{"id":"https://openalex.org/W4405992904","doi":"https://doi.org/10.1145/3700838.3703687","title":"NetProbe: Deep Learning-Driven DDoS Detection with a Two-Tiered Mitigation Strategy","display_name":"NetProbe: Deep Learning-Driven DDoS Detection with a Two-Tiered Mitigation Strategy","publication_year":2025,"publication_date":"2025-01-02","ids":{"openalex":"https://openalex.org/W4405992904","doi":"https://doi.org/10.1145/3700838.3703687"},"language":"en","primary_location":{"id":"doi:10.1145/3700838.3703687","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3700838.3703687","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th International Conference on Distributed Computing and Networking","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3700838.3703687","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025659496","display_name":"Prianshu Jha","orcid":"https://orcid.org/0009-0005-6464-7246"},"institutions":[{"id":"https://openalex.org/I162030827","display_name":"Thapar Institute of Engineering & Technology","ror":"https://ror.org/00wdq3744","country_code":"IN","type":"education","lineage":["https://openalex.org/I162030827"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Prianshu Jha","raw_affiliation_strings":["Department of Computer Science and Engineering, Thapar Institute of Engineering and Technology, Patiala, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Thapar Institute of Engineering and Technology, Patiala, Punjab, India","institution_ids":["https://openalex.org/I162030827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103177993","display_name":"Gurpreet Singh","orcid":"https://orcid.org/0009-0003-2712-3190"},"institutions":[{"id":"https://openalex.org/I162030827","display_name":"Thapar Institute of Engineering & Technology","ror":"https://ror.org/00wdq3744","country_code":"IN","type":"education","lineage":["https://openalex.org/I162030827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Gurpreet Singh","raw_affiliation_strings":["Department of Computer Science and Engineering, Thapar Institute of Engineering and Technology, Patiala, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Thapar Institute of Engineering and Technology, Patiala, Punjab, India","institution_ids":["https://openalex.org/I162030827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110659590","display_name":"Amit Kumar","orcid":null},"institutions":[{"id":"https://openalex.org/I162030827","display_name":"Thapar Institute of Engineering & Technology","ror":"https://ror.org/00wdq3744","country_code":"IN","type":"education","lineage":["https://openalex.org/I162030827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Amit Kumar","raw_affiliation_strings":["Department of Computer Science and Engineering, Thapar Institute of Engineering and Technology, Patiala, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Thapar Institute of Engineering and Technology, Patiala, Punjab, India","institution_ids":["https://openalex.org/I162030827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101620221","display_name":"Dewesh Agrawal","orcid":"https://orcid.org/0009-0002-8148-159X"},"institutions":[{"id":"https://openalex.org/I162030827","display_name":"Thapar Institute of Engineering & Technology","ror":"https://ror.org/00wdq3744","country_code":"IN","type":"education","lineage":["https://openalex.org/I162030827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Dewesh Agrawal","raw_affiliation_strings":["Department of Computer Science and Engineering, Thapar Institute of Engineering and Technology, Patiala, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Thapar Institute of Engineering and Technology, Patiala, Punjab, India","institution_ids":["https://openalex.org/I162030827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010706171","display_name":"Yashwant Singh Patel","orcid":"https://orcid.org/0000-0001-9322-2160"},"institutions":[{"id":"https://openalex.org/I90267481","display_name":"Ume\u00e5 University","ror":"https://ror.org/05kb8h459","country_code":"SE","type":"education","lineage":["https://openalex.org/I90267481"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Yashwant Singh Patel","raw_affiliation_strings":["Department of Computing Science, Umea University, Ume\u00e5, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Computing Science, Umea University, Ume\u00e5, Sweden","institution_ids":["https://openalex.org/I90267481"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085156523","display_name":"Javad Forough","orcid":"https://orcid.org/0000-0003-3399-2440"},"institutions":[{"id":"https://openalex.org/I90267481","display_name":"Ume\u00e5 University","ror":"https://ror.org/05kb8h459","country_code":"SE","type":"education","lineage":["https://openalex.org/I90267481"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Javad Forough","raw_affiliation_strings":["Department of Computing Science, Umea University, Ume\u00e5, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Computing Science, Umea