{"id":"https://openalex.org/W4391136398","doi":"https://doi.org/10.1145/3641106","title":"SecEG: A Secure and Efficient Strategy against DDoS Attacks in Mobile Edge Computing","display_name":"SecEG: A Secure and Efficient Strategy against DDoS Attacks in Mobile Edge Computing","publication_year":2024,"publication_date":"2024-01-23","ids":{"openalex":"https://openalex.org/W4391136398","doi":"https://doi.org/10.1145/3641106"},"language":"en","primary_location":{"id":"doi:10.1145/3641106","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3641106","pdf_url":null,"source":{"id":"https://openalex.org/S170502224","display_name":"ACM Transactions on Sensor Networks","issn_l":"1550-4859","issn":["1550-4859","1550-4867"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Sensor Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015739024","display_name":"Haiyang Huang","orcid":"https://orcid.org/0000-0001-8451-3337"},"institutions":[{"id":"https://openalex.org/I25254941","display_name":"Beijing Normal University","ror":"https://ror.org/022k4wk35","country_code":"CN","type":"education","lineage":["https://openalex.org/I25254941"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haiyang Huang","raw_affiliation_strings":["Institute of Artificial Intelligence and Future Networks, Beijing Normal University, Zhuhai, China"],"affiliations":[{"raw_affiliation_string":"Institute of Artificial Intelligence and Future Networks, Beijing Normal University, Zhuhai, China","institution_ids":["https://openalex.org/I25254941"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101525206","display_name":"Tianhui Meng","orcid":"https://orcid.org/0000-0002-2826-7757"},"institutions":[{"id":"https://openalex.org/I25254941","display_name":"Beijing Normal University","ror":"https://ror.org/022k4wk35","country_code":"CN","type":"education","lineage":["https://openalex.org/I25254941"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tianhui Meng","raw_affiliation_strings":["Institute of Artificial Intelligence and Future Networks, Beijing Normal University, Zhuhai, China"],"affiliations":[{"raw_affiliation_string":"Institute of Artificial Intelligence and Future Networks, Beijing Normal University, Zhuhai, China","institution_ids":["https://openalex.org/I25254941"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028160889","display_name":"Jianxiong Guo","orcid":"https://orcid.org/0000-0002-0994-3297"},"institutions":[{"id":"https://openalex.org/I12615008","display_name":"Beijing Normal-Hong Kong Baptist University","ror":"https://ror.org/04snvc712","country_code":"CN","type":"education","lineage":["https://openalex.org/I12615008"]},{"id":"https://openalex.org/I25254941","display_name":"Beijing Normal University","ror":"https://ror.org/022k4wk35","country_code":"CN","type":"education","lineage":["https://openalex.org/I25254941"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianxiong Guo","raw_affiliation_strings":["Institute of Artificial Intelligence and Future Networks, Beijing Normal University, Zhuhai, China and Guangdong Key Lab of AI and Multi-Modal Data Processing, BNU-HKBU United International College, Zhuhai, China"],"affiliations":[{"raw_affiliation_string":"Institute of Artificial Intelligence and Future Networks, Beijing Normal University, Zhuhai, China and Guangdong Key Lab of AI and Multi-Modal Data Processing, BNU-HKBU United International College, Zhuhai, China","institution_ids":["https://openalex.org/I12615008","https://openalex.org/I25254941"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084203901","display_name":"Xuekai Wei","orcid":"https://orcid.org/0000-0002-3761-1759"},"institutions":[{"id":"https://openalex.org/I25254941","display_name":"Beijing Normal University","ror":"https://ror.org/022k4wk35","country_code":"CN","type":"education","lineage":["https://openalex.org/I25254941"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuekai Wei","raw_affiliation_strings":["Institute of Artificial Intelligence and Future Networks, Beijing Normal University, Zhuhai, China"],"affiliations":[{"raw_affiliation_string":"Institute of Artificial Intelligence and Future Networks, Beijing Normal University, Zhuhai, China","institution_ids":["https://openalex.org/I25254941"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101752580","display_name":"Weijia Jia","orcid":"https://orcid.org/0000-0003-1000-3937"},"institutions":[{"id":"https://openalex.org/I12615008","display_name":"Beijing Normal-Hong Kong Baptist University","ror":"https://ror.org/04snvc712","country_code":"CN","type":"education","lineage":["https://openalex.org/I12615008"]},{"id":"https://openalex.org/I25254941","display_name":"Beijing Normal