{"id":"https://openalex.org/W3162767125","doi":"https://doi.org/10.1109/icce50685.2021.9427773","title":"Mitigating Botnet based DDoS Attacks by Selecting Incentivized Cooperating ISPs for Risk Transfer","display_name":"Mitigating Botnet based DDoS Attacks by Selecting Incentivized Cooperating ISPs for Risk Transfer","publication_year":2021,"publication_date":"2021-01-10","ids":{"openalex":"https://openalex.org/W3162767125","doi":"https://doi.org/10.1109/icce50685.2021.9427773","mag":"3162767125"},"language":"en","primary_location":{"id":"doi:10.1109/icce50685.2021.9427773","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce50685.2021.9427773","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Consumer Electronics (ICCE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013216953","display_name":"Amrita Dahiya","orcid":null},"institutions":[{"id":"https://openalex.org/I105094715","display_name":"National Institute of Technology Kurukshetra","ror":"https://ror.org/04909p852","country_code":"IN","type":"education","lineage":["https://openalex.org/I105094715"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Amrita Dahiya","raw_affiliation_strings":["National Institute of Technology Kurukshetra, Haryana, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology Kurukshetra, Haryana, India","institution_ids":["https://openalex.org/I105094715"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071261948","display_name":"Brij B. Gupta","orcid":"https://orcid.org/0000-0003-4929-4698"},"institutions":[{"id":"https://openalex.org/I105094715","display_name":"National Institute of Technology Kurukshetra","ror":"https://ror.org/04909p852","country_code":"IN","type":"education","lineage":["https://openalex.org/I105094715"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"B.B. Gupta","raw_affiliation_strings":["National Institute of Technology Kurukshetra, Haryana, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology Kurukshetra, Haryana, India","institution_ids":["https://openalex.org/I105094715"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041793220","display_name":"Shingo Yamaguchi","orcid":"https://orcid.org/0000-0003-0579-8501"},"institutions":[{"id":"https://openalex.org/I173915773","display_name":"Yamaguchi University","ror":"https://ror.org/03cxys317","country_code":"JP","type":"education","lineage":["https://openalex.org/I173915773"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Shingo Yamaguchi","raw_affiliation_strings":["Graduate School of Sciences and Technology for Innovation, Yamaguchi University, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Sciences and Technology for Innovation, Yamaguchi University, Japan","institution_ids":["https://openalex.org/I173915773"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070369356","display_name":"Kostas E. Psannis","orcid":"https://orcid.org/0000-0003-0020-6394"},"institutions":[{"id":"https://openalex.org/I192756129","display_name":"University of Macedonia","ror":"https://ror.org/05fg6gr82","country_code":"GR","type":"education","lineage":["https://openalex.org/I192756129"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Kostas Psannis","raw_affiliation_strings":["University of Macedonia, Greece"],"affiliations":[{"raw_affiliation_string":"University of Macedonia, Greece","institution_ids":["https://openalex.org/I192756129"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5013216953"],"corresponding_institution_ids":["https://openalex.org/I105094715"],"apc_list":null,"apc_paid":null,"fwci":0.4584,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.64238715,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.7676630020141602},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7241637110710144},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7173179388046265},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.553907573223114},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5087018609046936},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.33954721689224243}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.7676630020141602},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7241637110710144},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7173179388046265},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.553907573223114},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5087018609046936},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.33954721689224243},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icce50685.2021.9427773","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce50685.2021.9427773","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Consumer Electronics (ICCE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1487694752","https://openalex.org/W1994824641","https://openalex.org/W2022282473","https://openalex.org/W2126105956","https://openalex.org/W2149294210","https://openalex.org/W2763698365","https://openalex.org/W2799905159","https://openalex.org/W2800773710","https://openalex.org/W2801332928","https://openalex.org/W2898726528","https://openalex.org/W2969359174","https://openalex.org/W3007727958","https://openalex.org/W3034198581","https://openalex.org/W3034640547","https://openalex.org/W3098384436","https://openalex.org/W3112778273"],"related_works":["https://openalex.org/W2038807247","https://openalex.org/W2097156747","https://openalex.org/W2559738661","https://openalex.org/W3159690896","https://openalex.org/W4230824443","https://openalex.org/W1989286518","https://openalex.org/W2124456408","https://openalex.org/W2945572725","https://openalex.org/W2921012173","https://openalex.org/W2758517546"],"abstract_inverted_index":{"In":[0,17],"this":[1],"paper,":[2],"a":[3,78],"risk":[4],"transfer":[5],"based":[6],"defensive":[7],"model":[8,38],"against":[9],"botnet":[10],"rooted":[11],"DDoS":[12],"attacks":[13],"has":[14,39],"been":[15,40],"proposed.":[16],"the":[18,43,115],"basic":[19],"architecture":[20],"of":[21,45,48,85,118],"proposed":[22,41],"model,":[23],"our":[24],"main":[25],"work":[26],"solely":[27],"focused":[28],"on":[29],"communication":[30],"between":[31],"control":[32],"broker":[33],"and":[34,60,101],"directory":[35],"manager.":[36],"A":[37],"for":[42],"selection":[44],"optimal":[46,112],"set":[47,113],"cooperating":[49,73],"ISPs":[50,74,75],"by":[51],"using":[52],"modified":[53],"HEFT":[54],"(Heterogeneous":[55],"Early":[56],"Finish":[57],"Time)":[58],"algorithm":[59],"fuzzy":[61],"dominance":[62],"sort":[63],"rules.":[64],"All":[65],"incoming":[66],"traffic":[67],"will":[68],"be":[69,108],"transferred":[70],"to":[71,107],"selected":[72],"after":[76],"reaching":[77],"certain":[79],"attack":[80],"level":[81],"threshold":[82],"in":[83],"return":[84],"monetary":[86],"incentives.":[87],"This":[88],"whole":[89],"problem":[90,97],"is":[91],"formulated":[92],"as":[93,105],"multi":[94],"objective":[95],"optimization":[96],"where":[98],"make-span,":[99],"cost":[100],"reliability":[102],"are":[103],"taken":[104],"objectives":[106],"optimized":[109],"while":[110],"selecting":[111],"from":[114],"feasible":[116],"sets":[117],"solutions.":[119]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
