{"id":"https://openalex.org/W2989416344","doi":"https://doi.org/10.1109/access.2019.2950820","title":"Identifying Application-Layer DDoS Attacks Based on Request Rhythm Matrices","display_name":"Identifying Application-Layer DDoS Attacks Based on Request Rhythm Matrices","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2989416344","doi":"https://doi.org/10.1109/access.2019.2950820","mag":"2989416344"},"language":"en","primary_location":{"id":"doi:10.1109/access.2019.2950820","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2950820","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08888259.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08888259.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002957058","display_name":"Huan Lin","orcid":"https://orcid.org/0000-0003-4229-7837"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Huan Lin","raw_affiliation_strings":["School of Software, Shandong University, Jinan, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Shandong University, Jinan, China","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075701132","display_name":"Shoufeng Cao","orcid":null},"institutions":[{"id":"https://openalex.org/I4210087772","display_name":"National Computer Network Emergency Response Technical Team/Coordination Center of Chinar","ror":"https://ror.org/00247dh76","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210087772"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shoufeng Cao","raw_affiliation_strings":["National Computer Network Emergency Response Technical Team Coordination Center of China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Computer Network Emergency Response Technical Team Coordination Center of China, Beijing, China","institution_ids":["https://openalex.org/I4210087772"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024303921","display_name":"Jiayan Wu","orcid":"https://orcid.org/0000-0002-5792-9289"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiayan Wu","raw_affiliation_strings":["School of Software, Shandong University, Jinan, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Shandong University, Jinan, China","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080481476","display_name":"Zhenzhong Cao","orcid":"https://orcid.org/0000-0001-6038-4147"},"institutions":[{"id":"https://openalex.org/I202126657","display_name":"Qufu Normal University","ror":"https://ror.org/03ceheh96","country_code":"CN","type":"education","lineage":["https://openalex.org/I202126657"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenzhong Cao","raw_affiliation_strings":["School of Software, Qufu Normal University, Qufu, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Qufu Normal University, Qufu, China","institution_ids":["https://openalex.org/I202126657"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090944071","display_name":"Fengyu Wang","orcid":"https://orcid.org/0000-0003-1135-8035"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fengyu Wang","raw_affiliation_strings":["School of Software, Shandong University, Jinan, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Shandong University, Jinan, China","institution_ids":["https://openalex.org/I154099455"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5002957058"],"corresponding_institution_ids":["https://openalex.org/I154099455"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":1.6681,"has_fulltext":true,"cited_by_count":20,"citation_normalized_percentile":{"value":0.86104237,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"7","issue":null,"first_page":"164480","last_page":"164491"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9872999787330627,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8826968669891357},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.806968092918396},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.70737624168396},{"id":"https://openalex.org/keywords/crowds","display_name":"Crowds","score":0.5972980260848999},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.548336923122406},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4526124894618988},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4268287420272827},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.400431752204895},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1408086121082306},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.09147313237190247}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8826968669891357},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.806968092918396},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.70737624168396},{"id":"https://openalex.org/C2777852691","wikidata":"https://www.wikidata.org/wiki/Q13430821","display_name":"Crowds","level":2,"score":0.5972980260848999},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.548336923122406},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4526124894618988},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4268287420272827},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.400431752204895},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1408086121082306},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.09147313237190247}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2019.2950820","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2950820","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08888259.