{"id":"https://openalex.org/W4283740145","doi":"https://doi.org/10.1145/3535782.3535838","title":"A Deep Learning Approach to Create DNS Amplification Attacks","display_name":"A Deep Learning Approach to Create DNS Amplification Attacks","publication_year":2022,"publication_date":"2022-04-28","ids":{"openalex":"https://openalex.org/W4283740145","doi":"https://doi.org/10.1145/3535782.3535838"},"language":"en","primary_location":{"id":"doi:10.1145/3535782.3535838","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3535782.3535838","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Conference on Management Science and Industrial Engineering","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2206.14346","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079544499","display_name":"Jared Mathews","orcid":null},"institutions":[{"id":"https://openalex.org/I91036609","display_name":"Citadel","ror":"https://ror.org/01vwr6t80","country_code":"US","type":"education","lineage":["https://openalex.org/I91036609"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jared Mathews","raw_affiliation_strings":["The Citadel, USA"],"affiliations":[{"raw_affiliation_string":"The Citadel, USA","institution_ids":["https://openalex.org/I91036609"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070952809","display_name":"Prosenjit Chatterjee","orcid":"https://orcid.org/0000-0003-1169-4717"},"institutions":[{"id":"https://openalex.org/I91036609","display_name":"Citadel","ror":"https://ror.org/01vwr6t80","country_code":"US","type":"education","lineage":["https://openalex.org/I91036609"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Prosenjit Chatterjee","raw_affiliation_strings":["The Citadel, USA"],"affiliations":[{"raw_affiliation_string":"The Citadel, USA","institution_ids":["https://openalex.org/I91036609"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019855970","display_name":"Shankar M. Banik","orcid":"https://orcid.org/0000-0001-6866-3896"},"institutions":[{"id":"https://openalex.org/I91036609","display_name":"Citadel","ror":"https://ror.org/01vwr6t80","country_code":"US","type":"education","lineage":["https://openalex.org/I91036609"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shankar Banik","raw_affiliation_strings":["The Citadel, USA"],"affiliations":[{"raw_affiliation_string":"The Citadel, USA","institution_ids":["https://openalex.org/I91036609"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110218479","display_name":"C. Nance","orcid":null},"institutions":[{"id":"https://openalex.org/I91036609","display_name":"Citadel","ror":"https://ror.org/01vwr6t80","country_code":"US","type":"education","lineage":["https://openalex.org/I91036609"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Cory Nance","raw_affiliation_strings":["The Citadel, USA"],"affiliations":[{"raw_affiliation_string":"The Citadel, USA","institution_ids":["https://openalex.org/I91036609"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5079544499"],"corresponding_institution_ids":["https://openalex.org/I91036609"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.0646873,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"429","last_page":"435"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8357908129692078},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7188014388084412},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6821936368942261},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6650856137275696},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.6616722345352173},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6479178667068481},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6445419788360596},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5619391798973083},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.48979616165161133},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.120094895362854}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8357908129692078},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7188014388084412},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6821936368942261},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6650856137275696},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.6616722345352173},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6479178667068481},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6445419788360596},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5619391798973083},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.48979616165161133},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.120094895362854},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3535782.3535838","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3535782.3535838","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Conference on Management Science and Industrial Engineering","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2206.14346","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2206.14346","pdf_url":"https://arxiv.org/pdf/2206.14346","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2206.14346","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2206.14346","pdf_url":"https://arxiv.org/pdf/2206.14346","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2243397390","https://openalex.org/W2962718684","https://openalex.org/W2963612069","https://openalex.org/W2963857521","https://openalex.org/W2971480956","https://openalex.org/W2982682021","https://openalex.org/W2997681437","https://openalex.org/W3008276149","https://openalex.org/W3022802582","https://openalex.org/W3104423855","https://openalex.org/W3105604018","https://openalex.org/W4293478688"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4310988119","https://openalex.org/W4285226279","https://openalex.org/W4288019534"],"abstract_inverted_index":{"In":[0,97],"recent":[1],"years,":[2],"deep":[3],"learning":[4,31,38,66,159],"has":[5,67],"shown":[6],"itself":[7],"to":[8,23,39,46,49,53,107,118,127,132,140],"be":[9,162],"an":[10],"incredibly":[11],"valuable":[12],"tool":[13],"in":[14,61,70,147],"cybersecurity":[15],"as":[16,130,142],"it":[17],"helps":[18],"network":[19,52,134,139,166],"intrusion":[20,135,167],"detection":[21,136,168],"systems":[22,137],"classify":[24,141],"attacks":[25],"and":[26,73,95,102,154],"detect":[27],"new":[28],"ones.":[29],"Adversarial":[30],"is":[32],"the":[33,50,58,62,88,100,133],"process":[34],"of":[35,44,57,64,81,85,123],"utilizing":[36],"machine":[37],"generate":[40,119],"a":[41,78,108,165],"perturbed":[42],"set":[43],"inputs":[45,131],"then":[47,128],"feed":[48,129],"neural":[51,138,169],"misclassify":[54],"it.":[55],"Much":[56],"current":[59],"work":[60,149],"field":[63],"adversarial":[65,125,158],"been":[68],"conducted":[69],"image":[71,152],"processing":[72,76,153,157],"natural":[74,155],"language":[75,156],"with":[77],"wide":[79],"variety":[80],"algorithms.":[82],"Two":[83],"algorithms":[84,104,115,160],"interest":[86],"are":[87,105,116],"Elastic-Net":[89],"Attack":[90],"on":[91],"Deep":[92],"Neural":[93],"Networks":[94],"TextAttack.":[96],"our":[98],"experiment":[99],"EAD":[101],"TextAttack":[103],"applied":[106,163],"Domain":[109],"Name":[110],"System":[111],"amplification":[112],"classifier.":[113],"The":[114],"used":[117],"malicious":[120],"Distributed":[121],"Denial":[122],"Service":[124],"examples":[126],"valid":[143],"traffic.":[144],"We":[145],"show":[146],"this":[148],"that":[150],"both":[151],"can":[161],"against":[164],"network.":[170]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-29T08:15:47.926485","created_date":"2025-10-10T00:00:00"}