University","ror":"https://ror.org/022k4wk35","country_code":"CN","type":"education","lineage":["https://openalex.org/I25254941"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weijia Jia","raw_affiliation_strings":["Institute of Artificial Intelligence and Future Networks, Beijing Normal University, Zhuhai, China and Guangdong Key Lab of AI and Multi-Modal Data Processing, BNU-HKBU United International College, Zhuhai, China"],"affiliations":[{"raw_affiliation_string":"Institute of Artificial Intelligence and Future Networks, Beijing Normal University, Zhuhai, China and Guangdong Key Lab of AI and Multi-Modal Data Processing, BNU-HKBU United International College, Zhuhai, China","institution_ids":["https://openalex.org/I12615008","https://openalex.org/I25254941"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5015739024"],"corresponding_institution_ids":["https://openalex.org/I25254941"],"apc_list":null,"apc_paid":null,"fwci":2.0514,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.86499546,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":"20","issue":"3","first_page":"1","last_page":"21"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.9153029918670654},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8902720212936401},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.6850206851959229},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.6667081117630005},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.6118481755256653},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.4707503914833069},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4579005539417267},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4459972381591797},{"id":"https://openalex.org/keywords/mobile-edge-computing","display_name":"Mobile edge computing","score":0.41715067625045776},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4074837565422058},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3322734236717224},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.3118159770965576},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.14869126677513123},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.12678703665733337},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07947763800621033}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.9153029918670654},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8902720212936401},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.6850206851959229},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.6667081117630005},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.6118481755256653},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.4707503914833069},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4579005539417267},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4459972381591797},{"id":"https://openalex.org/C2776061582","wikidata":"https://www.wikidata.org/wiki/Q25325231","display_name":"Mobile edge computing","level":3,"score":0.41715067625045776},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4074837565422058},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3322734236717224},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.3118159770965576},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14869126677513123},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.12678703665733337},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07947763800621033}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3641106","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3641106","pdf_url":null,"source":{"id":"https://openalex.org/S170502224","display_name":"ACM Transactions on Sensor Networks","issn_l":"1550-4859","issn":["1550-4859","1550-4867"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Sensor Networks","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5400000214576721,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1419295722","display_name":null,"funder_award_id":"110190","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1477544716","display_name":null,"funder_award_id":"Guangdong","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2829093292","display_name":null,"funder_award_id":"20170012","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3151590080","display_name":null,"funder_award_id":"61872239","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3867600133","display_name":null,"funder_award_id":"2017001","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6258415954","display_name":null,"funder_award_id":"Chinese","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7033253288","display_name":null,"funder_award_id":"Grants","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7490658828","display_name":null,"funder_award_id":"221790","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321038","display_name":"Fonds