University, Ume\u00e5, Sweden","institution_ids":["https://openalex.org/I90267481"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5025659496"],"corresponding_institution_ids":["https://openalex.org/I162030827"],"apc_list":null,"apc_paid":null,"fwci":2.9775,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.89263623,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"402","last_page":"407"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7308475971221924},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7032076120376587},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.59070885181427},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4827103614807129},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.09301638603210449},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.08883994817733765}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7308475971221924},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7032076120376587},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.59070885181427},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4827103614807129},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.09301638603210449},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.08883994817733765}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3700838.3703687","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3700838.3703687","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th International Conference on Distributed Computing and Networking","raw_type":"proceedings-article"},{"id":"pmh:oai:DiVA.org:umu-236112","is_oa":true,"landing_page_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-236112","pdf_url":"https://umu.diva-portal.org/smash/get/diva2:1943323/FULLTEXT01","source":{"id":"https://openalex.org/S4306400361","display_name":"DiVA at Ume\u00e5 University (Ume\u00e5 University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I90267481","host_organization_name":"Ume\u00e5 University","host_organization_lineage":["https://openalex.org/I90267481"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"doi:10.1145/3700838.3703687","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3700838.3703687","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th International Conference on Distributed Computing and Networking","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.8500000238418579,"display_name":"Climate action","id":"https://metadata.un.org/sdg/13"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2625013748","https://openalex.org/W2982682021","https://openalex.org/W2993853848","https://openalex.org/W3003378062","https://openalex.org/W3194274338","https://openalex.org/W4223479306","https://openalex.org/W4225728612","https://openalex.org/W4281385944","https://openalex.org/W4285184516","https://openalex.org/W4390413371","https://openalex.org/W4391090519"],"related_works":["https://openalex.org/W2731899572","https://openalex.org/W3215138031","https://openalex.org/W3009238340","https://openalex.org/W4360585206","https://openalex.org/W4321369474","https://openalex.org/W4285208911","https://openalex.org/W3082895349","https://openalex.org/W4213079790","https://openalex.org/W2248239756","https://openalex.org/W3086377361"],"abstract_inverted_index":{"Web":[0],"servers":[1,23],"are":[2,24],"the":[3,11,40,56,75,168,201],"backbone":[4],"of":[5,35,43,55,68,93,198],"modern":[6,228],"Internet":[7],"infrastructure,":[8],"serving":[9],"as":[10],"primary":[12],"medium":[13],"for":[14,78,125,227],"online":[15],"information":[16],"distribution.":[17],"Despite":[18],"their":[19],"critical":[20],"role,":[21],"web":[22,229],"susceptible":[25],"to":[26,50,166,217],"cyber-attacks.":[27],"While":[28],"current":[29],"firewall":[30],"mechanisms":[31],"provide":[32],"some":[33],"level":[34],"protection":[36],"against":[37],"cyber":[38],"threats,":[39],"evolving":[41],"nature":[42],"these":[44],"attacks":[45,61],"and":[46,80,84,101,103,120,129,161,170,185,210,224],"emerging":[47],"vulnerabilities":[48],"continue":[49],"pose":[51],"significant":[52],"risks.":[53],"One":[54],"most":[57],"prevalent":[58],"yet":[59],"lethal":[60],"known":[62],"today":[63],"is":[64],"DDoS":[65,126,139],"(Distributed":[66],"Denial":[67],"Service)":[69],"attacks.":[70],"These":[71],"growing":[72],"risks":[73],"emphasize":[74],"urgent":[76],"need":[77],"dynamic":[79],"robust":[81],"threat":[82],"detection":[83,128,141,184,208],"mitigation":[85,146,154],"systems.":[86],"This":[87],"paper":[88],"presents":[89],"a":[90,137,145,152],"comparative":[91],"analysis":[92],"ensemble":[94],"learning":[95],"models":[96,106],"(e.g.,":[97,107],"Random":[98],"Forest,":[99],"XGBoost,":[100],"LightGBM)":[102],"neural":[104],"network-based":[105],"Graph":[108],"Neural":[109],"Networks":[110],"(GNN),":[111],"Long":[112],"Short-Term":[113],"Memory":[114],"networks":[115],"(LSTM)":[116],"with":[117,144,174],"attention":[118],"layers,":[119],"Gated":[121],"Recurrent":[122],"Units":[123],"(GRU))":[124],"attack":[127,140],"classification.":[130],"Based":[131],"on":[132],"this":[133],"analysis,":[134],"we":[135],"propose":[136],"real-time":[138,192],"system":[142,150],"integrated":[143],"mechanism.":[147],"The":[148,178],"proposed":[149,202],"utilizes":[151],"two-tiered":[153],"strategy":[155],"assisted":[156],"by":[157],"UFW":[158],"(Uncomplicated":[159],"Firewall)":[160],"Apache":[162],"server":[163,230],"configuration":[164],"files":[165],"block":[167],"incoming":[169],"outgoing":[171],"traffic":[172],"associated":[173],"suspicious":[175],"IP":[176],"addresses.":[177],"system's":[179],"overall":[180],"complexity,":[181],"integrating":[182],"both":[183],"response":[186],"processes,":[187],"ensures":[188],"its":[189],"efficiency":[190],"in":[191,207,213],"environments":[193],"while":[194],"handling":[195],"large":[196],"volumes":[197],"traffic.":[199],"Furthermore,":[200],"approach":[203],"achieves":[204],"15%":[205],"improvement":[206],"accuracy":[209],"20%":[211],"reduction":[212],"false":[214],"positives":[215],"compared":[216],"traditional":[218],"techniques,":[219],"making":[220],"it":[221],"an":[222],"effective":[223],"scalable":[225],"solution":[226],"security.":[231]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