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:5a1ff10b079b4151b6bf1df5ed670e95","is_oa":true,"landing_page_url":"https://doaj.org/article/5a1ff10b079b4151b6bf1df5ed670e95","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 7, Pp 164480-164491 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2019.2950820","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2950820","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08888259.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.7200000286102295,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2989416344.pdf","grobid_xml":"https://content.openalex.org/works/W2989416344.grobid-xml"},"referenced_works_count":47,"referenced_works":["https://openalex.org/W85389384","https://openalex.org/W1859813445","https://openalex.org/W1972950122","https://openalex.org/W1977145863","https://openalex.org/W1978502884","https://openalex.org/W1994606504","https://openalex.org/W2012498489","https://openalex.org/W2018901966","https://openalex.org/W2018992824","https://openalex.org/W2037515642","https://openalex.org/W2049054875","https://openalex.org/W2084611853","https://openalex.org/W2101151533","https://openalex.org/W2124589355","https://openalex.org/W2127605496","https://openalex.org/W2128824222","https://openalex.org/W2131126403","https://openalex.org/W2148600927","https://openalex.org/W2152598326","https://openalex.org/W2162969618","https://openalex.org/W2170874246","https://openalex.org/W2229135539","https://openalex.org/W2329403623","https://openalex.org/W2339674953","https://openalex.org/W2517207665","https://openalex.org/W2523950687","https://openalex.org/W2529878036","https://openalex.org/W2540373227","https://openalex.org/W2586670688","https://openalex.org/W2597472767","https://openalex.org/W2615405689","https://openalex.org/W2761193631","https://openalex.org/W2761831203","https://openalex.org/W2801401336","https://openalex.org/W2889158976","https://openalex.org/W2892142441","https://openalex.org/W2899576538","https://openalex.org/W2899948414","https://openalex.org/W2910074034","https://openalex.org/W2937711216","https://openalex.org/W2942104252","https://openalex.org/W2952314417","https://openalex.org/W2959394495","https://openalex.org/W2963897534","https://openalex.org/W4393509101","https://openalex.org/W6603459638","https://openalex.org/W6689464144"],"related_works":["https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W1968168724","https://openalex.org/W2204131204","https://openalex.org/W2921433547","https://openalex.org/W4385302085","https://openalex.org/W2754163055","https://openalex.org/W4256682929","https://openalex.org/W4322008378","https://openalex.org/W2383770723"],"abstract_inverted_index":{"Application-layer":[0],"distributed":[1],"denial":[2],"of":[3,16,99,122,173],"service":[4],"(AL-DDoS)":[5],"attacks":[6,18,28,94,124,145,182],"are":[7,51],"becoming":[8],"critical":[9],"threats":[10],"to":[11,96,161],"websites":[12],"because":[13],"the":[14,39,44,48,53,87,97,100,104,116,126,148,159,170],"stealth":[15],"AL-DDoS":[17,27,93,123,156,181],"makes":[19],"many":[20],"intrusion":[21],"prevention":[22],"systems":[23],"ineffective.":[24],"To":[25],"detect":[26,92,142],"aimed":[29],"at":[30],"websites,":[31],"we":[32,74,118],"propose":[33],"a":[34,82],"novel":[35],"statistical":[36],"model":[37],"called":[38],"RM":[40,105],"(rhythm":[41],"matrix).":[42],"Although":[43],"original":[45],"features":[46,80],"from":[47,180],"network":[49],"layer":[50],"adopted,":[52],"access":[54,89],"trajectory,":[55],"including":[56],"requested":[57],"objects":[58],"and":[59,66,85,106,133,146,152],"corresponding":[60],"dwell-time":[61],"values,":[62],"can":[63,75,141],"be":[64],"abstracted":[65],"accumulated":[67],"into":[68,81],"an":[69,72,155],"RM.":[70],"With":[71],"RM,":[73],"almost":[76],"losslessly":[77],"compress":[78],"complex":[79],"simple":[83],"structure":[84],"characterize":[86],"user":[88],"behavior.":[90],"We":[91,167],"according":[95],"increase":[98],"abnormality":[101],"degree":[102],"in":[103,176],"further":[107],"identify":[108,147],"malicious":[109,149],"hosts":[110,150],"based":[111],"on":[112],"change-rate":[113],"outliers.":[114],"In":[115],"experiments,":[117],"simulate":[119],"three":[120],"modes":[121],"with":[125,183],"latest":[127],"popular":[128],"DDoS":[129],"attack":[130],"tools:":[131],"LOIC":[132],"HOIC.":[134],"The":[135],"results":[136],"show":[137],"that":[138],"our":[139,174],"method":[140],"these":[143],"simulated":[144],"accurately":[151],"efficiently.":[153],"For":[154],"detection":[157],"method,":[158],"ability":[160],"distinguish":[162],"flash":[163,178],"crowds":[164,179],"is":[165],"indispensable.":[166],"also":[168],"demonstrate":[169],"excellent":[171],"performance":[172],"approach":[175],"distinguishing":[177],"two":[184],"reconstructed":[185],"public":[186],"datasets.":[187]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