National de la Recherche Luxembourg","ror":"https://ror.org/039z13y21"},{"id":"https://openalex.org/F4320321432","display_name":"Beijing Normal University","ror":"https://ror.org/022k4wk35"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W2136005005","https://openalex.org/W2339906234","https://openalex.org/W2613693574","https://openalex.org/W2733765803","https://openalex.org/W2773498880","https://openalex.org/W2788455797","https://openalex.org/W2793025358","https://openalex.org/W2894001169","https://openalex.org/W2899756632","https://openalex.org/W2910068345","https://openalex.org/W2921475081","https://openalex.org/W2951187092","https://openalex.org/W2959716986","https://openalex.org/W2967136126","https://openalex.org/W3029446097","https://openalex.org/W3083405908","https://openalex.org/W3089088190","https://openalex.org/W3093665612","https://openalex.org/W3094130405","https://openalex.org/W3126956508","https://openalex.org/W3152709638","https://openalex.org/W3153951905","https://openalex.org/W3159975148","https://openalex.org/W3172155345","https://openalex.org/W3200583622","https://openalex.org/W4200571820","https://openalex.org/W4205961034","https://openalex.org/W4210445337","https://openalex.org/W4210526653","https://openalex.org/W4220900646","https://openalex.org/W4232135423","https://openalex.org/W4237032351","https://openalex.org/W4281740121","https://openalex.org/W4288064524","https://openalex.org/W4302369416","https://openalex.org/W4312864291","https://openalex.org/W4362720671","https://openalex.org/W6737853578","https://openalex.org/W6980196572"],"related_works":["https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W1968168724","https://openalex.org/W2204131204","https://openalex.org/W4322008378","https://openalex.org/W2383770723","https://openalex.org/W2754163055","https://openalex.org/W2186749541","https://openalex.org/W2360429410","https://openalex.org/W4256682929"],"abstract_inverted_index":{"Application-layer":[0],"distributed":[1],"denial-of-service":[2],"(DDoS)":[3],"attacks":[4,30,107,137],"incapacitate":[5],"systems":[6],"by":[7,142,212],"using":[8],"up":[9,224],"their":[10],"resources,":[11,50,78],"causing":[12],"service":[13,175,206],"interruptions,":[14],"financial":[15],"losses,":[16],"and":[17,27,75,102,138,147,173,218],"more.":[18],"Consequently,":[19],"advanced":[20],"deep-learning":[21],"techniques":[22],"are":[23,64],"used":[24],"to":[25,44,130,157,167,202,225],"detect":[26,158],"mitigate":[28],"these":[29,52,94],"in":[31,35,58,185],"cloud":[32],"infrastructures.":[33],"However,":[34],"mobile":[36],"edge":[37,59,121,170,188],"computing":[38],"(MEC),":[39],"it":[40],"becomes":[41],"economically":[42],"impractical":[43],"equip":[45],"each":[46],"node":[47],"with":[48,115],"defensive":[49],"as":[51],"resources":[53],"may":[54],"largely":[55],"remain":[56],"unused":[57],"devices.":[60],"Furthermore,":[61],"current":[62],"methods":[63],"mainly":[65],"concentrated":[66],"on":[67,120],"improving":[68],"the":[69,80,169,174,186,194,197,205,219],"accuracy":[70],"of":[71,83,196,208],"DDoS":[72,90,106,136,159,181,216],"attack":[73,149],"detection":[74,119],"saving":[76],"CPU":[77,220],"neglecting":[79],"effective":[81],"allocation":[82,172],"computational":[84],"power":[85],"for":[86,108,177],"benign":[87,139,178,209],"tasks":[88],"under":[89,214],"attacks.":[91,160,182],"To":[92],"address":[93],"issues,":[95],"this":[96],"paper":[97],"introduces":[98],"SecEG,":[99],"a":[100,125],"secure":[101],"efficient":[103,164],"strategy":[104],"against":[105],"MEC":[109],"that":[110],"integrates":[111],"container-based":[112],"task":[113],"isolation":[114],"lightweight":[116],"online":[117],"anomaly":[118],"nodes.":[122],"More":[123],"specifically,":[124],"new":[126],"model":[127],"is":[128,155,222],"proposed":[129,156,198],"analyze":[131],"resource":[132,171,221],"contention":[133],"dynamics":[134],"between":[135],"tasks.":[140],"Subsequently,":[141],"employing":[143],"periodic":[144],"packet":[145],"sampling":[146],"real-time":[148],"intensity":[150],"predicting,":[151],"an":[152,163],"autoencoder-based":[153],"method":[154,166],"We":[161],"leverage":[162],"scheduling":[165],"optimize":[168],"quality":[176],"users":[179],"during":[180],"When":[183],"executed":[184],"real-world":[187],"environment,":[189],"our":[190],"experimental":[191],"findings":[192],"validate":[193],"efficacy":[195],"SecEG":[199],"strategy.":[200],"Compared":[201],"conventional":[203],"methods,":[204],"rate":[207],"requests":[210],"increases":[211],"23%":[213],"intense":[215],"attacks,":[217],"saved":[223],"35%.":[226]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
