{"id":"https://openalex.org/W4400236709","doi":"https://doi.org/10.1145/3663408.3663424","title":"ShieldGPT: An LLM-based Framework for DDoS Mitigation","display_name":"ShieldGPT: An LLM-based Framework for DDoS Mitigation","publication_year":2024,"publication_date":"2024-07-02","ids":{"openalex":"https://openalex.org/W4400236709","doi":"https://doi.org/10.1145/3663408.3663424"},"language":"en","primary_location":{"id":"doi:10.1145/3663408.3663424","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3663408.3663424","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th Asia-Pacific Workshop on Networking","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3663408.3663424","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023163420","display_name":"Tongze Wang","orcid":"https://orcid.org/0009-0007-0052-8402"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tongze Wang","raw_affiliation_strings":["Tsinghua University, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101977658","display_name":"Xiaohui Xie","orcid":"https://orcid.org/0000-0001-9413-4461"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaohui Xie","raw_affiliation_strings":["Tsinghua University, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100603173","display_name":"Lei Zhang","orcid":"https://orcid.org/0009-0007-8798-336X"},"institutions":[{"id":"https://openalex.org/I2250955327","display_name":"Huawei Technologies (China)","ror":"https://ror.org/00cmhce21","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250955327"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Zhang","raw_affiliation_strings":["Huawei, China","Zhongguancun Laboratory, China"],"affiliations":[{"raw_affiliation_string":"Huawei, China","institution_ids":["https://openalex.org/I2250955327"]},{"raw_affiliation_string":"Zhongguancun Laboratory, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067041421","display_name":"Chuyi Wang","orcid":"https://orcid.org/0009-0002-8296-3785"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chuyi Wang","raw_affiliation_strings":["Tsinghua University, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022203596","display_name":"Liang Zhang","orcid":"https://orcid.org/0000-0002-2035-6157"},"institutions":[{"id":"https://openalex.org/I2250955327","display_name":"Huawei Technologies (China)","ror":"https://ror.org/00cmhce21","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250955327"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liang Zhang","raw_affiliation_strings":["Huawei, China","Zhongguancun Laboratory, China"],"affiliations":[{"raw_affiliation_string":"Huawei, China","institution_ids":["https://openalex.org/I2250955327"]},{"raw_affiliation_string":"Zhongguancun Laboratory, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091090025","display_name":"Yong Cui","orcid":"https://orcid.org/0000-0002-5171-739X"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Cui","raw_affiliation_strings":["Tsinghua University, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5023163420"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":12.8819,"has_fulltext":false,"cited_by_count":37,"citation_normalized_percentile":{"value":0.99108343,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"108","last_page":"114"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6186314821243286},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6084449887275696},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4105474054813385},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.13765886425971985},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.09761378169059753}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6186314821243286},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6084449887275696},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4105474054813385},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.13765886425971985},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.09761378169059753}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3663408.3663424","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3663408.3663424","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th Asia-Pacific Workshop on Networking","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3663408.3663424","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3663408.3663424","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th Asia-Pacific Workshop on Networking","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","score":0.75,"display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2597472767","https://openalex.org/W2787944753","https://openalex.org/W2797742547","https://openalex.org/W3038154406","https://openalex.org/W3093459272","https://openalex.org/W3105750153","https://openalex.org/W3117819143","https://openalex.org/W3121731896","https://openalex.org/W4224315052","https://openalex.org/W4382239858","https://openalex.org/W4388625470","https://openalex.org/W4388625574","https://openalex.org/W4388629193","https://openalex.org/W4388629245","https://openalex.org/W4388644518","https://openalex.org/W4391582407"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W4386482731","https://openalex.org/W2765763546","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W4256682929","https://openalex.org/W335511927","https://openalex.org/W2471811227","https://openalex.org/W2217591390"],"abstract_inverted_index":{"The":[0,59],"constantly":[1],"evolving":[2],"Distributed":[3],"Denial":[4],"of":[5,21,28,61,89,114,119,172],"Service":[6],"(DDoS)":[7],"attacks":[8],"pose":[9],"a":[10,25,67,80,124],"significant":[11],"threat":[12],"to":[13,46,70,141,153,177],"the":[14,19,87,106,109,117,142,168],"cyber":[15],"realm,":[16],"which":[17],"underscores":[18],"importance":[20],"DDoS":[22,42,82,179],"mitigation":[23,53,83,159,180],"as":[24],"pivotal":[26],"area":[27],"research.":[29],"While":[30],"existing":[31],"AI-driven":[32],"approaches,":[33],"including":[34],"deep":[35],"neural":[36],"networks,":[37],"show":[38],"promise":[39],"in":[40],"detecting":[41],"attacks,":[43],"their":[44,56],"inability":[45],"elucidate":[47],"prediction":[48],"rationales":[49],"and":[50,101,116,131,145,158,164,170,185],"provide":[51],"actionable":[52],"measures":[54],"limits":[55],"practical":[57],"utility.":[58],"advent":[60],"large":[62],"language":[63,111],"models":[64],"(LLMs)":[65],"offers":[66],"novel":[68],"avenue":[69],"overcome":[71],"these":[72],"limitations.":[73],"In":[74],"this":[75],"work,":[76],"we":[77,122,136],"introduce":[78],"ShieldGPT,":[79,173],"comprehensive":[81],"framework":[84],"that":[85,127,150],"harnesses":[86],"power":[88],"LLMs.":[90],"ShieldGPT":[91],"comprises":[92],"four":[93],"components:":[94],"attack":[95],"detection,":[96],"traffic":[97,133],"representation,":[98],"domain-knowledge":[99],"injection":[100],"role":[102],"representation.":[103],"To":[104],"bridge":[105],"gap":[107],"between":[108],"natural":[110],"processing":[112],"capabilities":[113],"LLMs":[115,152],"intricacies":[118],"network":[120,143],"traffic,":[121],"develop":[123],"representation":[125],"scheme":[126],"captures":[128],"both":[129],"global":[130],"local":[132],"features.":[134],"Furthermore,":[135],"explore":[137],"prompt":[138,148],"engineering":[139],"specific":[140],"domain":[144],"design":[146],"two":[147],"templates":[149],"leverage":[151],"produce":[154],"traffic-specific,":[155],"comprehensible":[156],"explanations":[157],"instructions.":[160],"Our":[161],"preliminary":[162],"experiments":[163],"case":[165],"studies":[166],"validate":[167],"effectiveness":[169],"applicability":[171],"demonstrating":[174],"its":[175],"potential":[176],"enhance":[178],"efforts":[181],"with":[182],"nuanced":[183],"insights":[184],"tailored":[186],"strategies.":[187]},"counts_by_year":[{"year":2026,"cited_by_count":8},{"year":2025,"cited_by_count":23},{"year":2024,"cited_by_count":6}],"updated_date":"2026-03-31T07:56:22.981413","created_date":"2025-10-10T00:00:00"}
