{"id":"https://openalex.org/W4353046662","doi":"https://doi.org/10.1109/icin56760.2023.10073483","title":"Decentralized incentive-based DDoS mitigation","display_name":"Decentralized incentive-based DDoS mitigation","publication_year":2023,"publication_date":"2023-03-06","ids":{"openalex":"https://openalex.org/W4353046662","doi":"https://doi.org/10.1109/icin56760.2023.10073483"},"language":"en","primary_location":{"id":"doi:10.1109/icin56760.2023.10073483","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icin56760.2023.10073483","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 26th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078873548","display_name":"Sara Bitan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156197","display_name":"Life Cycle Engineering (United States)","ror":"https://ror.org/056hm0802","country_code":"US","type":"company","lineage":["https://openalex.org/I4210156197"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sara Bitan","raw_affiliation_strings":["CyCloak,Israel","CyCloak, Israel"],"affiliations":[{"raw_affiliation_string":"CyCloak,Israel","institution_ids":["https://openalex.org/I4210156197"]},{"raw_affiliation_string":"CyCloak, Israel","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028514135","display_name":"Adi Molkho","orcid":"https://orcid.org/0000-0002-7943-3057"},"institutions":[{"id":"https://openalex.org/I2250955327","display_name":"Huawei Technologies (China)","ror":"https://ror.org/00cmhce21","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250955327"]},{"id":"https://openalex.org/I4210146936","display_name":"Huawei Technologies (United States)","ror":"https://ror.org/03jyqk712","country_code":"US","type":"company","lineage":["https://openalex.org/I2250955327","https://openalex.org/I4210146936"]}],"countries":["CN","US"],"is_corresponding":false,"raw_author_name":"Adi Molkho","raw_affiliation_strings":["Tel-Aviv Research Center,Huawei,Israel","Tel-Aviv Research Center, Huawei, Israel"],"affiliations":[{"raw_affiliation_string":"Tel-Aviv Research Center,Huawei,Israel","institution_ids":["https://openalex.org/I2250955327","https://openalex.org/I4210146936"]},{"raw_affiliation_string":"Tel-Aviv Research Center, Huawei, Israel","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021185171","display_name":"Alon Dankner","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Alon Dankner","raw_affiliation_strings":["Israel"],"affiliations":[{"raw_affiliation_string":"Israel","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5078873548"],"corresponding_institution_ids":["https://openalex.org/I4210156197"],"apc_list":null,"apc_paid":null,"fwci":0.2009,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.4515346,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"33","last_page":"35"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.7216709852218628},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6623525619506836},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6593832969665527},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6559724807739258},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6494372487068176},{"id":"https://openalex.org/keywords/expansive","display_name":"Expansive","score":0.5854703783988953},{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.4844984710216522},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4698067307472229},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.423152357339859},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10265839099884033}],"concepts":[{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.7216709852218628},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6623525619506836},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6593832969665527},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6559724807739258},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6494372487068176},{"id":"https://openalex.org/C2780502288","wikidata":"https://www.wikidata.org/wiki/Q28838156","display_name":"Expansive","level":3,"score":0.5854703783988953},{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.4844984710216522},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4698067307472229},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.423152357339859},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10265839099884033},{"id":"https://openalex.org/C30407753","wikidata":"https://www.wikidata.org/wiki/Q186191","display_name":"Compressive strength","level":2,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icin56760.2023.10073483","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icin56760.2023.10073483","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 26th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W2113780533","https://openalex.org/W2117175761","https://openalex.org/W2151972741","https://openalex.org/W2297894457","https://openalex.org/W3160814718","https://openalex.org/W4200373727","https://openalex.org/W4286571634"],"related_works":["https://openalex.org/W2789663798","https://openalex.org/W2375896275","https://openalex.org/W2166943775","https://openalex.org/W2158007046","https://openalex.org/W2775236000","https://openalex.org/W2071426633","https://openalex.org/W2349754162","https://openalex.org/W1903420481","https://openalex.org/W3212927647","https://openalex.org/W4286859165"],"abstract_inverted_index":{"DDoS":[0,31,41],"attacks":[1],"continue":[2],"to":[3,8,37,66,72,77,93,102,114],"pose":[4],"a":[5,84,108],"major":[6],"threat":[7],"the":[9,78,116,123],"Internet\u2019s":[10],"stability.":[11],"Current":[12],"solutions":[13],"are":[14,47],"costly":[15],"and":[16,58,142],"require":[17],"deployment":[18],"of":[19,87,118,134,140],"dedicated":[20],"expansive":[21],"scrubbing":[22],"centers.":[23],"We":[24,106,127],"present":[25],"DDP,":[26],"an":[27,98],"incentive":[28,99],"based":[29,55],"Decentralized":[30],"Protection":[32],"mechanism":[33],"that":[34,61,111,129],"enables":[35,91,112],"operators":[36,92],"apply":[38],"near":[39],"attack-source":[40],"mitigation,":[42],"using":[43],"network":[44],"devices":[45],"which":[46],"already":[48],"deployed":[49],"in":[50,104],"their":[51],"network.":[52],"DDP":[53,88],"is":[54,83],"on":[56],"blockchain":[57],"smart":[59],"contracts":[60],"make":[62],"all":[63,67],"accounting":[64],"transparent":[65],"participant":[68],"operators,":[69],"allowing":[70],"them":[71,101],"get":[73,137],"accurate":[74],"compensation":[75],"according":[76],"effort":[79],"they":[80],"invest.":[81],"This":[82],"unique":[85],"advantage":[86],"as":[89],"it":[90],"charge":[94],"for":[95,100],"protection,":[96],"providing":[97],"participate":[103],"DDP.":[105],"provide":[107],"demo":[109],"tool":[110],"us":[113],"measure":[115],"percentage":[117],"filtered":[119],"attack":[120],"traffic":[121],"per":[122],"operators\u2019":[124],"participation":[125,132],"percentage.":[126],"show":[128],"even":[130],"at":[131],"rate":[133,139],"50%":[135],"we":[136],"filtration":[138],"89.2%":[141],"0%":[143],"false":[144],"positive.":[145]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-19T19:40:27.379048","created_date":"2025-10-10T00:00:00"}
