romania","institution_ids":["https://openalex.org/I61641377"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5081253819"],"corresponding_institution_ids":["https://openalex.org/I61641377"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.69483386,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.2955000102519989,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.2955000102519989,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.25690001249313354,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.11299999803304672,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7192000150680542},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5972999930381775},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5511999726295471},{"id":"https://openalex.org/keywords/boosting","display_name":"Boosting (machine learning)","score":0.5134000182151794},{"id":"https://openalex.org/keywords/microservices","display_name":"Microservices","score":0.47380000352859497},{"id":"https://openalex.org/keywords/hurst-exponent","display_name":"Hurst exponent","score":0.4672999978065491},{"id":"https://openalex.org/keywords/gaussian","display_name":"Gaussian","score":0.36629998683929443},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.366100013256073}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7294999957084656},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7192000150680542},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5972999930381775},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5511999726295471},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.5134000182151794},{"id":"https://openalex.org/C2778505942","wikidata":"https://www.wikidata.org/wiki/Q18344624","display_name":"Microservices","level":3,"score":0.47380000352859497},{"id":"https://openalex.org/C96835011","wikidata":"https://www.wikidata.org/wiki/Q1638718","display_name":"Hurst exponent","level":2,"score":0.4672999978065491},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.41290000081062317},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.40529999136924744},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.36629998683929443},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.366100013256073},{"id":"https://openalex.org/C100906024","wikidata":"https://www.wikidata.org/wiki/Q205692","display_name":"Poisson distribution","level":2,"score":0.35530000925064087},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.34950000047683716},{"id":"https://openalex.org/C149946192","wikidata":"https://www.wikidata.org/wiki/Q3235733","display_name":"Cognitive radio","level":3,"score":0.3479999899864197},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3050000071525574},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.2985000014305115},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.2883000075817108},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.28380000591278076},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27630001306533813},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.27070000767707825},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.2671999931335449},{"id":"https://openalex.org/C203595873","wikidata":"https://www.wikidata.org/wiki/Q25389927","display_name":"Change detection","level":2,"score":0.2669999897480011},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2637999951839447},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.25929999351501465},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.25130000710487366}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wpmc67460.2025.11351198","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wpmc67460.2025.11351198","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 28th International Symposium on Wireless Personal Multimedia Communications (WPMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5220337510108948,"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320311687","display_name":"Ministry of Education","ror":"https://ror.org/03m01yf64"},{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2475596014","https://openalex.org/W2579093384","https://openalex.org/W3080543622","https://openalex.org/W4320058141","https://openalex.org/W4383345785","https://openalex.org/W4390669430","https://openalex.org/W4393352947","https://openalex.org/W4399209458","https://openalex.org/W4407410490","https://openalex.org/W4409371983","https://openalex.org/W4410817805","https://openalex.org/W4414193480"],"related_works":[],"abstract_inverted_index":{"Cloud":[0],"environments":[1],"built":[2],"on":[3,137],"microservices":[4],"offer":[5],"great":[6],"scalability":[7],"and":[8,28,50,55,87,90,97,126,148],"flexibility,":[9],"but":[10],"they":[11],"are":[12,26,30],"increasingly":[13],"vulnerable":[14],"to":[15,39,118],"advanced":[16],"Denial-of-Service":[17],"(DoS)":[18],"attacks.":[19],"In":[20],"emerging":[21],"6G":[22,130],"networks,":[23],"where":[24],"services":[25],"distributed":[27],"resources":[29],"dynamically":[31],"allocated,":[32],"these":[33],"threats":[34],"become":[35],"even":[36],"more":[37],"difficult":[38],"manage.":[40],"The":[41,133],"combination":[42],"of":[43,160],"multiple":[44],"entry":[45],"points,":[46],"tight":[47],"inter-service":[48],"links,":[49],"features":[51,83],"like":[52],"cognitive":[53],"radio":[54],"AI-driven":[56],"spectrum":[57],"sensing":[58],"further":[59],"amplifies":[60],"the":[61,73,138],"risks.":[62],"This":[63],"paper":[64],"proposes":[65],"a":[66,77,157],"graph-aware":[67],"anomaly":[68],"detection":[69,120,150],"framework":[70,134],"that":[71],"models":[72],"cloud":[74],"environment":[75],"as":[76],"directed":[78],"endpoint":[79],"graph,":[80],"aggregates":[81],"flow-level":[82],"into":[84],"windowed":[85],"vectors,":[86],"characterizes":[88],"legitimate":[89],"attack":[91],"traffic":[92],"using":[93],"non-homogeneous":[94],"Poisson":[95],"processes":[96],"Hurst":[98],"exponent":[99],"analysis.":[100],"An":[101],"exponentially":[102],"weighted":[103],"moving":[104],"average":[105],"(EWMA)":[106],"deviation":[107],"score":[108],"with":[109,115,156],"graph-based":[110],"contextual":[111],"boosting":[112],"is":[113,135],"combined":[114],"logistic":[116],"regression":[117],"enhance":[119],"accuracy,":[121],"supporting":[122],"optimal":[123],"resource":[124],"management":[125],"interference":[127],"mitigation":[128],"in":[129],"multi-connectivity":[131],"architectures.":[132],"evaluated":[136],"recent":[139],"BCCC-cPacket-Cloud-DDoS-2024":[140],"dataset,":[141],"achieving":[142],"consistently":[143],"lower":[144],"false":[145],"positive":[146],"rates":[147,151],"higher":[149],"than":[152],"Gaussian":[153],"Naive":[154],"Bayes,":[155],"peak":[158],"F1-score":[159],"0.93.":[161]},"counts_by_year":[],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2026-01-30T00:00:00"}
